Access Control

Description

SYO-501 CompTIA Security + (Tema 11) Mind Map on Access Control, created by Rafael Jiménez Rey on 29/05/2018.
Rafael Jiménez Rey
Mind Map by Rafael Jiménez Rey, updated more than 1 year ago
Rafael Jiménez Rey
Created by Rafael Jiménez Rey almost 6 years ago
14
0

Resource summary

Access Control
  1. Type of controls
    1. Administrative Control o Management control

      Attachments:

      1. Logical control o Tecnical Control
        1. Physical control
          1. Operational Control
          2. Classes of controls
            1. Preventive
              1. Corrective
                1. Detective
                  1. Deterrent
                    1. Compensating
                    2. False Positives/False Negatives
                      1. False Positives
                        1. False Negatives
                        2. Implicit Deny
                          1. Least Privilege
                            1. Separation of Duties
                              1. Job Rotation
                                1. Other Account Practices
                                  1. Onboarding
                                    1. Offboarding
                                      1. Recertification
                                        1. Standard naming convention
                                          1. Account maintenance
                                            1. Location-based policies
                                            2. Access Control Models
                                              1. Discretionary Access Control
                                                1. Mandatory Access Control
                                                  1. Nivel de autorización (Usuarios o grupos)
                                                    1. Top secret
                                                      1. Secret
                                                        1. Confidential
                                                          1. Restricted
                                                            1. Unclassified
                                                            2. Etiquetas (Fichero)
                                                              1. Confidential
                                                                1. Private
                                                                  1. Sensitive
                                                                    1. Public
                                                                  2. Role-Based Access Control (RBAC)
                                                                    1. Rule-Based Access Control (RBAC)
                                                                      1. Group-Based Access Control (GBAC)
                                                                        1. Attribute-Based Access Control (ABAC)
                                                                          1. User Account Types
                                                                            1. User account:
                                                                              1. Shared and generic accounts
                                                                                1. Guest accounts
                                                                                  1. Service accounts
                                                                                    1. Privileged accounts:
                                                                                    2. Using Security Groups
                                                                                      1. Rights and Privileges
                                                                                        1. Access this computer from the network
                                                                                          1. Allow log on locally
                                                                                            1. Back up files and directories
                                                                                              1. Change the system time
                                                                                                1. Take ownership of files or other objects
                                                                                                2. NTFS Permissions
                                                                                                  1. Read
                                                                                                    1. Modify
                                                                                                      1. Full Control
                                                                                                      2. Linux Permissions
                                                                                                        1. Read (R): 4
                                                                                                          1. Write (W): 2
                                                                                                            1. Execute (X): 1
                                                                                                            2. Access Control Lists (ACLs)
                                                                                                              1. Cisco Standard Access Lists
                                                                                                                1. Cisco Extended Access Lists
                                                                                                                2. Group Policies
                                                                                                                  1. Install software
                                                                                                                    1. Configure password policies
                                                                                                                      1. Configure auditing
                                                                                                                        1. Configure user rights
                                                                                                                          1. Restricted groups
                                                                                                                            1. Disable services and configure event logs
                                                                                                                              1. File system permissions
                                                                                                                                1. Software restrictions:
                                                                                                                                  1. Lock down the system by disabling features
                                                                                                                                  2. Different types of group policies
                                                                                                                                    1. 1º - Local
                                                                                                                                      1. 2º - Site:
                                                                                                                                        1. 3º - Domain
                                                                                                                                          1. 4º - Organization unit (OU)
                                                                                                                                          2. Database Security
                                                                                                                                            1. Roles
                                                                                                                                              1. Permissions
                                                                                                                                                1. Encryption
                                                                                                                                                  1. Auditing
                                                                                                                                                  2. Account Restrictions
                                                                                                                                                    1. Account Expiration
                                                                                                                                                      1. Time-of-Day Restrictions:
                                                                                                                                                        1. Account Lockout:
                                                                                                                                                          1. Account lockout threshold
                                                                                                                                                            1. Account lockout duration
                                                                                                                                                              1. Reset account lockout counter after
                                                                                                                                                              2. Account Disablement:
                                                                                                                                                                1. View Account Details:
                                                                                                                                                                2. Account Policy Enforcement
                                                                                                                                                                  1. Shared accounts
                                                                                                                                                                    1. Credential management
                                                                                                                                                                      1. Group policy
                                                                                                                                                                        1. Password complexity:
                                                                                                                                                                          1. Expiration
                                                                                                                                                                            1. Recovery
                                                                                                                                                                              1. Disablement
                                                                                                                                                                                1. Lockout
                                                                                                                                                                                  1. Password history
                                                                                                                                                                                    1. Password reuse
                                                                                                                                                                                      1. Password length
                                                                                                                                                                                        1. Generic account prohibition
                                                                                                                                                                                        2. Monitoring Account Access
                                                                                                                                                                                          1. Group-based privileges
                                                                                                                                                                                            1. User-assigned privileges
                                                                                                                                                                                              1. User access reviews
                                                                                                                                                                                                1. Continuous monitoring
                                                                                                                                                                                              Show full summary Hide full summary

                                                                                                                                                                                              Similar

                                                                                                                                                                                              Tema 11 Administración de usuarios y permisos en Linux
                                                                                                                                                                                              Ramon El Varilla
                                                                                                                                                                                              Repaso Tema 11
                                                                                                                                                                                              María Parra
                                                                                                                                                                                              LOS CONFLICTOS EN LA EMPRESA
                                                                                                                                                                                              sergioalban455
                                                                                                                                                                                              Inglés 1 (Examen 11-15)
                                                                                                                                                                                              Inglés oposiciones
                                                                                                                                                                                              TEMA 11
                                                                                                                                                                                              aliciafiz
                                                                                                                                                                                              7 Crisis y hundimiento del comunismo (1985-1991)
                                                                                                                                                                                              isabel99villenera
                                                                                                                                                                                              Viaje al interior de la materia
                                                                                                                                                                                              pilu_4
                                                                                                                                                                                              tecnologia tema 11
                                                                                                                                                                                              julen martinez
                                                                                                                                                                                              Revista Time
                                                                                                                                                                                              jeniffer lopez0097
                                                                                                                                                                                              LAS DESAMORTIZACIONES DE MENDIZÁBAL Y MADOZ
                                                                                                                                                                                              Ángela Nuñez Lucas
                                                                                                                                                                                              Estructura lógica
                                                                                                                                                                                              Victor Diaz