Lesson 4: Implement Identity and Access Management Flashcards

1
Q

What is the purpose of authentication?

A

Verifies that only the account holder can use an account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the key considerations in authentication design.

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does confidentiality in authentication aim to achieve?

A

Prevent credential theft.
(You are who you say you are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity in authentication ensure?

A

Reliability and resistance to bypassing.
(The data is unchanged, what I sent is what is received)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by availability in authentication?

A

The system must be user-friendly and efficient.
(The system is available to use)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the authentication factors?

A
  • Something You Know
  • Something You Have
  • Something You Are
  • Somewhere You Are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give an example of ‘Something You Know’ in authentication.

A

Passwords, passphrases, PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What falls under ‘Something You Have’ in authentication?

A

Smart cards, OTP tokens, security keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of ‘Something You Are’ in authentication?

A

Biometric data like fingerprints or facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does ‘Somewhere You Are’ refer to in authentication?

A

Location-based factors using IP addresses or geolocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are strong password management policies?

A

Policies for password length, complexity, age, and reuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the risks associated with password managers?

A
  • Weak master password
  • Vendor being compromised
  • Impersonation attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is multifactor authentication (MFA)?

A

Combines multiple factors (e.g., password + smartphone) for stronger security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the enrollment process in biometric authentication?

A

Creates a unique template for each user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define False Rejection Rate (FRR).

A

Legitimate users denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define False Acceptance Rate (FAR).

A

Unauthorized users accepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Crossover Error Rate (CER)?

A

Intersection of FRR and FAR; lower is better.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Differentiate between hard tokens and soft tokens.

A
  • Hard Tokens: Hardware-based (smart cards, U2F security keys, OTP devices)
  • Soft Tokens: Software-based (e.g., authenticator apps, SMS/email OTPs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is passwordless authentication?

A

Uses FIDO2/WebAuthn for local gesture or biometric unlocks for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Discretionary Access Control (DAC)?

A

Resource owner controls access and can modify the Access Control List (ACL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define Mandatory Access Control (MAC).

A

Access control based on security clearance levels.

22
Q

What is Role-Based Access Control (RBAC)?

A

Permissions assigned based on roles.

23
Q

What does Attribute-Based Access Control (ABAC) use for decisions?

A

Combination of attributes and context.

24
Q

What is Rule-Based Access Control?

A

Permissions assigned by system-enforced rules, not by system users.

25
Q

What does the principle of Least Privilege entail?

A

Users and accounts are granted only the permissions needed for their tasks.

26
Q

What is the purpose of user account provisioning?

A

Setting up a service according to a standard procedure or best practice checklist.

27
Q

List the steps involved in provisioning.

A
  • Identity Proofing
  • Issuing Credentials
  • Issuing Hardware and Software Assets
  • Teaching Policy Awareness
  • Creating Permissions Assignment
28
Q

In regards to Provisioning, what is Identity Proofing?

A

The process of setting up a service according to a standard procedure or best practice checklist.

29
Q

In regards to Provisioning, explain Issuing Credentials?

A

Lets the user select a password known only to them and/or enrolls them with biometric or token-based authenticators.

30
Q

In regards to Provisioning, explain Issuing Hardware and Software Assets.

A

Providing a computer or phone to the user.

31
Q

In regards to Provisioning, explain Teaching Policy Awareness.

A

Scheduling training and providing learning material so the employee is aware of security policies and risk.

32
Q

In regards to Provisioning, explain Creating Permissions Assignment.

A

Identifying the work roles that the account must support and configuring role-based or attribute-based control models.

33
Q

What is deprovisioning?

A

Removing access rights and permissions from an employee.

34
Q

What is an example of location-based account restrictions?

A

Restricting logins by IP address, VLAN, or geolocation.

35
Q

What are time-based restrictions in account access?

A

Set login hours, maximum durations, impossible travel time, or temporary permissions.

36
Q

What does Privileged Access Management (PAM) refer to?

A

Policies, Procedures, and Technical Controls to prevent privileged accounts from being compromised.

37
Q

What is Zero Standing Privilege (ZSP)?

A

Temporary elevation of admin rights for a limited time.

38
Q

What is the purpose of password vaulting/brokering?

A

Privileged accounts must be ‘checked out’ from a repository for a limited time.

39
Q

Define ephemeral credentials.

A

Credentials generated or enabled for a task and destroyed or disabled afterward.

40
Q

What is Directory Services?

A

Centralized repository for managing accounts and attributes.
Ex. Active Directory (AD), or Lightweight Directory Access Protocol (LDAP)

41
Q

What is a Distinguished Name (DN)?

A

A collection of attributes that define a unique identifier for any given resource.
The DN is made up of attribute-value pairs, separated by commas.

42
Q

What is Single Sign-On (SSO)?

A

Authenticate once and access multiple services.

43
Q

What does Kerberos use for secure authentication?

A

Ticket Granting Ticket (TGT) and service tickets.
This encrypts the date and time on the local computer with the users password hash as the key.
Kerberos is implemented by Microsoft Active Directory.

44
Q

What is federation in identity management?

A

Allows trust relationships between different networks.
A user just needs to log in once with an identity provider (IdP) and is able to access multiple service providers (SPs)

45
Q

What are claims-based identities?

A

Identity provider issues signed claims (tokens) for authentication.

46
Q

What is Security Assertion Markup Language (SAML)?

A

Uses XML for identity assertions.
Is common in cloud services like AWS.

47
Q

What is Simple Object Access Protocol (SOAP) used for?

A

Used to establish communications along with HTTP/HTTPS.
Tightly specified, not used in many public cloud Application Programming Interfaces (API).

48
Q

What is Representational State Transfer (REST) used for?

A

Is used in many public cloud Application Programming Interfaces (API).
Rest has looser framework, allowing the service provider more choice over the implementation.

49
Q

What is the purpose of Open Authorization (OAuth)?

A

Facilitates sharing of user resources between sites.
Used to Authenticate and Authorize a RESTful API.

50
Q

What is JSON Web Tokens (JWT) used for?

A

Used for lightweight claims data.