Domain 5: Identity and Access Management Flashcards
Access
Access is a flow of information between a subject and an object.
Subject
A subject is an active entity that requests access to an object, which is a passive entity.
A subject can be a user, program, or process.
Security mechanisms that provide confidentiality
- Encryption
- Logical and physical access control
- Transmission protocols
- Database views
- Controlled traffic flow
IdM examples
- Directories
- Web access management
- Password management
- Legacy single sign-on
- Account management
- Profile update
Password synchronization
Password synchronization reduces the complexity of keeping up with different passwords for different systems.
Self-service password reset
Self-service password reset reduces help-desk call volumes by allowing users to reset their own passwords.
Assisted password reset
Assisted password reset reduces the resolution process for password issues for the help-desk department.
What do IdM directories contain?
- All resource information
- Users’ attributes
- Authorization profiles
- Roles
- Access control policies
They are the one centralized resource from which IdM applications gather this information.
User provisioning
User provisioning refers to the creation, maintenance, and deactivation of user objects and attributes as they exist in one or more systems, directories, or applications.
User access reviews
User access reviews ensure there are no active accounts that are no longer needed.
What is the authoritative source for user identities?
The HR database is usually considered the authoritative source for user identities because that is where each user’s identity is first developed and properly maintained.
Access control models (list 5)
- Discretionary
- Mandatory
- Role based
- Rule based
- Attribute based
DAC
Discretionary access control (DAC) enables data owners to dictate what subjects have access to the files and resources they own.
MAC
The mandatory access control (MAC) model uses a security label system. Users have clearances, and resources have security labels that contain data classifications.
MAC systems compare these two attributes to determine access control capabilities.
RBAC
Role-based access control (RBAC) is based on the user’s role and responsibilities (tasks) within the company.
RB-RBAC
Rule-based RBAC (RB-RBAC) builds on RBAC by adding Boolean logic in the form of rules or policies that further restrict access.
ABAC
Attribute-based access control (ABAC) is based on attributes of any component of the system. It is the most granular of the access control models.
Constrained user interface measurements (list 3)
- Menus and shells
- Database views
- Physically constrained interfaces
How is an access control list used?
Access control lists are bound to objects and indicate what subjects can use them.
Capability table
A capability table is bound to a subject and lists what objects it can access.
Remote access control technology examples (list 3)
- RADIUS
- TACACS+
- Diameter
Administrative control examples (list 5)
- Security policy
- Personnel controls
- Supervisory structure
- Security awareness training
- Testing
Physical control examples (list 5)
- Network segregation
- Perimeter security
- Computer controls
- Work area separation
- Cable
Technical control examples (list 6)
- System access
- Network architecture
- Network access
- Encryption
- Protocols
- Auditing
What does it take for a subject to be able to access a resource?
For a subject to be able to access a resource, it must be:
- Identified
- Authenticated
- Authorized
- Held accountable for its actions
How can authentication be accomplished? (list 6)
- Biometrics
- Password
- Passphrase
- Cognitive password
- One-time password
- Token
Type I and Type II biometric errors
- Type I error means the system rejected an authorized individual
- Type II error means an imposter was authenticated
Memory card vs. Smart card
A memory card cannot process information, but a smart card can through the use of integrated circuits and processors.
Least-privilege and need-to-know
Least-privilege and need-to-know principles limit users’ rights to only what is needed to perform tasks of their job.
Single sign-on (list 3 ways to accomplish)
- Kerberos
- Domains
- Thin clients
How does Kerberos work?
- The Kerberos user receives a ticket granting ticket (TGT)
- The TGT allows him to request access to resources through the ticket granting service (TGS)
- The TGS generates a new ticket with the session keys
Keystroke monitoring
Keystroke monitoring is a type of auditing that tracks each keystroke made by a user.
Object reuse
Object reuse can unintentionally disclose information by assigning media to a subject before it is properly erased.
When is deleting not enough?
Just removing pointers to files (deleting file, formatting hard drive) is not always enough protection for proper object reuse.
How to prevent data leakage via electrical signals in airwaves
- TEMPEST
- White noise
- Control zones
How is user authentication accomplished?
- By what someone knows
- By what someone is
- By what someone has
Password-generating token methods
- Synchronous (time, event)
- Asynchronous (challenge-based)
What makes strong authentication?
Strong authentication requires two of the three user authentication attributes:
- What someone knows
- What someone is
- What someone has