General ACM Flashcards
What does access to the backend database provide you?
access to tables/columns that have acount and access and entitlment information
What is the significance of more partitions?
makes it easier later on to extend the space for a particular file system e.g. the one used for the data collection files and e.g. the ASM partition of oracle. if everything is just one disk, it is harder to separate them out later. also, an overflowing /tmp would eat up all your diskspace that might be used under /home/oracle/AveksaExportImportDir
How are service acounts mapped?
mapped to app owner, automaintain or include as review monitor or take out and let no one make a decision on it.
Conversion of CSV file
you can have a script coded that converts file into CSV format or you can manually create the CSV based on the config file contents
If the application changes infrequently, probably not worth the effort of coding. For manual doesn’t leave options ope for provisioning down the road
What is a strategy to use when you have to collect business descriptions for roles/entitements and you have alot of applcitions?
Collect data, and report by who has access. Then decided who can report on the applciation. The majority of people with entitilements in a particular division are group should be the owner or know the information regarding the entitlements
How do you validate accounts after on-boarding?
irst look at orphans, the ones that pop up as orphans should they be orphans. Check accounts. Spot check orphans against user accounts, look for service accounts…the person icon brings up the unified user list —-if they don’t exist in unified user list, they are most likely terminated
Where should the run-book be placed?
The runbook should be placed in a central location and updates should be made there.
At what level should access reviews occur?
Access should be reviewed at the same level that it is provisioned and deprovisioned.
If admins grant and remove access at the group level, then groups are what you want to collect for access reviews
What type of demographic data supports Accounts?
Accounts are supported by access data about “What can the account do
What are the discreet packets of access that can be granted or removed from an account within an application/system?
Entitlements
How are entitlements broken down?
Entitlements can be 1-part - “can update the customer table” or they can be 2-part “can update the customer table for Saturn Bank, but can only read the customer table for Jupiter Bank”.
In the latter scenario the entitlement actually has both a resource (Jupiter Bank) and an action (read). Both parts are needed to fully describe the access a user has.
Do all applications have entitlements?
True -
All applications have entitlements but that may NOT be the level at which administrators add and remove access to/from accounts.
Some applications come packaged with the ability to create Application-Level Roles. These are predefined bundles of entitlements.
Many times the application comes with a few roles built-in but also allows the app admins to create their own.
What is an Application-Level Role?
Application roles are a level of abstraction that allows the admin of a particular application to grant access more quickly and easily
Instead of having to grant 10 or 30 granular Entitlements to 5000 users, they can bundle those 10 or 30 Entitlements into an A-L Role and simply grant the 1 role each user.
What are Groups
Roles are bundles of entitlements like Application level roles, but unlike A-L roles, they can cross multiple applications.
Typically groups are found in systems that already touch multiple applications like:
- Mainframes (using RACF, ACF2, Top Secret)
- Midrange (like AS/400 or I-series)
- Active Directory
- eDir and other Directories
What are Roles (RBAC Roles or Job/Functional Roles)
Roles that are not based on any account, but rather on the identity information for a user. They may be based on a job title or job code or combinations of fields – that are all part of the user’s Identity record
They are more complex to setup and maintain than other access abstractions, but they generate a lot of value when implemented correctly.
Job/Functional Roles is don’t physically exist in the target applications or systems.