Identity and Access Management (IAM) Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards covering key IAM concepts from the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Identity and Access Management (IAM)

Security process that provides identification, authentication, and authorization mechanisms for users, computers, and other entities to access organizational assets.

2
New cards

Unique subject

A distinct IAM entity (personnel, endpoints, servers, software, or roles) that has its own identity and credentials.

3
New cards

Personnel

People and employees with user accounts who log on to systems; a major IAM subject and a potential risk if credentials are exposed.

4
New cards

Endpoints

Desktops, laptops, tablets, and cell phones used to access a network, each with its own credentials.

5
New cards

Servers

Back-end machines that often communicate machine-to-machine and have their own IAM credentials; may host mission-critical systems.

6
New cards

Software

Applications that can act as IAM subjects and may use certificates to authenticate or authorize clients.

7
New cards

Roles

Functional identities that define access rights based on what the asset is supposed to do; can apply to people, endpoints, servers, or software.

8
New cards

Role-based permissions (RBAC)

Assigning access through groups or roles; commonly implemented in Windows by group memberships.

9
New cards

Provisioning

Creating a new user account in the IAM system.

10
New cards

Deprovisioning

Disabling or deleting a user account when it is no longer needed.

11
New cards

Managing accounts

Activities like resetting passwords, updating certificates, and adjusting permissions and authorizations.

12
New cards

Auditing accounts

Reviewing account activity logs to determine if actions were legitimate.

13
New cards

Identity-based threats

Threats identified by identity-related factors; includes assessing password strength and credential security.

14
New cards

Password checks

Evaluating password strength to ensure credentials are not easily compromised.

15
New cards

Compliance

Maintaining security through audits and checks to meet defined requirements.

16
New cards

User accounts

Standard accounts with basic permissions; considered the least risky IAM account type.

17
New cards

Privileged accounts

Accounts with elevated permissions (admin/root); high risk and require extra auditing and controls.

18
New cards

Shared accounts

Accounts used by multiple people; are dangerous for auditability and are generally discouraged.

19
New cards

Digital certificates

Certificates used to verify identity and enable secure access in software and clients.

20
New cards

Directory services

Core IAM component that stores identities and credentials for authentication and authorization.

21
New cards

Repositories

Storages for identities and credentials used by the IAM system.

22
New cards

Access management tools

Tools that enforce and manage who can access which resources.

23
New cards

Auditing and reporting

Systems that monitor identity activity and generate security reports.

24
New cards

Windows groups

A common method to assign users to groups for role-based permissions in Windows.