A group of developers has a shared backup account to access the source code repository. Which of the following is best way to secure the backup account if there is an SSO failure?
popular PAM tools:
1. Azure Active Directory (Azure AD) Privileged Identity Management (PIM) as part of its Microsoft Entra suite
2. Keeper
3. CyberArk,
4. BeyondTrust
5. Thycotic (now part of Delinea)
The correct answer is:
D. PAM (Privileged Access Management)
Explanation:
Privileged Access Management (PAM) is the best approach to securing a shared backup account. PAM helps enforce security practices like access controls, session monitoring, and audit logs for privileged accounts. In the event of an SSO failure, PAM can secure and manage access to the shared account, ensuring only authorized users can access the backup account.
Other Options:
A. RAS (Remote Access Service): This provides remote access functionality but does not offer the specific access control and management needed for securing a shared account.
B. EAP (Extensible Authentication Protocol): A framework used for network authentication, not for managing privileged accounts.
C. SAML (Security Assertion Markup Language): Used for Single Sign-On (SSO) and federated authentication, but it does not directly secure a shared backup account in case of SSO failure.
A Privileged Access Management (PAM) solution is the best way to secure the backup account. It provides a centralized platform to manage and control access to privileged accounts, such as the shared backup account. PAM can enforce strong authentication methods, such as multi-factor authentication, and monitor user activity to detect suspicious behavior.
D. PAM (Privileged Access Management)
Explanation:
PAM (Privileged Access Management) is a security solution designed to manage and control access to privileged accounts, such as shared accounts for administrative purposes or critical systems like a source code repository.
PAM solutions are designed to manage and secure privileged accounts, such as the shared backup account. It ensures:
Strict control over access to shared accounts.
Auditing and monitoring of access activities.
Enforcement of strong authentication mechanisms, even in the absence of SSO functionality.
Temporary access and rotation of account credentials to reduce the risk of unauthorized use.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
9149f41
2 months agoAnyio
2 months agoProudFather
3 months, 2 weeks agoSegunmx
4 months, 1 week agoAriGarcia
4 months, 1 week ago