Domain 5. Identity and Access Management (IAM) Flashcards

(30 cards)

1
Q

Is the collection of mechanisms that work together to protect the assets of an organization and, at the same time, allow controlled access to authorized subjects.

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Restricting a user’s KNOWLEDGE (access to data) to only the data required for them to perform their role.

Restricting access to only required personnel who require access.

A

Need to Know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Restricting a user’s ACTIONS/PRIVILEGES to only those required for them to perform their role.

Granting only the minimum permissions required by the user or system.

A

Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A collection of users that has been named. The users are generally not associated with a specific job in the organization. Instead, they could be part of a specific internal leadership team or focus area.

A

Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A set of permissions that is usually associated with a specific job within an organization, such as a call center agent.

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The assertion of a user’s identity or a process to a system.

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The verification of an identity through knowledge, ownership, or characteristic.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The level of access defined for the identified and authenticated user or process.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refers to proper identification, authentication, authorization that is logged and monitored. Also known as the Principle of Access Control.

A

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is when a valid user is falsely rejected by the system. The false rejection rate (FRR) is the probability that a valid user will be rejected by the system. It is expressed as a percentage.

A

Type 1 (False Rejection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This is when an invalid user is given access to a system. It is a much more serious and potentially dangerous situation. The false acceptance rate (FAR) is the probability that an invalid user will be accepted by the system. It is expressed as a percentage.

A

Type 2 (False Acceptance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The intersection of the two error plots (FAR and FRR)

A

Crossover Error Rate (CER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Refers to management of sessions created through a successful user identification, authentication, and authorization process.

A

Session management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Best way to prevent or mitigate session hijacking

A

Session termination and re-authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refer to the strength of authentication processes and systems.

A

Authenticator Assurance Levels (AAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIM trust relationships include three components:

A

Principal/user, identity provider, relying party

17
Q

The person who wants to log in or access the system.

A

Principal/User

18
Q

The entity that owns the identity and performs the authentication

A

Identity Provider

19
Q

Also known as the service provider

A

Relying party

20
Q

Frequently used in Federated Identity Management (FIM) solutions and provides authentication and authorization.

21
Q

Are written in a language called XML, or Extensible Markup Language. XML is a way of communicating in a manner that is machine and human-readable.

A

SAML assertions

22
Q

(like SAML) offers authentication and authorization functionality. Like most federated access standards, the primary goal is enabling identity federation authentication and authorization. It was created by a consortium of companies, including IBM, Microsoft, and Verisign, and it was codified as a standard by OASIS.

A

WS-Federation

23
Q

Provides the AUTHENTICATION component.

allows a user to use an existing account to identify and authenticate to multiple disparate resources—websites, systems, and so on—without the need to create new passwords for each resource. With __ a user password is given only to the user’s identity provider—Microsoft, for example—and the identity provider confirms the user’s identity to sites the user visits.

24
Q

Provides the AUTHORIZATION component to a federated access solution.

Is the protocol or standard that allows users to gain access—to be authorized—to resources.

25
SAML's Key Components:
1. Assertion: authentication, authorization, and other attributes. 2. Protocol: defines how entities request and respond to requests. 3. Bindings: mapping of SAML onto standard communication protocols (ex: HTTP). 4. Profiles: define how SAML can be used for different business use cases (ex: Web SSO, LDAP, etc.)
26
Two key characteristics of SAML:
1. SAML uses assertion tokens. 2. Assertions are written in a language called Extensible Markup Language (XML), which is a way of communicating in a manner that is machine and human-readable.
27
Enforcing access control policies within an organization to regulate and manage user access
Access Policy Enforcement
28
Responsible for making access control decisions based on predefined access policies and rules (evaluate access requests)
Policy decision point (PDP)
29
Responsible for enforcing the access control decisions made by the PDP (acts as a gatekeeper)
Policy enforcement point (PEP)
30
Is an identity layer built on top of the OAuth 2.0 framework. It allows third-party applications to verify the identity of the end user and to obtain basic user profile information. While OAuth 2.0 is about resource access and sharing, __ is about user authentication.
OpenID Connect (OIDC)