8. Identity and Access Management Flashcards
What are the foundations of authentication and authorization?
Identities
Identities are claimed through an authentication process.
What methods can users use to claim an identity?
Usernames, certificates, tokens, SSH keys, smartcards
Each method provides additional security capabilities.
What attributes are used to describe a user’s identity?
Job, title, personal traits
Attributes are stored as part of the user’s identity.
What is single sign-on (SSO)?
Allows users to log in once and access resources across an organization
SSO is a core element of many identity infrastructures.
What are critical technologies for modern SSO designs?
LDAP, OAuth, SAML
These technologies are widely used in SSO implementations.
What are best practices for password configuration?
Length, complexity, reuse, expiration, age
Understanding each setting is important for security professionals.
What role do password managers play in security?
Limit password reuse, manage passwords for organizations
They are effective when implemented with enterprise solutions.
What does multifactor authentication rely on?
Additional factors beyond passwords
Potential factors include biometrics and hardware/software tokens.
What are the distinct factors in multifactor authentication?
Something you know, something you have, something you are, somewhere you are
Each factor provides a different layer of security.
What are the types of user accounts?
Users, guests, administrative (privileged), service accounts
Understanding account types is crucial for managing access.
What is privileged access management (PAM)?
Focuses on controlling privileged accounts and rights
Techniques include just-in-time permission granting and ephemeral accounts.
What do access control schemes determine?
What rights accounts have
Access control schemes are essential for managing user permissions.
What is attribute-based access control (ABAC)?
Employs user attributes to determine access
ABAC is one of the key access control schemes.
What is role-based access control (RBAC)?
Makes decisions based on roles
RBAC is commonly used for managing user permissions.
What is rule-based access control?
Uses rules to control access
Sometimes referred to as a variant of RBAC.
What is mandatory access control (MAC)?
Relies on the system administrator to control access
MAC is stricter compared to discretionary access control.
What is discretionary access control (DAC)?
Allows users to make decisions about access to files and directories
DAC provides more flexibility to users.
What is the focus of privileged access management (PAM)?
Controlling administrative accounts
PAM helps in managing permissions for sensitive operations.
What do test takers need to know about filesystem permissions?
How to use and apply common filesystem permissions
Understanding permissions is critical for security management.