CISSP Domain 1 Access Control Vocab Flashcards
(82 cards)
Discretionary access control
gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
Mandatory access control
system enforced access control based on subject’s clearances and object’s labels.
Role-based access control
subjects are grouped into roles, and each defined role has access permissions based upon the role, not the individual.
CIA Triad
confidentiality, integrity, and availability.
Confidentiality
seeks to prevent the unauthorized disclosure of information; it keeps data secret. In other words, confidentiality seeks to prevent unauthorized read access to data.
Integrity
seeks to prevent an authorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. There are two types of integrity: data integrity and system integrity. Data integrity seeks to protect information against unauthorized modification; system integrity seeks to protect a system such as Windows 2008 server operating system from unauthorized modification.
Availability
ensures that information is available when needed. Systems need to be usable for normal business use. An example of an attack on availability would be a denial of service attack.
DAD
Disclosure, Alteration, and Destruction. The opposing force to the CIA Triad.
AAA
Authentication, Authorization, and accountability. Identification is understood with all three.
Subjects, objects, access permissions
Three important access control concepts.
Subjects
Entities that may be assigned permissions.
Objects
Types of resources that subjects may access.
Access permissions
Relationships between subjects and the objects they may access.
Four phases of access control.
Identification, authentication, authorization, accounting
Identification
User makes a claim as to his or her identity.
Authentication
User proves his or her identity using one or more mechanisms. Providing an identity claim.
Authorization
System makes decisions about what resources the user is allowed to access and the manner in which they may be manipulated. Allowing authenticated subjects access to a system
Accountability
System keeps an accurate audit trail of the users activity.
Non-Repudiation
a user cannot deny (repudiate) having performed a transaction. Authentication with integrity
Least Privilege
users should be granted the minimum amount of access (authorization) required to do their jobs, but no more. Need to know is more granular than lest privilidge, as the user must need to know that specific pieve of information before accessing it.
Defense in Depth or Layered Defense
applies multiple safegards or controls to protect an asset. Mulitple controls will increase your chances of secutiry.
Subject
an active entity on an information system.
object
a passive datafile.
Access control list (ACL)
Contains access control entities (ACEs) that correspond to access permissions.