Domain 5 Identity and Access Management (IAM) Flashcards
Control of Physical Access to Assets
Physical access control represents the tangible layer of security, focusing on measures that restrict unauthorized access to an organization’s facilities, equipment, and resources.
Information:
Ensuring secure storage and handling of sensitive documents is paramount. Hospitals might use locked cabinets to store patient records, employing shredding protocols for no longer needed documents.
Systems:
Access to computers and servers can be restricted through locked rooms, cabinets, or cages. Data centers might employ biometric scanners, limiting entry solely to authorized personnel.
Devices:
Security measures for portable devices like laptops and mobile phones are essential. Corporations might use cable locks for laptops in shared spaces or store them in locked cabinets when not in use.
Facilities:
Implementing access control systems, such as card readers or security personnel, is vital. Research laboratories might utilize retina scanners, ensuring only authorized scientists can enter sensitive areas.
Control of Logical Access to Assets
Logical access control, in contrast, focuses on the virtual realm, securing digital assets by managing user access and permissions within IT systems.
Information:
Implementing access controls on databases and file systems is vital. Banks might limit access to customer financial data based on employee roles, ensuring that only authorized staff can view sensitive information.
Systems:
Employing security controls like firewalls and intrusion detection systems is essential. Ecommerce companies might deploy advanced firewalls, preventing unauthorized access to internal networks.
Devices:
Enforcing device security policies such as password protection and encryption is crucial. Government agencies might uphold strict encryption standards on mobile devices to protect classified information.
Applications:
Managing user access within applications ensures role-appropriate access. Universities might configure student information systems so that professors can access only the grades and attendance records relevant to their courses.
Understanding Access Control Models
Access control models are the architectural blueprints for managing and securing access to an organization’s resources. These models articulate the principles and mechanisms that define how permissions are granted, ensuring that users can only access the data and resources necessary for their job functions.
Discretionary Access Controls (DAC)
Discretionary access controls empower resource owners to determine who has access to their resources and to what extent. In the DAC model, users can grant or revoke permissions for other users at their discretion.
Example: In a shared file system within a collaborative research project, a lead scientist with the necessary permissions can grant read or write access to specific files or folders to other team members, tailoring access based on individual responsibilities.
Mandatory Access Controls (MAC)
Mandatory access controls enforce access based on predefined security policies and classification levels. The MAC model is rigid, allowing access only to those with the appropriate security clearance and need-to-
know basis.
Example: In a government agency handling classified information, a user with “Secret” clearance can access only “Secret” or lower documents. Access to “Top Secret” documents is restricted, maintaining the integrity of sensitive information.
Nondiscretionary Access Control (Role-Based Access Control or RBAC)
Nondiscretionary access control assigns permissions based on users’ roles within an organization rather than their identities. The RBAC model grants access based on job responsibilities and functions.
Example: In a hospital’s patient management system, nurses are granted access to patient medical records, while administrative staff members are granted access to billing information. Each role has specific permissions, aligning access with job functions.
Rule-Based Access Controls
Rule-based access controls enforce access permissions based on predefined rules or conditions, such as time of day, location, or network conditions.
Example: A financial institution might implement a rule-based access control policy that allows traders to access certain internal trading platforms only during market hours or from secure trading floors.
Content-Dependent and Context-Dependent Access Controls
Content-dependent access controls grant or deny access based on the content of the resources accessed. At the same time, context-dependent access controls consider the context in which the access request is made.
Example: A content-dependent policy in a law firm might restrict access to legal documents based on their confidentiality level. A context-dependent policy might grant access to specific resources only when a lawyer is connected to the firm’s secure network using a firm-issued device.
The landscape of access control models is diverse and nuanced, reflecting the complexity of modern organizational structures and technological environments. Understanding these models is more than a theoretical exercise; it is a practical necessity for securing an organization’s resources.
Identity Management (IdM) Implementation
Identity Management involves creating, maintaining, and validating unique user identities across an organization. IdM implementation is the bedrock of access control, ensuring that users are accurately identified and authenticated.
Example: In a multinational corporation, IdM might include a centralized directory service that manages employee identities, roles, and permissions, ensuring consistency and security across global operations.
Single-factor authentication
Single-factor authentication relies on one method, such as a password or PIN. While simple, it can be vulnerable to attacks.
Multifactor authentication
Multifactor authentication combines two or more factors (e.g., something you know, something you have, and something you are) to provide a higher level of security. These factors are typically categorized into
Something you know (knowledge-based factors):
These are pieces of information that the user must know to authenticate, such as passwords, PINs, or answers to security questions.
Something you have (possession-based factors):
These are physical devices or objects the user must have to authenticate, such as a security token, smart card, or mobile phone with an authentication app.
Something you are (inherence-based factors):
These are biometric characteristics unique to the individual, such as fingerprints, facial recognition, or voice patterns.
Somewhere you are (location-based factors):
This newer category includes the user’s location as a factor, such as a specific geographical location verified through GPS.
Something you do (behavior-based factors):
This includes the unique ways in which a person interacts with a system, such as typing rhythm or mouse movement patterns.
Accountability
Accountability in information security is the mechanism that ensures users are held responsible for their actions within a system.