03 Technical Network Security Flashcards
Access Control
Selective restriction of access to a network resource
Access Control Mechanisms use:
user identification, authentication and authorization to restrict or grand access to a specific user.
Subject:
a particular user or process that wants to access a resource
Object:
a specific resource that the users wants to access such as a file or a hardware device
Reference Monitor:
checks the access control rule for specific restrictions.
Operation:
represents an action taken by a subject on an object.
Principles of Access Control:
- Separation of Duties (SoD)
- Need-to-know
- Principle of Lease Privilege (POLP)
Principles of Access Control: SoD:
Separation of Duties (SoD):
Conflicting responsibilities create unwanted risks such as security breaches, info theft, and circumvention of security protocols.
Principles of Access Control: need-to-know:
Under the need-to-know access control principle, access is provided only to the info that is required for performing a specific task.
Principles of Access Control: POLP
Principle of Least Privilege (POLP):
- POLP believes in providing employees a need-to-know access, not more not less.
- Helps orgs by protecting it from malicious behavior, achieving better system stability and system security.
Access Control Model:
- Mandatory Access control (MAC)
- Role-based access control (RBAC)
- Discretionary Access Control (DAC)
- Rule-based access control (RB-RBAC)
Access Control Model: MAC
- Only the admin/system owner has the rights to assign privileges.
- Does not permit end user to decide who can access the information.
Access Control Model: RBAC
Role-based Access Control (RBAC)
-Permission is assigned based on user roles.
Access Control Model: DAC
Discretionary Access Control (DAC)
End user has complete access to the information they own.
Access Control Model: RB-RBAC
Rule-based access control (RB-RBAC)
-Permissions are assigned to a user role dynamically based on a set of rules defined by the admin.
Two types of MAC models:
- Bell-LaPadula (BLM)
- Biba Integrity Model
DAC Model: Access Control Matrix
Access control matrix is a two-dimensional array in which subjects are placed against the objects.
BLM Model
Bell-LaPadula Model (BLM)
- Focuses on data confidentiality and controlled access to classified information.
- This model believes in read-down, write-up.
Biba Integrity Model:
-Exact opposite of BLM model: read-up OK, write-down OK
Biba Integrity Model: 3 data integrity axioms
- : Prevent data modification by unauthorized parties
- : prevent unauthorized data modification by authorized parties
- : maintain internal and external consistency
DAC Model: Access Control Matrix
Access control matrix is a two-dimensional array in which subjects are placed against the objects.
RBAC Implementation:
-Just Enough Administration (JEA): Restricts logon rights of IT administrators.