Chapter 1 - Access Control Flashcards
Access Controls encompass all operational levels of an organization.
Facilities; Support Systems; Information Systems; and Personnel
C-I-A
Confidentiality, Integrity and Availability
Two Philosophies for Access Control
Allow by Default and Deny by Default
Defense in Depth Strategy
Applying multiple layers of security protection between an information resource and a potential attacker.
Three step process for determining access controls
- Defining Resources 2. Determining Users 3. Specifying the Users use of the resources
Consistent Access Control Strategy
Simplicity is the key to an effective security system.
Separation of Duties
Primary Objective is the prevention of fraud and errors. Distributing tasks and associated privileges for a specific process among multiple people
Processes
Collection of tasks that must be performed to achieve an objective.
Applicabililtiy of Separation of Duties
Sensitivity of the function under consideration; and the elements within a function are prone to abuse, which are easily segmented, and what skills are available.
Least privilege
User is given no more access priviliege than necessary to perform a job, task, or function
Need to know
Defines the minimum needed to know to perform job function
Compartmentalization
Seperating groups of people and information such that each group is isolated and information does not flow between groups.
Security domain
Area where common process and security control work to separate all entities involved in these processes from other entities or security domains.
Information Classification
Objective is to group an organization’s information assets by levels of sensitivity and criticality.
Information Classification Program
- Determine objectives 2. Establish organizational support 3. Develop policy and supporting procedures 4. Develop process flows and procedures 5. Develop tools to support 6. Identify process and application owners 7. Identify information owners and delgates 8. Distribute standard templates 9. Classify information and applications 10. Develop auditing procedures 11. Load classification information into a central repository 12. Train users. 13. Periodically review and update information classifications.
Access Control System Requirements
Reliability, Transparency, Scalability, Integrity, Maintainability, Authentication Data Security, and Auditability
Main Categories of Access Control
- Directive - apply rules 2. Deterrent - discourage violations 3. Preventitive - prevent incident 4. Compensating - mitigate risk 5. Detective - signal warning when breached 6. Corrective - remedy circumstance 7. Recovery - restore conditions
Access Control Types
- Administrative Controls - define roles, responsibilities, policies, and administrative functions. 2. Logical (Technical) controls - electronic hardware and software solutions implemented to control access to information and information networks. 3. Physical Controls - protect physical environment - locks, gates, guards
Major Groups of Administrative Controls
- Policies and Procedures 2. Personnel Security, evaluation and clearances 3. Security policies 4. Monitoring 5. User management 6. Privilege management
BCP/DRP
Business continuity plan/disaster recovery plan
RADIUS
Remote Authentication Dial In User Service
Major Groups of Logical Controls
- Network Access 2. Remote Access 3. System Access 4. Application Access 5. Malware Control 6. Encryption
Discretionary Access Controls (DACS)
Controls placed on data by the owner of the data
Mandatory Access Controls (MACS)
Controls determined by the system and based primarily on organizational policy. Data needs to be labeled as to its classification. Access permissions are applied to an object based on the level of clearance given to a subject.
Nondiscretionary Access Control
Based on assignment of permissions as defined by the administrator of a system
Access Control Matrix
An access control list in the form of a table - showing what permissions a user has for various system objects.
Rule-based Access Control
Specifies the privileges granted to user s(e.g read, write) when the specific condition of a rule is met - e.g. the time a certain file can be accessed.
Role-based Access Control
Based on job function - objects associated with a role will inherit privileges assigned to that role
RBAC
Non-RBAC - user granted access Limited RBAC - users mapped to roles within a single application Hybrid RBAC-role applied to multiple applications or systems, but instances wheresubjects assigned to roles defined within an application FUll RBAS - roles defined by organizational policy
Content Dependent Access Control
Based on content of data not roles
Constrained User interface
Restricting users to specific functions based on their role in the system - e.g. limiting menus, data views, encryption, etc
Capability Tables
Used to match subjects and their capabilities - read, write
Temporal Isolation
Activities may be restricted on when they can be performed
Identification
Assertion of a unique identity for a person or system and is the starting point of access control. - Uniqueness
Authentication
The process of verifying the identity of the user - Validity
Authorization
Process of defining the specific resources a user needs and determining the type of assess to those resources the user may have. - Control
MAC Address
Media Access Control - 48-bit number - machine address - now can be set in software so no longer can be considered a strong identifier
IP Address
Logical location of a device on the IP network - assigned in software
RFID
Radio Frequency Identification - small label that can be embedded in almost any object - they can be read from a distance
Email Address
globally unique - enforced by convention
User Identification Guidelines
User identification must be unique; user identification should be non-descriptive and disclose as little as possible about the user; user identification must be secure; and the final process must be logged and documented so that it can be verified and audited.
Identity Management
refers to a set of technologies intented to offer greater efficiency in the management of a diverse user and technical environment
Challenges for Identity Management Solutions
Consistency; usability; reliability; and scalability
Centralized Access Control Systems
RADIOS and TACACS+(Terminal Access Controller Access-Control System Plus)
Authentication Methods
By knowledge (knows); by possession (has); by characteristic (is); and geolocation (where)
Single - factor authentication
user id and password
Two - factor authentication
user id, password, and fob
Three - factor authentication
user id, password, fob, and biometric
Secure passwords
typically hashed; a hash function takes an arbitrary amount of data as input and, through the use of a mathematical algorithm, will produce a unique, fixed-length representation of the data as output. Hash is a one-way function.
Authentication by Posession
Asynchronous token - challenge response technology; sychronous is based on an event, location, or time based sychronization between the requestor and the authenticator
Memory Card
Holds information but cannot process information. e.g users swipes card and enters a PIN. Data stored on the card is not protected.
Smart Card
Embedded semiconductor chip that accepts, stores and sends information.ICC (integrated circuit card). Based on ISO 7816-2 there are 8 electrical contacts - six are currently used. Can be used in Proximity of a reader.
Biometrics
Physical (finger print) and behavioral (voice pattern). Most common -finger prints. tend to provide higher security than other methods - higher strength
Hand Geometry
tension in the tendons, temperature, finger length, bone length, and hand width.
Palm Scans
combination of hand geometry and fingerprint analysis
Face Individuality
Iris, Retina (blood vessels back of the eye), entire face (facial geometry and heat signatures