Refer back to Security + Identify and Access Management deck for additional notes
What is the process of aggregating logs collected from various devices across a network for centralized analysis?
Log ingestion
What process increases the security of a system by reducing vulnerabilities and minimizing the attack surface?
System hardening
What set of tools and processes helps standardize and automate security operation tasks, such as data enrichment and threat intelligence combination, to minimize human engagement?
Security Orchestration Automation & Response (SOAR)
What six-phase process, involving requirements definition, collection, analysis, dissemination, and feedback ensures that security information is timely, actionable and consistent?
Threat intelligence lifecycle
What type of vulnerability scanning involves the scanner logging into the target system using valid credentials to perform a more thorough, internal check for misconfigurations and missing patches?
Authenticated scanning
What are the pieces of forensic data, such as IP addresses, file hashes, or domain names, that indicate a system or network has been breached by an attacker?
Indicators of Compromise (IoCs)
Which configuration is commonly used to establish trust between an identity provider and a resource provider?
The resource provider is configured with the identity provider public key
Which server file stores SSH public keys for users?
authorized_keys
What is identity federation in cybersecurity?
Identity federation a system that uses a trusted identity provider (IdP) to authenticate users, devices, or software
Examples of IdPs include Microsoft Active Directory, Google, Facebook, and LinkedIn.
What is the purpose of the Identity Provider (IdP)?
IdP a centralized location for credentials that authenticate users
What is the role of a resource provider or service provider (RP or SP)?
RP or SP are web apps or service that trusts the identity provider
It allows authentication through the IdP instead of building in authentication directly.
What is a claim in the context of identity federation?
Claim a statement or assertion about a user or device
Claims can include attributes like device type, IP address, or user date of birth.
True or false: Users can sign in to websites using identity federation with providers like Google and Facebook.
TRUE
This is a common practice for authentication on the Internet.
What happens when a user accesses an app configured with an identity provider?
The app redirects the user to the IdP for authentication
This process is transparent and quick for the user.
What is a security token in identity federation?
Security token a digitally signed token that may contain claims about the user
It is created by the server after successful user authentication.
What is attribute-based access control?
A method of access control based on user attributes or claims
An example is verifying a user’s age using their date of birth.
What is the purpose of a digital signature in identity federation?
Digital signatures verify the authenticity of a security token
It is created using a private key from a public-private key pair.
How is an application configured to trust an identity provider?
By using the public key of the IdP
This allows the app to verify digitally signed tokens.
What does single sign-on (SSO) mean?
SSO users are signed in automatically to an app after initial authentication within an environment
SSO is often used in conjunction with identity federation.
What are some common authentication methods used in single sign-on?
These methods can be used both on-premises and in the cloud.
What is OpenID Connect?
OpenID Connect an open standard for single sign-on in the cloud
It is often used alongside OAuth.
Why must cybersecurity analysts understand identity federation?
To analyze past intrusions and prevent future ones
Knowledge of data flow and configurations aids in threat hunting.
Which access control model uses the OS to determine resource access?
Mandatory Access Control (MAC)