Domain 5 - Identity and Access Management Flashcards
Digital Certificates
- may be used as an authN technique for user, service and device identities. Similar to those used to secure websites. Have both a public and private key. Usually issued by certificate authority in a PKI
Network access server
- client to a RADIUS server, RADIUS server provides AAA services
RADIUS
- uses UDP 1812/1813 and encrypts the password only, remote access
TACACS+
uses TCP 49 and encrypts entire session, admin access to network devices
Diameter
based on RADIUS and improves its weaknesses, NOT COMPATIBLE with RADIUS, used in LTE/4G networks
Kerberos
- authN protocol (UDP/TCP 88) for active directory (on prem and hybrid), provides confidentiality and integrity using SYMMETRIC key encryption, does not provide logging for accountability, common attacks include replay, pass the ticket, golden ticket, and kerberoasting
Need to know
- ensures subjects are only granted access to what they NEED for work tasks, subjects with clearance to access is only granted if they need to know
Least privilege
- subjects are granted only the privs they NEED to perform their job functions, includes rights to take action on a system
Separation of Duties/ responsibilities
- ensures that sensitive functions are split into tasks performed by 2 or more employees, helps prevent fraud and errors by adding checks and balances
Just in Time (JIT)
- modern/granular approach to least privilege, allows temp elevation of privilege as its needed and revoking at the end of the window, ie priviliged identiy management (PIM)/ priviliged access management (PAM), implemented through ephemeral accounts or broker and remove access strategy
Identification
- subject claims an identity ie provides a username
Authentication
- subject PROVES identity ie provides a password or MFA
Authorization
- after authentication, determines ACCESS based on proven identity
Accountability
- auditing logs/ trails record events including identity, provides PROOF
MFA
- something you know (PIN, password), something you have (trusted device), something you are (biometric), includes 2 or more authN factors, passwords are the WEAKEST form of authN,
Smartcards
- include microprocessors and cryptographic certificates,
Tokens (MFA)
- create one time passwords
Biometrics (MFA)
- identify based on physical characteristics like fingerprints/ retina scan. Know CROSSOVER ERROR RATE and how to calculate.
Facial recognition
- looks at shape of face, light and angle can affect it, windows Hello uses special infrared camera and is better than others,
Veins (MFA biometrics)
- uses blood vessels in palm for authentication
Gait analysis
- looks at how you walk for authN, works with low resolution
Crossover error rate (CER) (biometrics)
- identifies the accuracy of biometrice method, shows where false rejection and false rates are equal, to change this you increase/decrease sensitivity of the biometric device
FAR
- false acceptance rate, biometric authN, TYPE 2 ERROR
FRR
- false rejection rate, biometric authN, TYPE 1 ERROR
Single sign on (SSO)
- authN once and then access multiple objects with reauthentication, commons standards include: SAML, SESAME, KryptoKnight, Oauth, OpenID. KNOW SAML/ OAUTH 2.0/ OPENID
Security Assertion Markup Language (SAML)
XML based open standard data format for exchanging authN and authZ data between parties, mainly between an identity provider and service provider, Used often in Active Directory Federation services