Domain 5: Identity and Access Management Flashcards
MAC
Mandatory Access Control
Uses classifications and labels to define user access.
Used in very strict environments.
The Operating System enforces MAC (when used in a digital format).
DAC
Discretionary Access Control
Discretionary Access Control (DAC) allows the Data Owner to control and define access to objects.
ABAC
Attribute Access Control
Attribute-Based Access Control (ABAC) makes decisions based on attributes for either the subject, object, or actions.
RBAC
Role-based Access Control
Role-Based Access Control (RBAC) maps a subject’s role with their needed operations and tasks.
Type 1 authentication factor
Something you know: password, PIN
Type 2 Authentication factor
Something you have: Smartcard, MFA app on phone
Type 3 Authentication factor
Something you are: Fingerprint, voice id, face id
CER
Cross-over Error Rate: Defines the point where false rejection rates are equal to false acceptance rates.
Type 1 Error
Falsely rejected Authentication (user should have access but is denied)
Type 2 Error
False acceptance (User should NOT have access but is granted access.)
Registration (biometrics)
Registration is the capturing of an individuals biometric data.
(is this capturing of any type of identifiable data?)
Hybrid Federation
Related to a type of authentication infrastructure:
Authentication occurs on-premise, not in the cloud. Grants access to resources outside of just on-premise.
Cloud based federation
Uses a third party for shared federated identities. i.e. okta or duo
On-premise federation
Federation is hosted on premises for access to on-premises resources.
Relationship of federated identities and SSO
SSO provides single sign on to one organization.
Multiple SSO systems that agree to share information and access create a FEDERATION.
Two basic components of PKI
CA and RA - certificate authority and registration authority.
Public Key Infrastructure (PKI) uses a central authority to store encryption keys or certificates in order to establish the identity or digital signature of a user. PKI systems use certificate authorities (CAs) and registration authorities (RAs).
OAuth Connect pairs with _____ to perform identity verification, and obtain user profile information
Open ID Connect
Audit Trail
Log that provides play by play record of actions.
The audit trail allows an administrator to review events and users linked to those events. It can be used to review employee misconduct or provide a log of events leading to system failure. An audit trail is required for some security standards, including the Health Insurance Portability and Accountability Act (HIPAA).
Smart Card
Smart cards are credit card-sized devices that contain a microprocessor. A smart card typically contains an encrypted private key issued through a public key infrastructure (PKI) system that the authenticating environment trusts. When the smart card is inserted into a reader, the user must enter a PIN before the smart card releases the private key. Smart cards can be programmed to wipe themselves if a PIN is entered incorrectly too many times.
Identification device with the best tamper resistance
Smart Card
Access Control Matrix
Table that list objects, subjects, and their privileges.
SPML
Service Provisioning Markup Language
Used to provision users, resources, and services.
Is Non-Discretionary Access Model a thing?
Yes
The Non-Discretionary Access Control model uses a central administration element to govern access. Mandatory Access Control models employ data classification labels to control access.
CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition. Pg 681-690.
OpenID Provider
OpenID Provider or Identity Provider or IdP) performs user authentication, user consent, and token issuance