Domain 5: Identity and Access Management (IAM) Flashcards
Master IAM-related terminology including authentication, authorization, and identity lifecycle.
Define:
AAA Server
A network server that manages user access through authentication, determines user permissions via authorization, and logs user activity for accounting purposes.
A server that provides authentication, authorization, and accounting services for network devices and users. An AAA server is a network security device that controls access to a network by verifying the identity of a user or device and granting or denying access based on predefined policies. It is commonly used in enterprise networks to control access to resources and track user activity.
Or visit this Wikipedia page.
Define:
Access
The permission to enter or use a system, network, resource, or data, managed through authentication and authorization to protect against unauthorized use.
In the context of IT and cybersecurity, access refers to the permission or ability to enter or use a system, network, resource, or data. Managing access involves authenticating users to confirm their identity and authorizing them to interact with certain information or functionalities based on their roles, responsibilities, and established security policies. Access controls are put in place to prevent unauthorized individuals from gaining entry to sensitive systems or information, thereby protecting the confidentiality, integrity, and availability of data. Access can be categorized into physical access, which pertains to entering facilities, and logical access, related to using computer networks, systems, and data.
For more information, view this lecture on Introduction to Access Control. Or visit this Wikipedia page.
Define:
Access Control
The selective restriction of access to a system or network, where users must be authorized and authenticated to access specific resources, thereby protecting sensitive data.
Refers to the systematic regulation of the ability of authenticated users to view, use, or alter resources. This procedure safeguards sensitive data from unauthorized access, protects system integrity, and prevents potential disruptions. It includes techniques such as role-based access control (RBAC), discretionary access control (DAC), and mandatory access control (MAC), which decide the level of user access based on assigned roles, user discretion, and adherence to policies, respectively.
For more information, view this lecture on Introduction to Access Control. Or visit this Wikipedia page.
Define:
Access Control List
(ACL)
A security protocol feature listing permissions granted to various users or processes for accessing and modifying specific system objects or resources.
A table or database that keeps track of the permissions attached to an object, such as a file directory or a network interface. The ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. It is a key concept in file permissions, network security, and database management, where it is critical to maintain the right balance between security and usability.
For more information, view this lecture on Security models and concepts- Part 2. Or visit this Wikipedia page.
Define:
Access Control Matrix
A tabular representation of access permissions where rows are subjects (like users) and columns are objects (like files), showing who has what type of access.
A two-dimensional table used to implement an access control policy within a system. In this matrix, the rows represent subjects (like users or processes), and the columns represent objects (like files, directories, or devices). The intersection of a row and a column indicates the access rights that the subject has over the object. It offers a comprehensive view of the access rights within a system, assisting in the design, implementation, and auditing of access control policies.
For more information, view this lecture on Security models and concepts- Part 2. Or visit this Wikipedia page.
Define:
Access Control Mechanism
A security framework or system that ensures only authenticated and authorized users can access certain resources, enforcing the overall security policy.
A process or system that manages access to resources within a system by enforcing policies and rules. These mechanisms often involve elements of identification, authentication, authorization, and accountability. They are integral to maintaining the security of a system by ensuring that only properly authenticated and authorized users gain access to the resources they require and no more.
For more information, view this lecture on Access control systems. Or visit this Wikipedia page.
Define:
Access Control Model
A theoretical model defining the conditions under which users (subjects) can access various system resources (objects), examples include DAC, MAC, and RBAC.
A framework that dictates how subjects (users or processes) access objects (resources) within a system. Common models include Discretionary Access Control (DAC), where access is granted based on user identity; Mandatory Access Control (MAC), where access is determined by comparing the labels (clearances) of the users and the data; and Role-Based Access Control (RBAC), where permissions are based on user roles rather than individual user identities.
For more information, view this lecture on Security models and concepts - Introduction. Or visit this Wikipedia page.
Define:
Access Level
Categorization of the degree of authorization a user has when accessing a network or system, often tied to user roles, with administrative levels granting more permissions than standard levels.
A categorization of the degree of authorization that a user has when accessing a network or system. These levels often correspond to the roles of users and determine what kind of operations they can perform on the system. For instance, a user with an administrative access level has more permissions compared to a user with a standard access level. Defining access levels is a key part of access control and is crucial for maintaining system security and data integrity.
For more information, view this lecture on Introduction to Access Control. Or visit this Wikipedia page.
Define:
Access Management Lifecycle
A series of processes and procedures for managing system or network access, from initial authentication to ongoing monitoring and revoking of access, including password policies and user access audits.
The set of processes and procedures for managing access to a system or network, from initial user authentication to ongoing monitoring and revoking of access. It is used in organizations to ensure the security of their networks and data and to prevent unauthorized access. Examples include implementing password policies, conducting regular audits of user access, and providing training on secure access practices.
For more information, view this lecture on Identity and access provisioning.
Define:
Access Method
The technique or protocol used to retrieve data from storage or transmit data over a network, which varies depending on the type of data, storage medium, or network architecture.
The technique or protocol that a system uses to locate and retrieve data from storage or transmit data over a network. Different access methods might be used depending on the type of data, the storage medium, or the network architecture. By defining standard access methods, systems can ensure data interoperability, optimize performance, and maintain data integrity and security.
Or visit this Wikipedia page.
Define:
Access Path
The route or sequence of operations used by a database management system to retrieve data based on a query, which impacts query performance and data security.
The route or means through which data is retrieved from a database. This typically involves a series of steps or operations that the database management system executes based on a given query, such as scanning an index or traversing a table. Efficient access paths can significantly improve query performance and system responsiveness while also ensuring that data access adheres to security and integrity constraints.
Define:
Access Profile
A predefined set of permissions and settings that outline what a user or role can do within a system, including data access rights and interface customization.
A predefined set of permissions and settings that determines what a user or role can do within a system. It can include parameters such as data access rights, available functionalities, and interface customization. By assigning users to appropriate access profiles, a system can effectively control access, streamline user management, and ensure that users have the necessary capabilities to perform their tasks without compromising security.
For more information, view this lecture on Identity and access provisioning.
Define:
Access Rights
Privileges or permissions granted to a user or group to perform operations such as reading, writing, or deleting data, or accessing specific resources within a system.
The privileges or permissions that are granted to a user or group of users within a system or network. These rights can include the ability to read, write, modify, or delete data, as well as access specific resources or functions within the system. For example, a user may have read-only access to a company’s financial reports, while another user may have full access to the company’s customer database.
Or visit this Wikipedia page.
Define:
Access Server
A server that controls access to a network by providing authentication, authorization, and accounting services, and decides whether to grant or deny access based on policies.
A server that controls access to a network and its resources, often by providing authentication, authorization, and accounting services. It can serve as a point of entry into a network, handling connection requests from users and deciding whether to grant or deny access based on predefined policies. By centralizing access control, an access server enhances security, simplifies management, and provides a foundation for auditing and monitoring user activities.
Or visit this Wikipedia page.
Define:
Access Type
The nature of operations a user can perform on a resource, including actions like reading, writing, executing, or deleting data, critical for setting access controls.
The kind of operations that a user or role can perform on a resource within a system. Common access types include read (viewing data), write (modifying data), execute (running a program or script), and delete (removing data). Defining access types is a critical part of access control, as it helps maintain data integrity, prevent unauthorized actions, and ensure that users have the necessary permissions to perform their tasks.
Define:
Account Access Review
The regular assessment of user account permissions to ensure they align with current roles, responsibilities, and to remove any unnecessary access.
The process of regularly reviewing and assessing the access granted to user accounts on a system or network. It is used to ensure that access is appropriate and in line with the user’s current roles and responsibilities and to identify and remove any unnecessary or unused access. Examples of account access reviews include reviewing access to shared resources, such as files and databases, and assessing the need for access to specific applications or systems.
For more information, view this lecture on Identity and access provisioning.
Define:
Account Lockout
A security feature that locks an account after several failed login attempts to prevent unauthorized access, part of a comprehensive password policy.
A security measure that automatically locks an account after a certain number of failed login attempts. It is used to prevent unauthorized access to an account and is commonly found in password policies. Examples - A user tries to log in to their email account and enters the wrong password 5 times, causing the account to be locked. An employee attempts to access a secure database but forgets their password, resulting in their account being locked after 3 failed attempts.
For more information, view this lecture on Identity and access provisioning.
Define:
Account Management
The process of creating and handling user accounts, including setting up, modifying, and disabling accounts, to secure access to systems and networks.
The process of creating, maintaining, and managing user accounts on a system or network. It is used to ensure that only authorized users have access to the system and that access is granted and revoked in a controlled and secure manner. Examples of account management include setting up new user accounts, modifying existing accounts, and disabling accounts when necessary.
Define:
Adaptive Authentication
Adaptive Authentication dynamically adjusts verification processes based on user behavior, context, or risk factors, strengthening security by applying more rigorous checks when anomalies or threats are detected.
Adaptive Authentication is a flexible, context-aware security method that evaluates multiple factors, including login location, time of access, device profiles, and user behaviors. By assigning risk scores at each step, it enables organizations to decide whether to demand additional authentication measures, such as multi-factor prompts. This approach not only improves user experience by minimizing friction but also enhances protection against compromised credentials, session hijacking, and sophisticated attack vectors. Its dynamic nature helps maintain a balanced security posture while preserving usability.
Or visit this Wikipedia page.
Define:
Administrative Controls
Policies and procedures established by an organization to regulate user behavior and system operations, guiding the use and management of IT resources.
Policies and procedures implemented by an organization to manage and regulate user behavior and system operation. These include security policies, operating procedures, rules of behavior, and personnel controls, among others. Administrative controls are a vital part of an organization’s overall security strategy, serving to guide the appropriate use and handling of resources, define roles and responsibilities, and establish processes for monitoring, incident response, and recovery. They complement technical and physical controls to create a multi-layered defense against security threats.
For more information, view this lecture on Access Control Categories and Types. Or visit this Wikipedia page.
Define:
Anonymous Authentication
An access method allowing system interaction without user identification, used to protect privacy in public services like Wi-Fi hotspots.
A method of access where a system allows users to interact without providing any identifying information. This is often used to protect user privacy and is typical in services where user identification is unnecessary, like public Wi-Fi access points or certain online forums and services.
Define:
Attribute
A characteristic or quality of an object or entity, used in data modeling to describe properties of data elements, like a customer’s name or product details.
A characteristic or quality of an object or entity. It is used in data modeling to describe the properties or characteristics of a data element. Examples include the name, address, and phone number of a customer or the product name, price, and quantity of an order.
For more information, view this lecture on Identity and access provisioning.
Define:
Attribute-Based Access Control
(ABAC)
A resource access model evaluating user, resource, and environmental attributes to provide granular and flexible authorization.
A model that controls access to resources based on the evaluation of attributes associated with the user, the resource to be accessed, and current environmental conditions. This sophisticated method allows for flexible, fine-grained access control, catering to a wide range of potential scenarios. ABAC is particularly useful in complex environments where role-based access control (RBAC) may be too rigid or insufficient.
For more information, view this lecture on Authorization. Or visit this Wikipedia page.
Define:
Authenticate
The process of verifying an identity, such as confirming a user or device’s right to access information before granting system or network access.
This refers to the process of verifying the identity of a user, device, or transaction. It is used to confirm that the user or device has the right to access the information or perform the action being requested. For example, a user may be asked to enter a password or provide a biometric identifier to authenticate their identity before accessing a secure website or system.
For more information, view this lecture on Introduction to Access Control. Or visit this Wikipedia page.