Privileged Access: Least Privilege + definition, and why does it help?
giving users the MINIMUM access they need to do their job, reducing risk of misuse/attack
Privileged Access: Privileged Users: what are they and what do they do?
users with HIGHER permissions than normal accounts eg system/network admins. can grant other users permissions, assign accounts to groups, configure access settings
Privileged Access: PA Management Techniques (3)
1 Just-in-time permissions: users don’t have always-on admin rights. elevated permissions granted ONLY whe needed and for a short time
2 Password vaulting: software that stores and manages credentials in an encrypted “vault”
3 Temporal accounts: accounts created for temporary use with a built-in expiration date
Identity + Access Management: Creating User Accounts best practice to avoid what 3 risks?
one person shouldn’t create all user accounts due to risk of insider threat, error, or poor documentation. use checks/balances
Identity + Access Management: Identity Proofing
verifying that someone is who they claim to be ie checking documents
Identity + Access Management: Federation
federated login
using credentials from your org to log into another org (eg using using your uni credentials to cross register at another uni)
Identity + Access Management: Single Sign-on (SSO) + main benefit
authenticate once, access many apps/systems without logging in again. benefit: reduces number of times user must enter credentials
Identity + Access Management: LDAP
Lightweight Directory Access Protocol
protocol for querying/updating directories (user data) organized under X.500 standard
Identity + Access Management: Cloud Access Security Broker
software that ensures accounst & permissions are synchronized between local (on-site) AAA servers and cloud providers
Identity + Access Management: OAuth
Open Authentication, created by Twitter
allows token-based authentication using public/private keys over the Internet
Identity + Access Management: Open ID Connect
an improvement to OAuth, simplifigying the SSO process for web apps
Identity + Access Management: SAML
Security Assertions Markup Language
framework for exchanging authentication/authorization info, especialy in federated networks
Identity + Access Management: Interoperability
the ability for solutions to work across systems using open standards like XML or JSON
Identity + Access Management: Attestation
Affirming correctness/validity of information, often used for compliance (verifying user access is correct)
Password Concepts: Best Practices (4)
1 length = strength
2 complexity
3 no reuse
4 age/change regulary
Password Concepts: Password Managers
store complex passwords in encrypted format. secure but ensure backup access
Password Concepts: Passwordless Authentication
no passwords/PINs used; relies on tokens, keys, or physical devices
MFA: 5 Authentication factors
MFA = 2+ authentication types for access;
5 factors
1 something you know
2 something you have
3 something you are
4 something you do (eg signature, gait, typing style)
5 someWHERE you are
MFA Implementation: Biometrics
use personal traits to identify/authenticate a person
MFA Implementation: MFA tokens: Hard/Soft Tokens
hardware or software-based identity devices
hard token ex; RSA token (6-digit code synced with server)
soft token ex: usb token or app-based token (eg yubikey, smart cards)
Access Control Models: TBAC
task-based access control: permissions are granted based on specific aks or workflow steps. ex: bank employee is given access to loan approval system only while assigned the ‘approve loan’ task. once finished, access is revoked
Access Control Models: MAC
enforced by system rules. often used in military/govt
Access Control Models: RBAC
role-based access control
access determined by a user’s role within an organization. if user changes roles, their access changes accordingly
types: MBC
RBAC
ABAC
Access Control Models: ABAC
attribute based access control
access based on context/attributes: user, time, location, etc