Lesson 6: Implementing Identity and Access Management Controls Flashcards
access control system
set of technical controls that govern how subjects may interact with objects
subjects
users, devices, or software processes, or anything else that can request and be granted access to a resource
objects
- resources
- examples:
- networks
- servers
- databases
- files
Access Control List (ACL)
- basis of access control
- list of subjects and rights or permissions they have been granted on the object
Identity and Access Management (IAM)
four main processes:
- Identification
- creating an account or ID that identifies the user, device, or process on the network
- associates a particular user (or software process) with an action performed on a network system
- vital first steps in access control process
- Authentication
- proving that a subject is who or what it claims to be when it attempts to access the resource
- that someone or something is not masquerading as a genuine user
- vital first steps in access control process
- Authorization - determining what rights subjects should have on each resource, and enforcing those rights
- Accounting - tracking authorized usage of a resource or use of rights by a subject and alerting when unauthorized use is detected or attempted
non-repudiation
user should not be able to deny what s/he has done
account
consists of an identifier (must be unique), credentials, and a profile
Security Identifier (SID) string
- account is actually defined on this system
- if the user account was deleted and another account with the same name subsequently created, the new account would have a new SID and, therefore, not inherit any of the permissions of the old account
issuance (or enrollment)
means processes by which a subject’s credentials are recorded, issued, and linked to the correct account, and by which the account profile is created and maintained
issues of issuance (or enrollment)
- identity proofing - verifying that subjects are who they say they are at the time the account is created
(Websites that allow users to self-register typically employ a CAPTCHA (Completed Automated Public Turing Test to Tell Computers and Humans Apart - a CAPTCHA is usually a graphic or audio of some distorted letters and digits) - ensuring only valid accounts are created
- secure transmission of credentials
- revoking the account if it is compromised or no longer in use
two techniques to mitigate confusion of digital identities
- password reset - automating the password reset process reduces the administration costs associated with users forgetting passwords but making the reset process secure can be problematic
- single sign-on - this means that all network resources and applications accept the same set of credentials, so subject only needs to authenticate once per session
something you know authentication
- username
- password
- passphrase (longer password comprising several words, advantages of being more secure and easier to remember)
- Personal Identification Number (PIN)
- account reset mechanisms:
- challenge questions
something you have authentication
- smart card
- USB token
- key fob
- digital certificate
concerns:
- cryptographic access control technologies are subject to loss and theft
something you are authentication
- employ some sort of biometric recognition system
- fingerprint
- iris or retina recognition
- facial recognition
- template: the chosen biometric information scanned and recorded in a database
main problems:
- users can find it intrusive and threatening to privacy
- technology can be discriminatory or inaccessible to those with disabilities
- setup and maintenance costs to provision biometric readers
- vulnerability to spoofing methods
something you do authentication
- refers to behavioral biometric recognition
- analyzes a behavior such as typing or writing a signature, variations in speed and pressure
somewhere you are authentication
- location-based authentication measures some statistic about where you are:
- Global Positioning System (GPS) or indoor Position System (IPS): this could be a geographic location, measured using a device’s location service
- IP address or geolocation
- VPN gateway
multifactor authentication
- combines use of more than one type of something you know/have/are (multifactor)
- two-factor authentication (2FA): combines something like a smart card or biometric mechanism with something you know, such as a password or PIN
- three-factor authentication combines all three technologies, or incorporates an additional location-based factor
mutual authentication
- security mechanism that requires that each party in a communication verifies each other’s identity
- shared secret (configured on both server and client)
- prevents:
- client from inadvertently submitting confidential information to a non-secure server
- helps in avoiding Man-in-the-Middle and session hijacking attacks
LAN Manager (LM or LANMAN)
challenge/response authentication protocol; this means that the user’s password is not sent to the server in plaintext
NTLM authentication
- designed to work over trusted local network
- password is Unicode and mixed case and can be up to 127 characters long
- the 128-bit MD4 hash function is used in place of DES