Authentication & Authorization Flashcards

Day5_Identity and Access Management & Operational Visibility (39 cards)

1
Q

Refer back to Security + Identify and Access Management deck for additional notes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the process of aggregating logs collected from various devices across a network for centralized analysis?

A

Log ingestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What process increases the security of a system by reducing vulnerabilities and minimizing the attack surface?

A

System hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What set of tools and processes helps standardize and automate security operation tasks, such as data enrichment and threat intelligence combination, to minimize human engagement?

A

Security Orchestration Automation & Response (SOAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What six-phase process, involving requirements definition, collection, analysis, dissemination, and feedback ensures that security information is timely, actionable and consistent?

A

Threat intelligence lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of vulnerability scanning involves the scanner logging into the target system using valid credentials to perform a more thorough, internal check for misconfigurations and missing patches?

A

Authenticated scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the pieces of forensic data, such as IP addresses, file hashes, or domain names, that indicate a system or network has been breached by an attacker?

A

Indicators of Compromise (IoCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which configuration is commonly used to establish trust between an identity provider and a resource provider?

A

The resource provider is configured with the identity provider public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which server file stores SSH public keys for users?

A

authorized_keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is identity federation in cybersecurity?

A

Identity federation a system that uses a trusted identity provider (IdP) to authenticate users, devices, or software

Examples of IdPs include Microsoft Active Directory, Google, Facebook, and LinkedIn.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of the Identity Provider (IdP)?

A

IdP a centralized location for credentials that authenticate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of a resource provider or service provider (RP or SP)?

A

RP or SP are web apps or service that trusts the identity provider

It allows authentication through the IdP instead of building in authentication directly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a claim in the context of identity federation?

A

Claim a statement or assertion about a user or device

Claims can include attributes like device type, IP address, or user date of birth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or false: Users can sign in to websites using identity federation with providers like Google and Facebook.

A

TRUE

This is a common practice for authentication on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens when a user accesses an app configured with an identity provider?

A

The app redirects the user to the IdP for authentication

This process is transparent and quick for the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a security token in identity federation?

A

Security token a digitally signed token that may contain claims about the user

It is created by the server after successful user authentication.

17
Q

What is attribute-based access control?

A

A method of access control based on user attributes or claims

An example is verifying a user’s age using their date of birth.

18
Q

What is the purpose of a digital signature in identity federation?

A

Digital signatures verify the authenticity of a security token

It is created using a private key from a public-private key pair.

19
Q

How is an application configured to trust an identity provider?

A

By using the public key of the IdP

This allows the app to verify digitally signed tokens.

20
Q

What does single sign-on (SSO) mean?

A

SSO users are signed in automatically to an app after initial authentication within an environment

SSO is often used in conjunction with identity federation.

21
Q

What are some common authentication methods used in single sign-on?

A
  • SAML
  • HTTP header-based authentication
  • Integrated Windows authentication
  • Basic password-based authentication

These methods can be used both on-premises and in the cloud.

22
Q

What is OpenID Connect?

A

OpenID Connect an open standard for single sign-on in the cloud

It is often used alongside OAuth.

23
Q

Why must cybersecurity analysts understand identity federation?

A

To analyze past intrusions and prevent future ones

Knowledge of data flow and configurations aids in threat hunting.

24
Q

Which access control model uses the OS to determine resource access?

A

Mandatory Access Control (MAC)

25
What occurs after **successful authentication**?
***Authorization*** ## Footnote Authorization determines the level of access to a given resource.
26
Define **authentication**.
**Authentication** is a method of proving a user's identity ## Footnote It is the process that verifies who a user is.
27
What does **authorization** determine?
**Authorization** determines level of access to a resource ## Footnote This includes permissions to applications, databases, file systems, and physical facilities.
28
True or false: **Authorization** is influenced by legal or regulatory requirements related to data privacy.
TRUE ## Footnote Legal requirements can affect how permissions are granted.
29
List examples of resources that may require **authorization**.
* Databases * Applications * File systems * Physical facilities ## Footnote Authorization can apply to both digital and physical access.
30
What is a common issue found during **security audits**?
Regular users added to powerful groups ## Footnote This often occurs instead of finding granular permission details.
31
Give examples of **authorization** in action.
* Gaining VPN access * Sending emails with confidential attachments ## Footnote These actions often require additional authentication methods.
32
What is often required in addition to regular user sign-in for **VPN access**?
Smart card insertion ## Footnote The smart card typically contains a PKI certificate or private key.
33
What model should organizations adopt **regarding internal networks**?
***Zero-trust model*** ## Footnote This treats internal networks as potentially hostile, similar to external networks.
34
What should be conducted periodically to ensure security?
Audits of resource access and privilege use ## Footnote These audits can be automated and may include workflows for access confirmation.
35
What can **threat hunting tools** detect?
Unusual access patterns ## Footnote They use machine learning to identify potential account compromises.
36
What is **Transitive Trust**?
**Transitive trust** is when trust between two entities is extended—implicitly or automatically—to a third entity, even though that third entity was never directly evaluated or approved ## Footnote Example: If A trusts B, and B trusts C, then A ends up trusting C… whether A meant to or not
37
Define **Cloud Access Security Broker** (CASB)?
**CASB** a software tool or service that provides policy-based protection for cloud-based resources. ## Footnote CASB is considered a core component of a SASE architecture
38
List some DLP concepts
* RDP blocking * Print blocking * Clipboard privacy controls * Data classification blocking * Blocking use of external media
39
List the different data types
* Cardholder Data (CHD) * Intellectual Property (IP) * Personal Health Information (PHI) * Personally Identifiable Information (PII) * Personal Identifiable Financial Information (PIFI)