Business Justifications and Authorization Enforcement
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of tying access to a structured business justification?

  • To improve customer service efficiency
  • To streamline the ticketing process
  • To enforce authorization and limit data access (correct)
  • To comply with industry regulations

Which of the following represents an anti-pattern in customer service access control?

  • Requiring customer approval for data access
  • Implementing access controls gradually over time
  • Allowing access only to assigned tickets
  • Giving customer service representatives access to all customer records (correct)

What is the recommended approach for customer service data access control?

  • Require customer approval for all data access requests
  • Block access by default, and only allow access with a verified business need (correct)
  • Implement a single, comprehensive access control system upfront
  • Allow unrestricted access to all customer data for efficiency

What is the advantage of using structured business justifications like ticket numbers?

<p>They prevent unauthorized access by validating the business need (A)</p> Signup and view all the answers

How can access controls for customer service be improved over time?

<p>By only allowing access to specific customers and data, with customer approval (C)</p> Signup and view all the answers

What does the text imply about the implementation of access controls?

<p>It can be a gradual process, implemented over time (C)</p> Signup and view all the answers

What factor(s) determine(s) the appropriate usage of controls described in the text?

<p>All of the above (D)</p> Signup and view all the answers

Which of the following is NOT a benefit of Multi-Party Authorization (MPA) mentioned in the text?

<p>Reducing the cost of implementing security measures (C)</p> Signup and view all the answers

How does Multi-Party Authorization (MPA) discourage bad actors from attempting malicious changes?

<p>By requiring compromise of at least one other person (C)</p> Signup and view all the answers

What culture does Multi-Party Authorization (MPA) aim to foster?

<p>Culture of security and reliability (D)</p> Signup and view all the answers

Why is auditing past actions important in the context of incident response or postmortem analysis?

<p>For incident response and postmortem analysis (B)</p> Signup and view all the answers

How does Multi-Party Authorization (MPA) affect the risk faced by employees and external attackers?

<p>It discourages bad actors by increasing the cost of attack (B)</p> Signup and view all the answers

What is the primary purpose of granting temporary access to resources?

<p>All of the above (D)</p> Signup and view all the answers

Which concept is mentioned as a reason for favoring 'sudo' or 'Run as Administrator' over operating as the root or Administrator accounts?

<p>Reduced ambient authority (B)</p> Signup and view all the answers

What is the purpose of using a heavily monitored and restricted proxy machine (or bastion) when fine-grained controls for backend services are not available?

<p>To provide a secure and controlled access point to backend services (B)</p> Signup and view all the answers

What is the purpose of combining temporary access with a request for multi-party authorization or a business justification?

<p>To enhance security by requiring additional authorization controls (D)</p> Signup and view all the answers

Which of the following is NOT mentioned in the text as a reason for granting temporary access to resources?

<p>To enable fine-grained controls for every action (C)</p> Signup and view all the answers

What is the significance of temporary access creating a logical point for auditing, according to the text?

<p>It provides data about where temporary access occurs, allowing prioritization of reducing these requests (A)</p> Signup and view all the answers

What is the primary advantage of using small functional APIs for auditing?

<p>They provide a granular series of actions that can be logged. (C)</p> Signup and view all the answers

Which of the following statements best describes a recommended approach to audit logging?

<p>Consider how to justify and explain administrative actions to customers. (A)</p> Signup and view all the answers

In exceptional circumstances where existing audit capabilities are insufficient, what option is recommended?

<p>Provide breakglass functionality for interactive sessions with powerful APIs. (A)</p> Signup and view all the answers

What is a potential consequence of providing breakglass functionality or direct credential access in exceptional circumstances?

<p>Increased risk of insider threats due to lack of auditing. (B)</p> Signup and view all the answers

What is a key factor in the success of an auditing strategy, according to the text?

<p>The culture associated with auditing within the organization. (B)</p> Signup and view all the answers

Which of the following is NOT mentioned as a recommended practice for auditing in the text?

<p>Implementing strong encryption for audit logs. (C)</p> Signup and view all the answers

Which of the following is NOT a benefit of using structured data to associate with audit log events?

<p>It allows for the use of free-text fields to record justifications (B)</p> Signup and view all the answers

What is the primary purpose of the "tripwires" mentioned in the text?

<p>To provide early detection of anomalous actions (C)</p> Signup and view all the answers

Why does the passage suggest that teams may not notice a "couple of anomalous actions"?

<p>They do not have the cross-team view to connect the dots (D)</p> Signup and view all the answers

What is the main benefit of associating audit log events with structured data, such as a bug number or customer case number?

<p>It allows for programmatic checks to ensure observed data belongs to the correct customer (C)</p> Signup and view all the answers

Why does the passage suggest that organizations may need to work with other departments, such as Legal and HR, when implementing auditing mechanisms?

<p>To ensure the auditing mechanisms are appropriate, properly scoped, and documented (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser