Chap 3 - Identity Access Mgmt Flashcards
what is access control
means to ensure that access to assets is authorized and restricted based on business and security requirements
what is a subject
any person, process, device or entity that wants to access and object (data)
what is an object
information assets or systems resources
what is Identity lifecycle (IAM)
- new ID request
- ID provisioning - establishing access
- authentication (per attempt)
- authorization
- accounting (track during access/after)
- User behavior review
- disable and deprovision OR job/duty change review
who grant access to data
DATA OWNER, asset owner reviews the request and provides access approval or rejection to the data custodian that implements it
what is authentication
the verification of a claim of identity by a user, process, device
what is authorization
a. initial decision to grant access/ permission to an ID
b. real-time confirmation that a request to perform an action by a subject towards a given object
what is accounting/accountability
ID mgmt function that tracks every action involving every identity defined in the system
in form form of logs, these are store/analized using tech e.g., SIEM
what is user behavior review
organization should define sets or patterns of user behaviors that are acceptable and expected in most circumstance to detect extra-ordinary activities
what is “privilege creep”
do not relinquish permissions that are not needed
ID access disable and deprovision
deactivation of permissions throughout the systems.
Accounts are not deleted but disabled.
the data custodian or other IAM administrators perform these tasks
common issue identifiable when conducting account access review
- inactive accounts not revoked
- user accounts with excessive permissions
- user accounts without permissions
Security identifiers defaults accounts in Microsoft windows
- Administrator
- default account
- guest
- domain administrator
how to reduce risk of credential misuse
Multi-factor authentication (MFA)
types of privilege escalation attacks
- vertical privilege escalation
- horizontal privilege escalation
what is IAAA
Identification
Authentication
Authorization
Accountability
what is CIANA+PS
Confidentiality
Integrity
Availability
Non-repudiation
Accountability
Privacy
Safety
Bell-LaPadula security model
- Subject cannot read/access object of higher classification
- subject can only save an object at same or higher classification (no write down)
- Subject can on write/edit at same classification level
Biba security model
- subject cannot read/observe an object of lower integrity (no read down)
- subject cannot modify an object of higher integrity (no write up)
- subject can only request access to same or lower integrity level
which security model is known for preventing conflict or interest (Ethical Waals)
Brewer and Nash
which security model improved Biba by addressing the integrity at the transaction level
Clark-Wilson
Graham-Denning security model
Focus on HOW subject and objects are created
2 key modern security model - access control models (AC)
- Discretionary access control (DAC)
- Mandatory access control (MAC)
types of access control models (AC)
- Discretionary access control (DAC)
- Mandatory access control (MAC)
- Non-discretionary access control (NDAC) -> most common (central authority making policies)
- Role-based access control (RBAC)
- Rule-based access control (RuBAC)
- Attribute-based access control (ABAC)
Common type of privileged accounts mgmt
- system admin
- Help desk or IT support
- security analyst
- others
type of IAM administration choices/implementation
- CENTRALIZED: one function is responsible for configurating the ACs
- DECENTRALIZED or DISTRIBUTED: ACs are controlled by owners or creators of the files
- HYBRID: Centralized control exercised for some information and decentralized control allowed for other information (less sensitive)
what are logical access control systems
Logical access control systems as automated systems that
- authorize or deny use to user
- authorize or permit user
- identity registered and approved in system
what is a credential management system
software that issue and manage credentials
CMS software can be used as part of public key infrastructure (PKI) systems, as well as issuing 2-factor-authentication (2FA)