Security Guidance page 137: An authorization is permission to do something—access a file or network, or perform a certain function like an API call on a particular resource.
The correct answer is C because you give permission.
A. The process of specifying and maintaining access policies
Authorization, as a component of identity, entitlement, and access management, refers to the process of specifying and maintaining access policies. It involves defining rules and permissions that determine what actions and resources a user or entity is allowed to access based on their identity and assigned roles or attributes. Authorization ensures that individuals and entities can only access the resources and perform the actions that they have been granted permission for, following established policies.
The correct answer is E. Enforcing the rules by which access is granted to the resources. Authorization, as a component of identity, entitlement, and access management (IAM), refers to the process of determining and enforcing the rules or policies that dictate access to resources. It involves verifying whether an authenticated user or entity has the necessary permissions or privileges to perform specific actions or access certain resources within a system or application. Authorization ensures that users are granted appropriate access based on their roles, permissions, and the established security policies.
E. Enforcing the rules by which access is granted to the resources
Authorization is the process of determining and enforcing the rules or permissions by which access is granted to specific resources or functionalities within a system. It involves evaluating the privileges and entitlements associated with an identity or user and deciding whether they have the necessary permissions to perform a requested action or access a particular resource.
Authorization typically works in conjunction with authentication, which verifies the identity of the user or entity requesting access. Once the authentication is successful, the authorization component determines the level of access rights and permissions associated with that identity and enforces them.
By enforcing access control rules and permissions, authorization ensures that users are only granted access to the resources they are entitled to, based on their role, privileges, or other defined criteria. This helps protect sensitive data, maintain system integrity, and prevent unauthorized access or misuse of resources.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MassoudAbedian
Highly Voted 1 year, 1 month agoCrotofroto
Most Recent 2 months, 3 weeks agoriee02
3 months, 2 weeks agobyfener
4 months, 2 weeks agomoten
6 months, 2 weeks agoBrainiac
6 months, 4 weeks ago