Section 14: Authentication and Authorization Flashcards
Mandatory Access Control
Mandatory Access Control
▪ Uses security labels to determine which users are authorized to access a resource
Complex to configure and expensive to maintain
Generally reserved for high security systems
Anything that is now explicitly allowed is denied by default
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
▪ Allows the resource owner to specify which users can access each
resource
Role-Based Access Control
Role-Based Access Control
▪ Allows an administrator to assign roles and permissions to access each resource
Windows Domain, Groups
Attribute-Based Access Control
Attribute-Based Access Control
▪ Relies on a set of characteristics of an object to make access control
decisions
● User Attributes, username, role, group
● Environment attributes: time of access, location of data
● Resource attributes: creation date, file name, file owner
Authentication Protocols
o Remote Authentication Dial-In User service (RADIUS)
▪ Cross-Platform protocol that authenticates and authorizes users to
services, and accounts for their usage
o Terminal Access Controller Access Control System Plus (TACACS+)
▪ Cisco-proprietary protocol that provides separate authorization,
authorization, and account services
o Diameter
▪ Peer-to-peer protocol created as a next-generation version of RADIUS
o The Lightweight Directory Access Protocol (LDAP)
▪ Cross-platform protocol that centralized info about clients and objects on the network
Hardware Security Module (HSM)
▪Generates and stores cryptographic keys and is less susceptible to
tampering and insider threats
Attestation
o Allows enterprise security personnel to determine if a change to the baseline has been made
o Attestation Integrity Key
▪ Determines the integrity of a TPM chip