Section 17.163 Privileged Access Management (PAM) Flashcards

Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.

1
Q

Privileged Access Management (PAM)

A

Solution that restricts and monitors privileged access within an IT environment

■ The policies, procedures, and technical controls that are used to prevent malicious abuse of privileged accounts

■ Crucial for preventing data breaches and ensuring the least privileged access is granted for specific tasks or roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Components of Privileged Access Management

Just-In-Time Permissions (JIT Permissions)

A

● Security model that grants administrative access only when needed for a specific task

● Reduces the risk of unauthorized access or misuse of privileges

● Access rights are given when the task begins and revoked once the task is completed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Components of Privileged Access Management

Password Vaulting

A

● Technique that stores and manages passwords securely, often in a digital
vault

● Requires multi-factor authentication for accessing stored passwords

● Tracks access to privileged credentials, providing an audit trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Components of Privileged Access Management

Temporal Accounts

A

● Temporary accounts used for time-limited access to resources

● Created for specific purposes and automatically disabled or deleted after a predefined period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly