Video Content Lesson 2 Flashcards
Access Control
Protects data from unauthorized access
2 parts of CIA
Confidentiality - no unauthorized reads
Integrity - no unauthorized writes
Subject is an entity that requests access to data (active)
Object is an entity that contains or controls data (passive)
Least Privilege
Grant subjects only enough access to objects to perform required tasks
Goal is to limit “authorization creep”
Accidental authorization can be given to subject
Accountability
Log every access by a subject to an object or group of objects
Ensures subject to adhere to security policy
provides deterrent to unauthorized behavior
Access Controls
Use Controls as they provide a safeguard to protect an object from a threat
Object Controls are loosely organized into three groups
1-Physical Access Controls
2-Administrative Access Controls
3-Logical Access Controls
Physical Access Controls
Controls that limit physical access to hardware
Perimeter Security–fences, walls, limited access rooms, cable protection
shielding from emanations, cabling media choice (fiber optic–NO emanations)
conduit or other physical protection (protect cable)
Separation of duties and work areas–minimize “shoulder surfing”
keep single person from completing a sensitive process
Administrative Access Control
Set of rules/strategies Policies and Procedures Hiring Practices Policies Security Awareness Training Monitoring-validates processes
Logical Access Control
Technical controls
Object access restrictions (only allow access by authorized users)
Encryption (only allow authorized users to read data)
Network architecture/sergregation (use architecture to keep network segments separate)
Data Classification
Controls can be expensive
Only protect what must be protected
Data Classification (Identifies valuable data, satisfies legal or regulatory criteria, helps in choosing appropriate controls)
Classification Criteria
Value or usefulness
Age
Laws and Regulations
Personal association
Data Responsibility
1-Owner (member of middle/upper management and ultimate responsibility for data security)
2-Custodian (responsible for control implementation and maintenance)
3-User (Routinely uses data)
Commercial Data (Integrity and Availability)
1-Public
2-Sensitive
3-Private
4-Confidential
Government Data (Confidentiality)
1-Unclassified 2-Sensitive but Unclassified (SBU) 3-Confidential 4-Secret 5-Top Secret
Access Control Techniques
1-Control Types 2-Control Categories 3-Security Labels 4-Discretionary 5-Mandatory 6-Nondiscretionary 7-Access Control Lists
Access Control Types
Controls apply to threat events Preventative (avoid event) Detective (identify event) Deterrent (discourage event) Corrective (fix event) Recovery (restore)
Control Categories
Physical preventative control (badge/access card)
Technical preventative control (Database views, encryption, antivirus software)
Administrative detective control (policy, audit, logs)
Security Labels
Assign classification levels to objects and subjects
Subject must be at or above clearance level of object
Use of label in table
Discretionary
1-Discretionary Access Control (DAC) (identity-based access control, owner specifies who can have access to objects) this is most common access control in commercial arena
Mandatory
2-Mandatory Access Control (MAC) (rule-based access control, subjects clearance compared to objects security level)