Information Technology /Security+ (SY0-701): Lesson 4: Implement Identity Part 2

Security+ (SY0-701): Lesson 4: Implement Identity Part 2

Information Technology40 CardsCreated about 2 months ago

This deck covers key concepts from Lesson 4 of the Security+ (SY0-701) course, focusing on identity implementation and access control models.

List the 3 types of hard authentication tokens

  1. Smart cards

  2. One-time password (OTP)

  3. Security key

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/40

Key Terms

Term
Definition
List the 3 types of hard authentication tokens
  1. Smart cards

  2. One-time password (OTP)

  3. Security key

Define a 'Smart card'
A security device similar to a credit card that can store authentication information.
What authentication information is stored on a smart card?
User's digital certificate, the private key associated with the certificate, and a personal identification number (PIN) used to activate the card.
Define a 'Security key'
Refers to a portable hardware security module (HSM) with a computer interface, such as USB or NFC; Most closely associated with U2F.
Define a 'soft authentication token'
An OTP generated by the identity provider that is transmitted to the supplicant.
How can a soft authentication token be made more secure?
With the use of an authenticator app.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
List the 3 types of hard authentication tokens
  1. Smart cards

  2. One-time password (OTP)

  3. Security key

Define a 'Smart card'
A security device similar to a credit card that can store authentication information.
What authentication information is stored on a smart card?
User's digital certificate, the private key associated with the certificate, and a personal identification number (PIN) used to activate the card.
Define a 'Security key'
Refers to a portable hardware security module (HSM) with a computer interface, such as USB or NFC; Most closely associated with U2F.
Define a 'soft authentication token'
An OTP generated by the identity provider that is transmitted to the supplicant.
How can a soft authentication token be made more secure?
With the use of an authenticator app.
Define 'Passwordless Authentication'
Multifactor authentication scheme that uses ownership and biometric factors, but not knowledge factors.
What is best practice for securing passwordless authentication?
The authenticator must be trusted and resistant to spoofing or cloning attacks.
What concept is used to ensure secure passwordless authentication?
Attestation
Define 'Attestation' in context of passwordless authentication
Capability of an authenticator to prove that it is a trusted root.
How is an authenticator attested?
Each security key is manufactured with an attestation and model ID.
Define 'permissions' in the context of authorization
Security settings that control access to objects.
Define 'Discretionary access control (DAC)'
Access control model; Each resource is protected by an access control list (ACL) managed by the resource's owner(s)
Why is 'Discretionary access control (DAC)' considered insecure?
Makes centralized administration of security policies the most difficult to enforce; Vulnerable to insider threats and abuse of compromised accounts.
Define 'Mandatory access control (MAC)'
Access control model; Object and users are allocated a clearance level - Subjects are permitted to read objects classified at their own clearance level or below.
Define 'Role-based access control (RBAC)'
Access control model; Resources are protected by ACLs that are managed by administrators providing permissions based on job function.
What makes 'Role-based access control (RBAC)' nondiscretionary?
Right to modify the permissions assigned to each role is reserved to a system owner; Each principal cannot modify the ACL of a resource.
Define a 'security group'
Collection of user accounts to establish Role-based access control (RBAC).
Define 'Attribute-based access control (ABAC)'
Access control technique that evaluates a set of attributes that each subject possesses to determine if access should be granted.
What attributes can be used in Attribute-based access control (ABAC)?
group/role memberships; IP/location; OS version; current patches and AV.
Define 'Rule-based access control'/ nondiscretionary access control
Any access control model where access control policies are determined by system-enforced rules rather than system users; RBAC, ABAC, MAC, conditional access.
Define 'Conditional Access'
Conditional access system monitors account or device behavior throughout a session; If certain conditions are met, it may suspend the account or may require the user to reauthenticate.
What makes User Account Control (UAC) a form of conditional access?
User is prompted for confirmation or authentication when making requests that require elevated privileges.
Define 'Least privilege'
Subject should be allocated the minimum necessary rights, privileges, or information to perform its role.
Define 'authorization creep'
Over time, a user acquires more and more rights, either directly or by being added to security groups or roles.
Define 'provisioning'
Process of setting up a service according to a standard procedure or best practice checklist.

What are the 5 general steps of provisioning a user account?

  1. Identity Proofing

  2. Issuing Credentials

  3. Issuing Hardware and Software Assets

  4. Creating Permissions Assignment

  5. Teaching Policy Awareness

Define 'Deprovisioning'
Process of removing an account, host, or application from the production environment; Revoking any access that had been assigned to the subject/object.
Define a 'security identifier (SID)'
A unique value assigned to an account by Windows and that is used by the OS to identify that account.
Define 'group policy objects (GPOs)'
On a Windows domain, a way to deploy per-user and per-computer settings.
Define 'geolocation'
Identification or estimation of the physical location of an object and applying rule based access control.
How does geolocation determine the location of a subject/object?
IP address and location services/GPS.
Define a 'time-of-day restrictions'
Establishes authorized login hours for a subject.
Define a 'duration-based login policy'
Establishes maximum amount of time a subject may be logged in for.
Define a 'impossible travel time/risky login policy'
Tracks the location of login events over time. If these do not meet a threshold, the account will be disabled.
Define a 'temporary permissions policy'
Removes an account from a security role or group after a defined period.
Define a 'privileged account'
Can make significant configuration changes to a host, rights to network appliances, application servers, and databases.
Define 'Privileged access management (PAM)'
Policies, procedures, and technical controls to prevent compromise of privileged accounts.
Define 'zero standing privileges (ZSP)'
Permissions are explicitly requested and are only granted for a limited period.

List 3 implementations of 'zero standing privileges (ZSP)'

  1. Temporary Elevation

  2. Password Vaulting/Brokering

  3. Ephemeral Credentials