4.6 Identity and Access Management Flashcards
Identity and Access Management (IAM)
Applications are available anywhere
– Desktop, browser, mobile device, etc.
* Data can be located anywhere
– Cloud storage, private data centers, etc.
* Many different application users
– Employees, vendors, contractors, customers
* Give the right permissions to the right people at
the right time
– Prevent unauthorized access
* Identify lifecycle management
– Every entity (human and non-human) gets a
digital identity
* Access control
– An entity only gets access to what they need
* Authentication and authorization
– Entities must prove they are who they claim to be
* Identity governance
– Track an entity’s resource access
– May be a regulatory requirement
* Provisioning/de-provisioning user accounts
* The user account creation process
– And the account removal process
* Provisioning and de-provisioning occurs for certain events
– Hiring, transfers, promotions, job separation
* Account details
– Name, attributes, group permissions, other permissions
* An important part of the IAM process
– An initial checkpoint to limit access
– Nobody gets Administrator access
Permission assignments
Each entity gets limited permissions
– Just enough to do their job
– Group assignments are common
* Storage and files can be private to that user
– Even if another person is using the same computer
* No privileged access to the operating system
– Specifically not allowed on a user account
Identity proofing
I could be anyone
– The IAM process should confirm who I am
* Resolution
– Who the system thinks you are
* Validation
– Gathering information from the user
(password, security questions, etc.)
* Verification / Attestation
– Passport, in-person meeting, etc.
– Automated verification is also an option
Single sign-on (SSO)
Provide credentials one time
– Get access to all available or assigned resources
– No additional authentication required
* Usually limited by time
– A single authentication can work for 24 hours
– Authenticate again after the timer expires
* The underlying authentication infrastructure must
support SSO
– Not always an option
LDAP (Lightweight Directory Access Protocol)
Protocol for reading and writing directories over
an IP network
– An organized set of records, like a phone directory
* X.500 specification was written by the International
Telecommunications Union (ITU)
– They know directories!
* DAP ran on the OSI protocol stack
– LDAP is lightweight
* LDAP is the protocol used to query and update an
X.500 directory
– Used in Windows Active Directory, Apple OpenDirectory,
Novell eDirectory, etc.
X.500 Directory Information Tree
Hierarchical structure
– Builds a tree
* Container objects
– Country, organization, organizational units
* Leaf objects
– Users, computers, printers, files
Security Assertion Markup Language (SAML)
Open standard for authentication and authorization
– You can authenticate through a third-party to
gain access
– One standard does it all, sort of
* Not originally designed for mobile apps
– This has been SAML’s largest roadblock
OAuth
Authorization framework
– Determines what resources a user will be able to access
* Created by Twitter, Google, and many others
– Significant industry support
* Not an authentication protocol
– OpenID Connect handles the single sign-on
authentication
– OAuth provides authorization between applications
* Relatively popular
– Used by Twitter, Google, Facebook, LinkedIn, and more
Federation
Provide network access to others
– Not just employees - Partners, suppliers,
customers, etc.
– Provides SSO and more
* Third-parties can establish a federated network
– Authenticate and authorize between the two
organizations
– Login with your Facebook credentials
* The third-parties must establish a trust relationship
– And the degree of the trust
Interoperability
Many different ways to communicate with an
authentication server
– More than a simple login process
* Often determined by what is at hand
– VPN concentrator can talk to a LDAP server
– We have an LDAP server
* A new app uses OAuth
– Need to allow authentication API access
* The interoperability is dependent on the
environment
– This is often part of a much larger IAM strategy
Access control
Authorization
– The process of ensuring only authorized rights are
exercised
– Policy enforcement
– The process of determining rights
– Policy definition
* Users receive rights based on
– Access Control models
– Different business needs or mission requirements
Least privilege
Rights and permissions should be set to the bare
minimum
– You only get exactly what’s needed to complete your
objective
* All user accounts must be limited
– Applications should run with minimal privileges
* Don’t allow users to run with administrative privileges
– Limits the scope of malicious behavior
Mandatory Access Control (MAC)
The operating system limits the operation on an object
– Based on security clearance levels
* Every object gets a label
– Confidential, secret, top secret, etc.
* Labeling of objects uses predefined rules
– The administrator decides who gets access to what
security level
– Users cannot change these settings
Discretionary Access Control (DAC)
Used in most operating systems
– A familiar access control model
* You create a spreadsheet
– As the owner, you control who has access
– You can modify access at any time
* Very flexible access control
– And very weak security
Role-based access control (RBAC)
You have a role in your organization
– Manager, director, team lead, project manager
* Administrators provide access based on the role of the
user
– Rights are gained implicitly instead of explicitly
* In Windows, use Groups to provide role-based access
control
– You are in shipping and receiving, so you can use the
shipping software
– You are the manager, so you can review shipping logs