Lesson 4: Implement Identity and Access Management Flashcards
(50 cards)
What is the purpose of authentication?
Verifies that only the account holder can use an account.
List the key considerations in authentication design.
- Confidentiality
- Integrity
- Availability
What does confidentiality in authentication aim to achieve?
Prevent credential theft.
(You are who you say you are)
What does integrity in authentication ensure?
Reliability and resistance to bypassing.
(The data is unchanged, what I sent is what is received)
What is meant by availability in authentication?
The system must be user-friendly and efficient.
(The system is available to use)
What are the authentication factors?
- Something You Know
- Something You Have
- Something You Are
- Somewhere You Are
Give an example of ‘Something You Know’ in authentication.
Passwords, passphrases, PINs.
What falls under ‘Something You Have’ in authentication?
Smart cards, OTP tokens, security keys.
What is an example of ‘Something You Are’ in authentication?
Biometric data like fingerprints or facial recognition.
What does ‘Somewhere You Are’ refer to in authentication?
Location-based factors using IP addresses or geolocation.
What are strong password management policies?
Policies for password length, complexity, age, and reuse.
What are the risks associated with password managers?
- Weak master password
- Vendor being compromised
- Impersonation attacks
What is multifactor authentication (MFA)?
Combines multiple factors (e.g., password + smartphone) for stronger security.
What is the enrollment process in biometric authentication?
Creates a unique template for each user.
Define False Rejection Rate (FRR).
Legitimate users denied access.
Define False Acceptance Rate (FAR).
Unauthorized users accepted.
What is the Crossover Error Rate (CER)?
Intersection of FRR and FAR; lower is better.
Differentiate between hard tokens and soft tokens.
- Hard Tokens: Hardware-based (smart cards, U2F security keys, OTP devices)
- Soft Tokens: Software-based (e.g., authenticator apps, SMS/email OTPs)
What is passwordless authentication?
Uses FIDO2/WebAuthn for local gesture or biometric unlocks for authentication.
What is Discretionary Access Control (DAC)?
Resource owner controls access and can modify the Access Control List (ACL).
Define Mandatory Access Control (MAC).
Access control based on security clearance levels.
What is Role-Based Access Control (RBAC)?
Permissions assigned based on roles.
What does Attribute-Based Access Control (ABAC) use for decisions?
Combination of attributes and context.
What is Rule-Based Access Control?
Permissions assigned by system-enforced rules, not by system users.