3.7 Implement identity & account management Flashcards

1
Q

Identity controls: what is an IdP ?

A

Identity Provider. It’s a service that can vouch (se porte garant) for you: Authentication as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identity controls: why is an IdP can be used ?

A

Commonly used by SSO applications or authentication process in cloud-based services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identity controls: what are the standard authentication methods of an IdP ?

A

SAML, OAuth, OpenID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity controls: how IdP know a person identity ?

A

Thanks to certains attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identity controls: what is an attribute?

A

An identifier or property of an identity. It can be:
- personal attributes: name, email, phone, employee ID
- other attributes: department name, job title etc

1 or more attributes can be use for identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity controls: can public key cryptography can be use for identity?

A

Yes through the use of digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity controls: what is a digital certificate ?

A

Digital certificate are assigned to a person/ device and allows to confirm that the owner of that certificate is someone that we can trust.
It requires an existing PKI to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity contols: how to authenticate to ssh ?

A

Use username+ password OR use public/private keys to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity contols: is management of ssh key important ?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity contols: how to create a public/ private key pair for ssh ?

A

1/ Use ssh-keygen command on linux to generate a key pair
2/ Copy the public key to the SSH server using: ssh-copy-id user@host
3/ Once copied use ssh user@host to connect to the serve (no password needed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Account types: what are the different types of accounts ?

A
  • user account
  • shared & generaic accounts
  • service accounts
  • privileged accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Account types: what is a shared account ?

A

An account that is used by more than 1 user using no credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Account types: what is the security issue w/ shared account ?

A

Very difficult to create an audit trail:
- there is no way to know exactly who was working
- it’s difficult to determine the proper privileges
- no password management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Account types: what is a guest account ?

A

Access to a computer for guest with very limited access to settings, application etc. There is usually no password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Account types: what is the security issue w/ guest account ?

A

Someone can escalate privilege to get full access to system. So guest account must be controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Account types: what is a service account ?

A

Used exclusively by services running on a computer such as web server, database server etc
Access can be defined for a specific service (eg. web server right & permission)

17
Q

Account types: what is a privilege account ?

A

Admin (Windows) or root (Linux) account that have complete access to the system. They are often used to manage hardware, drivers and software.
Needs to be very secure: strong password + MFA

18
Q

Account policies: what are the differents policies that needs to be set up for an account ?

A
  • Access to an account
  • Authentication process
  • Permission after login
  • Paswword complexity & length
  • Account lockout & disablement policy
  • Location-based policies
19
Q

Account policies: what is password entropy ?

A

A way to measure how unpredictable a password might be: no single words, no obvious password, mix letters & nb