Microsoft Windows Security Architecture Flashcards
Security Architecture - Security Reference Monitor:
The SRM defines the access token data structure, performs access control on objects, manipulates privileges and emits audit records
Security Architecture - Local Security Authority:
The LSA subsystem is a user-mode process and maintains the local system security policy
Security Architecture - LSASS Policy Database:
Loaded from the registry, includes Active Directory and server trust settings and access rights, will also contain domain logon keys
Security Architecture - Security Accounts Manager:
The SAM service manages local user and group names
Security Architecture - Active Directory:
When running, operates in the LSASS process alongside the SAM and LSA
Security Architecture - Authentication Packages:
Extensions to basic authentication mechanisms, will run in the LSASS context and act as an authentication provider to the remainder of LSASS
Security Architecture - Winlogon:
The interactive login user-mode component responding to the System Attention Sequence (SAS) and creating a user’s first process
Security Architecture - LogonUI:
The Logon User Interface is a user-mode process presenting a visual interface for authentication, but interfaces with different credential providers
Security Architecture - Credential Providers:
COM objects running within the LogonUI process once Winlogon has triggered LogonUI after a SAS event
Security Architecture - Netlogon:
Sets up a secure channel to an Active Directory or legacy Domain Controller for interactive authentication
Security Architecture - KSecDD:
The Kernel Security Device Driver is a library of components implementing local procedure call interfaces to other kernel-mode security components, e.g. The Encrypting File System
The object-based design of Windows allows handling of most entities within the operating system as objects…
This includes all system resources exposed to user mode. Objects are accessed via the Object Manager, which maintains name spaces and handles, the latter on a per-process basis. Any access requires the specification of desired access privileges on handle creation.
Windows Security Identifiers (SIDs) are unique…
On installation each machine is issued with a SID. Accounts and other derivative entities are then derived from this source SID. N case of domain accounts, the relative security identifiers (RIDs) are based on that of the domain controller. Some RIDs are pre-defined for special roles and groups, these are well known SIDs
Machines can be cloned, although for proper operations…
The SID will need to be adjusted after cloning
Winlogon creates a unique ephemeral SID for each interactive login session, called a logon SID…
This can be used to generate a unique access token, which is then tied to the interactive window station and desktop. The SID for a logon session is fixed, but the RID is randomly generated