Join Mike Chapple for an in-depth discussion in this video Account monitoring, part of CompTIA Security+ (SY0-401) Cert Prep: Access Control and Identity Management.
- Security administrators must pay careful attention…to the permissions and use of end user accounts…to protect against security incidents.…Two major account administration issues…face security professionals.…The first is inaccurate permissions assigned to accounts…that either prevent a user from doing his or her work…or violate the principle of least privilege.…These permissions are often the result of privilege creep,…a condition that occurs when users switch jobs…and gain new permissions but never have…their old permissions revoked.…
The second issue is the unauthorized use of permissions…either by someone other than the legitimate user…accessing the account or by the user performing…some illegitimate action.…To protect against the first issue,…administrators should perform regular user access reviews…in cooperation with managers from around the organization.…During each review, administrators should pull a listing…of all of the permissions assigned to each account…and then review that listing with managers…
Author Mike Chapple, an IT leader with over 15 years experience, introduces identification methods such as usernames and biometrics, as well as authentication methods to verify users, including multifactor authentication, password authentication, and single sign-on. He also discusses authorization concepts such as mandatory and discretionary access controls, which can help you restrict access to sensitive parts of your network. The course also covers best practices for ongoing account management, such as establishing a good password policy, managing user roles, and monitoring accounts, and what to do when you need to suspend or terminate access.
NOTE: We are now a CompTIA Content Publishing Partner. Our training prepares members to pass CompTIA certification exams and become qualified IT professionals. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Setting policies for usernames and access cards
- Implementing biometrics
- Combining authentication factors for multifactor authentication
- Using a Kerberos access control system
- Using access control lists such as Windows NTFS file permissions
- Role-based authorization
- Implementing account and password policies
Skill Level Intermediate
Q: This course was updated on 04/14/2016. What changed?
A: We updated one tutorial to address the November 2015 security update to Kerberos.