Domaine 3 : Architecture de sécurité Flashcards
What is Discretionary Access Control (DAC)?
Access decisions are made by the resource owner
DAC allows owners to determine who has access to their resources.
What does Mandatory Access Control (MAC) rely on?
Access is based on fixed policies and classifications
MAC is often used in environments requiring high security.
How is access assigned in Role-Based Access Control (RBAC)?
Access is assigned based on user roles within an organization
RBAC simplifies management by grouping users with similar access needs.
What is the basis for access decisions in Attribute-Based Access Control (ABAC)?
Access decisions are based on attributes (e.g., user, resource, environment)
ABAC offers fine-grained access control compared to other models.
Define the principle of Least Privilege.
Users are granted the minimum access necessary to perform their duties
This principle helps minimize potential security risks.
What does Separation of Duties aim to prevent?
Prevents fraud or error
It ensures that no single individual has control over all aspects of a critical task.
What are Time-of-Day Restrictions?
Access is limited to specific times to enhance security
This helps to restrict access during non-business hours.
What do Location-Based Restrictions control?
Access is controlled based on geographic location
This can prevent unauthorized access from non-approved locations.
What is the purpose of Access Control Lists (ACLs)?
Define permissions attached to objects specifying which users can access them
ACLs are essential for managing access to resources effectively.
What are Group Policies used for?
Used to manage user and computer settings in an Active Directory environment
Group Policies streamline the administration of settings across multiple users.
What does Multifactor Authentication (MFA) combine?
Combines multiple authentication methods to verify identity
MFA enhances security by requiring more than one form of verification.
What is the Principle of Least Privilege?
Users are granted only the permissions necessary to perform their job functions
This principle minimizes potential damage from malicious activities or accidental misuse.
What does Discretionary Access Control (DAC) entail?
Resource owners determine access permissions.
DAC is common in standard operating systems.
What is Mandatory Access Control (MAC)?
Access decisions are based on fixed policies and classifications.
MAC is often used in environments requiring high security.
Define Role-Based Access Control (RBAC).
Permissions are assigned based on user roles within an organization.
RBAC simplifies management by grouping users with similar access needs.
What is Rule-Based Access Control?
Access is determined by system-enforced rules set by administrators.
Examples include time-based restrictions or specific browser requirements.
Describe Attribute-Based Access Control (ABAC).
Access decisions are based on attributes (e.g., user, resource, environment).
ABAC allows for more granular and context-aware access control.
What are Time-of-Day Restrictions?
Access can be limited to specific times or days.
This enhances security by restricting access during non-business hours.
What is the Principle of Least Privilege?
Users are granted only the permissions necessary to perform their job functions
This principle minimizes potential damage from malicious activities or accidental misuse.
What does Discretionary Access Control (DAC) entail?
Resource owners determine access permissions.
DAC is common in standard operating systems.
What is Mandatory Access Control (MAC)?
Access decisions are based on fixed policies and classifications.
MAC is often used in environments requiring high security.
Define Role-Based Access Control (RBAC).
Permissions are assigned based on user roles within an organization.
RBAC simplifies management by grouping users with similar access needs.
What is Rule-Based Access Control?
Access is determined by system-enforced rules set by administrators.
Examples include time-based restrictions or specific browser requirements.
Describe Attribute-Based Access Control (ABAC).
Access decisions are based on attributes (e.g., user, resource, environment).
ABAC allows for more granular and context-aware access control.
What are Time-of-Day Restrictions?
Access can be limited to specific times or days.
This enhances security by restricting access during non-business hours.