Module 5: Privileged Access Flashcards

(39 cards)

1
Q

Privileged Access: Least Privilege + definition, and why does it help?

A

giving users the MINIMUM access they need to do their job, reducing risk of misuse/attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privileged Access: Privileged Users: what are they and what do they do?

A

users with HIGHER permissions than normal accounts eg system/network admins. can grant other users permissions, assign accounts to groups, configure access settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privileged Access: PA Management Techniques (3)

A

1 Just-in-time permissions: users don’t have always-on admin rights. elevated permissions granted ONLY whe needed and for a short time

2 Password vaulting: software that stores and manages credentials in an encrypted “vault”

3 Temporal accounts: accounts created for temporary use with a built-in expiration date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identity + Access Management: Creating User Accounts best practice to avoid what 3 risks?

A

one person shouldn’t create all user accounts due to risk of insider threat, error, or poor documentation. use checks/balances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identity + Access Management: Identity Proofing

A

verifying that someone is who they claim to be ie checking documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity + Access Management: Federation

A

federated login

using credentials from your org to log into another org (eg using using your uni credentials to cross register at another uni)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identity + Access Management: Single Sign-on (SSO) + main benefit

A

authenticate once, access many apps/systems without logging in again. benefit: reduces number of times user must enter credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity + Access Management: LDAP

A

Lightweight Directory Access Protocol

protocol for querying/updating directories (user data) organized under X.500 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identity + Access Management: Cloud Access Security Broker

A

software that ensures accounst & permissions are synchronized between local (on-site) AAA servers and cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Identity + Access Management: OAuth

A

Open Authentication, created by Twitter
allows token-based authentication using public/private keys over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identity + Access Management: Open ID Connect

A

an improvement to OAuth, simplifigying the SSO process for web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity + Access Management: SAML

A

Security Assertions Markup Language

framework for exchanging authentication/authorization info, especialy in federated networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identity + Access Management: Interoperability

A

the ability for solutions to work across systems using open standards like XML or JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity + Access Management: Attestation

A

Affirming correctness/validity of information, often used for compliance (verifying user access is correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Concepts: Best Practices (4)

A

1 length = strength
2 complexity
3 no reuse
4 age/change regulary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Concepts: Password Managers

A

store complex passwords in encrypted format. secure but ensure backup access

17
Q

Password Concepts: Passwordless Authentication

A

no passwords/PINs used; relies on tokens, keys, or physical devices

18
Q

MFA: 5 Authentication factors

A

MFA = 2+ authentication types for access;

5 factors
1 something you know
2 something you have
3 something you are
4 something you do (eg signature, gait, typing style)
5 someWHERE you are

19
Q

MFA Implementation: Biometrics

A

use personal traits to identify/authenticate a person

20
Q

MFA Implementation: MFA tokens: Hard/Soft Tokens

A

hardware or software-based identity devices

hard token ex; RSA token (6-digit code synced with server)

soft token ex: usb token or app-based token (eg yubikey, smart cards)

21
Q

Access Control Models: TBAC

A

task-based access control: permissions are granted based on specific aks or workflow steps. ex: bank employee is given access to loan approval system only while assigned the ‘approve loan’ task. once finished, access is revoked

22
Q

Access Control Models: MAC

A

enforced by system rules. often used in military/govt

23
Q

Access Control Models: RBAC

A

role-based access control

access determined by a user’s role within an organization. if user changes roles, their access changes accordingly

types: MBC
RBAC
ABAC

24
Q

Access Control Models: ABAC

A

attribute based access control
access based on context/attributes: user, time, location, etc

25
Privileged Access: PA Management Techniques: Just-in-time Permissions
temporary permission granted only for the task duration, then revoked
26
Privileged Access: PA Management Techniques: Password vaulting
Storing credentials in a secure vault with access control (who, when, how long)
27
Privileged Access: PA Management Techniques: Temporal accounts
Short-lived accounts created for temporary tasks, expire after a set time
28
Identity + Access Management: definition
Managing users and their access to systems/resources securely
29
Identity + Access Management: User account documentation
Procedures for creating accounts, assigning roles/permissions appropriately. Involves mapping user roles to correct privileges based on job function.
30
Identity + Access Management: Federated domain
group of trusted domains/companies that allow shared authentication
31
Identity + Access Management: LDAP X.500
X.500 = the structure/rules established bythe ITU for formatting/organizing directory data
32
Identity + Access Management: X.500 attributes
CN common name (eg bob) OU organizational unit (eg accounting) O organization L locality (eg boston) ST state C country DC domain component (eg .com)
33
Identity + Access Management: AAA
Authentication = verifying the identity of a user/device Authorization = what you are allowed to do Accounting = what did you do? (user activity)
34
Identity + Access Management: how does OAuth work?
consumer gets a token to access info from provider’s site and is authorized for specific permissions
35
Identity + Access Management: what is OAuth used for besides login?
useful to authenticate bots and limit access to services
36
MFA Implementation: Smart Cards
cards with embedded chips/certificates for secure access
37
MFA Implementation: RSA Token
a small hardware device (or software app) that generates a random 6-digit code every 60 seconds. used as part of MFA. adds a ‘something you have’ factor
38
MFA Implementation: CAC
Common Access Card - has a chip with a secure certificate
39
Access Control Models: DAC
Discretionary access control “what you want when you want” — user controls their data access