IAM Flashcards

1
Q

Describe Azure Active Directory

A

Microsoft’s cloud based identity and access management service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the available versions of AAD.

A

Four editions:

  • Free
  • Office 365 apps
  • AAD premium P1
  • AAD premium P2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe AAD identity types

A

Users (employees and guests)
Service Principal (applications)
Managed Identity (Azure services. User and system assigned)
Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compare user-assigned and system-assigned managed identities.

A

System-assigned: created as part of a resource, shares lifecycle with resource, cannot be shared. Intended for single resource workloads.

User-assigned: user created, independent lifecycle, can be assigned to multiple resources. Intended for workloads where resources are recycled frequently but permissions the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe types of AAD External Identities

A
  • B2B collaboration (guest users, same dir as org employees)
  • B2C access management (CIAM solution, allows customers to signin to services via a social identity, separate B2C directory.)

P1 or P2 tier feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe hybrid identities

A

Hybrid = identity created and managed by on-prem IdP and synchronised to Azure AD by using Azure AD Connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the authentication methods for hybrid identities.

A
  • Password hash synchronization: AAD does authN using the password hash.
  • Pass-through Authentication: A software agent on on-prem server validates users directly with on-prem AD, so validation doesn’t occur in cloud.
  • Federated Authentication: AAD passes off AuthN to a separate process like AD FS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe MFA in Azure AD.

A

Require multiple forms of verification to authN.

Something you know
+
Something you have or something you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Authentication methods in AAD.

A
  • Authenticator App
  • Windows Hello for Business
  • FIDO2 (external security key)
  • OATH one-time token (TOTP)
  • Phone
  • Passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Windows Hello for Business

A
  • Windows 10 authN feature.
  • Two factor combination of PIN or biometric that is tied to a device.
  • Windows 10 uses private key to sign data that is sent to the IdP.

NB: PIN/biometric is tied to the device, local to the device, and backed by hardware (TPM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe when SSPR in Azure AD can be used and its requirements and features.

A

For PW changes, resets, and unlocks.

Users must:

  • Be assigned an AAD license (P1, P2 tier)
  • SSPR enabled by an Admin
  • Registered with the AuthN methods they wish to use.

Can write back to on-prem AD. Notifications can be configured to alert SSPRs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the AuthN methods available for AAD SSPR.

A
  • Authenticator app notification or code
  • Mobile or office phone
  • Email
  • Security questions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Azure AD Password Protection

A

Feature that blocks users from setting an easy password that belongs to a default global list or a user-admin’d custom list (P1 or P2).

Helps defend against password spray attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Conditional Access and its benefits

A

Conditional Access = Using signals to automate decisions for authorizing access to resources.

Key benefit is providing extra layers of security before allowing authenticated users to gain access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the assignments (signals) of Conditional Access policies

A

Assignments = the conditions that trigger a policy (IF THEN …)

  • User or Group membership
  • Cloud Apps or Actions (i.e. scope a policy to include/exclude certain apps or actions.)
  • Conditions [Location (IP), Device, Sign-in and User Risk (probabilities from AAD Identity Protection, client apps)]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the Access Controls of Conditional Access

A

Access Controls = What to do (IF … THEN )

  • Block access
  • Grant access (can choose to enforce one or more controls e.g. MFA, device compliance, using approved client app, password change, require app protection policy.)
  • Session (make use of session controls to limit experience.)
17
Q

Describe Azure AD RBAC role types and role assignments.

A

AAD roles can be Built-in (global admin, user admin, billing admin) or Custom.

Role assignments combine a user (security principal), a role definition (built-in or custom), and a scope.

NB: custom Azure AD roles require premium P1 or P2 tier license.

18
Q

Describe principles of identity governance in Azure AD

A
  • Govern identity lifecycle
  • Govern access lifecycle
  • Secure privileged access for administrators.
19
Q

Describe identity lifecycle governance capabilities of AAD

A

AAD premium tiers sync with cloud HR systems. For on-prem HR systems, Microsoft Identity Manager can import identities.

20
Q

Describe access lifecycle governance capabilities of AAD

A

Dynamic groups that grant/revoke access based on identity attributes to automate access.

21
Q

Describe privileged identity management capabilities of AAD

A

AAD PIM is a premium P2 service for mgmt, control and monitoring of access to important resources.

  • JIT access
  • Timebound access
  • Approval based
  • Visible (notifications when activated)
  • Auditable (full access history)
22
Q

Describe entitlement management and access review capabilities of AAD

A

Entitlement management is a P2 feature for IAM lifecycle governance.

  • Create packages to bundle accesses and delegate creation and approval.
  • Managing external users by package.
23
Q

Describe Azure AD Identity Protection

A

Premium P2 feature that allows orgs to

  • automate detection and remediation of identity risks (user and sign-in risks)
  • Investigate risks using data
  • Export risk data to 3rd party utilities for further analysis.

Low, medium, high risk tiers.