Identity, Access and Security Flashcards

1
Q

What is Microsoft Entra and Microsoft Entra ID?

A
  • web version of Microsoft Active Directory
  • Identity management system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was Microsoft Entra called before?

A

Azure Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Active Directory and Microsoft Entra compare?

A
  • lot of similiarities but not direct replacements of each other
  • Active directory is designed to be run on a server and controls lots of different objects
  • Microsoft Entra is cloud focused, still handles identity but it not a replacement
  • Active directory procotols do not work over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you work with Entra?

A
  • you can use Entra APIs to integrate it into your application code and handle authentication and authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Entra ID Model?

A
  • Client App -> redirects user to identity provider, log in directly there,
  • Identity Provider -> identity provider provides token back to say yes
  • Server/Web Server -> receives token from Client app for identification and can check in with identity provider to see if token is valid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of using Entra as your identity /authentication manager?

A
  • security: Microsoft is world leader with Active Directory, multiple options to handle authentication needs
  • reduced development time + easier support: microsoft offers own support for Entra, and integration is only a few lines of code
  • additional features are available: AI can be used to check login patterns and recognize login-threats; conditional access; audit features
  • centralized administration
  • Single sign-on, tie in with on-premise Active directory
  • Integrates with other Azure Services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Authentication?

A
  • user proving who they say they are
  • usually via user id and pw
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Authorization?

A
  • assumes you are who you say you are
  • is to ensure that a user is permitted to perform an action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Entra function : Conditional Access and what does it consider?

A
  • not all attempts to log into a system are equally safe
  • attempts to rank certain attributes across a spectrum as being normal and routine to being highly suspicious and unexpected
  • additional steps for verification should be taken at the higher end
  • you can configure how risky a login you allow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What signals does Conditional Access of Entra ID use?

A
  • User and location
  • device (brand new, personal, company, …)
  • application to login-to
  • real-time risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps of Conditional Access of Entra Id?

A
  1. Signals to consider
  2. Verification of every access attempts
  3. Access to Apps and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What options exist in Conditional Access in Entra Id to verify every access attempt?

A
  1. Allow Access
  2. Require MFA
  3. Block access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Factos in Multi-Factor Authentication?

A
  • Something you know
  • Something you have
  • Something you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples for the factors in MFA?

A
  • Know: Password
  • Have: Smartphone (SMS, authentication app)
  • Are: Fingerprint, Face scan, fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the “Passwordless” alternative to MFA

A
  • using gestures to login, like swiping a symbol
  • using a pin or biometrics recognition (Iris, face, fingerprint)
  • ## all the data is kept on the device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Role-based Access control

A
  • microsofts preferred solution for authorization
  • hundreds of built-in roles in entra
  • possibility of custom roles
  • distinction between entra administrator and administering the roles and custom roles for applications your are developing
17
Q

Name an example for a role

A

Developer-role with all rights to create apps, restarts apps, scale services, create directories, …

18
Q

What is the Principle of Least Privilege?

A
  • everyone only has the rights/privileges to do, what he needs to do
  • you try to get granular with the assignments
19
Q

How do you deal with extra permissions in addition to roles?

A
  • not adviced to do so
  • try to avoid unexpected expections with special privileges for certain users
20
Q

What roles are very common in Entra Id?

A
  • Reader
  • Contributor
  • Owner
21
Q

What are Owner-level permissions?

A
  • full access to that particular resource
  • and also allow to assign permissions to users
22
Q

What are Contributor-level permissions?

A
  • full access to a resource
  • but you cannot share that permission with anybody else
23
Q

What are Reader-level permissions?

A
  • Read-only permissions
24
Q

What is the Zero-Trust Model of Security?

A
  • you can’t trust any connection or request regardless of where it comes from
  • you’re going to force every request to include a proof of whos making it
25
Q

What are the zero trust principles within Microsoft?

A

**1. Verify explicitly **(instead of verify a token once and make it usable for the rest of a day, verify more intensly)
2. Principle of Least Privilege (Tone done who has access to what)
3. Assume breach - think there is already a breach happening, redesign how applications talk to each other, how data gets stored within network drives, databases etc.

26
Q

Name example ways of verifying identity

A
  • user ID + password
  • include other things like IP addresses, geographic location, same device
  • add additional elements
27
Q

What is Just-in-Time access?

A
  • elevation of privilege for just a short period of time
  • like 30 or 60 min
  • afterwards go back
28
Q

What does the Zero-Trust approach mean for network security?

A
  • security inside network needs to exist
  • utilizing encryption so that applications inside the network are communicating using encrypted HTTPS type channel
  • network segmentation to reduce access to physical networks to users who need it
  • threat detection
29
Q

What is included in Threat intelligence? And what does is enable=?

A
  • analytics
  • automation
  • monitoring

Enables to see, who access what using what device

30
Q

What is the Concept of Defense in Depth?

A
  • You are way more secure the more defence you have in place
  • use multiple security layers
31
Q

Name a few examples of Defense in Depth

A
  • Data - i.e. virtual network endpoint
  • application - API manamgent
  • Compute - Windows Update
  • Network- NSG, use of subnets, deny by default
  • Perimeter - i.e. DDoS, firewalls
  • Identity & access - Entry ID
  • Physical - Door locks and key cards
32
Q

What is the Concept Microsoft Defender for Cloud?

A
  • non-free Service for Security in Azure
  • based on the services, production infrastructure you get several security products to enhance security on them
  • 30 day free trial
  • also includes governance, anti-virus, …
33
Q

Which Azure Service provides network traffic filtering across multiple subscriptions and virtual networks?

A
  • Azure Firewall
  • managed, cloud-based network security service
  • that protects your Azure Virtual Network Resources
  • stateful firewalls as a service and built-in high availability and unrestricted cloud scalability
34
Q
A