What are the three components of AAA?
Authentication, Authorization, and Accounting.
Define authentication.
Verifying a claimed identity (e.g., via password, token, certificate, biometric).
Define authorization.
Granting rights/privileges to an authenticated identity to access resources.
Define accounting (auditing).
Recording and tracking user activities for non-repudiation and forensics.
List the five factor types for authentication.
Something you know, have, are, do, and where (location).
What is MFA?
Using two or more different factor types (not two of the same) for authentication.
What is 2FA vs MFA?
2FA uses exactly two factors; MFA uses two or more factors.
What is SSO?
Single Sign-On—authenticate once to access multiple systems without re-entering credentials.
What is federation?
Trust established between identity domains so identities can access resources across org boundaries.
What are common federation standards?
SAML, OpenID Connect (OIDC), and OAuth 2.0 (for delegated authorization).
What is least privilege?
Providing the minimum access necessary to complete a task.
What is separation of duties (SoD)?
Splitting critical tasks across people to reduce fraud/error risk.
What is need-to-know?
Limiting data access to what is required for a role or task.
What is privilege bracketing?
Elevating privileges only for the duration of a task, then returning to normal.
What is Just-In-Time (JIT) access?
Granting temporary privileged access on demand, time-bound and audited.
What is PAM?
Privileged Access Management—controls and monitors privileged account use, often with a vault.
What is zero trust (in access control)?
Never trust, always verify; continuous authentication and authorization with least privilege and microsegmentation.
What is access recertification?
Periodic review of user entitlements to confirm they are appropriate.
What is role mining?
Analyzing entitlements to design clean, least-privilege roles.
What is the Joiner-Mover-Leaver model?
Lifecycle events for provisioning, modifying, and removing access as employees join, change roles, or leave.
RBAC: what is it?
Role-Based Access Control—permissions grouped by role; users inherit via role membership.
ABAC: what is it?
Attribute-Based Access Control—evaluates attributes of user, resource, action, and environment.
DAC: what is it?
Discretionary Access Control—resource owners determine access (e.g., POSIX file permissions).
MAC: what is it?
Mandatory Access Control—central authority enforces labels/clearances and compartments.