Identity and Access Administrator Associate Flashcards
what are the three concepts of zero trust ?
- verify explicitly
- use least privilege
- assume breach
when we say verify explicitly and always validate all available data points including… what do we mean
always verify
- user identity and location
- device health
- service or workload context
- data classification
- anomalies
what are some of the tools we can use with azure to achieve least privilege
- Just in Time JIT
- Just enough access JEA
- Risk Based adaptive policies
what does Identity give us the ability to do ?
- to prove who we are / authentication
- to get permissions to do something
- to report on what was done / auditing
- to it manage and self administer identity - Administration
The most common components of an identity solution are the following
- a repository of user identities
- an authentication system
- security protocols that defend against intrusion
- someone we trust
what does SSO do for us ?
SSO enhances usability by reducing password fatigue. It also provides better security by decreasing the potential attack surface.
what are two of the common identity protocols ?
Open ID Provider
SAML identity Provider
what is identity proliferation ?
deals with the storage of identity objects within the environment. Often, organizations have identities in places such as Active Directory, other directory services and application specific identity stores.
what is provisioning and de-provisioning as it relates to identity ?
are actually two separate capabilities. Provisioning speaks towards how identity objects are created within a system. Deprovision focuses on the removal of an identity from having access (deletion, disablement of security principle or removal of access).
what is identity updates as it relates to identity ?
surrounds how identity information is updated throughout the environment. The idea is to move away from a manual effort to a more automated and streamlined approach.
what is synchronization as it relates to identity ?
is ensuring that identity systems within an environment are up to date with the latest identity information. This information is often crucial for determining access. The key things that influence this capability are how synchronization is performed whether it’s manual, time-based or event driven.
what is password management as it relates to identity ?
focuses on where and how passwords are set throughout the identity infrastructure. In most organizations, the Service Desk is still the focal point for forgotten passwords.
what is group management as it relates to identity ?
focuses on how an organization manages groups (for example, Active Directory and/or LDAP) within their environment. Groups are one of the most common form for determining access permissions to resources and are expensive to manage and operate.
what is application entitlement management as it relates to identity ?
Application Entitlement Management - defines on how identities are granted access to applications. It focuses on providing coarse-grained application entitlements that are enforced as a capability contained within the Authorization pillar. On the other hand, fine-grained entitlements are managed as attributes relating to an identity.
what is change control as it relates to identity ?
capability focuses on how changes flow through the environment whether manually completed by a Service Desk professional. There can be automation with or without workflow, which drives the change process. Some organizations still send emails to complete requests while others have rich and mature processes to execute the change.
what is Microsoft Graph ?
Microsoft Graph exposes REST API’s and client libraries to access data on the following Microsoft cloud services such as Microsoft Entra ID
what is a high level overview of the acronym IAM?
Identity and access management is called IAM for short, and identity solutions controls access to an organizations apps and data. Users, devices, and applications have identities. IAM components support the authentication and authorization of these and other identities. The process of authentication controls who or what u
Microsoft Entra Terminology: Identity
Identity is an object that can get authenticated. An identity can be a user with a username and password. Identities also include applications or other servers that might require authentication through secret keys or certificates
Microsoft Entra Terminology: Account
Account is an identity that has data associated with it. you cant have an account without an identity.
Microsoft Entra Terminology: Microsoft Entra Account
An identity created through Microsoft entra ID or another Microsoft cloud service such as Microsoft 365. Identities are stored in Microsoft Entra ID and accessible to your organizations cloud service subscriptions. This account is sometimes also called a work or school account.
Microsoft Entra Terminology: User
A single personable verifiable identity in Microsoft Entra ID
Microsoft Entra Terminology: Group
A container of users or identities that can be assigned security privileges or restrictions. Often used to control access to specific shared resources to a set of accounts instead of assigning individually.
Microsoft Entra Terminology: Administrative unit
a portioned off piece of a Microsoft Entra tenant used to create an administrative boundary.
what are Microsoft Entra External Identities
Microsoft Entra external identities refers to all the ways you can securely interact with users outside of your organization