Module 04 - Identity and Acess Management Flashcards
Definition:
Non-repudiation
Cannot deny having done something in systems or network
Acronym:
CSF
Cybersecurity Framework
Acronym:
NIST
National Institute of Standards and Technology
According to NIST, what are the classification of security tasks?
- Identify
- Protect
- Detect
- Respond
- Recover
Definition:
Gap Analysis
Process that identifies how security systems deviate from outcomes required, or recommended, by CSTs
Definition:
Access Control
Defines how subjects interact with objects.
Subjects => Can be granted access to resources
Objects => Resources
Acronym:
IAM
Identity and Access Management
Definition:
Identity and Access Management - IAM systems
System that implements access controls
What are the processes of IAM?
- Identification
- Authentication
- Authorization
- Accounting
Acronym:
AAA
Authentication, Authorization and Accounting
Definition
Zero Trust
Security model that assumes that all devices, users, and services are not inherently trusted, regardless of whether inside or outside a network’s perimeter
What are the main concepts of Zero Trust Model?
- Adaptive identity
- Threat scope reduction
- Policy-drive access control
Definition:
Adaptive identity [Zero Trust Concept]
Recognition of identity not being static.
UBA
Definition:
Threat scope reduction [Zero Trust Concept]
Access to resources are only to the ones needed to complete a task.
[Principle of least privilege]
Definition:
Policy-driven access control [Zero Trust Concept]
Access Control policies enforces access restriction based on user identity, device posture and network context.
Definition:
Device Posture
Security status of a device, including its security configurations, software versions, and patch levels.
In Zero Trust architecture, what are the planes?
Control and data planes
Definition:
Control plane
Manages policies that dictate how users and devices are authorized to access network resources.
Divided in Policy Engine and Policy Administrator
Definition:
Data plane
Where a subject uses a system to make requests for a given resource.
Definition:
Policy Engine
Defines an algorithm and metrics for making dynamic authentication and authorization decisions on a per-request basis.
Definition:
Policy Administrator
Issues access tokens and establishes or tears down sessions based on the decisions made by the policy engine.
List the access control best practices
- Principle of least privilege
- Need to know [Information classification]
- Separation of Duties [Conflict of interest]
- Job rotation
- Defense in depth
- Identification
- Multi-Factor Authentication
- Mutual Authentication
- Time of day restrictions
Acronym:
MFA
Multi-Factor Authentication
What are the common methods of controlling access?
Implicit Deny
Explicit Allow
Explicit Deny
Acronym:
ACL
Access Control List
Acronym:
MAC [Access Control]
Mandatory Access Control
Acronym:
DAC
Discretionary Access Control
Acronym:
RBAC
Role-Based Access Control
Acronym:
ABAC
Attribute-Based Access Control
List the types of Access Controls
Discretionary Access Control
Mandatory Access Control
Role-Based Access Control
Attribute-Based Access Control
Rule-Based Access Control
Definition:
Discretionary Access Control - DAC
In the DAC Model, every resource has an owner which has full control over the resource, and they can modify its access control list (ACL) to grant rights to others.
Discretionary => By one’s judgment
Definition:
Mandatory Access Control - MAC
Model based on security clearance levels.
Each object is given a classification label, and each subject is granted a clearance level.
Definition:
Role-Based Access Control - RBAC
Permissions depends on the tasks that an employee or service must be able to perform.
Each set of permissions is a role, or a group account.
Definition:
Attribute-Based Access Control - ABAC
Based on a combination of subject and object attributes plus any context-sensitive or system-wide attributes.
Definition:
Rule-Based Access Control
Any sort of access control model where access control policies are determined by system-enforced rules rather than system users.
Anything but discretionary access control models.
Ex: RBAC, ABAC, and MAC
Definition:
Provisioning
Setting up a service according to a standard procedure or best practice checklist.
Definition:
Deprovisioning
Removing the access rights and permissions allocated to a subject
Time-based restrictions:
A time-of-day restrictions policy [Login hours]
A duration-based login policy
Impossible travel time/risky login policy
Temporary permissions
Identification x Authorization
Identification is saying who you are
Authorization is confirming who you are
List the authentication factors
- Something you know
- Something you are
- Somewhere you are
- Something you can do
- Something you exhibit
- Someone you know [CA or Attestation]
- Something you have
Definition and list:
Hard authentication token
Token generated within a secure cryptoprocessor
- Smart card
- OTP
- Security Key
Definition and list:
Soft authentication token
OTP generated by the Identity provider (IdP) and transmitted to the supplicant.
- SMS
- Authentication app
Acronym:
IdP
Identity provider
Definition:
Passwordless
No longer processes knowledge-based factors.
Acronym:
LSASS
Local Security Authority Subsystem Service
Acronym:
NTLM
NT LAN Manager
Acronym:
VPN
Virtual Private Network
Acronym:
SAM [Windows File]
Security Accounts Manager
List the windows authentication scenarios
- Windows local sign-in or interactive logon
- Windows network sign-in
- Remote sign-in
What protocols are responsible for a network sign-in, in Windows?
Kerberos and NTLM
Acronym:
SSH
Secure SHell