IAM v2 Flashcards
1
Q
Open Authorization (OAuth):
A
- Definition: An open standard framework that allows applications to access user data without sharing user credentials, often used for granting third-party applications limited access to user accounts.
2
Q
Access Control (system):
A
- Definition: A system that manages and enforces policies and permissions, determining who can access what resources or perform specific actions within an organization’s environment.
3
Q
Privilege creep:
A
- Definition: The gradual accumulation of excessive privileges or access rights by users or accounts over time, potentially leading to security risks.
4
Q
Self-service ID Management:
A
- Definition: A system that allows users to manage and update their own identity information, reducing the administrative burden on IT departments.
5
Q
Access tokens:
A
- Definition: Tokens that provide temporary access rights to specific resources or services, often used in OAuth and other authentication systems.
6
Q
MFA vs. SFA (Multi-Factor Authentication vs. Single-Factor Authentication):
A
- Definition: MFA requires users to provide two or more authentication factors (e.g., password and a one-time code), while SFA relies on a single factor (e.g., just a password) for authentication.
7
Q
Accounting:
A
- Definition: The process of tracking and recording the activities and access permissions of users within a system or network for audit and security purposes.
8
Q
IDaaS (Identity as a Service):
A
- Definition: A cloud-based service that provides identity and access management solutions to organizations, allowing them to manage user identities and access controls in the cloud.
9
Q
Identity Proofing:
A
- Definition: The process of verifying the identity of a person by confirming their claimed attributes or information, often used for secure authentication.
10
Q
ABAC (Attribute-Based Access Control):
A
- Definition: An access control model that uses attributes of users, resources, and the environment to make access control decisions, offering fine-grained control.
11
Q
Authentication & Authorization:
A
- Definition: Authentication is the process of verifying the identity of a user, while authorization involves granting or denying access to specific resources or actions based on the user’s identity and permissions.
12
Q
Ethical Wall:
A
- Definition: A network or communication barrier that prevents certain users or groups from communicating or sharing specific types of information to maintain privacy and regulatory compliance.
13
Q
Data Custodian:
A
- Definition: An individual or entity responsible for the storage, management, and protection of data, typically following the directives of the data owner or controller.
14
Q
CER (Cross-Enterprise Reference):
A
- Definition: A reference data system that ensures consistent data naming and categorization across different entities within an organization.
15
Q
Granularity of Controls:
A
- Definition: The level of detail and specificity in access controls, determining how finely access permissions can be defined and enforced.