Configuration and Setup - Data Security Flashcards

1
Q

Organization restrictions

A

For your whole org, you can maintain a list of authorized users, set password policies, and limit logins to certain hours and locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Object level data

A

Access to object-level data is the simplest thing to control. By setting permissions on a particular type of object, you can prevent a group of users from creating, viewing, editing, or deleting any records of that object. For example, you can use object permissions to ensure that interviewers can view positions and job applications but not edit or delete them. You can use profiles to manage the objects that users can access and the permissions they have for each object. You can also use permission sets and permission set groups to extend access and permissions without modifying users’ profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fields restrictions

A

You can restrict access to certain fields, even if a user has access to the object. For example, you can make the salary field in a position object invisible to interviewers but visible to hiring managers and recruiters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Records-level access

A

You can allow particular users to view an object, but then restrict the individual object records they’re allowed to see. For example, an interviewer can see and edit her own reviews, but not the reviews of other interviewers. You can manage record-level access in these four ways.

Organization-wide defaults
Role hierarchies
Sharing rules
Manual sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Records: Organization-wide defaults

A

specify the default level of access users have to each others’ records. You use org-wide sharing settings to lock down your data to the most restrictive level, and then use the other record-level security and sharing tools to selectively give access to other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Records: Role hierarchies

A

give access for users higher in the hierarchy to all records owned by users below them in the hierarchy. Role hierarchies don’t have to match your organization chart exactly. Instead, each role in the hierarchy should represent a level of data access that a user or group of users needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Records: Sharing rules

A

are automatic exceptions to organization-wide defaults for particular groups of users, so they can get to records they don’t own or can’t normally see. Sharing rules, like role hierarchies, are only used to give additional users access to records. They can’t be stricter than your organization-wide default settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Records: Manual sharing

A

allows owners of particular records to share them with other users. Although manual sharing isn’t automated like org-wide sharing settings, role hierarchies, or sharing rules, it can be useful in some situations, such as when a recruiter going on vacation needs to temporarily assign ownership of a job application to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Login Hours

A

Profile level: Can restrict hours for users to log in
Days & hours can be set for users to log into the organization; they will be denied if attempted outside the allotted days/hours
The same error message that appears when the username or password is incorrect appears when a user is denied access
‘Clear all times’ can be clicked to allow users to log in at any time
By setting ‘Start Time’ to 12AM and ‘End Time’ to ‘End of Day, it will prohibit users from logging in on a specific day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Settings

A

Org Access (Highest level):Without verifying their identity, users can login on specified trusted IP ranges set within the network access settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Record Modification Fields

A

All objects include fields to store the name of the user who created the record and who last modified the record. This provides some basic auditing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Login History

A

You can review a list of successful and failed login attempts for the past six months

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Field History Tracking

A

You can turn on auditing to automatically track changes in the values of individual fields. Although field-level auditing is available for all custom objects, only some standard objects allow it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Setup Audit Trail

A

The Setup Audit Trail logs when modifications are made to your organization’s configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password policies

A

Set password and login policies, such as specifying an amount of time before all users’ passwords expire and the level of complexity required for passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User password expiration

A

Expire the passwords for all the users in your org, except for users with “Password Never Expires” permission.

17
Q

User password resets

A

Reset the password for specified users.

18
Q

Login attempts and lockout periods

A

If a user is locked out due to too many failed login attempts, you can unlock the person’s access.

19
Q

Identity provider

A

is a trusted service that enables users to access other websites and services without logging in again.

20
Q

Single sign-on (SSO)

A

enables a person to log in once and access other apps and services without logging in again.

21
Q

Social sign-on

A

enables a person to log in to an app using the credentials established with a social account like Google. That app accepts the Google credentials, and the user doesn’t have to create another account and password.

22
Q

Service provider

A

is a website or service that hosts apps and accepts identity from an identity provider.

23
Q

Protocol

A

specifies the set of rules that enable systems to exchange information. Generally, the term protocol and standard are used interchangeably.

24
Q

Privileged credentials

A

are a subset of credentials (such as passwords) that provide elevated access and permissions across accounts, applications, and systems.

25
Q

Privileged passwords

A

can be associated with humans, applications, service accounts, and more.

26
Q

Privileged access management (PAM)

A

Manages a way to store secrets, such as passwords and cryptographic keys (a word, number, or phrase that works in combination with an algorithm to encrypt [or scramble] plaintext)

An important factor of PAM implementation is to make sure you have well-defined use cases and user profiles.

Use these to assign levels of access for service account management, discovery functions, asset and vulnerability management and analytics, and more.

If your organization does not have the resources to maintain security staff who are trained to install, configure, and manage these solutions, consider using a managed service provider (MSP) who can perform these functions for you.

27
Q

Privileged Account Password Policy

A

To protect your systems your organization should develop and enforce a clear policy for privileged account passwords and to socialize it with all relevant parties who use and manage these accounts.

It’s a good idea for organizations to develop privileged account password policies for both accounts accessed by people, and accounts accessed by other systems. These policies should include the mandatory use of long passphrases and multi-factor authentication (MFA) for human accounts.

Passwords rotation standards can ensure the systematic rotation of passwords for every account, system, networked hardware device, application, and service. Your rotation standards should include automatic notification to stakeholders when it’s time to update passwords.

28
Q

principle of least privilege (POLP)

A

he principle of least privilege is an IT security design principle that restricts access rights and program privileges to only those necessary for the required job. It’s the difference between having a key that works on every door, and one that only opens certain rooms.

One aspect of implementing least privilege is that you remove full local administrator access to system endpoints

29
Q

k

A

k