General Terms Flashcards
What are the 3Cs
Cloud first
Cloud native
Cloud agnostic
What reasons could there be to move cloud providers
Commercial
Security
Geopolitical
Unique technologies
What is an Entra ID TAP
Temporary access password
IAM
Identity and access management
CIAM
Customer identity and access management
Four main components of IAM
IAM consists of four main components: Authentication, Authorization, Administration, and Auditing and Reporting.
What is SCIM
System for Cross-Domain Identity Management (SCIM)
What is a CDAO?
Chief Data Analytics Officer
CIO
Chief Information Officer - oversees organisations information technology strategy
CEO
Chief Executive Officer - highest ranking person in a company, ultimately responsible for managerial decisions
CISO
Chief Information Security Officer - overseeing organisations information, cyber and technology security.
CTAO
Chief Technology and Architecture Officer
Applications
Software that users interact with
Services
Things that run in the background that users don’t directly interact with.
SIEM
Security Information and Event Management.
Collect, aggregate and analyse large volumes of data from apps, devices, servers, users in real time. So SOC can detect and block attacks. Uses predefined rules to define threats and generate alerts.
SOAR
Security, Orchestration, Automation and Response.
Set of services and tools that automate cyberattack prevention and response. Helps SOC cope by offloading repetitive and time consuming tasks.
ABAC
Attribute Based Access Control.
User attributes - department, location
Resource attributes - data classification, owner
Environment attributes - time of day, device
Policies - rules that take the above and establish if you can access
Evaluates attributes rather than relying on roles. Allows for more dynamic and fine grained access control.
What are ABAC benefits
Fine- grained access control
Simplified management
Scalability