Access Control Schemes Flashcards
Identification
This is similar to everyone who has their own bank account. The account is identified by the account details on the bank card. Identification in a security environment may involve having a user account, a smart card, or maybe a fingerprint reader - this is unique to that individual.
Authentication
Once the individual inserts their method of identification, they are then authenticated, for example, by inserting a password or a PIN.
Authorization
This is the level of access you have to selective data. You are normally a member of certain groups; for example, a sales manager could access data from sales group and then access data from the managers group. You will only be given the minimum amount of access required to perform your job. This is known as least privilege.
Privilege Access Management (PAM)
This is a solution that helps protect the privilege accounts within a domain, preventing attacks such as pass the hash, pass the ticket, and privilege escalation. It also gives visibility in terms of who is using privilege accounts and what tasks they are being used for.
Mandatory Access Control (MAC)
MAC is based on the classification level of the data
MAC levels
Top Secret: Highest level, exceptionally grave damage
Secret: Causes serious damage
Confidential: Causes damage
Restricted: Undesirable effects
MAC Roles
Owner: This is the person who writes the data and determines the classification
Steward: The steward is the person who is responsible for labeling the documents
Custodian: The custodian is the person who stores and manages classified data
Security Administrator: The security administrator is the person who gives access to classified data once clearance has been approved