Domain 5 - Identity and Access Management (IAM) Flashcards

1
Q
For our new startup, we are looking at different types of identity and access management. Which of these are COMMON types of that? (Select all that apply).
A: TRAC (trust access control)
B: RUBAC (rule based access control)
C: MAC (mandatory access control)
D: RBAC (role based access control)
E: DAC (discretionary access control)
A

C and E

In Identity and Access Management we can use DAC (Discretionary Access Control), which is often used when Availability is most important. Access to an object is assigned at the discretion of the object owner. MAC (Mandatory Access Control): Often used when Confidentiality is most important. Access to an object is determined by labels and clearance, this is often used in the military or in organizations where confidentiality is very important. RBAC (Role Based Access Control): Often used when Integrity is most important. Policy neutral access control mechanism defined around roles and privileges. A role is assigned permissions, and subjects in that role are added to the group, if they move to another position they are moved to the permissions group for that position. RUBAC is based on IF/THEN statements (think older firewalls), and is not a type of Identity and Access Management. TRAC is .. well nothing, I made it up 0_o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Identity and Access Management you would primarily use MAC (Mandatory Access Control) for?
A: availability
B: integrity
C: confidentiality

A

C: confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Identity and Access Management you would primarily use MAC (Mandatory Access Control) for?
A: availability
B: integrity
C: confidentiality

A

C: confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In Identity and Access Management you would primarily use RBAC (Role Based Access Control) for?
A: availability
B: integrity
C: confidentiality

A

B: Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is RUBAC Identity and access management

A

No, Rule based access control (RUBAC) is based on IF/THEN statements (think older firewalls),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is HMAC

A

HMAC (Hash-based Message Authentication Code) is a type of a message authentication code (MAC) that is acquired by executing a cryptographic hash function on the data (that is) to be authenticated and a secret shared key. Like any of the MAC, it is used for both data integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A HMAC-based one-time password (HOTP) is an example of which type of authentication method?
A: something you know
B: something you are
C: somewhere you are
D: something you have
A

D: something you have

Explanation
Something you have - Type 2 Authentication: HOTP (HMAC-based one-time password): Shared secret and incremental counter, generate code when asked, valid till used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of these countermeasures would be the LEAST effective against brute force attacks?
A: strong password requirements
B: salting
C: Key stretching
D: limited number of wrong logins
A

B: salting
Explanation
Salting is adding random characters to passwords before hashing, it does nothing against brute force attacks. Key stretching and limited login attempts are good countermeasures, complex passwords can help, but will eventually be broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security issue in Kerberos was addressed in SESAME with Public Key Infrastructure (PKI)?
A: symmetric plain text key storage
B: never sending the password over the internet
C: PKI
D: asymmetric plaintext key storage

A
A: symmetric plaintext key storage
Explanation
SESAME (Secure European System for Applications in a Multi-vendor Environment): Uses a PAS (Privilege Attribute Server), which issues PACs (Privilege Attribute Certificates) instead of Kerberos’ tickets. It uses PKI encryption (asymmetric), which fixed the Kerberos the plaintext storage of symmetric keys issue.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

We are adding random data to our password hashes, to prevent attackers from successfully using rainbow table and dictionary attacks. What are we adding to the hash function?

A

salting
Explanation
Salting is random data that is used as an additional input to a one-way function that hashes a password or passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of these is the WEAKEST form of authentication we can implement?
A: something you know
B: biometrics
C: something you have 
D: something you are
A

A: something you know
Explanation
Something you know - Type 1 Authentication: Passwords, pass phrase, PIN etc., also called Knowledge factors. It is the weakest form of authentication, and can easily be compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
When we look at using type 3 authentication, we would talk about all these terms EXCEPT which?
A: FAR
B: CER
C: FRR
D: CRR
A

D: CRR
Explanation
Something you are - Type 3 Authentication (Biometrics), uses Errors for Biometric Authentication: FRR (False rejection rate), FAR (False accept rate) and CER (Crossover Error Rate).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

We have found some older systems on our network using CHAP. What could be a reason we would want to migrate away from using CHAP?
A: it uses PPP
B: it uses SSL
C: it stores client passwords on the server, they are never sent over the internet
D: credentials are sent plaintext over the network

A

C:
Explanation
The CHAP server stores plaintext passwords of each client, an attacker gaining access to the server can steal all the client passwords stored on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Jane is looking at the Kerberos implementation we have in place and is working on the Key Distribution Center (KDC). Which of these is part of the KDC?
A: TGT
B: SWG
C: BGP
D: TGS
A

D: TGS
Explanation
The KDC (Key Distribution Center) consists of the AS (Authentication Server) and the TGS (Ticket Granting Server).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An administrator notices a user’s account is being used from across the world and at 0300 in the morning. They know the employee is not out of the country. What is the FIRST thing they should do?

A

Explanation
The administrator should lock the account, then if deemed appropriate call the user. We would assume the credentials are compromised and we don’t want the attacker to stay on our network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
We have been using Kerberos for some years. Bob is explaining the traffic flow to a new colleague. What does the client send to the TGS?
A: session key
B: authenticator
C: user ID
D: plaintext password
A

B: authenticator
Explanation
When requesting services, the client sends the following messages to the TGS: #1 The TGT and the ID of the requested service. #2 Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
what is kerberos 
A. authentication
B. encryption
C. one way hash
D. data security
A

answer: A. Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is PKI

A

answer:
Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does kerberos try to solve

A

It is primarily focused on verifying the identity of the users over an insecure network connection. It is symmetric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what service does kerberos use to verify the identity of users

A
  • Kerberos protocol uses KDC (key distribution center) to verify the identity of a certain user over an insecure network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

3 basic steps a client takes during authentication with kerberos

A
  1. a client (generally either a user or a service) sends a request for a ticket granting ticket to the Key Distribution Center (KDC) sending a plaintext user ID
  2. KDC creates a ticket-granting ticket (TGT) for the client, encrypts it using the client’s password as the key
  3. sends the encrypted TGT back to the client.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

the 3 primary pieces (functions) of kerberos are

A
  1. A ticket-granting server (TGS) that connects the user with the service server (SS)
  2. A Kerberos database that stores the password and identification of all verified users
  3. An authentication server (AS) that performs the initial authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what did MS user prior to kerberos

A

NTLM (NT Lan Manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

authentication protocols (3) supported by MS AD

A

Microsoft Active Directory supports
.. Rivest Cipher 4 (RC4)
.. Advanced Encryption Standard 128-bit (AES-128)
.. Advanced Encryption Standard 256-bit (AES-256)
..Data Encryption Standard (DES) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is a cipher

A

a cipher is an algorithm for encrypting and decrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is LDAP encrypted

A

by default LDAP communications between client and server applications are not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

LDAPS is what

A

light weight Directory Protocol over TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following has the correct term-to-definition mapping?

i. Brute-force attacks: Performed with tools that cycle through many possible character, number, and symbol combinations to uncover a password.
ii. Dictionary attacks: Files of thousands of words are compared to the user’s password until a match is found.
iii. Social engineering: An attacker falsely convinces an individual that she has the necessary authorization to access specific resources.
iv. Rainbow table: An attacker uses a table that contains all possible passwords already in a hash format.

A. i, ii
B. i, ii, iv
C. i, ii, iii, iv
D. i, ii, iii

A

answer is C:

The list has all the correct term-to-definition mappings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what are the 7 security controls - not security categories

A
  1. Preventive
  2. Compensating
  3. Corrective
  4. Deterrent
  5. Detective
  6. Directive
  7. Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

there are 7 security controls. what are the 3 primary

this is not a question about the 3 security categories

A
  • preventative
  • detective
  • corrective
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what are TTPs

A
  • Tactics
  • Techniquest
  • Procedures

** describe the behaviors, processes, actions, and strategies used by a threat actor to develop threats and engage in cyberattacks **

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Microsoft AD uses both Kerberos and LDAP. What is the authorization and what is the Authentication

A

Kerberos is the Authentication
LDAP is the authorization

33
Q

kerberos attributes snippet

A
  • uses udp port 88
  • uses symmetric keys and requires a trusted 3rd party
  • K5 use symmetric AES 256
  • provides confidentiality and integrity
  • using end to end security
  • CAN use PKI during CERTAIN phases of the authentication (private public keys)
  • if bad actor gets access to KDC they have access to everything with a single password
34
Q

What is constrained interface

A

• It’s basically restricting what the user can do.
• You are giving them a restricted version of that interface so that they do not have advanced capabilities to for example break your application

35
Q

Radius attributes

A
  • it uses UDP compared to tacacs+ that uses TCP
  • password is encryped but most of the information is unencrpted
  • udp ports 1812 and 1813
  • can set it to use TCP, you can then use TLS for security
  • Central authentication Service
  • 802.1x standard
  • open standard
  • not as strong of encryption with the initial handshake compared to Tacacs+
36
Q

OAuth 2.0 attributes

A
  • rfc 6749 describes OAuth 2.0
  • OAuth shares password information securely with third party applications
  • exchanges information using API
  • an app obtains an access token from an identity provider
  • later, the app includes the access token for authorization
  • often used in web applications
    • OpenID connect adds authentication functions to OAuth that only does authorization
  • in OIDC the user is presented an option of identity providers (IdPs)
  • OIDC adds SSO type functionality to OAuth
37
Q

A software developer created an application and wants to protect it with DRM technologies. Which of the following is she most likely to include? (Choose three.)

  1. virtual licensing
  2. persistent online authentication
  3. automatic expiration
  4. continous audit trail
A

2,3,4
Answer: Persistent online authentication, automatic expiration, and a continuous audit trail are all methods used with digital rights management (DRM) technologies. Virtual licensing isn’t a valid term within DRM.

38
Q

A company maintains an e-commerce server used to sell digital products via the internet. When a customer makes a purchase, the server stores the following information on the buyer: name, physical address, email address, and credit card data. You’re hired as an outside consultant and advise them to change their practices. Which of the following can the company implement to avoid an apparent vulnerability?

A. Anonymization
B. Pseudonymization
C. Move the company location
D. Collection limitation

A

D. Collection limitation

Answer: The company can implement a data collection policy of minimization to minimize the amount of data they collect and store. If they are selling digital products, they don’t need the physical address. If they are reselling products to the same customers, they can use tokenization to save tokens that match the credit card data, instead of saving and storing credit card data. Anonymization techniques remove all personal data and make the data unusable for reuse on the website. Pseudonymization replaces data with pseudonyms. Although the process can be reversed, it is not necessary.

39
Q

Pseudonymization
1. what is it
2. is it reversible

A
  1. Pseudonymization replaces data with pseudonyms
  2. the process can be reversed
40
Q

An administrator is planning to deploy a database server and wants to ensure it is secure. She reviews a list of baseline security controls and identifies the security controls that apply to this database server. What is this called?
A. Tokenization
B. Scoping
C. Standards selection
D. Imaging

A

B. Scoping

41
Q

A cloud-based provider has implemented an SSO technology using JSON Web Tokens. The tokens provide authentication information and include user profiles. Which of the following best identifies this technology?
A. OIDC
B. OAuth
C. SAML
D. OpenID

A

A. OIDC

Explaination: OpenID Connect (OIDC) uses a JavaScript Object Notation (JSON) Web Token (JWT) that provides both authentication and profile information for internet-based single sign-on (SSO). None of the other answers use tokens. OIDC is built on the OAuth 2.0 framework. OpenID provides authentication but doesn’t include profile information.

42
Q

Which of the following best expresses the primary goal when controlling access to assets?
A. Preserve confidentiality, integrity, and availability of systems and data.
B. Ensure that only valid objects can authenticate on a system.
C. Prevent unauthorized access to subjects.
D. Ensure that all subjects are authenticated.

A

A. Preserve confidentiality, integrity, and availability of systems and data.

explaination: A primary goal when controlling access to assets is to protect against losses, including any loss of confidentiality, loss of availability, or loss of integrity. Subjects authenticate on a system, but objects do not authenticate. Subjects access objects, but objects do not access subjects. Identification and authentication are important as the first step in access control, but much more is needed to protect assets.

43
Q

sesame attributes

A
  • called the successor to kerberos
  • use PKI/asymmetric (public private keys)
  • no plaintext storage
  • not widely used since Kerberos is native in most OS’s
44
Q

TACACS

A
  • this is no longer used
  • only encrypted password
  • used tcp/udp port 49
  • used reusable passwords
  • replaced with TACACS+ or radius
45
Q

TACACS+ attributes

A
  • developed by cisco (proprietary)
  • uses TCP not UDP
  • uses 2FA
  • tcp port 49 for authentication with the TACACS+ server
  • encrypts the entire data packet, not just the password
46
Q

chap (challenge handshake authentication protocol)

A
  • requires the client and server to know the plaintext of the shared secret, but its never sent of the network
  • better than PAP at security (PAP did not encrypt username or password)
  • password is hashed via the challenge process
  • still considered and acceptable technology for use in modern applications (not ms-chap or ms-chapv2, they are both broke)
47
Q

what access controls are used when integrity is important

A
  • role based
  • attribute base
48
Q

what access controls are used when availability is important

A

DAC (discretionary access based)

49
Q

what access controls are used when confidentiality is important

A

MAC (mandatory access control)

50
Q

mandatory access attributes

A
  • objects have labels
  • subjects have clearance
  • clearance must dominate the objects label (higher or equal to)
  • is it possible to have subjects using labels but that is not the normal implentation
51
Q

chap steps

A
  • once client and server establish a link
  • server sends a random value (challenge) to client
  • client combines the value with the shared secret creating a hash and sends to server (response)
  • server stores the response in memory, computes its own hash value using the same hash function on the challenge and using the shared secret they both know
  • if value of hash is the same - server know the client knows the correct shared secret and authenticates the client without sending the secret across over the network
52
Q

kerberos ldap ports

A
  • keberos TCP 88
  • LDAP use TCP 389
  • secure LDAP TCP 636
53
Q

OpenID Connect (OIDC)

related protocols that provide different sevices

A
  • is an authentication layer using OAuth 2.0
  • it builds on the OpenID authentication standard
  • it provieds both authentication and aurhtorization
  • it builds on OpenID but uses JSON Web Token
  • and federates identity management to provide users with an authentication experience similar to SSO
  • the identity and authentication provider that help users prove their identity to other services
54
Q

accountability has 2 prerequisits

A
  1. identification - must have unique identifiers, like usernames and must not allowed shared, departmental or generic accounts
  2. authentication - must be protected by strong authorization the provent unauthorized uses from gaining access

tracking (logging, auditing) must be done to enforce accountability - centeralized log servers that is locked down and admin are not even able to purge, to prevent unauthorized changes to the logs.

55
Q

capabilites access control

A

List access controls and privileges assigned to a subject.
* ACLs focus on objects whereas capability lists focus on
subjects.

56
Q

TCB access, capabilites table, ACL, Mandatory, Discretionary

A

image below

57
Q

reference monitor concept

A

image below

58
Q

access control matrix, capabilities, ACL diagram

A

image below

59
Q

Capability Tables

A
  • Each row of an access control matrix is a capability list. A capability list is tied to the subject; it lists valid actions that can be taken on each object.
  • List access controls and privileges assigned to a subject.
  • ACLs focus on objects whereas capability lists focus on subjects.
60
Q

TCB access control

A
61
Q

MAC (mandatory access control) attributes

A
  • most stringent access control
  • static and hierarchical approach to control
  • the operating system itself restrict permissions to subjects
  • user are not able to modify permissions
  • security labels to subjects and objects
  • normally implemented as a rule based access control system
  • users and resources have labels, the OS makes access control decisions by comparing the labels.
  • OS that uses this is SElinux
62
Q

pharming

A
  • beging with phishing messages
  • they create a fake website that looks legit and sending users a link to that site. they might use typosquating to make the fake site look similar to the real site, and copy the look at feel of the real site (also part of credential harvesting)
  • it could also use dns poisoning to redirect the user to the fake site
63
Q

smishing

A
  • sms
  • IM
64
Q

what is session sidejacking

A

sniffing the same network the victim is on and stealing the session cookies to then impersonate the victim

65
Q

what is cms (credential management system)

A
  1. provides tools to provision, manage, audit, and deprovision credentials.
    * password managers are a common example
    * RAs and CAs are examples
    * RA - functions as identity proofing
    * CA - fuctions to verify authenticity
66
Q

what federated solutions can IDaas use

A
  • SAML
  • OAuth
67
Q

LDAP is considereed an on prem?

A

Identity and access manager (IAM)

68
Q

Why is OpenID Connect important?

A
  • Identity is the key to any cloud strategy. At the core of modern authorization is OAuth 2.0, but OAuth 2.0 lacks an authentication component. Implementing OpenID Connect on top of OAuth 2.0 completes an IAM strategy. As more and more companies need to interoperate and more identities are being populated on the internet the demand to be able to re-use these identities will also increase thus, to serve the demand of digital customers it is crucial that identity and authentication be a part of your strategy not only authorization.
69
Q

oauth 4 roles

A
  1. resource owner - (you)
  2. client - (the application that wants to access data or perform an action on your behalf (the resource owner))
  3. authorization server - (the one that knows the resource owner, google, facebook, where you already have an account)
  4. resource server - any server hosting the protected resources wich accepts and responds to access request

authorization server and resource server, might be the same server, sometiems it not even part of the same organization. sometimes its just a authorization server that the resource server trusts

70
Q

SAML process example

A
  1. The user opens their browser and navigates to the service provider’s web application, which uses an identity provider for authentication.
  2. The web application responds with a SAML request.
  3. The browser passes SAML request to the identity provider.
  4. The identity provider parses the SAML request.
  5. The identity provider authenticates the user by prompting for a username and password or some other authentication factor. NOTE: The identity provider will skip this step if the user is already authenticated.
  6. The identity provider generates the SAML response and returns it to the user’s browser.
  7. The browser sends the generated SAML response to the service provider’s web application which verifies it.
  8. If the verification succeeds, the web application grants the user access.
71
Q

SAML attributes and roles

A
  • is an oasis standard 2005
  • xml based
  • provides authentication and authorization and attribute information on principal
72
Q

kerberos attributes

A
  • one of the earliest models of SSO
  • provides authentication
  • database stores password and identification of all verified users
  • kerberos realm ( principlals, KDC, authentication server (AS), Ticket granting server (TGS))
73
Q

3 (MAC) mandatory access control models/environments

A
  1. hierarchical environment - relates various classification labels in an ordered structure from low to medium to high, such as confidential, secret and top secret.
  2. compartmentalized environment - no relationship between one security domain and another. each domain represents a seperate isolated compartment. the subject must have specific clearance to gain access to an object
  3. Hybrid environment - each hierarchical level may contain numberous subdivisions that are isolated from teh rest of the security domain. a subject must have the correct clearans and the need to know data within a specific compartment to gain access to the compartementalized object.
74
Q

OpenID

A
  • authentication standard
  • maintained by OpenID foundation
  • an OpenID provider provides decentralized authentication
  • user enter their Open ID identifier (such as bobsmith1234.myopenid.com) on a site and the OpenID provider verifies the identifier
75
Q

pass the hash is an attack on what

A
  • While Pass-the-Hash attacks can occur on Linux, Unix, and other platforms, they are most prevalent on Windows systems. In Windows, PtH exploits Single Sign-On (SS0) through NT Lan Manager (NTLM), Kerberos, and other authentication protocols.
  • When a password is created in Windows, it is hashed and stored in the Security Accounts Manager (SAM), Local Security Authority Subsystem (LSASS) process memory, the Credential Manager (CredMan) store, a ntds.dit database in Active Directory, or elsewhere. When a user logs onto a Windows workstation or server, they essentially leave behind their password credentials.
76
Q

what can enabling kerberos preauthentication help to prevent

A
  • password guessing attacks
  • ASREPRoast identifies users that do not hve it enabled
77
Q

kerberoasting is what

A
  • attacker collects encrypted ticket granting service tickets (user accounts used by services)
  • attempts to crack these collected tickets offline
78
Q

HOTP

A
  • The “H” in HOTP stands for Hash-based Message Authentication Code (HMAC).
  • includes a hash function
  • 6-8 numbers
  • valid until used