4.6 Flashcards

1
Q

IAM

A

Identity and access Management
Makes sure right individuals have right access to right resources for right reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Components of IAM

A

network access control
password management
digitial identity management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IAM Process

A

Identification - claiming identity
Authentication
Authorization - uses role based access control often
accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SSO

A

user authentication service using one set of credentials for multiple apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technologies for SSO

A

LDAP
OAUTH
SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Federation

A

Sharing and using identities across multiple systems or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAM

A

priviledged access management
- JIT permissions just in time
password vaulting
temporal accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access Control Models

A

MAC mandatory access control
DAC discretionary
Role bAC role based
Rule based access control
ABAC attribute based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity Proofing

A

process of verifying a user’s identity before creating an account
drivers license verification or passport examples

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attestation

A

validating that user accounts and access rights are correct and up to date
involves regular reviews and audits or user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Interoperability

A

ability of different systems and apps to work together to share information
in IAM it can involve SAML or OpenID Connect for secure authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passkeys

A

Passwordless authentication
invovles creating a passkey by device authentication methods like fingerprint or facial recognization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LDAP

A

lightweight directory access protocol
used to access and maintain distributed directory information
can share user info across network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OAuth

A

open standard for token based authentication and authorization
allows third party services to access user account info without exposing passwords
often used in restful apps
uses json web tokens JWT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAML

A

Security Assertion markup langugae
standard for logging users into apps based on sessions in another contect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Federation

A

links electronic identities and attributes across multiple identity management systems
enables users to use the same credentials for login across systems managed by different orgs
based on trusted relationship between systems

17
Q

PAM

A

privileged access management
solution that restricts and monitors priviledged access within an IT environment
tools used to prevent malicious abuse of privileged accounts

18
Q

JIT Permissions

A

just in time
grants admin access only when needed for a specific task

19
Q

Temporal Account

A

time limited privileges accounts

20
Q

MAC

A

uses security labels to authorize resources
access is granted if user label is equal or higher than the resource’s label

21
Q

DAC

A

discretionary access control
resource owners specify which users can access their resources

22
Q

RBAC

A

role based access control
assigns users to roles and assigns permissions to roles
mimics orgs hierarchy
enforces minimum privileges

23
Q

Rule Based Access Control

A

uses security rules or access control lists
policies can be changed quickly
applied across multiple users on a network segmentA

24
Q

ABAC

A

attribute based access control
includes user attributes like name, and Org ID
environmental variables, time of access data location etc and resource attributes like resource owner, rile name and data sensitivity

25
Q

UAC

A

user account control
a mechanism designed to ensure that actions requiring admin rights are explicitly authorized by the user