CompTIA Security+ Study Guide (SY0-501) Chapter 4: Identity and Access Management
Chapter 4: Identity and Access Management Given a scenario, use appropriate software tools to assess the security posture of an organization Given a scenario, troubleshoot common security issues Given a scenario, analyze and interpret output from security technologies Compare and contrast identity and access management concepts Given a scenario, install and configure identity and access services Given a scenario, implement identity and access management control
Tools to Assess Your Network Protocol analyzers tcpdump Wireshark Network scanners Solar Winds LanHelper Wireless scanners and crackers Aircrack
Tools to Assess Your Network Continued Password crackers pwdump Ophcrack Vulnerability scanners Nessus MBSA OWASP Zap
Command-Line Tools ping netstat tracert nslookup/dig arp ipconfig/ip/ifconfig nmap netcat
Additional Tools General networking tools Honeypots Steganography tools
Troubleshooting Common Security Issues Access issues Configuration issues Digital certificate issues Personnel issues Other issues
Security Technologies Intrusion detection systems Antimalware Firewalls and related devices Other systems
Identification vs. Authentication Requires a human to intercede and verify that someone is who they say they are Authentication The user may not be who they are supposed to be, but they have indeed given the correct combination of values (such as username and password, tokens, or biometrics) and thus they are authenticated.
Authentication (single factor) and authorization Single-factor authentication (SFA) Username and password Multifactor authentication Multifactor system Two-factor authentication system
Biometrics Federations
Potential Authentication and Access Problems Transitive Access One party (A) trusts another party (B). If the second party (B) trusts another party (C), then a relationship can exist where the third party (C) is trusted by the first party (A).
LDAP PAP, SPAP, and CHAP Kerberos RADIUS
Chapter 4: Access Control, Authentication, and Authorization TACACS/TACACS+/XTACACS This is a client-server-oriented environment, and it operates in a manner similar to how RADIUS operates. OATH One-time passwords SAML Security Assessment Markup Language
Access Control Five primary methods Mandatory access control (MAC) All access predefined Discretionary access control (DAC) Incorporates some flexibility Role-based access control (RBAC) Allows the user’s role to dictate access capabilities Rule-based access control (RBAC) Limits user to preconfigured policies Attribute-based access control (ABAC) Considers all of the various attributes associated with the subject and object in making the access control decision
Smart cards Common access card (CAC) Personal identification verification card (PIV)