Domain 1 Access Control Vocab Flashcards
Discretionary access control
gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.
Mandatory access control
system enforced access control based on subject’s clearances and object’s labels.
Role-based access control
subjects are grouped into roles, and each defined role has access permissions based upon the role, not the individual.
CIA Triad
confidentiality, integrity, and availability.
Confidentiality
seeks to prevent the unauthorized disclosure of information; it keeps data secret. In other words, confidentiality seeks to prevent unauthorized read access to data.
Integrity
seeks to prevent an authorized modification of information. In other words, integrity seeks to prevent unauthorized write access to data. There are two types of integrity: data integrity and system integrity. Data integrity seeks to protect information against unauthorized modification; system integrity seeks to protect a system such as Windows 2008 server operating system from unauthorized modification.
Availability
ensures that information is available when needed. Systems need to be usable for normal business use. An example of an attack on availability would be a denial of service attack.
DAD
Disclosure, Alteration, and Destruction. The opposing force to the CIA Triad.
AAA
Authentication, Authorization, and accountability. Identification is understood with all three.
Subjects, objects, access permissions
Three important access control concepts.
Subjects
Entities that may be assigned permissions.
Objects
Types of resources that subjects may access.
Access permissions
Relationships between subjects and the objects they may access.
Four phases of access control.
Identification, authentication, authorization, accounting
Identification
User makes a claim as to his or her identity.
Authentication
User proves his or her identity using one or more mechanisms. Providing an identity claim.
Authorization
System makes decisions about what resources the user is allowed to access and the manner in which they may be manipulated. Allowing authenticated subjects access to a system
Accountability
System keeps an accurate audit trail of the users activity.
Non-Repudiation
a user cannot deny (repudiate) having performed a transaction. Authentication with integrity
Defense in Depth or Layered Defense
applies multiple safeguards or controls to protect an asset. Multiple controls will increase your chances of security.
Subject
an active entity on an information system.
object
a passive data file.
Three types of access control models
MAC, DAC, NDAC (RBAC),
Mandatory access control (MAC)
Authorization of the subjects access to an object depends on labels which indicate a subjects clearance and the classification or sensitivity of the related object
Discretionary access control (DAC)
Access control type where the subject has authority to specify what objects can be accessible.
Non-discretionary access control (NDAC) also known as role based access control (RBAC)
Access control type where the Administrator determines which subjects can have access to certain objects based on an organizations security policy.
Task based access control
based on the tasks that each subject must perform. Focus on tasks rather than roles.
Content and Context-based access controls
adds additional criteria beyond identification and authentication: the actual content the subject is attempting to access.
Centralized access control
concentrates access control in one logical point for a system or organization.
Decentralized access control
allows IT admin to occur closer to the mission and operations of an organization.
Access Aggregation
Occurs as individual users gain more access to more systems. Authorization creep - gaining more entitlements without shedding the old ones.
RADIUS
Access Control Protocol. Remote Authentication Dial In User Service. Third party authentication system. Request for Comments 2865 and 2866. User Datagram Protocol ports 1812(authentication) 1813(accounting). AAA system comprised of three components: Authentication, authorization, and accounting. Request and response data is carried in Attribute-Value Pairs (AVPs).
Diameter
Successor to RADIUS. Uses Attribute-Valued Pairs but supports more. Used 32 bits. Uses single server to manage policies for many services.
TACACS and TACACS+
Terminal Access Controller Access Control System. Centralized access control system that requires users to send an ID and static reusable password for authentication. Uses UDP port 49 and may also use Transmission Control Protocol. TACACS+ is not backward compatible. TACACS+ encrypts all data below the header.
Labels
These are the security level assigned to objects - confidential, secret, top secret.
Clearance
a determination by senior security professional about whether a subject can be trusted to have access to objects with labels. Can you be trusted to access classified data.
Least Privilege
users should be granted the minimum amount of access (authorization) required to do their jobs, but no more. Need to know is more granular than lest privilege, as the user must need to know that specific piece of information before accessing it.
Separation of Duties
aka segregation of duties. Allows for an organization to maintain checks and balances among the employees with privileged access. No one person has total control over sensitive transactions.
Rotation of Duties
a process that requires different staff members to perform the same duties. Helps to mitigate collusion.
Formal Access approval
Documented approval from the data owner for a subject to access certain objects, requiring the subject to understand all the rules and requirements for accessing data and consequences should the data become lost, destroyed, or compromised.
Need to Know
Does the user need to know the specific data he may attempt to access. Based on each individual object.
Rule based access control
system uses a series of defined rules, restrictions, filters for accessing objects within a system. The rules form if/then statements
Access control list (ACL)
Contains access control entities (ACEs) that correspond to access permissions.
Six types of access controls.
Preventative, detective, corrective, recover, deterrent, compensatory
Preventative controls
Controls designed to prevent unwanted activity from occurring.
Detective controls
Type of controls that provide a means of discovering unwanted activities that have occurred.
Corrective controls
Controls that are mechanisms for bringing a system back to its original state prior to the unwanted activity.
Recovery
After a security incident, recovery controls may have to be taken in order to restore functionality to the system or organization
Deterrent controls
Control type used to discourage individuals from attempting to perform undesired activities.
Compensatory controls
Control type implemented to make up for deficiencies in other controls.
Credential Set
term used for a combination of both identification and authentication of a user
Three authentication factors.
Something you know, something you have, something you are
Passwords
The most commonly implemented authentication technique. Something you know.
Static password token
Token type where the owner authenticates himself to the token and the token authenticates the owner to the system.
Four different kinds of tokens
Static password, synchronous dynamic password, asynchronous dynamic password, challenge-response token
Static password
Reusable passwords that may or may not expire. They are typically user generated and work best when combined with another authentication type, such as a smart card or biometric control.