Module 04 - Identity and Acess Management Flashcards
(128 cards)
Definition:
Non-repudiation
Cannot deny having done something in systems or network
Acronym:
CSF
Cybersecurity Framework
Acronym:
NIST
National Institute of Standards and Technology
According to NIST, what are the classification of security tasks?
[NUST Categories]
- Identify
- Protect
- Detect
- Respond
- Recover
Definition:
Gap Analysis
Process that identifies how security systems deviate from outcomes required, or recommended, by CSTs
Definition:
Access Control
Defines how subjects interact with objects.
Subjects => Can be granted access to resources
Objects => Resources
Acronym:
IAM
Identity and Access Management
Definition:
Identity and Access Management - IAM systems
System that implements access controls
What are the processes of IAM?
- Identification
- Authentication
- Authorization
- Accounting
Acronym:
AAA
Authentication, Authorization and Accounting
Definition
Zero Trust
Security model that assumes that all devices, users, and services are not inherently trusted, regardless of whether inside or outside a network’s perimeter
What are the main concepts of Zero Trust Model?
- Adaptive identity [UBA]
- Threat scope reduction [Principle of Least Privilege]
- Policy-drive access control [Device posture, network context, user identity]
Definition:
Adaptive identity [Zero Trust Concept]
Recognition of identity not being static.
UBA
Definition:
Threat scope reduction [Zero Trust Concept]
Access to resources are only to the ones needed to complete a task.
[Principle of least privilege]
Definition:
Policy-driven access control [Zero Trust Concept]
Access Control policies enforces access restriction based on user identity, device posture and network context.
Definition:
Device Posture
Security status of a device, including its security configurations, software versions, and patch levels.
In Zero Trust architecture, what are the planes?
Control and data planes
Definition:
Control plane
Manages policies that dictate how users and devices are authorized to access network resources.
Divided in Policy Engine and Policy Administrator
Definition:
Data plane
Where a subject makes access requests for a given resource.
Definition:
Policy Engine
Responsible for making authentication and authorization decisions per-request.
Definition:
Policy Administrator
Issues access tokens and establishes or tears down sessions based on the decisions made by the policy engine.
List the access control best practices
- Principle of least privilege
- Need to know [Information classification]
- Separation of Duties [Conflict of interest]
- Multi-Factor Authentication
- Mutual Authentication
- Time of day restrictions
Acronym:
MFA
Multi-Factor Authentication
What are the common methods of controlling access?
Implicit Deny
Explicit Deny
Explicit Allow