3.7 Given a scenario, implement identity and account management controls Flashcards

1
Q

What is an identity provider IdP?

A

The identity provider is the service that provisions the user account and processes authentication requests. On a private network, these identity directories and application authorization services can be operated locally. The same site operates both identity provision and application provision. Most networks now make use of third-party cloud services, however. In this scenario, various protocols and frameworks are available to implement federated identity management across web-based services. This means that a user can create a digital identity with one provider, but other sites can use that identity to authorize use of an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does least privelege mean?

A

Least privilege means that a user is granted sufficient rights to perform his or her job and no more. This mitigates risk if the account should be compromised and fall under the control of a threat actor. Authorization creep refers to a situation where a user acquires more and more rights, either directly or by being added to security groups and roles. Least privilege should be ensured by closely analyzing business workflows to assess what privileges are required and by performing regular account audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a default account?

A

A default account is one that is created by the operating system or application when it is installed. The default account has every permission available. In Windows, this account is called Administrator; in Linux, it is called root. This type of account is also referred to as a superuser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a good practice for generic administrator account management?

A

Superuser accounts directly contradict the principles of least privilege and separation of duties. Consequently, superuser accounts should be prohibited from logging on in normal circumstances. The default superuser account should be restricted to disaster recovery operations only. In Windows, the account is usually disabled by default and can be further restricted using group policy (docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-h–securing-local-administrator-accounts-and-groups). The first user account created during setup has superuser permissions, however.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a guest account?

A

A guest account is a special type of shared account with no password. It allows anonymous and unauthenticated access to a resource. The Windows OS creates guest user and group accounts when installed, but the guest user account is disabled by default. Guest accounts are also created when installing web services, as most web servers allow unauthenticated access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a service account?

A

Service accounts are used by scheduled processes and application server software, such as databases. Windows has several default service account types. These do not accept user interactive logons but can be used to run processes and background services:

System—has the most privileges of any Windows account. The local system account creates the host processes that start Windows before the user logs on. Any process created using the system account will have full privileges over the local computer.

Local Service—has the same privileges as the standard user account. It can only access network resources as an anonymous user.

Network Service—has the same privileges as the standard user account but can present the computer’s account credentials when accessing network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are account attributes?

A

A user account is defined by a unique security identifier (SID), a name, and a credential. Each account is associated with a profile. The profile can be defined with custom identity attributes describing the user, such as a full name, email address, contact number, department, and so on. The profile may support media, such as an account picture.

As well as attributes, the profile will usually provide a location for storing user-generated data files (a home folder). The profile can also store per-account settings for software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are group policy objects?

A

On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two mechanisms of geolocation?

A

IP address—these can be associated with a map location to varying degrees of accuracy based on information published by the registrant, including name, country, region, and city. The registrant is usually the Internet service provider (ISP), so the information you receive will provide an approximate location of a host based on the ISP. If the ISP is one that serves a large or diverse geographical area, you will be less likely to pinpoint the location of the host Internet service providers (ISPs). Software libraries, such as GeoIP (maxmind.com/en/geoip-demo), facilitate querying this data.

Location Services—these are methods used by the OS to calculate the device’s geographical position. A device with a global positioning system (GPS) sensor can report a highly accurate location when outdoors. Location services can also triangulate to cell towers, Wi-Fi hotspots, and Bluetooth signals where GPS is not supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is geofencing?

A

Geofencing refers to accepting or rejecting access requests based on location. Geofencing can also be used for push notification to send alerts or advice to a device when a user enters a specific area. Geotagging refers to the addition of location metadata to files or devices. This is often used for asset management to ensure devices are kept with the proper location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are time-based restrictions?

A

1.) A time of day policy establishes authorized logon hours for an account.
2.) A time-based login policy establishes the maximum amount of time an account may be logged in for.
3.) An impossible travel time/risky login policy tracks the location of login events over time. If these do not meet a threshold, the account will be disabled. For example, a user logs in to an account from a device in New York. A couple of hours later, a login attempt is made from LA, but this is refused and an alert raised because it is not feasible for the user to be in both locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information is gained from doing account audits?

A

1.) Accounting for all actions that have been performed by users. Change and version control systems depend on knowing when a file has been modified and by whom. Accounting also provides for non-repudiation (that is, a user cannot deny that they accessed or made a change to a file). The main problems are that auditing successful access attempts can quickly consume a lot of disk space, and analyzing the logs can be very time-consuming.
2.) Detecting intrusions or attempted intrusions. Here records of failure-type events are likely to be more useful, though success-type events can also be revealing if they show unusual access patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is discretionary access control?

A

Access control model where each resource is protected by an Access Control List (ACL) managed by the resource’s owner (or owners).

As the most flexible model, it is also the weakest because it makes centralized administration of security policies the most difficult to enforce. It is also the easiest to compromise, as it is vulnerable to insider threats and abuse of compromised accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is role-based access control?

A

Role-based access control (RBAC) adds an extra degree of centralized control to the DAC model. Under RBAC, a set of organizational roles are defined, and subjects allocated to those roles. Under this system, the right to modify roles is reserved to a system owner. Therefore, the system is non-discretionary, as each subject account has no right to modify the ACL of a resource, even though they may be able to change the resource in other ways. Users are said to gain rights implicitly (through being assigned to a role) rather than explicitly (being assigned the right directly).

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command that is used to change permissions to a file?

A

Read (r)—the ability to access and view the contents of a file or list the contents of a directory.
Write (w)—the ability to save changes to a file, or create, rename, and delete files in a directory (also requires execute).
Execute (x)—the ability to run a script, program, or other software file, or the ability to access a directory, execute a file from that directory, or perform a task on that directory, such as file search.

These permissions can be applied in the context of the owner user (u), a group account (g), and all other users/world (o). A permission string lists the permissions granted in each of these contexts:

chmod u=rwx,g=rx,o=rx home

The string above shows that for the directory (d), the owner has read, write, and execute permissions, while the group context and other users have read and execute permissions.

The chmod command is used to modify permissions. It can be used in symbolic mode or absolute mode. In symbolic mode, the command works as follows:

chmod g+w,o-x home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is mandatory access control?

A

Mandatory access control (MAC) is based on the idea of security clearance levels. Rather than defining ACLs on resources, each object and each subject is granted a clearance level, referred to as a label. If the model used is a hierarchical one (that is, high clearance users are trusted to access low clearance objects), subjects are only permitted to access objects at their own clearance level or below.

Access control model where resources are protected by inflexible, system defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).

17
Q

What is attribute-based access control?

A

Attribute-based access control (ABAC) is the most fine-grained type of access control model. As the name suggests, an ABAC system is capable of making access decisions based on a combination of subject and object attributes plus any context-sensitive or system-wide attributes. As well as group/role memberships, these attributes could include information about the OS currently being used, the IP address, or the presence of up-to-date patches and anti-malware.

18
Q

What is rule-based access control?

A

Rule-based access control is a term that can refer to any sort of access control model where access control policies are determined by system-enforced rules rather than system users. As such, RBAC, ABAC, and MAC are all examples of rule-based (or non-discretionary) access control. As well as the formal models, rule-based access control principles are increasingly being implemented to protect computer and network systems founded on discretionary access from the sort of misconfiguration that can occur through DAC.

19
Q

What is SAML?

A

An XML-based data format used to exchange authentication information between a client and a service. Communications are established using HTTP/HTTPS and the Simple Object Access Protocol (SOAP).

20
Q

What is SOAP?

A

An XML-based web services protocol that is used to exchange messages.

21
Q

What is OAuth?

A

Standard for federated identity management, allowing resource servers or consumer sites to work with user accounts created and managed on a separate identity provider.

The user creates a password-protected account at an identity provider (IdP). The user can use that account to log on to an OAuth consumer site without giving the password to the consumer site. A user (resource owner) can grant a client an authorization to access some part of their account. A client in this context is an app or consumer site.

The user account is hosted by one or more resource servers. A resource server is also called an API server because it hosts the functions that allow clients (consumer sites and mobile apps) to access user attributes. Authorization requests are processed by an authorization server. A single authorization server can manage multiple resource servers; equally the resource and authorization server could be the same server instance.

22
Q

What is OpenID Connect?

A

An authentication layer that sits on top of the OAuth 2.0 authorization protocol.

OAuth is explicitly designed to authorize claims and not to authenticate users. The implementation details for fields and attributes within tokens are not defined. There is no mechanism to validate that a user who initiated an authorization request is still logged on and present. The access token once granted has no authenticating information. Open ID Connect (OIDC) is an authentication protocol that can be implemented as special types of OAuth flows with precisely defined token fields.

23
Q

What is an AUP?

A

A policy that governs employees’ use of company equipment and Internet services. ISPs may also apply AUPs to their customers.

24
Q

What is a clean desk policy?

A

A clean desk policy means that each employee’s work area should be free from any documents left there. The aim of the policy is to prevent sensitive information from being obtained by unauthorized staff or guests at the workplace.

25
Q

What is user and role based training?

A

Another essential component of a secure system is effective user training. Untrained users represent a serious vulnerability because they are susceptible to social engineering and malware attacks and may be careless when handling sensitive or confidential data.

Training Provides:

Overview of the organization’s security policies and the penalties for non-compliance.
Incident identification and reporting procedures.
Site security procedures, restrictions, and advice, including safety drills, escorting guests, use of secure areas, and use of personal devices.
Data handling, including document confidentiality, PII, backup, encryption, and so on.
Password and account management plus security features of PCs and mobile devices.
Awareness of social engineering and malware threats, including phishing, website exploits, and spam plus alerting methods for new threats.
Secure use of software such as browsers and email clients plus appropriate use of Internet access, including social networking sites.

26
Q

What is a phishing campaign?

A

A phishing campaign training event means sending simulated phishing messages to users. Users that respond to the messages can be targeted for follow-up training.

27
Q

What is capture the flag?

A

Capture the Flag (CTF) is usually used in ethical hacker training programs and gamified competitions. Participants must complete a series of challenges within a virtualized computing environment to discover a flag. The flag will represent either threat actor activity (for blue team exercises) or a vulnerability (for red team exercises) and the participant must use analysis and appropriate tools to discover it. Capturing the flag allows the user to progress to the next level and start a new challenge.