Access Control Flashcards
Implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
Access Control
Verification that the credentials of a user or other system entity are valid.
Authentication
The granting of a right or permission to a system entity to access a system resource.
Authorization
An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures.
Audit
What are the access control policies?
Discretionary access control (DAC)
Mandatory access control (MAC)
Role-based access control (RBAC)
Attribute-based access control (ABAC)
Controls access based on the identity of the requestor and on access rules stating what requestors are allowed to do.
Discretionary access control (DAC)
Controls access based on comparing security labels with security clearances.
Mandatory access control (MAC)
Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles.
Role-based access control (RBAC)
Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions.
Attribute-based access control (ABAC)
What are the basic elements of access control?
Subject
Object
Access right
A _____ is an entity capable of accessing objects.
subject
Access control systems typically define three classes of subject, with different access rights for each class. What are they?
Owner - created the file
Group - given access rights as a owner
World - least amount of access granted
An _____ is a resource to which access is controlled.
Object
An ____ _____ describes the way in which a subject may access an object.
access rights
Access rights have multiple privileges, such as:
Read, write, execute, delete, create, search.
List users and their permitted access rights.
Access control lists
A ____ _____ specifies authorized objects and operations for a particular user.
capability ticket
Certain areas of memory are protected from the users’s use and in which certain instructions may not be executed.
user mode
Privileged instructions may be executed and in which protected areas of memory may be accessed.
kernel mode
What are the entities in an RBAC system.
User
Role
Permission
Session
A ______ is a defined relationship among roles or a condition related to roles.
constraint
What are the types of constraints?
Mutually exclusive roles
Cardinality
Prerequisite roles
______ ____ ____ are roles such that a user can be assigned to only one role in the set.
Mutually exclusive roles
What are the properties of mutually exclusive role?
- A user can only be assigned to one role in the set
2. Any permission can be granted to only one role in the set.
_____ refers to setting a maximum number with respect to roles.
Cardinality
Dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role.
Prerequisite role
What are the three elements to an ABAC model?
Attributes - which are defined for entities in a configuration
Policy model - which defines the ABAC policies
Architecture model - which applies to polices that enforce access control
A _______ is a set of rules and relationships that govern allowable behavior within an organization, based on the privileges of subjects and how resources or objects are to be protected under which environment conditions.
policy
_______ represent the authorized behavior of a subject
privileges
What does ICAM stand for?
Identity, credential access management
What is ICAM designed for?
- Create trusted digital identity representations of individuals and what the ICAM documents refer to as nonperson entities.
- Bind those identities to credentials that may serve as a proxy for the individual or NPE in access transactions.
- Use the credentials to provide authorized access to an agency resources.
What are the three support elements needed in enterprise-wide access control?
Resource management
Privilege management
Policy management