Identity and Access Management Flashcards
Access Control Types (10)
- Preventative
- Detective
- Corrective
- Deterrent
- Recovery
- Directive
- Compensating
- Administrative
- Logical/Technical
- Physical
Preventative Access Control
thwarts or stops unwanted or unauthorized activity
Examples:
fences, locks, biometrics, mantraps, lighting, alarm systems, security cameras, CCTV, smart cards
separation of duties, policies, job rotation policies, data classification, pen-testing, access control, encryption auditing, callback procedures, security policies, security awareness training, antivirus software, firewalls, and intrusion prevention systems
Detective Access Controls
attempts to discover or detect unwanted or unauthorized activity - can only be discovered after the fact.
Examples:
security guards, motion detectors, recording and reviewing events by security cameras, CCTV,
job rotation policies, mandatory vacation policies, audit trails, honeypots/nets, intrusion detection systems, violation reports, supervision and review of users, and incident investigations
Corrective Access Control
modifies the environment to return systems back to normal after unwanted or unauthorized activity
Examples:
terminating malicious activity, rebooting a system, antivirus solutions (quarantine, isolation), backup and restore plans, IDS systems modifying environments to stop an attack in progress
Deterrent Access Control
attempts to discourage security policy violations - very similar to preventative controls, but relies on the individual to be dissuaded from taking the action
Examples: policies, security awareness training, locks, fences, security badges, guards, mantraps and security cameras
Recovery Access Control
attempts to repair or restore resources, functions and capabilities after a security violation - an extension of corrective controls but have more advanced capabilities
Examples: backups, restores, fault-tolerant drive systems, system imaging, server clustering, antivirus software, and database or virtual machine shadowing
Directive Access Control
attempts to direct, confine or control the actions of subjects to force or encourage compliance with security policies
Examples: security policy requirements or criteria, posted notifications, escape route exist signs, monitoring, supervision and procedures
Compensating Access Control
provides an alternative when it isn’t possible to use a primary control, or when necessary to increase the effectiveness of a primary control.
Example: A security policy might dictate the use of smart cards by all employees, but it might take a long time for new employees to get a smartcard. The org can issue hardware tokens to employees as a compensating control. Tokens provide a stronger auth than just username or password.
Administrative Access Controls
the policies and procedures defined by an org’s security policy and other regulations or requirements - sometimes referred to as management controls
Examples: policies, procedures, hiring practices, background checks, classifying and labeling data, security awareness and training efforts, reports and reviews, personnel controls, and testing.
Logical and Technical Controls
hardware or software mechanisms used to manage access and to provide protection of the
Smartcard
ID or badge with a circuit chip embedded in it and stores information of the authorized user’s identification and authentication
Usually contains a microprocessor and one or more certificate - used for asymmetric cryptography such as encrypting data or digitally signing email.
Tamper resistant
US government personnel:
CACs: common access cards
PICs: personal identity verification cards
Synchronous Dynamic Password Tokens
Time-based and synchronized with an authentication server
They generate a new password periodically, e.g. every 60 seconds
The token and the server must have accurate time
Common method is for a user to enter a username, a static password and the dynamic one-time password into a webpage
Asynchronous Dynamic Password Tokens
Does not us a clock - instead the hardware token generates passwords based on an algorithm and an incrementing counter > this creates dynamic, one-time password that stays the same until used for authentication
some tokens create a onetime password when the user enters a PIN provided by the authentication server into the token
Example: a user submits a user name and password to a webpage. After validation, the authentication system used the token’s identifier and incrementing counter to create a challenge number and sends it back to the user. The challenge number changes each time a user authenticates, so it is often called a NONCE (short for number used once). The challenge number will only produce the correct onetime passwork on the device belonging to the user > they enter the password into the website to complete authentication
HMAC
Hash Message Authentication Code
HOTP
HMAC-based-One-Time-Password
The HMAC includes a hash function used by the HOTP standard to create onetime passwords
It typically creates HOTP values of 6-8 numbers
Similar to the asynchronous dynamic passwords created by tokens
HOTP values remain valid until used
TOTP
Time-based One-Time Password
TOTP uses a timestamp and remains valid for a certain timeframe, such as 30 seconds
TOTP expires if the user doesn’t use within the timeframe
Similar to the synchronous dynamic passwords used by tokens
Iris Scans > Retina Scans
Iris is second most accurate, but it does not reveal health information and can be done from a distance
Con: it can be spoofed by really high quality pictures of the eye
Con: accuracy can be affected by light, glasses or contact lenses
Biometric Factor Error Ratings
Biometrics devices are rated for performance by examining the different types of errors they produce,
False Rejection Rate (FRR): a valid subject is not authenticated, Type 1 Error - when the biometric device is more sensitive
False Acceptance Rate (FAR): an invalid subject is authenticated, Type 2 Error - when biometric device is not sensitive enough
CER or ERR
Crossover Error Rate or Equal Error Rate
The point where the FRR and the FAR percentages are equal - this is used as the standard assessment value to compare accuracy of different biometric devices
Lower CER = more accurate
Device Fingerprinting
Users can register their devices with the organization and associate them with their user accounts
During registration, the authentication system captures characteristics about the device - usually via a webpage - and captures characteristics like OS, version, browser, fonts, plugins, time zone, storage, screen resolution, cookie settings and HTTP headers
When the user logs in, the auth system checks the user account for a registered device and verifies the characteristics - even though the characteristics can change, it’s pretty successful method
SecureAuth Identity Provider (IdP) is commonly used for device authentication