Section 17.157 Identity and Access Management (IAM) Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Identity and Access Management (IAM)

A

■ Critical component of enterprise security, focusing on managing access to information

■ Ensures the right individuals have access to the right resources at the right times for the right reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Four Main IAM Processes

Identification

A

● User claims an identity using a unique identifier (e.g., username or email address)

● Ensures user legitimacy and accuracy of provided information

e.g creating an account or creating an ID for an account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Four Main IAM Processes

Authentication

A

Verifies the identity of a user, device, or system. Typically involves validating user credentials against an authorized userdatabase

● Methods
○ Passwords
○ Biometrics
○ Multi-factor authentication

e.g Enterering a password after their username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Four Main IAM Processes

Authorisation

A

Process that determines what permissions or levels of access the user has

e.g employees in human resources will have access to personal files whereas employees in finance will NOT have access to personal informttion but financial information instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four Main IAM Processes

Accounting (Auditing)

A

Tracks and records user activities. Helps detect security incidents, identify vulnerabilities, and provide evidence in case of breaches

○ Logins
○ Actions
○ Changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key IAM Concepts: Provisioning and Deprovisioning of User Accounts

Provisioning

A

Creating new user accounts, assigning permissions, and providing system access

e.g HIring a new employee the employees account must be created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key IAM Concepts: Provisioning and Deprovisioning of User Accounts

Deprovisioning

A

Removing access rights when no longer needed (e.g., when an
employee leaves)

e.g Removing access rights when an employee leaves the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key IAM Concepts

Identity Proofing

A

Process of verifying a user’s identity before creating their account

● May involve checking personal details or providing identification
documents (e.g., driver’s license or passport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key IAM Concepts:

Interoperability

A

Ability of different systems, devices, and applications to work together and share information

● In IAM, it can involve using standards like SAML or OpenID Connect for secure authentication and authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key IAM Concepts:

Attestation

A

Process of validating that user accounts and access rights are correct and up-to-date

● Involves regular reviews and audits of user accounts and their access rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly