Domain 5 - Identity and Access Management Flashcards
ACCESS
is flow of information between a subject and an object
CONTROL
security features that control how users and systems communicate and interact with other systems and resources Subject - active entity that requests access to an object or data within the object (user, program)
Subject
active entity that requests access to an object or data within the object (user, program)
Object
is a passive entity that contains information (computer, database, file, program) access control techniques support the access control models
Approaches to Administration
Centralized administration
Decentralized administration
Hybrid
Centralized administration
one element responsible for configuring access controls. Only modified through central administration, very strict control
Decentralized administration
access to information is controlled by owners or creators of information, may not be consistency with regards to procedures, difficult to form system wide view of all user access at any given time
Hybrid
centralized control is exercised for some information and decentralized for other information
Identity Management: What 4 key principles does access control relies on?
IAAA Identification Authentication Authorization Accountability
Identification/Assertion
- Registration
– verify an individual’s identity and adds a unique identifier to an identity system
- ensuring that a subject is who he says he is
- bind a user to the appropriate controls based on the unique user instance
- Unique user name, account number etc. OR an issuance (keycard)
Authentication
- Process of Verifying the user
- User provides private data
- Establish trust between the user and the system for the allocation of privileges
Authorization
- resources user is allowed to access must be defined and monitored
- First piece of credentials Authorization
Accountability
who was responsible for an action?
- Logging – best way to provide accountability, change log for approved changes and change management process
What is the Relationship between Identity, Authentication, and Authorization?
- Identification provides uniqueness
- Authentication provides validity
- Authorization provides control
Logical Access Controls: tools used for IAAA
MAC Address – 48 bit number, supposed to be globally unique, but now can be changed by software, not a strong ID or auth. Tool
Single Sign On (SSO)
SSO referred to as reduced sign-on or federated ID management
Advantage - ability to use stronger passwords, easier administration, less time to access resources.
Disadvantage - once a key is compromised all resources can be accessed, if Db compromised all PWs compromised Thin client is also a single sign on approach
What areas of access control does KERBEROS address?
Kerberos addresses Confidentiality and integrity and authentication, not availability, can be combined with other SSO solutions Kerberos Is based on symmetric key cryptology (and is not a propriety control)
What type of cryptography is KERBEROS base on?
symmetric key cryptography
What are some benefits of KERBEROS?
inexpensive, loads of OS’s, mature protocol
What are some Disadvantage of KERBEROS?
takes time to administer, can be bottleneck or single point of failure
In KERBEROS, what is a Realm?
Indicates an authentication administrative domain. Its intention is to establish the boundaries within which an authentication server has the authority to authenticate a user, host or service.
KDC
Key Distribution Center, grants tickets to client for specific servers. Knows all secret keys of all clients and servers from the network, TGS and AS, single point of failure
AS
Authentication server
TGS
Ticket granting server