Domain 5: Identity and Access Management Flashcards
What is Access?
Flow of information between a subject and an object
What is an Access Control?
It is a security feature that controls how subjects and objects communicate and interact with other systems and resources.
What is Object?
Passive entity that contains information (computer, database, file, program) that is accessed by a subject.
Centralised administration: Approaches to Administration
One element responsible for configuring access controls. Only modified through central administration, very strict control.
Decentralised administration: Approaches to Administration
Access to information is controlled by owners or creators of information. There may be a lack of consistency with regards to procedures, as it is difficult to form a system wide view of all user access at any given time
Hybrid: Approaches to Administration
Centralised control is exercised for some infomation and decentralised for other information
IAAA
Four key principles upon which access control relies:
- Identification
- Authentication
- Authorisation
- Accountability
Explain the principle of Identification/Assertion
This is about ensuring a subject is who he says he is. It binds a user to the appropriate controls based on the unique user instance. This may also include Registration which is about verifying an individual’s identity and adds a unique idenfier to an identity system.
Explain the principle of Authentication
Process of verifying the user where the user provides private data and establishes trust between the user and the system for the allocation of privileges.
Explain the principle of Authorisation
Checks the resources user is allowed to access. These resources must be defined and monitored.
Explain the principle of Accountability
Who was responsible for an action? Logging is the best way to provide accountability, where change log for approved changes and change management process is captured.
Relationship between Identity, Authentication, and Authorisation
- Identification provides uniquness
- Authentication provides validity
- Authorsiation provides control
Logical Access Controls
Tools used to administer IAAA
MAC Address
48 bit number, supposed to be globally unique, however, can be spoofed by software and no longer acts as a strong ID or authentication.
SSO
Single Sign On. It is also referred to as Reduced Sign On or federated ID management.
SSO Advantages
Ability to use stronger passwords, easier administration, and less time to access resources
SSO Disadvantages
Once a key is compromised, all resources can be accessed. Similarly, if DB is compromised all PWs are compromised. A thin client is also a SSO approach.
Kerberos
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using symmetric keys. Additionally, it addresses confidentiality, integrity, and authentication.
Benefits of Kerberos
Inexpensive, supported by a number of OS’s and is a mature protocol
Disadvantages of Kerberos
Takes time to administer, can be bottleneck or single point of failure
What is ‘Realm’?
Indicates an authentication administrative domain. Its intention is to establish the boundaries within which an authentication server has the authority to authenticate a user, host, or service. Uses symmetric Key cryptography.
KDC
The Key Distribution Centre grants tickets to client for specific servers. It knows all secret keys of all clients and servers from the network, TGS and AS. However, acts as a single point of failure.
AS
Authentication Server
TGS
Ticket Granting Server