4.0 Identity and Access Management Flashcards
Standards, best practices, and guidelines for effective security risk management. Some frameworks are general in nature, while others are specific to industry or technology types.
cybersecurity frameworks (CSF)
Develops computer security standards used by US federal agencies and publishes cybersecurity best practice guides and research.
National Institute of Standards and Technology (NIST)
A technology or procedure put in place to mitigate vulnerabilities and risk and to ensure the confidentiality, integrity, and availability (CIA) of information.
security controls
An analysis that measures the difference between the current and desired states in order to help assess the scope of work included in a project.
Gap analysis
The process by which a user account (and its credentials) is issued to the correct person. Sometimes referred to as enrollment.
Identification
A security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to work with organizational assets like networks, operating systems, and applications.
identity and access management (IAM)
A security concept where a centralized platform verifies subject identification, ensures the subject is assigned relevant permissions, and then logs these actions to create an audit trail.
authentication, authorization, and accounting (AAA)
In zero trust architecture, functions that define policy and determine access decisions.
control plane
Security settings that control access to objects including file system items and network resources.
permissions
An access control model where each resource is protected by an access control list (ACL) managed by the resource’s owner (or owners).
Discretionary access control (DAC)
An access control model where resources are protected by inflexible, system-defined rules. Resources (objects) and users (subjects) are allocated a clearance level (or label).
Mandatory access control (MAC)
An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.
Role-based access control (RBAC)
A group account is a collection of user accounts that is useful when establishing file permissions and user rights because when many individuals need the same level of access, a group could be established containing all the relevant users.
group account
An access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
Attribute-based access control (ABAC)
A nondiscretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.
Rule-based access control
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
Least privilege
The process of deploying an account, host, or application to a target production environment. This involves proving the identity or integrity of the resource, and issuing it with credentials and access permissions.
Provisioning
The process of removing an account, host, or application from the production environment. This requires revoking any privileged access that had been assigned to the object.
Deprovisioning
The value assigned to an account by Windows and that is used by the operating system to identify that account.
security identifier (SID)
On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.
group policy objects (GPOs)
The identification or estimation of the physical location of an object, such as a radar source, mobile phone, or Internet-connected computing device.
geolocation
Policies or configuration settings that limit a user’s access to resources.
time-of-day restrictions policy
Authentication token generated by a cryptoprocessor on a dedicated hardware device. As the token is never transmitted directly, this implements an ownership factor within a multi-factor authentication scheme.
Hard authentication token
A security device similar to a credit card that can store authentication information, such as a user’s private key, on an embedded cryptoprocessor.
Smart cards
Portable HSM with a computer interface, such as USB or NFC, used for multi-factor authentication.
Security key
OTP sent to a registered number or email account or generated by an authenticator app as a means of two-step verification when authenticating account access.
Soft authentication token