Domain 5 - Identity and Access Management Flashcards
Information
Includes all of the organizations data. Needs to be protected
Systems
Includes any and all IT systems that provide a service (File, Web)
Facilities
Any Physical location that an org rents/owns. Physical security protects the building
Subject
A subject is an active entity that accesses a passive object to receive information from an object. When authorized, subjects can modify objects.
Object
An object is a passive entity that provides information to active subjects. Includes files, DB’s, computers, programs, processes etc
Access Control
Access Control is any hardware, software or administrative policy that controls access to the resources. The goal is to prevent unauthorized access and provide authorized access
Access Control Steps
- ) Identify and authenticate users
- ) Determine if access is authorized
- ) Grant or restrict access based on the subject’s identity
- ) Monitor and record access attempts
Preventive Access Control
A preventive control attempts to stop unwanted or unauthorized activity from occurring.
Detective Access Control
A detective control attempts to discover or detect unwanted or unauthorized activity. Detective controls operate after the fact and can discover the activity only after it has occurred
Corrective Access Control
A corrective control modifies the environment to return systems to normal after an unwanted or unauthorized activity has occurred.
Deterrent Access Control
A deterrent control attempts to discourage security policy violations. Depends on People
Directive Access Control
A directive control attempts to direct, confine, or control the actions of subjects to force or encourage compliance with security policies
Compensation Access Control
A compensation control provides an alternative when
it isn’t possible to use a primary control, or when necessary to increase the effectiveness
of a primary control
Administrative Access Control
Administrative access controls are the policies and
procedures defined by an organization’s security policy and other regulations or
requirements.
Logical/Technical Access Control
Logical access controls (also known as technical access controls) are the hardware or software mechanisms used to manage access and to provide
protection for resources and systems.
Physical Controls
Physical access controls are items you can physically touch. They include physical mechanisms deployed to prevent, monitor, or detect direct contact with
systems or areas within a facility
Confidentiality
Access controls help ensure that only authorized subjects can access objects.
Integrity
Integrity ensures that data or system configurations are not modified without authorization, or if unauthorized changes occur, security controls detect the changes.
Availability
Authorized requests for objects must be granted to subjects within a reasonable amount of time.
Identification
The process of a subject claiming or professing an identity. A subject must provide an identity to a system to start the AAA process
Authentication
Verifies the identity of the account by comparing it against a DB of valid identities. Authentication Info needs to be protected
Authorization
Subjects are granted access to objects based on proven identities. Authorization indicates who is trusted to perform specific operations.
Accountability
Users and other subjects can be held accountable for their actions when auditing is implemented. Auditing tracks subjects and records when they access objects, creating an audit trail in one or more audit logs
Auditing
Auditing is the process of tracking and recording
subject activities within logs.
Type 1
Something you know
Type 2
Something you have
Type3
Something you are
Tokens
Password generating device.
- ) Synchronous Dynamic Password Tokens
- )Asynchronous Dynamic Password Tokens