4.4 Given a scenario, differentiate common account management practices. Flashcards
Account Types
When controlling access to resources, you typically should start by defining user accounts for each individual within your organization. It is important to know that there are different reasons to have user accounts, and as a result, there are different types of account.
Account Types - User Account
Each employee within your organization should have a separate user account assigned to them that they use to access the network and systems. This user account should not be used by anyone else, as it represents that specific user and controls what resources the employee will have access to. You will also monitor employee activities by logging what actions the user account performs, so stress to employees not to share the password for their account.
Account Types - Shared and Genetic Accounts/Credentials
From time to time you may consider creating an account that is shared by multiple employees because they share the same job role.
For example, Sue is the accounting clerk in the morning, while in the afternoon Bob is the accounting clerk. Instead of creating multiple accounts, you may consider creating a shared account called AccountingClerk and have each employee use that account. Keep in mind, however, from a security point of view, security professionals try to avoid having multiple employees share an account.
For purposes of monitoring and auditing, being able to log which actions Bob performed and which actions Sue performed is highly preferred. Having an entry in your logs that states AccountingClerk deleted a file does not help you determine who performed the action. Beware of shared or generic accounts!
Account Types - Guest Accounts
A guest account is an account that can be used to access a system if a person does not have an account. This allows an individual to gain temporary access to a resource without requiring you to create an account for them. Most operating systems have a guest account, but it is disabled by default, which means if someone wants to access the system, they require that an account be created for them. It is a security best practice to keep the guest account disabled.
Account Types - Service Accounts
Secure operating systems such as Windows and Linux require that everything authenticates to the system, whether it is a user or a piece of software. When software runs on the system, it needs to run as a specific user so that the software can be assigned permissions. The user account that you associate with a piece of software is known as a service account because it is a feature that is used by services running within the operating systems as well. When creating a service account (the user account that the software application will be configured to use), you typically configure the service account with a strong password and specify that the password never expires.
Ensure that the service account does not have administrative capabilities, because otherwise if the service were compromised by an attack such as a buffer overflow attack, the attacker would have the same credentials as the account associated with the service.
Account Types - Privileged Accounts
A privileged account is an account that has extra permissions outside of what is assigned to a typical user. Privileged accounts typically are authorized to make configuration changes to a system or perform an action not normally performed by a regular employee.
General Concepts
.
General Concepts - Least Privilege
The first principle of security that you should always follow when giving users and network administrators access to resources such as systems or files is the concept of least privilege. Least privilege means that you give a user only the minimum level of permissions needed to perform their tasks or duties. You do not want to give more permissions than needed because then the user or administrator can do more than what is expected with the resource.
For example, if Bob is responsible for doing the backups of a Windows server, you do not want to place him in the Administrators group because he would have the capability to do more than backups—he could make any change to the system he wants. In this example, you want to place him in the Backup Operator group so that his scope is limited to performing backups.
Another example involves file permissions. If a user only needs to be able to read the contents of a file, be sure to give them just the read permission and no more, because otherwise, they could accidentally delete content out of the file. If this were to happen, who do you think would be at fault—the person who deleted the content or the person who gave the privilege to delete the content?
General Concepts - Onboarding/Offboarding
Onboarding refers to the interview and orientation process new hires go through and includes all of the steps right from the candidate selection process for the job. Once an employee is hired, the onboarding process should continue with ensuring the employee has an account and has access to all resources needed for the job. The onboarding process should also include training for the specific job role so that the employee is geared for success within your organization from the start.
Offboarding is the process that needs to be followed when an employee leaves the organization. This includes an exit interview, reminding them of the nondisclosure agreement (NDA) they signed when they were hired (if applicable), disabling their account, and collecting any assets of the organization they may have.
In a different context:
When allowing personal devices that need access to your systems and network, you will need to ensure that you have procedures in place for adding those personal devices to the identity and access management system (IAM). This system is used to identify persons or devices outside the company and to control access to the system. The process of adding the new device to the system is known as onboarding while removing a device from the system is known as offboarding.
General Concepts - Permission Auditing and Review
Permission auditing and reviews, which involve continuous monitoring of the permissions configured on your different assets within the organization
General Concepts - Usage Auditing and Review
Usage auditing and reviews to determine what users are doing on the systems and in software applications on a regular basis.
General Concepts - Time-of-day Restrictions
Another example of a restriction that can be placed on a user account is a time of day restriction for account logons. Most environments allow you to specify as a property of the user account what hours the employee is allowed to be logged on to the system. The benefit of this is that you can ensure the employee is not accessing network resources after hours.
General Concepts - Recertification
Accounts go through a certification process to determine if they are required. Recertification is the process of reevaluating on a regular basis whether user accounts are still needed.
For example, you may have a recertification policy that states that accounts must be recertified every 90 days. If the account is deemed unnecessary, or if the owner of the account does not respond to the recertification request, the account is suspended.
General Concepts - Standard Naming Convention
When it comes to user accounts, be sure to create a standard naming convention for your accounts. Some companies go with firstname.lastname as the username convention, such as glen.clarke, while others use lastname plus first initial, such as clarkeg, or some other convention. Having a standard naming convention can help you detect rogue accounts if they are created without following the organization’s naming convention. The same applies to computer accounts—be sure to have a naming convention in place for workstations and servers.
General Concepts - Account Maintenance
Perform regular account maintenance, such as ensuring that users change their password regularly, backing up user home folders, and disabling unnecessary accounts on a regular basis. These could be accounts of users who have left the organization or have gone on leave.