Old - Domain 1: Access Control Flashcards
Subject
An active entity on an information system.
Object
A passive data file.
Discretionary Access Control (DAC)
Gives subject full control of objects they have been given access to, including sharing the objects with others.
Mandatory Access Control (MAC)
System-enforced access control based on subject’s clearances and object’s labels.
Role-based Access Control (RBAC)
Subjects are grouped in to roles, and each defined role has access permissions based upon the role, not the individual.
Purpose of Access Control?
To protect the confidentiality, integrity, and availability of data.
Opposite of CIA?
Disclosure, Alteration, Destruction (DAD)
Honeywell’s SCOMP, Purple Penelope, and Linux Intrusion Detection System (LIDS) are all examples of what type of access control system?
Mandatory Access Control (MAC) – List examples.
Examples of Non-discretionary Access Control?
Role Based Access Control
Task Based Access Control
–Are examples of what type of access control?
RBAC has what rules?
- Role assignment
- Role authorization
- Transaction authorization
What are the 3 primary models for access control?
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Non-discretionary Access Control (Such as RBAC)
Access provisioning lifecycle: Name the steps IBM has outlined.
- Password policy compliance checking.
- Notifying users to change pwd before it expires.
- Identifying lifecycle changes (ex: inactive accounts).
- Identifying new accounts that haven’t been used for 10 days after creation.
- Identifying accounts that can be deleted (ex: suspended for 30 days).
- Identifying all accounts belonging to a business partner or contractor and revoking access when no longer required.
Access aggregation (authorization creep)
Occurs as individual users gain more access to more systems. (sometimes through role or duty changes)
RADIUS
Remote Authentication Dial-In User Service
According to RFC 2865 RADIUS supports what codes?
- Access-Request
- Access-Accept
- Access-Reject
- Accounting-Request
- Accounting-Response
- Access-Challenge
- Status-Server (Experimental)
- Status-Client (Experimental)
Name the protocols & ports used by RADIUS.
UDP ports 1812 (authentication) & 1813 (accounting)
Formerly used 1645 (authentication) & 1646 (accounting)
Name the RFCs that RADIUS is described in.
RFC 2865 & 2866
RADIUS request and response data is carried in?
Attribute-Value Pairs (AVPs)
Diameter
Successor to RADIUS, designed to provide an improved AAA framework.
Differences between Diameter & RADIUS?
- Radius uses 8 bits for AVP field, Diameter uses 32 bits.
- Diameter uses single server to manage policies for many services, as opposed to RADIUS which requires many.
- Diameter uses TCP, RADIUS uses UDP.
Name the RFC that Diameter is described in.
RFC 3588
TACACS
The Terminal Access Controller Access Control System
TACACS ports?
UDP port 49 (may also use TCP)
RADIUS or TACACS+ more secure?
Radius encrypts only password, all other data is unencrypted. TACACS+ encrypts all data below TACACS+ header, so it is more secure then RADIUS.
TACACS+ port?
TCP port 49
Name RFC that PAP is described in.
RFC 1334
PAP
Password Authentication Protocol (not a strong authentication method)
CHAP
The Challenge Handshake Authentication Protocol
Name the RFC that CHAP is described in.
RFC 1994
Advantage of CHAP over PAP?
CHAP uses a shared secret that is known only to the authenticator and peer. This isn’t passed over the network so it can’t be captured using a sniffer.
Name the RFC that describes the Kerberos Authentication Protocol (Microsoft).
RFC 1510
Trust (nontransitive)
Trust relationship exists only between two trust partners.
Trust (transitive)
Trust relationship exists between two partners and all of their partners.
Labels
Applied to objects in MAC.
Clearances
Applied to subjects in MAC.
Object labels used by many world governments?
Confidential, Secret, Top Secret.
Additional labels used by government?
- Unclassified (data that is not sensitive)
- Sensitive but unclassified (SBU)
- For official use only (FOUO)
- Sensitive compartmented information (SCI) - these compartments require a documented and approved need to know in addition to a normal clearance such as top secret.
Labels used by private sector companies?
- Internal use only
- Company proprietary
Rule-based access control
System that uses a series of defined rules, restrictions, and filters for accessing objects.
Types of access control
- Preventative
- Detective
- Corrective
- Recovery
- Deterrent
- Compensating
Categories that each access control type can fall in to?
- Administrative
- Technical
- Physical
Preventative controls
Access control type that stops actions from occurring.
Detective controls
Access control type that alerts during or after a successful attack.
Preventative control examples?
- Physical - lock, mantrap
- Technical - firewall
- Administrative - Pre-employment drug screening
Detective control examples?
Physical - CCTV, light
Technical - IDS
Administrative - Post-employment random drug screenings.
Corrective controls
Access control type that works by correcting a damaged system or process.
Recovery controls
Access control type that is used to restore functionality to a system or organization after a security incident.
Deterrent controls
Access control type that discourages users from performing actions on a system.
Compensating controls
Access control type that is an additional security control put in place to make up for weaknesses in other controls.
Types of authentication methods?
Type 1 (something you know) Type 2 (something you have) Type 3 (something you are) Type 4 (someplace you are)
Four types of passwords?
- Static passwords
- Passphrases
- One-time passwords
- Dynamic passwords
Static passwords
Reusable passwords that may or may not expire.
Passphrases
Long static passwords, comprised of words in a phrase or sentence.