IAM Flashcards
(36 cards)
Cybersecurity Framework
Cybersecurity Framework
Within the goal of ensuring information security, cybersecurity refers specifically to provisioning secure processing hardware and software. Information security and cybersecurity tasks can be classified into five functions, following the framework developed by the National Institute of Standards and Technology (NIST) ( nist.gov/cyberframework/online-learning/five-functions ):
Identify — develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.
Protect — procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operation’s lifecycle.
Detect — perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats.
Respond — identify, analyze, contain, and eradicate threats to systems and data security.
Recover — implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.
security controls .
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
Identification
Identification — creating an account or ID that uniquely represents the user, device, or process on the network.
The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.
Authentication
Authentication — proving that a subject is who or what it claims to be when it attempts to access the resource. An authentication factor determines what sort of credential the subject can use. For example, people might be authenticated by providing a password; a computer system could be authenticated using a token such as a digital certificate.
A method of validating a particular entity’s or individual’s unique credentials.
Authorization
Authorization — determining what rights subjects should have on each resource and enforcing those rights. An authorization model determines how these rights are granted. For example, in a discretionary model, the object owner can allocate rights. In a mandatory model, rights are predetermined by system-enforced rules and cannot be changed by any user within the system.
The process of determining what rights and privileges a particular entity has.
Accounting
Accounting — tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
Tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted.
Zero Trust
Zero Trust is a security model that assumes that all devices, users, and services are not inherently trusted, regardless of whether inside or outside a network’s perimeter. Instead, the Zero Trust model requires all users and devices to be authenticated and authorized before accessing network resources.
Adaptive identity
Adaptive identity recognizes that user identities are not static and that identity verification must be continuous and based on a user’s current context and the resources they are attempting to access.
Threat scope reduction
Threat scope reduction means that access to network resources is granted on a need-to-know basis, and access is limited to only those resources required to complete a specific task. This concept reduces the network’s attack surface and limits the damage a successful attack can cause.
Policy-driven access control
Policy-driven access control describes how access control policies are used to enforce access restrictions based on user identity, device posture, and network context.
Device posture
Device posture refers to the security status of a device, including its security configurations, software versions, and patch levels. In a security context, device posture assessment involves evaluating the security status of a device to determine whether it meets certain security requirements or poses a risk to the network.
Control Plane
In zero trust architecture, functions that define policy and determine access decisions.
The control plane manages policies that dictate how users and devices are authorized to access network resources. It is implemented through a centralized policy decision point.
policy decision point
The policy decision point is responsible for defining policies that limit access to resources on a need-to-know basis, monitoring network activity for suspicious behavior, and updating policies to reflect changing network conditions and security threats. The policy decision point is comprised of two subsystems:
The policy engine is configured with subject and host identities and credentials, access control policies, up-to-date threat intelligence, behavioral analytics, and other results of host and network security scanning and monitoring. This comprehensive state data allows it to define an algorithm and metrics for making dynamic authentication and authorization decisions on a per-request basis.
The policy administrator is responsible for managing the process of issuing access tokens and establishing or tearing down sessions based on the decisions made by the policy engine. The policy administrator implements an interface between the control and the data plane.
Policy Engine
The policy engine is configured with subject and host identities and credentials, access control policies, up-to-date threat intelligence, behavioral analytics, and other results of host and network security scanning and monitoring. This comprehensive state data allows it to define an algorithm and metrics for making dynamic authentication and authorization decisions on a per-request basis.
Policy Administrator
The policy administrator is responsible for managing the process of issuing access tokens and establishing or tearing down sessions based on the decisions made by the policy engine. The policy administrator implements an interface between the control and the data plane.
Data Plane
Where systems in the control plane define policies and make decisions, systems in the data plane establish sessions for secure information transfers. In the data plane, a subject (user or service) uses a system (such as a client host PC, laptop, or smartphone) to make requests for a given resource. A resource is typically an enterprise app running on a server or cloud. Each request is mediated by a policy enforcement point. The enforcement point might be implemented as a software agent running on the client host that communicates with an app gateway. The policy enforcement point interfaces with the policy administrator to set up a secure data pathway if access is approved or tear down a session if access is denied or revoked.
Implicit Trust Zone
The data pathway established between the policy enforcement point and the resource is referred to as an implicit trust zone.
Provisioning
Provisioning is the process of setting up a service according to a standard procedure or best practice checklist.
The process of deploying an account, host, or application to a target production environment. This involves proving the identity or integrity of the resource, and issuing it with credentials and access permissions.
Deprovisioning
Deprovisioning is the process of removing the access rights and permissions allocated to an employee when they leave the company or from a contractor when a project finishes.
The process of removing an account, host, or application from the production environment. This requires revoking any privileged access that had been assigned to the object.
identification
Identification is the initial process of confirming your identity when you request credentials. It occurs when you enter a user ID to log on. Identity proofing occurs during the identification phase as you prove that you are who you say you are to obtain credentials. Suppose you have been identified previously but cannot provide the assigned authentication credentials (such as a lost password). In that case, identity proofing is called upon again.
Authentication
Authentication is the verification of the issued identification credentials. It is usually the second step in the identification process. It establishes your identity, ensuring that you are who you say you are.
factors .
In authentication design, different technologies for implementing authentication, such as knowledge, ownership/token, and biometric/inherence. These are characterized as something you know/have/are.
Smart cards
Smart cards — implement certificate-based authentication. A certificate is a digital document associated with a user as a one-to-one or many-to-one mapping. In a one-to-one mapping, each certificate maps to an individual user account (each user has a unique certificate). With many-to-one mapping, a certificate maps to many user accounts (a group of users shares the same certificate). The smart card stores the user’s digital certificate, the private key associated with the certificate, and a personal identification number (PIN) used to activate the card. The card must be presented to a reader. There are physical contact and contactless near-field communication (NFC) card types.
Passwordless
Multifactor authentication scheme that uses ownership and biometric factors, but not knowledge factors