Access Request Flashcards

1
Q

What specific rule do identities follow?

A

Users and Identities have a 1 to 1 relationship. Each user has 1 identity which is never shared across multiple users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between accounts and identities?

A

Accounts are specific to the system or application. Identities are enterprise wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is demographic data collected for each Identity used?

A

It is used to help perform access reviews, decide what role a user should be placed in, restrict what access the user can or can’t request.

Can also be used for a variety of automated rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between demographic Identity data and Account demographic data?

A

Identities are supported by demograhic data about who you are. Account demographic data is supported by access data about “What the account can do”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are accounts viewed as a security feature?

A

They require users to “Login” and prove they are who they say they are and then to only allow them to perform certain functions or see certain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the only type of application that would not have entitlements?

A

Those where everyone who has an account has full access, and there is no other level of access possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the entitlement breakdown

A

Entitlements can be 1-part - “can update the customer table” or they can be 2-part “can update the customer table for Saturn Bank, but can only read the customer table for Jupiter Bank”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Application-Level Roles?

A

Predefined bundles of entitlements that only exist and are relevant to that one specific application that allow the admin of an application the ability to quickly and easily grant access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are other names for Application Level roles

A

Bundle roles, profiles, or templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are groups?

A

Similar to roles, they are a bundle of entitlements, but they can cross multiple applications. Typically they are found in systems that already touch multiple applications, like:

Mainframes (using RACF, ACF2, Top Secret)
Midrange (like AS/400 or I-series)
Active Directory
eDir and other Directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a key difference between Application-Level Roles and Groups

A

A-L Roles are tied to the Account in the specific application while Groups are tied to the Account at the Mainframe/Midrange/Directory level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does nesting cause issues?

A

It hinders the ability to conduct access governance tasks and audit functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is another name for Roles?

A

Also are known as RBAC Roles or Job/Functional Roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which grouping of entitlements are the highest level of abstraction and are the most complex to setup and maintain, but generate a lot of value when implemented correctly?

A

Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Roles based on? i.e. Clerk 2 or Rep 5?

A

They are based on a job title or job code or combinations of fields that are part of the users Identity record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a unique characteristic of Job/Functional Roles?

A

They don’t physically exist in the target system or application or systems. In non-automated shops they are purely theoretical.

17
Q

What is role mining?

A

Looking at all of the current access of a population of users to see what they have in common – in order to incorporate that
common access into a Role.