Domain 5: Identity and Access Management Flashcards
MAC
Mandatory Access Control
Uses classifications and labels to define user access.
Used in very strict environments.
The Operating System enforces MAC (when used in a digital format).
DAC
Discretionary Access Control
Discretionary Access Control (DAC) allows the Data Owner to control and define access to objects.
ABAC
Attribute Access Control
Attribute-Based Access Control (ABAC) makes decisions based on attributes for either the subject, object, or actions.
RBAC
Role-based Access Control
Role-Based Access Control (RBAC) maps a subject’s role with their needed operations and tasks.
Type 1 authentication factor
Something you know: password, PIN
Type 2 Authentication factor
Something you have: Smartcard, MFA app on phone
Type 3 Authentication factor
Something you are: Fingerprint, voice id, face id
CER
Cross-over Error Rate: Defines the point where false rejection rates are equal to false acceptance rates.
Type 1 Error
Falsely rejected Authentication (user should have access but is denied)
Type 2 Error
False acceptance (User should NOT have access but is granted access.)
Registration (biometrics)
Registration is the capturing of an individuals biometric data.
(is this capturing of any type of identifiable data?)
Hybrid Federation
Related to a type of authentication infrastructure:
Authentication occurs on-premise, not in the cloud. Grants access to resources outside of just on-premise.
Cloud based federation
Uses a third party for shared federated identities. i.e. okta or duo
On-premise federation
Federation is hosted on premises for access to on-premises resources.
Relationship of federated identities and SSO
SSO provides single sign on to one organization.
Multiple SSO systems that agree to share information and access create a FEDERATION.
Two basic components of PKI
CA and RA - certificate authority and registration authority.
Public Key Infrastructure (PKI) uses a central authority to store encryption keys or certificates in order to establish the identity or digital signature of a user. PKI systems use certificate authorities (CAs) and registration authorities (RAs).
OAuth Connect pairs with _____ to perform identity verification, and obtain user profile information
Open ID Connect
Audit Trail
Log that provides play by play record of actions.
The audit trail allows an administrator to review events and users linked to those events. It can be used to review employee misconduct or provide a log of events leading to system failure. An audit trail is required for some security standards, including the Health Insurance Portability and Accountability Act (HIPAA).