Lesson 8 Implementing IAM controls Flashcards

1
Q

Public key infrastructure (PKI)

A

Public key infrastructure (PKI) allows the management of digital identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

certificate authority (CA

A

certificate authority (CA) issues certificates to validated subjects (users and servers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The identity provider (IdP)

A

The identity provider (IdP) is the service that provisions the user account and processes authentication requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

privilege access management (PAM)

A

privilege access management (PAM) products provide a solution for storing these high-risk credentials somewhere other than a spreadsheet and for auditing elevated privileges

Privileged access management (PAM) refers to policies, procedures, and technical controls to prevent the malicious abuse of privileged accounts and to mitigate risks from weak configuration control over privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Discretionary access control (DAC)

A

Discretionary access control (DAC) is based on the primacy of the resource owner. The owner is originally the creator of a file or service, though ownership can be assigned to another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role-based access control (RBAC)

A

Role-based access control (RBAC) adds an extra degree of centralized control to the DAC model. Under RBAC, a set of organizational roles are defined, and subjects are allocated to those roles.

Under this system, the right to modify roles is reserved to a system owner. Therefore, the system is non-discretionary, as each subject account has no right to modify the ACL of a resource, even though they may be able to change the resource in other ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mandatory access control (MAC)

A

Mandatory access control (MAC) is based on the idea of security clearance levels. Rather than defining ACLs on resources, each object and each subject is granted a clearance level, referred to as a label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attribute-based access control (ABAC)

A

Attribute-based access control (ABAC) is the most fine-grained type of access control model.

ABAC system is capable of making access decisions based on a combination of subject and object attributes plus any context-sensitive or system-wide attributes.

  • Time of day
  • IP
  • Location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rule-based access control

A

Rule-based access control - any sort of access control model where access control policies are determined by system-enforced rules rather than system users.

As such, RBAC, ABAC, and MAC are all examples of rule-based (or non- discretionary) access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Federation

A

Federation is the notion that a network needs to be accessible to more than just a well-defined group of employees.

  • Trusting accounts created and managed by other networks
  • SAML (Security Assertions Markup Language)-Openstandard for implementing identity
  • Obtaining assertion (access) from an identy provider.
  • Corporate
  • User centric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Open Authentication (OATH)

A

Open Authentication (OATH) is designed to facilitate sharing of information (resources) within a user profile between sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Capture the Flag (CTF)

A

Capture the Flag (CTF) is usually used in ethical hacker training programs and gamified competitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privilege Management

A

Separation of duties

Job Rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Least Privilege

A

Sufficient permission to do your job

- Reduce if compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identity Management

A

Accounts can be securely associated with a digital ID

  • PKI (Certs)
  • SSO
  • smartcard (Token)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vacations

A

Avoid Complacency

Used to check employees performance

17
Q

Security Account Types:

Administrator / Root

A
  • Change system attributes
  • Disable these accounts for security
  • Assign admin permission rather than group membership
18
Q

Security Account Types:

Standard Users

A
Limited priv.
No system changes
Account profile
Password Policy
Guest Account
19
Q

Security Account Types:

Security Groups

A

Privileges assigned through group membership/multiple group membership

20
Q

Security Account Types:

Service Accounts

A

Created by OS or Service
Used by scheduled process of applications
No user interaction
-system - most privileged
-local service - same as a standard user
-Network services - same as a standard user

Linux uses services account to run a non-interactive process (Daemon)

21
Q

Account Policies

A

Enforce privilege management policy as what a user can and cannot do

22
Q

Account Attributes

A
  • SID
  • Acc. Name + PW
  • Profile: Shares/Stores, Environment settings/identity attributes
23
Q

Group Policy/Group Membership

A

OU - Assigns group policy

  • user
  • computer
  • group
24
Q

Password Policy

A

Domain Level

  • Complexity
  • Age
  • History
  • Account lockout
25
Q

Account Restrictions

A
  • location-based
  • IP address
  • location services: geofencing (entering or leaving an area)
26
Q

Time based Restrictions

A
  • Log on hours
  • how long to access
  • force log off if inactive
27
Q

Account Auditing

A

Security and audit log
Check account activity
Detect Intrusions.

28
Q

Open ID connect

A
  • Authentication
  • Trust relation using PII or user accounts
  • PII (Personably Identifiable Information)
29
Q

Trusts

A

One way A –> B
Two way A B

Transitive Trust
A –> B
B –> C
Therefore A –> C

30
Q

Personnel Policies

A

What you can do in an agreement

  • Conduct Policies
  • AUP (misuse of equiptment)
  • Codes of conduct
  • Clean desk policy (confidential documents)
31
Q

Training

A

Security Policies
Incident Policies (Shared documents / HDD disposal)
Password Policies
Social Engineering / malware