Old - Domain 1: Access Control Flashcards
(134 cards)
Subject
An active entity on an information system.
Object
A passive data file.
Discretionary Access Control (DAC)
Gives subject full control of objects they have been given access to, including sharing the objects with others.
Mandatory Access Control (MAC)
System-enforced access control based on subject’s clearances and object’s labels.
Role-based Access Control (RBAC)
Subjects are grouped in to roles, and each defined role has access permissions based upon the role, not the individual.
Purpose of Access Control?
To protect the confidentiality, integrity, and availability of data.
Opposite of CIA?
Disclosure, Alteration, Destruction (DAD)
Honeywell’s SCOMP, Purple Penelope, and Linux Intrusion Detection System (LIDS) are all examples of what type of access control system?
Mandatory Access Control (MAC) – List examples.
Examples of Non-discretionary Access Control?
Role Based Access Control
Task Based Access Control
–Are examples of what type of access control?
RBAC has what rules?
- Role assignment
- Role authorization
- Transaction authorization
What are the 3 primary models for access control?
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Non-discretionary Access Control (Such as RBAC)
Access provisioning lifecycle: Name the steps IBM has outlined.
- Password policy compliance checking.
- Notifying users to change pwd before it expires.
- Identifying lifecycle changes (ex: inactive accounts).
- Identifying new accounts that haven’t been used for 10 days after creation.
- Identifying accounts that can be deleted (ex: suspended for 30 days).
- Identifying all accounts belonging to a business partner or contractor and revoking access when no longer required.
Access aggregation (authorization creep)
Occurs as individual users gain more access to more systems. (sometimes through role or duty changes)
RADIUS
Remote Authentication Dial-In User Service
According to RFC 2865 RADIUS supports what codes?
- Access-Request
- Access-Accept
- Access-Reject
- Accounting-Request
- Accounting-Response
- Access-Challenge
- Status-Server (Experimental)
- Status-Client (Experimental)
Name the protocols & ports used by RADIUS.
UDP ports 1812 (authentication) & 1813 (accounting)
Formerly used 1645 (authentication) & 1646 (accounting)
Name the RFCs that RADIUS is described in.
RFC 2865 & 2866
RADIUS request and response data is carried in?
Attribute-Value Pairs (AVPs)
Diameter
Successor to RADIUS, designed to provide an improved AAA framework.
Differences between Diameter & RADIUS?
- Radius uses 8 bits for AVP field, Diameter uses 32 bits.
- Diameter uses single server to manage policies for many services, as opposed to RADIUS which requires many.
- Diameter uses TCP, RADIUS uses UDP.
Name the RFC that Diameter is described in.
RFC 3588
TACACS
The Terminal Access Controller Access Control System
TACACS ports?
UDP port 49 (may also use TCP)
RADIUS or TACACS+ more secure?
Radius encrypts only password, all other data is unencrypted. TACACS+ encrypts all data below TACACS+ header, so it is more secure then RADIUS.