Module 19 Access Control Flashcards
What is the CIA triad?
Confidentiality, Integrity and Availability
What is confidentiality?
Only authorized individuals, entities or processes can access sensitive information
What is integrity
This refers to the production of data from unauthorized alteration
Availability
Authorized users must have uninterrupted access to the network resources and data.
What is the zero-trust approach
Never trust, always verify. This contains breaches, reduces risk of an attackers lateral movement throughout a network, and prevents unauthorized access.
What is a perimeter?
Any place where access control decisions are required.
What are the three pillars of trust?
Zero trust for the workforce, workloads and workplace.
What is zero trust for the workforce?
Only right users and secure devices can access applications.
What is zero trust for the workloads
This is concerned with applications that are running in the cloud, in data centers, etc. Focuses on secure access when an API is accessing a database within an app.
What is zero trust for the workplace
This pillar focuses on secure access for all devices including IoT, that connect to enterprise networks - user endpoints, printers, virtual servers, etc
What are the two access control models?
DAC, discretionary access control and mandatory access control (MAC).
What is DAC
Discretionary access control, least restrictive, users control access to their data as owners.
What is MAC
It assigns security levels to information and enables users with access based on security level clearance.
What are the newer models of Access Control?
RBAC, ABAC and TAC
What is RBAC
Role-based access control. Different roles, different permissions, more profile driven. Non-discretionary access control.