6. Access Control (RBAC, ABAC) Flashcards

(58 cards)

1
Q

What is Role-Based Access Control (RBAC)?

A

An access control model that assigns permissions to users based on their roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does RBAC differ from DAC?

A

RBAC assigns permissions to roles, not directly to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a role in RBAC?

A

A collection of permissions representing a job function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do users get permissions in RBAC?

A

By being assigned to roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is role-centric access control?

A

Access decisions are based on roles rather than individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why does RBAC simplify management?

A

Admins manage roles instead of individual permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does separation of users and permissions mean in RBAC?

A

Users are linked to roles, and roles are linked to permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does RBAC support job changes?

A

Updating a user’s role automatically updates permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the principle of least privilege?

A

Users should have only the minimum permissions needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does RBAC enforce least privilege?

A

Roles contain only required permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is role hierarchy?

A

Senior roles inherit permissions from junior roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give an example of role hierarchy.

A

Manager inherits Employee permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Separation of Duties (SoD)?

A

Preventing users from holding conflicting roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is SoD important?

A

It reduces fraud and abuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does RBAC enforce SoD?

A

By restricting conflicting role assignments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name the core elements of RBAC.

A

Users, Roles, Permissions, Sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are RBAC sessions?

A

Activated subsets of roles during a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are sessions useful?

A

They limit active permissions temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Core RBAC?

A

Basic model with users, roles, and permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Hierarchical RBAC?

A

RBAC with inherited roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Constrained RBAC?

A

RBAC with enforced separation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Dynamic RBAC?

A

RBAC where roles are activated per session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a major advantage of RBAC scalability?

A

It works well in large organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does RBAC improve security?

A

By enforcing least privilege.

25
Why is RBAC good for compliance?
It enforces structured access policies.
26
How does RBAC simplify access management?
Roles handle onboarding and changes.
27
What is role explosion?
Too many roles to manage effectively.
28
Why is RBAC sometimes rigid?
It lacks flexibility in dynamic environments.
29
What is initial setup complexity in RBAC?
Designing roles and permissions is time-consuming.
30
What is limited context awareness in RBAC?
RBAC ignores time, location, and device.
31
What is Attribute-Based Access Control (ABAC)?
An access control model based on evaluating attributes and policies.
32
How does ABAC differ from RBAC?
ABAC uses attributes instead of roles.
33
What makes ABAC flexible?
Policies evaluate multiple attributes.
34
What are attribute-based policies?
Rules based on user, resource, and environment attributes.
35
Why is ABAC fine-grained?
It evaluates many attributes for access.
36
What is policy-based management in ABAC?
Policies define access rules using formal languages.
37
What makes ABAC context-aware?
It considers time, location, and device.
38
Name the main types of ABAC attributes.
User, Resource, Action, Environment.
39
What are user attributes?
Department, clearance, certifications.
40
What are resource attributes?
Sensitivity, ownership, data type.
41
What are action attributes?
Read, write, delete.
42
What are environment attributes?
Time, location, device security.
43
What is an example of ABAC policy?
Doctors can access records during work hours in hospital network.
44
What is a major advantage of ABAC flexibility?
Supports complex access requirements.
45
Why is ABAC good for dynamic systems?
Policies adapt to real-time context.
46
How does ABAC support privacy and compliance?
Through fine-grained policies.
47
What is a major disadvantage of ABAC complexity?
Policies and attributes are hard to design.
48
Why can ABAC cause performance overhead?
Multiple attributes are evaluated in real time.
49
What is policy management difficulty in ABAC?
Keeping complex rules updated.
50
Why is ABAC interoperability difficult?
Different implementations vary.
51
What is XACML?
An XML-based standard for ABAC policies.
52
What is the purpose of XACML?
To define and evaluate access control policies.
53
What is a Policy Enforcement Point (PEP)?
Enforces access decisions.
54
What is a Policy Decision Point (PDP)?
Evaluates requests and makes decisions.
55
What is a Policy Administration Point (PAP)?
Manages and creates policies.
56
What is a Policy Information Point (PIP)?
Provides attribute information.
57
What decisions can PDP return?
Permit, Deny, NotApplicable, Indeterminate.
58
What is the main benefit of XACML?
Standardized policy enforcement.