4: 4 Account Management Flashcards

1
Q

Accounts Management

A

Implement least privilege, separation of duty,, job rotation, and account lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Principle of least privilege

A

Minimum necessary permissions to perform duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Separation of Duties

A

Sensitive functions should require action by two separate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Job Rotation

A

Regularly move people between jobs to prevent fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mandatory Vacation

A

Enforce periods of time when employee has no access to system, to ensure some frauds can come to light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Account Management Lifecycle

A

Provisioning new user access + entitlements, modifying entitlements when needed, reviewing access when needed, removing access, and deprovisioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Account

A

Standard permissions and standard monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Privileged accounts

A

Have administrative rights, require strong controls including logging every action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Guest accounts

A

Has limited permissions and temporary lifetimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shared accounts

A

Reduces accountability, should not be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service Accounts

A

Provides access for internal server process, password shouldn’t be known by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GPO

A

Group Policy Object - applies configuration settings to users and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Password policy

A

Using requirements to ensure passwords are resistant to attacks - length requirements, different character types, password history/reuse requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lockout Policy

A

Locks out accounts after a number of incorrect login accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password recovery methods

A

Allows users to reset passwords on self-service basis, to alleviate burden on help-desks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Inaccurate Permissions

A

Block work capabilities or violates least privilege

17
Q

How do you protect against inaccurate permissions?

A

User Account Audit - pull list of permissions and review with managers, then make necessary adjustments

18
Q

How do you protect against unauthorized use?

A

Use continuous account monitoring systems that watch for suspicious activities (impossible travel time logins, unusual network location logins, deviations in behavior/amount of data sent)

19
Q

Geotagging

A

Tags logs with user location

20
Q

Geofencing

A

Alerts administrators to devices leaving defined boundaries

21
Q

Password Vaulting

A

Stores administrative passwords, so nobody knows the actual passwords of the privileged account

22
Q

Command Proxying

A

Eliminates the need for direct server access by sending commands that are validated for authority

23
Q

Emergency Access Workflow

A

When a user needing to bypass the privileged account manager, requiring approval, logging access and changing password afterword.

24
Q

Provisioning

A

After onboarding an individual, creating authentication credentials and providing appropriate authorizations.

25
Q

Deprovisioning

A

Remove credentials and authorizations at the appropriate time.

26
Q

Routine Workflow

A

Disables accounts on scheduled basis for planned departures