Domain 5: Identity and Access Management Flashcards
Access
Access is a flow of information between a subject and an object.
Subject
A subject is an active entity that requests access to an object, which is a passive entity.
A subject can be a user, program, or process.
Security mechanisms that provide confidentiality
- Encryption
- Logical and physical access control
- Transmission protocols
- Database views
- Controlled traffic flow
IdM examples
- Directories
- Web access management
- Password management
- Legacy single sign-on
- Account management
- Profile update
Password synchronization
Password synchronization reduces the complexity of keeping up with different passwords for different systems.
Self-service password reset
Self-service password reset reduces help-desk call volumes by allowing users to reset their own passwords.
Assisted password reset
Assisted password reset reduces the resolution process for password issues for the help-desk department.
What do IdM directories contain?
- All resource information
- Users’ attributes
- Authorization profiles
- Roles
- Access control policies
They are the one centralized resource from which IdM applications gather this information.
User provisioning
User provisioning refers to the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications.
User access reviews
User access reviews ensure there are no active accounts that are no longer needed.
What is the authoritative source for user identities?
The HR database is usually considered the authoritative source for user identities because that is where each user’s identity is first developed and properly maintained.
Access control models (list 5)
- Discretionary
- Mandatory
- Role based
- Rule based
- Attribute based
DAC
Discretionary access control (DAC) enables data owners to dictate what subjects have access to the files and resources they own.
MAC
The mandatory access control (MAC) model uses a security label system. Users have clearances, and resources have security labels that contain data classifications.
MAC systems compare these two attributes to determine access control capabilities.
RBAC
Role-based access control (RBAC) is based on the user’s role and responsibilities (tasks) within the company.
RB-RBAC
Rule-based RBAC (RB-RBAC) builds on RBAC by adding Boolean logic in the form of rules or policies that further restrict access.
ABAC
Attribute-based access control (ABAC) is based on attributes of any component of the system. It is the most granular of the access control models.
Constrained user interface measurements (list 3)
- Menus and shells
- Database views
- Physically constrained interfaces
How is an access control list used?
Access control lists are bound to objects and indicate what subjects can use them.
Capability table
A capability table is bound to a subject and lists what objects it can access.
Remote access control technology examples (list 3)
- RADIUS
- TACACS+
- Diameter
Administrative control examples (list 5)
- Security policy
- Personnel controls
- Supervisory structure
- Security awareness training
- Testing
Physical control examples (list 5)
- Network segregation
- Perimeter security
- Computer controls
- Work area separation
- Cable
Technical control examples (list 6)
- System access
- Network architecture
- Network access
- Encryption
- Protocols
- Auditing