Block 1 Day 2 review Questions Objective 1C & 1D
Identity, Credential, And Access Management (ICAM)
is the set of security disciplines that allows an organization to: enable the right individual, access the right resource, the right time for the right reason
ICAM Landscape - Identity
Establish, Create, Provision, Update, De-Provision
ICAM Landscape - Credential
Establish, Register, issue, Maintain, Revoke
ICAM Landscape - Access
Access, Authentication, Authorization
Access Management
set of practices and services for ensuring only those with proper permissions can interact with a given resource
COMPUSEC
includes all measures to safeguard Issues and information against sabotage, tampering, denial of service, espionage, fraud, misuse, misappropriation, or release to unauthorized persons
Information System Security Manager/ Officer
are responsible for the protection from threats by ensuring proper configuration of technical security mechanisms and establish physical controls for the removal and secure storage of information from unattended ISs
Classified
Ensure the transmission of _____ Information is encrypted using NSA-Approved cryptography
WCO
will perform annual assessments of all units utilizing IT under the control of the base communications unit, including IT of tenant units