General IAM Flashcards

1
Q

Access Provisioning

A

Review how access is provisioned in the application and decide if you are going to collect access as an app role or entitlement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rules about Rules

A

Not all rules are good rules

You shouldn’t have a rule unless you plan to do something about violators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Review

A

Review access at the same level it is commonly provisioned and de-provisioned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Output of Access Recertification

A

A list of removals is the only output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mining for roles

A

Works once access has been cleared up through reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of system is required when access is collected as a granular entitlement

A

the system requires a 2-part or pair of attributes… Resource and Action. It is assumed that you will have both of these fields in your source data and they are coupled together like:
Resource - Action
Group A – READ
Customer 123 - ADMIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you are collecting granular entitlements, which two fields must be populated in your collector?

A

The Resource and Action field. The entitlement displayed in a review will show a colon between the two
i.e. Customer BigMart : Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With granular entitlements, if there is no action, what are two common population tricks

A
  1. Populate the action field with a “Y” or “Yes”

2. Collect the resource as an application role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are additional uses of ACM?

A
Enforcing policies
Licencing Monitoring
Fraud investigation evidence
App usage and reduction strategies
Monitoring requests/Approval routines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which attributes should we capture?

A

attributes that would help an access reviewer make solid keep/remove decisions

ones that help with sorting

access needed to restrict forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does ACM view active and inactive identities?

A

ACM doesn’t care if identities are active or terminated at the company, but whether they are being collected or filtered out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many distinct processes occur in ACM?

A

2 (Identity and Target collections) These processes run independently and the logic used in one does not impact the logic used in the other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can logic or values from the IDC be used to filter, sort, or populate data in a target collector?

A

No - logic or values from the IDC cannot be used to filter, sort, or populate data in a target collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the only required filed in the Account collectors?

A

Account ID/Name, all others are optional but desired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With Account collectors what benefit is gained from collecting the name, last login date, and type of account flag?

A

Name - assist in resolving orphan accounts
Last Login -helps reviewers with their maintain/revoke decision process
Account Flag - Can later filter out reviews or ensure certain types of accounts arent deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 5 R’s and an F of Access Management?

A

Reviews, Requests, Roles, Reports, Rules, and Fulfillment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the impact of running an Aveksa review?

A

It depends on configured fulfillment method for the application where the revoke is selected.
If the app is set to auto-provisioning then a revoke will wipe it out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are terminated users handled?

A

Terminated users should be flagged as terminated. The SQL query can be set to skip older terminated users and not collet them. If an identity was collected yesterday and skipped today, it will be stamped with a last seen on date and becomes inactive. Inactive dont count against licensing

19
Q

What is supplied in a Soft appliance configuration

A

RSA Aveksa supplies the RSA Aveksa software, JRE, and the JBOSS application server. The Oracle database may be supplied by RSA Aveksa or the customer based on the customer’s choosing. The customer is responsible for supplying the hardware, operating system, and optionally the VMware

20
Q

What are the components that make up an ACM installation?

A
Aveksa software
JDK 1.6.0
Oracle Database 11.2.0.3
App Server - JBOSS, Weblogic 11g, Websphere 7.0
Red Hat version 5
21
Q

What are the 4 dimensions of data collected to represent user entitlement information and complete basic access recertifications

A

Identity Data
Account Data
Entitlement data
Managed Data

22
Q

What is necessary to create a complete record for users in order to synch records properly

A

a common unique field such as user ID or email address

23
Q

What does Account data represent

A

The specific accounts in each target system for which you want to collect entitlements and perform certifications.

24
Q

What does Entitlement Data represent

A

All of the specific rights or access granted to each account within your target system. You want to capture all entitlements that grant access to a resource and can be added or removed form an account.

25
Q

What are the 3 dimensions in ACM that illustrate how entitlement data can be captured, populated, and represented in ACM

A

Application Role, Resource, and Action. Entitlements are represented by an App role or Resource/Action Pair

26
Q

How do custom attributes benefit collected data?

A

Custom attributes can be added to the 3 dimensions of data to enrich collected data; these attributes can be collected or manually populated

27
Q

What are the two types of certifications that can be generated?

A

User Access Review and Group Definition Review

28
Q

What is the function of a User Access Review?

A

A User Access review will combine the data types previously mentioned and give reviewers the ability to:

  • Maintain or revoke the entitlements assigned to a user account
  • Maintain or revoke the user groups an account is a member of
29
Q

What is the function of a group Definition Review?

A

A Group Definition review will combine the data types previously mentioned and give reviewers the ability to:
Maintain or review group memberships
Maintain or revoke the entitlements assigned to a user group

30
Q

What is the Top Down Approach to Role Creation?

A

Business Roles are created which are tied to business processes, organizational structure, HR data, etc.

31
Q

What is the Bottom up Approach to Role Creation?

A

Technical roles are created which are independent of the organization and combine like entitlements/functions at the application level

32
Q

What are the 4 dimensions of data needed to create and manage roles and complete related access certifications?

A

Business Roles
Identity Data
Technical Roles
Managed Data

33
Q

What are business rules based on?

A

Business processes, identity data, membership rules. They can be manually created or collected from existing sources

34
Q

What are Identity Counts based on?

A

Based on the number of unique IDs being read into ACM.
If users have more than one unique ID – then there will be more than one identity being counted
If you do not filter out non-human accounts as identities (conf rooms, servers, etc) they will be included in the identity count
If you do not filter out terminated users – they will be included in the identity count

35
Q

What happens when someone leaves, is terminated?

A

If we are filtering out terminated users, when we collect data the second time, it will not bring the terminated user in. ACM sees the person was collected one day but not collected the next day and the system marks them as inactive.,,,the no longer count towards your active identities or license total

36
Q

What is the Account ID/Name field in CSV files used for?

A

It is required to connect the entitlement collector to the account collector

37
Q

If an account has more than one role or entitlement, how should they be represented in the CSV file?

A

They should be captured on separate rows

38
Q

Which fields should you bring in for Identity Collections?

A

Only fields that support rule automation, support reviewers, support reports. Any other fields pollute your database, make collections take longer and increase the opportunities for data integrity issues.

39
Q

Logic or values from Identity collectors in target collectors

A

Logic or values from identity collectors can’t be used to filter, sort, or populate data in a target collector

40
Q

What is the only required field in the account collector?

A

The Account ID/Name field is the only required field. This is used to link back to the Entitlements

41
Q

How does the Last Login field help reviewers to make good decisions?

A

If someone hasn’t logged in for a while, probably safe to remove access

42
Q

How is the Type of Account Flag used?

A

This flag can be used to filter certain accounts out of reviews and to ensure they won’t get deleted - service accounts system, training, shared accounts. Usually added as a managed attribute

43
Q

Why is the Entitlement Risk Level attribute a common attribute?

A

It is used for filtering and running reviews on high risk items more frequently, usually a managed attribute.

44
Q

How can knowing a little bit about the data assist with running your IAM program?

A

Help to identify trends, example resolving orphan for client system app. Several smiths as last name. If you know the app is client system can help you narrow down that orphan account quicker rather than going through multiple applications.

  • 1 app they dump everyone every quarter and make people have to reapply for access
  • An access review is not required because for auditors it happens every quarter