Foundational Concepts Flashcards

1
Q

What is the purpose of identity security

A

to securely manage and govern accounts, roles, and entitlements across all applications, systems, data, and cloud services, ensuring consistent and visible security practices throughout the entire organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Identity Cube

A

multi-dimensional data models of identity information that offer a single, logical representation of each managed user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define entitlements

A

the access rights an account has on a source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Roles

A

allow you to group related sets of access, from a single source or across multiple sources, to simplify access management for your users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Governance Groups

A

is a group of users that can make governance decisions about access. If your organization has the Access Request or Certifications service, you can configure governance groups to review access requests or certifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Access Requests

A

Requests made by users, or on behalf of a user, to gain access to specific resources or systems. These requests may be for access to data, applications, networks, or other digital resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Certification Campaigns

A

a mechanism for reviewing and verifying user access to entitlements (sets of permissions) and approving or removing that access, helping organizations reduce risk of inappropriate access and satisfy audit requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Identity

A

Represents a person or entity within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity Mappings

A

Configure the identities managed by SailPoint, specifying applications and attributes from which identity data is derive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Correlation

A

Match and assign source accounts to identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attribute Synchronization

A

Synchronize changes to identity attributes from authoritative sources to target systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Segmentation

A

Define which users have access to specific data segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounts:
Provisioning

A

Create, update, and delete accounts in target systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the term ‘Accounts’ represent?

A

Represents a user’s access to a specific application or resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of correlation in account management?

A

Match and assign source accounts to identities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does provisioning involve?

A

Create, update, and delete accounts in target systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the function of attribute synchronization?

A

Synchronize changes to account attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the search functionality do in account management?

A

Search for accounts within identities or by specific criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are account schemas used for?

A

Manage the attributes stored for each account source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an Access Profile?

A

A collection of access rights or entitlements granted to an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the primary purpose of Access Management?

A

Control and manage user access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can Access Profiles be utilized in searching?

A

Search for access profiles within identities or by specific criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Data Segmentation allow in relation to Access Profiles?

A

Define which users can view specific access profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the function of Nested Queries in Access Profiles?

A

Use nested queries to search for data within access profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are tags used for?
To apply tags to searchable items for organization and filtering. ## Footnote Tags help categorize and locate items efficiently.
26
What are data segments?
Data segments are created for administrative access that can be delegated to others. ## Footnote This allows for controlled access management.
27
What is the purpose of rules?
Snippets of user code written to inject business logic. Rules are used for various purposes, including aggregation, correlation, and provisioning. Stored as reusable objects in the database ## Footnote Rules automate and streamline processes.
28
What are ManagedAttributes?
ManagedAttributes are used to deal with ManagedAttribute objects. ## Footnote They help in handling specific attributes within the system.
29
What do filters do?
Filters are used to constrain the identities refreshed. ## Footnote They limit the scope of identity data processing.
30
What are provisioning policies (application configuration)?
Provisioning policies in an application configuration define the set of attributes which are needed to complete a provisioning request, whether that request is to create an account, modify an account, add a role to an identity, etc. In some cases, values for the attributes can be auto-calculated based on the field's definition in the provisioning policy; ## Footnote Provisioning policies are implemented as forms
31
What is target mapping?
Target mapping is used to synchronize attributes from SailPoint to target applications. ## Footnote This ensures data consistency across platforms.
32
What are transformation rules?
Transformation rules are used to transform values during synchronization. ## Footnote They facilitate the conversion of data formats as needed.
33
What is IdentityIQ?
The core platform that provides the foundation for SailPoint's products and services. ## Footnote It includes tools and capabilities for managing identities, access, and compliance.
34
What does Identity Governance allow organizations to do?
Manage user identities and access across hybrid environments. ## Footnote Ensures the right individuals have access to the appropriate resources.
35
What is the purpose of Certification in SailPoint?
Facilitates the generation of certificates for compliance management
36
What does the IdentityIQ Compliance Manager help businesses with?
Improving audit and compliance performance while ensuring cost reduction.
37
What are Connectors and Integration Modules?
Modules that enable IdentityIQ to integrate with various applications and data sources. ## Footnote This includes both on-premises and cloud environments.
38
What is the function of User Provisioning?
Automates user provisioning to make change management across the user lifecycle more efficient.
39
What capabilities does Password Management offer?
Robust password management capabilities to strengthen authentication processes. ## Footnote Includes password policy enforcement and self-service password reset.
40
What tools does Access Control provide?
Tools for managing and controlling user access to applications and resources.
41
What is the role of Identity Analytics?
Helps organizations understand their identity and access data, identify risks, and make informed decisions about access privileges.
42
What does Lifecycle Manager provide?
A comprehensive approach to managing the user lifecycle, from onboarding to offboarding. ## Footnote Ensures security and compliance.
43
What is the Identity Security Platform?
A platform that combines identity governance, access management, and identity security capabilities.
44
What is IdentityNow?
A cloud-based IAM tool that works seamlessly with IdentityIQ.
45
What are the four major components of SAILPOINT IDENTITY IQ?
Compliance Manager, Lifecycle Manager, Governance Platform, Password Manament? ## Footnote The fourth component is not mentioned in the provided text.
46
What is the primary function of the Lifecycle Manager?
Automated Change Management ## Footnote It provides automated change management based on configurable identity lifecycle event triggers.
47
What are Lifecycle Events?
Activities that occur during a person's employment, such as joining, changing departments, or leaving. ## Footnote Lifecycle Events can be configured to represent various employment activities.
48
Who can make provisioning requests in the Lifecycle Manager?
users for themselves, managers for their direct reports, and help desk users for themselves and others, depending on the Lifecycle Manager configuration and user roles. ## Footnote Users can request for themselves or for other identities.
49
What does the Lifecycle Manager integrate with?
Business processes ## Footnote It ensures that access changes are handled correctly and efficiently.
50
Fill in the blank: The Lifecycle Manager provides _______ based on configurable identity lifecycle event triggers.
[Automated Change Management]
51
True or False: Lifecycle Events can only represent activities related to leaving a job.
False ## Footnote Lifecycle Events can represent various activities including joining and changing departments.
52
List some activities represented by Lifecycle Events.
* Joining * Mover * Leaving ## Footnote These activities occur during a person's employment.
53
Fill in the blank: The Lifecycle Manager integrates with _______ to ensure access changes are handled correctly.
[Business processes] (workflow)
54
______________________ automates access certifications, policy management, and audit reporting through a unified governance framework. This enables you to streamline compliance processes and improve the effectiveness of identity governance, all while lowering costs.
Compliance Manager
55
_______________________ manages changes to access through user-friendly self-service request and password management interfaces and automated lifecycle events. It provides a flexible, scalable provisioning solution for addressing the constantly evolving access needs of your business in a way that's both efficient and compliant.
Lifecycle Manager
56
Four commons uses of BeanShell Rules
**PC CD** * Provide application provisioning logic * Control certification behavior * Customize data during aggregation * Define unique business policies
57
Define Tasks
are batch jobs that act on objects * Scheduled or manually run * No user interaction
58
Define Business processes
are a set of executable steps that act on objects * Respond to actions in the system * Often interact with a user Triggered by system events or a user request
59
Key Features: Access Certifications
Ensures that users have appropriate access by conducting periodic reviews.
60
Key Features: Access Request Management
Allows users to request access to applications and systems, with a built-in approval workflow.
61
Key Features: Provisioning
Automates the process of granting or removing access to systems and applications.
62
Key Features: Policy Management
Enforces policies related to user access and segregation of duties (SoD)
63
Key Features: Governance Dashboard
Provides reporting and analytics for monitoring access risks and compliance.
64
Key Features: Analytics and Reporting
Offers insights into identity usage, security trends, and compliance metrics.
65
Ensures that users have appropriate access by conducting periodic reviews.
Key Features: Access Certifications
66
Allows users to request access to applications and systems, with a built-in approval workflow.
Key Features: Access Request Management
67
Automates the process of granting or removing access to systems and applications.
Key Features: Provisioning
68
Enforces policies related to user access and segregation of duties (SoD)
Key Features: Policy Management
69
Provides reporting and analytics for monitoring access risks and compliance.
Key Features: Governance Dashboard
70
Offers insights into identity usage, security trends, and compliance metrics.
Key Features: Analytics and Reporting
71
What are batch jobs that act on objects * Scheduled or manually run * No user interaction
Tasks
72
are a set of executable steps that act on objects * Respond to actions in the system * Often interact with a user Triggered by system events or a user request
Define Business processes
73
SailPoint IIQ: Supports a wide range of connectors, including: (4)
LDAP/Active Directory for user authentication and directory services. Databases like Oracle, SQL Server for account and entitlement management. SaaS Applications like Salesforce, Workday, Office 365 for cloud identity management. Mainframes such as RACF, AS/400 for legacy systems.
74
What is the purpose of Role Models?
Defining roles based on job functions and automating access provisioning. ## Footnote Role Models help streamline the process of granting access to systems and data based on predefined job roles.
75
What does Role Mining entail?
Discovering existing access patterns to create efficient role structures. ## Footnote Role Mining analyzes current access permissions to optimize role definitions.
76
What are Role Assignments?
Automatically assigning roles to users based on attributes like department, job title, and location. ## Footnote Role Assignments help in maintaining consistency in user access management.
77
What is the purpose of Role Certifications?
Periodic reviews of role assignments to ensure that users retain only the necessary access. ## Footnote Role Certifications help in maintaining security and compliance by regularly verifying access rights.