Access Controls Concepts Flashcards
CC Domain 3 Access Controls Concepts
zero trust
means access to a computing, network, or data resource will not be given to any person or subject unless that access is explicitly
authorized.
Least Privilege
concept that a user should only have access to the resources that they need in order to do their job but no more than that.
Segregation of Duties
internal control that organizations use to prevent fraud or the
likelihood of errors.
Two-Person Rule
requires certain functions to be performed by two authorized users or employees working in tandem.
subject
entity that is capable of accessing an object, usually by first requesting such access.
object
entity, or resource, that is accessed by a subject. (files, folders, apps)
Access
right that is granted to the subject to perform a function
with the object
Identification
act of the subject providing identifying information
Authentication
method by which systems verify that a user really is who they claim
to be.
Centralized
where one department or entity is responsible for governing, managing, and configuring tools for access administration. For example, in a centralized model the IT department would manage access control for all resources (e.g., physical and all information systems)
Decentralized
access administration is managed by different departments or people for different systems throughout the organization.
Hybrid
utilizes a combination of centralized and decentralized access control. For example, the IT department may manage access control for critical resources such as Active Directory (centralized administration), while systems belonging to individual departments, such as the sales team customer relationship management (CRM), may be managed by individual departments (decentralized administration).
Provisioning
creation and maintenance of user accounts as well as maintaining the correct access rights for the user.
Review
Accounts are regularly reviewed and monitored to ensure that
there is still a need for access over time.
Revocation
After an employee has separated from the organization or when the employee no longer has a need for an account or access to a
system, their access(es) is/are revoked