Chapter 8 - Identity and Access Management Flashcards

1
Q

Identity

A

Identities are the sets of claims made about a subject. Subjects are typically people, applications, devices, systems, or organizations, but the most common application of Identity is to individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the common ways of claiming an identity?

A
  1. Usernames
  2. Certificates
  3. Tokens
  4. SSH keys
  5. Smartcards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Single Sign-On (SSO)

A

Single Sign-On systems allow a user to log in with a single identity and then use multiple systems or services without reauthenticating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lightweight Directory Access Protocol (LDAP)

A

The Lightweight Directory Access Protocol is commonly deployed as part of an identity management infrastructure and offers hierarchically organized information about the organization. LDAP is commonly used as part of SSO infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the core technologies that internet-based systems and architectures often rely on for authentication, authorization, and SSO?

A
  1. Security Assertion Markup Language (SAML)
  2. OpenID
  3. OAuth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Assertion Markup Language (SAML)

A

Security Assertion Markup Language is an XML-based open standard for exchanging authentication and authorization information. SAML is often used between identity providers and service providers for web-based applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OpenID

A

OpenID is an open standard for decentralized authentication. A common example of this is the “Log in with Google” functionality that many websites provide. Relying Parties (RPs) redirect authentication requests to the Identity Providers (IdPs) and then receive a response with an assertion that the user is who they claim to be due to successful authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OAuth

A

OAuth is an open standard for authorization used by many websites. OAuth provides a method for users to determine what information to provide to third-party applications and sites without sharing credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity Provider (IdP)

A

Identity Providers manage the life cycle of digital identities from creation through maintenance to eventual retirement of the identity in the systems and services it supports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by a Federated environment in IT?

A

In a federated environment, user authentication is separated from user access through the use of one or more external entities that provide independent authentication of user credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passwordless Authentication

A

Passwordless Authentication often relies on something you have (security tokens, certificates) or something you are (biometric factors).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multifactor Authentication (MFA)

A

Multifactor Authentication ensures that a single compromised factor like a password does not create undue risk. MFA relies on two distinct factors for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four commonly used authentication factors?

A
  1. Something you know (password, PIN)
  2. Something you have (smartcard, USB, Bluetooth token)
  3. Something you are (physical/biometric characteristics)
  4. Somewhere you are (GPS, network location)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One-Time Passwords (OTP)

A

One-Time Passwords are usable only once. Brute-force attacks against an OTP will be constantly attempting to identify a constantly changing target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Time-Based One-Time Passwords (TOTP)

A

Time-Based One-Time Passwords use an algorithm to derive a one-time password using the current time as part of the code-generation process. The code is valid for a set period of time and then moves on to the next time-based code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HMAC-Based One-Time Passwords (HOTP)

A

HMAC-Based One-Time Passwords use a seed value that both the token or HTOP code-generation application and the validation server use, as well as a moving factor. For many hardware HOTP tokens that work when a button is pressed, the moving factor is often a counter.

17
Q

SMS-Based One-Time Passwords (SMS OTP)

A

SMS-Based One-Time Passwords involve an SMS message with an OTP being sent to the users phone when they attempt to authenticate. Of the OTP methods, SMS OTP is the most susceptible to attacks.

18
Q

False Rejection Rate (FRR)

A

False Rejection Rate (Type 1 Errors) describes when a biometric measure was presented and the system rejected it.

19
Q

False Acceptance Rate (FAR)

A

False Acceptance Rate (Type 2 Errors) describes when a biometric factor is presented and is accepted when it shouldn’t be.

20
Q

What are some of the basic account types?

A
  1. User accounts
  2. Privileged or administrative accounts
  3. Shared and generic accounts or credentials
  4. Guest accounts
  5. Service accounts (associated with applications and services)
21
Q

Permission Creep

A

Permission Creep occurs when users take on new roles or are granted new permissions baed on tasks they are doing.

22
Q

Deprovisioning

A

Deprovisioning is the process of removing the account, permissions, related data, files, or other artifacts required by the organization’s processes and procedures when an account is terminated.

23
Q

Privileged Access Management (PAM)

A

Privileged Access Management tools can be used to handle administrative and privileged accounts. PAM tools focus on ensuring that the concept of least privilege is maintained by helping administrators specify only the minimum set of privileges needed for a role or task.

24
Q

What are the three most important features of PAM tools?

A
  1. Just-in-time (JIT) permissions
  2. Password vaulting
  3. Ephemeral accounts
25
Q

Just-in-time (JIT) Permissions

A

Just-in-time (JIT) Permissions are permissions that are granted and revoked only when needed.

26
Q

Password Vaulting

A

Password Vaulting is commonly used as part of PAM environments to allow users to access privileged accounts without needing to know a password. This allows privileged credentials to be checked out as needed while creating a logged, auditable event related to the use of the credentials.

27
Q

Ephemeral Accounts

A

Ephemeral Accounts are temporary accounts with limited lifespans. They may be used for guests or for specific purposes in an organization when a user needs access but should not have an account on an ongoing basis.

28
Q

Mandatory Access Control (MAC)

A

Mandatory Access Control (MAC) systems rely on the operating system to enforce control as set by a security policy administrator. In a MAC implementation, users do not have the ability to grant access to files or otherwise change the security policies that are set centrally. Some examples include SELinux for Linux and Mandatory Integrity Control (MIC) for Windows.

29
Q

Discretionary Access Control (DAC)

A

Discretionary Access Control often assigns owners for objects like files and directories, and then allows the owner to delegate rights and permissions to those objects as they desire. Linux file permissions are an easy example of this system.

30
Q

Role-Based Access Control (RBAC)

A

Role-Based Access Control systems rely on roles that are then matched with privileges that are assigned to those roles. This makes RBAC a popular option for enterprises that can quickly categorize employees with roles such as “cashier” or “database administrator.”

31
Q

Rule-Based Access Control (RuBAC)

A

Rule-Based Access Control is applied using a set of rules, or access control lists (ACLs), that apply to various objects or resources. When an attempt is made to access an object, the rule is checked to see if the access is allowed.

32
Q

Attribute-Based Access Control (ABAC)

A

Attribute-Based Access Control relies on policies that are driven by attributes of the users. This allows for complex rulesets based on combinations of attributes that provide users with specific rights that match the attributes they have. ABAC policies can be complex to manage well due to their flexibility.

33
Q

Time-Of-Day Restrictions

A

Time-Of-Day Restrictions limit when activities can occur. For example, in Windows, logon hours can be set via Active Directory.

34
Q

Least Privilege

A

Least Privilege is the concept that accounts and users should only be given the minimum set of permissions and capabilities necessary to perform their role or job function.