πStudy Focus | Domain 5: Identity and Access Management (IAM)
π Domain 5: Identity and Access Management (IAM)
π Flashcard Topics (Acronyms, Models, and Authentication Nuance)
π Authentication, Authorization, Accounting (AAA)
-
Authentication = Prove identity (e.g., password)
-
Authorization = What you’re allowed to do
-
Accounting = Logging and tracking usage
π Authentication Factors
-
Something you...
Know (password), Have (token), Are (biometrics), Do (signature), Are from (location/IP) -
Multifactor = from different categories
Two passwords ≠ MFA; password + fingerprint = MFA.
π Access Control Models
π Discretionary Access Control (DAC)
-
Owner controls access. Based on user identity. Used by Windows OS.
π Mandatory Access Control (MAC)
-
System-enforced, labels + clearances. Used in military.
π§© Role-Based Access Control (RBAC)
-
Access assigned based on job function (role).
π― Attribute-Based Access Control (ABAC)
-
Access based on multiple factors (e.g., user + location + time).
π§± Rule-Based Access Control
-
If-then conditions. Common in firewalls or dynamic environments.
π ️ Access Control Mechanisms
-
Least Privilege = Users get minimum needed rights
-
Separation of Duties = Split critical tasks between users
-
Need to Know = Restrict access to only what’s relevant
-
Job Rotation = Reduces fraud, increases knowledge transfer
π§Ύ Access Control Lists (ACLs)
-
Lists permissions for subjects on objects (e.g., read/write). Common in file systems and routers.
π Identity Management Concepts
-
Identity Proofing = Confirming identity during onboarding
-
Provisioning = Granting access rights to users
-
Deprovisioning = Removing access when no longer needed
-
Federated Identity = Single identity across multiple orgs
-
Single Sign-On (SSO) = One login, access many systems
π Auth Protocols (Must-Memorize Acronyms)
π‘️ Kerberos
-
Uses tickets (TGTs), mutual authentication, time-sensitive.
-
Requires trusted third party (KDC).
π SAML (Security Assertion Markup Language)
-
Used in SSO for web apps. XML-based.
π OAuth 2.0
-
Delegated access (e.g., login with Google). Doesn’t share password.
πͺͺ OpenID Connect
-
Built on OAuth 2.0 — adds authentication (ID tokens).
π§ RADIUS vs TACACS+
-
RADIUS = UDP, combines auth/accounting, encrypts password only
-
TACACS+ = TCP, separates AAA, encrypts entire packet
𧬠Biometric Performance Metrics
-
FRR (False Rejection Rate) = Legit user denied
-
FAR (False Acceptance Rate) = Impostor allowed
-
CER (Crossover Error Rate) = Point where FAR = FRR → lower is better
π Common Access Attacks
-
Brute Force = Try all combinations
-
Dictionary Attack = Use wordlists
-
Replay Attack = Resend valid authentication info
-
Pass-the-Hash = Steal and reuse NTLM hashes
-
Credential Stuffing = Use leaked credentials on other sites
This domain is acronym-dense and easily testable via scenarios. Reviewing flashcards daily is key for mastery here.
Comments
Post a Comment