2.1 Authentication and Access Flashcards

(20 cards)

1
Q

What is SAML (Security Assertion Markup Language)?

A

An open standard that allows web applications to use a third-party identity provider to authenticate users.

SAML facilitates secure communication between identity providers and service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does SAML improve authentication?

A

It enables single sign-on across multiple services using a trusted identity provider.

This reduces the need for multiple logins and enhances user experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Single Sign-On (SSO)?

A

A method that allows users to access multiple applications with one set of login credentials.

SSO simplifies user management and improves security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How long do SSO sessions typically last?

A

Often up to about 24 hours before reauthentication is required.

Session duration can vary based on security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Privileged Access Management (PAM)?

A

A security approach that controls and monitors access to administrative accounts and privileged systems.

PAM is crucial for protecting sensitive systems from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Just-in-Time (JIT) access?

A

A method where users are granted temporary, time-limited elevated access only when needed.

JIT access minimizes the risk of credential misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is Just-in-Time access used in security?

A

To reduce the risk of abuse by limiting the duration and availability of privileged credentials.

This approach enhances security by ensuring access is only granted when necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vault in the context of PAM?

A

A secure centralized system used to store and manage privileged credentials.

Vaults help in safeguarding sensitive access information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Mobile Device Management (MDM)?

A

A centralized platform used to manage, secure, and enforce policies on mobile and endpoint devices.

MDM is essential for maintaining security in a mobile workforce.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of devices can MDM manage?

A

Both company-owned devices and personal (BYOD) devices.

MDM solutions often support various operating systems and device types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What capabilities does MDM provide?

A
  • Policy enforcement
  • Device configuration
  • Security controls
  • Data partitioning between personal and corporate data

These capabilities help protect organizational data on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Data Loss Prevention (DLP)?

A

A set of tools and policies designed to prevent unauthorized sharing or leakage of sensitive data.

DLP is critical for compliance with data protection regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where is DLP typically implemented?

A

Across endpoints, email systems, and cloud services.

DLP solutions can monitor and control data movement in various environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of data does DLP protect?

A
  • Personally identifiable information (PII)
  • Financial data
  • Intellectual property

Protecting these types of data is essential for maintaining privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Identity and Access Management (IAM)?

A

A framework that manages user identities and controls access to resources throughout their lifecycle.

IAM is vital for ensuring that users have appropriate access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main goal of IAM?

A

To ensure users have access only to the resources required for their roles.

This principle of least privilege enhances security.

17
Q

What are directory services in IT?

A

Centralized databases used to manage users, devices, permissions, and network resources.

Directory services play a key role in identity management.

18
Q

What is an example of a directory service?

A

Microsoft Active Directory.

Active Directory is widely used in enterprise environments for user and resource management.

19
Q

How do directory services support authentication and authorization?

A

They centralize account management and enforce access control policies across a network.

This centralization simplifies user management and enhances security.

20
Q

How do IAM and directory services work together?

A

IAM defines identity and access policies, while directory services store and enforce those identities and permissions.

Together, they provide a comprehensive approach to managing user access.