Lesson 8 Flashcards
Federated Identify management
cloud based identify manage provider enables access to many platforms. similar to Kerberos SSO
• Certificates and smart cards
- Public key cryptography
- Subject identified by a public key, wrapped in digital certificate
- Private key must be kept secure
Tokens
- Authorizations issued under single sign-on
* Avoids need for user to authenticate to each service
• Identity provider
- Provisions and manages accounts
- Processes authentication
- Federated identity management
• Separation of duties
- Separation of duties
- Standard operating procedures (SOPs)
- Shared authority
• Least privilege
Assign sufficient permissions only
• Reduce risk from compromised accounts
• Job rotation
- Distributes institutional knowledge and expertise
* Reduces critical dependencies
• Mandatory vacations
During that time, the
corporate audit and security employees have time to investigate and discover any
discrepancies in employee activity.
• User-assigned privileges
• Assign privileges directly to user
accounts
• Unmanageable if number of users
is large
• Group-based privileges
• Assign permissions to security groups and assign user accounts to relevant groups • Issues with users inheriting multiple permissions
Service accounts
are used by scheduled processes and application server software, such
as databases.
Must manage share service acccount credentials
Shared/Generic/Device Accounts and Credentials
- Shared accounts
- Accounts whose credentials are known to more than one person
- Generic accounts
- Accounts created by default on OS install
- Only account available to manage a device
- Might use a default password
- Risks from shared and generic accounts
- Breaks principle of non-repudiation
- Difficult to keep credential secure
- Credential policies for devices
- Privilege access management software
• Privilege access management software
stores high-risk credentials somewhere other than a spreadsheet
SSH
• Secure Shell (SSH) used for remote access • Host key identifies the server • User key pair used to authenticate to server • Server holds copy of valid users’ public keys • Keys must be actively managed
• Third-party credentials
Passwords and keys to manage
cloud services
• Highly vulnerable to accidental
disclosure