Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Activity 2 : On - Site Identity Issues Scenario In this activity, you will be provided with two different local identity scenarios. For each, you
Activity : OnSite Identity Issues Scenario
In this activity, you will be provided with two different local identity scenarios. For each, you should
research the technology or situation described, and then write a written recommendation to handle
the issue described. In Part you will review your answers and look for potential flaws that remain.
Part : Emergency privilege escalation
At Example Corp., administrative accounts are created and managed using a central identity and
access management suite. This suite, as well as the company's central AAA servers, are hosted in
redundant datacentres, and sitetosite VPNs normally connect those datacentres to multiple
locations around the country.
Example Corp.s systems engineering department recently dealt with a major internet connectivity
outage, which also resulted in engineers being unable to log in to the systems at the sites where they
worked. This meant that they were unable to work to fix the issues.
The engineers have requested that you identify a secure way to provide emergency, ondemand
privileged access to local servers when the central AAA services are unavailable. You have been asked
to provide a solution to central IT management that is both secure and flexible enough to allow
authentication for network devices, servers, and workstations.
Part : Managing privilege creep
A recent audit of Example Corp.s file shares shows that many longterm employees have significantly
broader rights to files and folders than their current roles should allow. In fact, in some cases
employees could see sensitive data that could result in negative audit findings in a pending external
audit.
How would you recommend that Example Corp. handle both the current issue of privilege creep and
the ongoing problem of ensuring that it does not occur in the future without seriously disrupting the
company's operations?
Part : Review
Review your recommendations to ensure that confidentiality, integrity, and availability are maintained. Did you provide a solution that covers each of these three areas?
Does your solution cover each of these areas if appropriate
Personnel
Endpoint devices
Servers
Services and applications
Roles and groups
If you were asked to conduct a penetration test of an organization that had implemented your
recommendations, how would you approach attacking your solution?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started