quiz image

Business Justifications and Authorization Enforcement

BrainyRo avatar
BrainyRo
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the primary purpose of tying access to a structured business justification?

To enforce authorization and limit data access

Which of the following represents an anti-pattern in customer service access control?

Giving customer service representatives access to all customer records

What is the recommended approach for customer service data access control?

Block access by default, and only allow access with a verified business need

What is the advantage of using structured business justifications like ticket numbers?

<p>They prevent unauthorized access by validating the business need</p> Signup and view all the answers

How can access controls for customer service be improved over time?

<p>By only allowing access to specific customers and data, with customer approval</p> Signup and view all the answers

What does the text imply about the implementation of access controls?

<p>It can be a gradual process, implemented over time</p> Signup and view all the answers

What factor(s) determine(s) the appropriate usage of controls described in the text?

<p>All of the above</p> Signup and view all the answers

Which of the following is NOT a benefit of Multi-Party Authorization (MPA) mentioned in the text?

<p>Reducing the cost of implementing security measures</p> Signup and view all the answers

How does Multi-Party Authorization (MPA) discourage bad actors from attempting malicious changes?

<p>By requiring compromise of at least one other person</p> Signup and view all the answers

What culture does Multi-Party Authorization (MPA) aim to foster?

<p>Culture of security and reliability</p> Signup and view all the answers

Why is auditing past actions important in the context of incident response or postmortem analysis?

<p>For incident response and postmortem analysis</p> Signup and view all the answers

How does Multi-Party Authorization (MPA) affect the risk faced by employees and external attackers?

<p>It discourages bad actors by increasing the cost of attack</p> Signup and view all the answers

What is the primary purpose of granting temporary access to resources?

<p>All of the above</p> Signup and view all the answers

Which concept is mentioned as a reason for favoring 'sudo' or 'Run as Administrator' over operating as the root or Administrator accounts?

<p>Reduced ambient authority</p> Signup and view all the answers

What is the purpose of using a heavily monitored and restricted proxy machine (or bastion) when fine-grained controls for backend services are not available?

<p>To provide a secure and controlled access point to backend services</p> Signup and view all the answers

What is the purpose of combining temporary access with a request for multi-party authorization or a business justification?

<p>To enhance security by requiring additional authorization controls</p> Signup and view all the answers

Which of the following is NOT mentioned in the text as a reason for granting temporary access to resources?

<p>To enable fine-grained controls for every action</p> Signup and view all the answers

What is the significance of temporary access creating a logical point for auditing, according to the text?

<p>It provides data about where temporary access occurs, allowing prioritization of reducing these requests</p> Signup and view all the answers

What is the primary advantage of using small functional APIs for auditing?

<p>They provide a granular series of actions that can be logged.</p> Signup and view all the answers

Which of the following statements best describes a recommended approach to audit logging?

<p>Consider how to justify and explain administrative actions to customers.</p> Signup and view all the answers

In exceptional circumstances where existing audit capabilities are insufficient, what option is recommended?

<p>Provide breakglass functionality for interactive sessions with powerful APIs.</p> Signup and view all the answers

What is a potential consequence of providing breakglass functionality or direct credential access in exceptional circumstances?

<p>Increased risk of insider threats due to lack of auditing.</p> Signup and view all the answers

What is a key factor in the success of an auditing strategy, according to the text?

<p>The culture associated with auditing within the organization.</p> Signup and view all the answers

Which of the following is NOT mentioned as a recommended practice for auditing in the text?

<p>Implementing strong encryption for audit logs.</p> Signup and view all the answers

Which of the following is NOT a benefit of using structured data to associate with audit log events?

<p>It allows for the use of free-text fields to record justifications</p> Signup and view all the answers

What is the primary purpose of the "tripwires" mentioned in the text?

<p>To provide early detection of anomalous actions</p> Signup and view all the answers

Why does the passage suggest that teams may not notice a "couple of anomalous actions"?

<p>They do not have the cross-team view to connect the dots</p> Signup and view all the answers

What is the main benefit of associating audit log events with structured data, such as a bug number or customer case number?

<p>It allows for programmatic checks to ensure observed data belongs to the correct customer</p> Signup and view all the answers

Why does the passage suggest that organizations may need to work with other departments, such as Legal and HR, when implementing auditing mechanisms?

<p>To ensure the auditing mechanisms are appropriate, properly scoped, and documented</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser