1. Friendly Tip: Please take notes to better remember concepts
In this video we will
learn about
Implementing
Account Policies &
Authorization
Solutions
Core Cyber Security Concepts
Architecture & Design
2. Account Attributes
After a candidate clears background
check, and goes through the on
boarding process to be a part of the
organization, the new employee's
user account has to be managed by
the network administrator & certain
attributes are assigned to the user
account based on the roles &
responsibilities.
3. Access Policy
Access control is the selective
restriction of access to a place or
other resource, while access
management describes the process.
And there are various policies
determining how access control
should be carried out.
4. Access Password Policy Settings
This policy lists out certain norms on
password creation to ensure that
employees create & use strong
passwords. This includes factors
such as password length, it's
complexity (use of numbers &
special characters) and password
reuse .
5. Account Audits
User or Employee's workstation
activities should be logged & reviewed
as needed to ensure that the account
isn't being used in illegitimate ways &
maintain it's integrity.
The idea is to track all user and actions
& spot potential discrepancies .
6. Account Lockout
If the audit logs show signs of incident, the
information security department should be
able to immediately disable the
compromised user account at a moment's
notice to limit the potential damage cause
to the organization.
This process is is known as Account Lockout.
7. OATH - Open Authentication
OAuth is an open-
standard authorization
protocol or framework
that provides
applications the ability
for “secure designated
access.”
8. OATH - Open Authentication
For example, When logging into
Udemy you can tell Google that it’s
OK for Udemy.com to access your
profile without having to give Udemy
your Google account password.
This minimizes risk in a major way: In
the event Udemy suffers a breach,
your Google account password
remains safe.
9. OpenID Connect
OpenID Connect 1.0 is a simple identity layer on top of the OAuth
2.0 protocol. It allows Clients to verify the identity of the End-User
based on the authentication performed by an Authorization Server.