-
Access Control Overview
-
Access
- The transfer of information from an object to a subject
-
Subjects
- active entities that seek information about or data from passive entities, or objects
-
Objects
- entity that provides or hosts information
-
Types of Access Control
-
Confidentiality
- ensures that only authorized subjects can access objects
-
Integrity
- unauthorized or unwanted changes to objects are denied
-
Availability
- addresses the ability to obtain access within a reasonable amount of time upon request
-
Access controls categories:
-
Preventive access control
- to stop unwanted or unauthorized activity from occurring
-
Directive access control
- to direct or control the actions of subjects to force compliance with security policies
-
Detective access control
- to discover unwanted or unauthorized activity
-
Corrective access control
- to restore systems to normal after an unwanted or unauthorized activity has occurred
-
Deterrent access control
- to discourage violation of security policies
-
Compensation access control
- to aid in enforcement and support of security policy
-
Recovery access control
- to repair or restore resources, functions, and capabilities after a violation of security policies
-
Administrative access controls
- policies and procedures to implement and enforce overall access control
-
Logical/technical access controls
- hardware or software mechanisms used to manage access
-
Physical access controls
- physical barriers deployed to prevent direct contact with systems or areas
-
The Process of Accountability
-
Identification
- process by which a subject professes an identity
-
Authentication
- Type 1 (something you know)
- Type 2 (something you have)
- Type 3 (something you are)
- “ Something ” and “ Somewhere ”
- Multiple Factor Authentication
-
Authorization
- ensures that the requested activity or object access is possible
-
Auditing and Accountability
- the process by which online activities of user accounts and processes are tracked
-
Identification and Authentication Techniques
-
Passwords
-
Risks
- sniffing
- Brute - force and dictionary attacks
- dictionary attack
- brute - force attack
- hybrid attack
- social - engineering attack
-
Improve
- encryption
- Use password verification tools
- Disable idle user accounts
- train users
- change passwords regularly
- Longer password
- compromised password should be changed
- Hand out passwords in person
-
Biometrics
- Fingerprints
- Face scans
- Retina scans
- Iris scans
- Palm scans
- Hand geometry
- Heart/pulse patterns
- Voice pattern recognition
- Signature dynamics
- Keystroke patterns (keystroke dynamics)
-
Tokens
- Static tokens
- Synchronous dynamic password tokens
- Asynchronous dynamic password tokens
- Challenge - response tokens
-
Tickets
- a mechanism that employs a third - party entity to prove identification
-
Single Sign - On
-
a mechanism that allows a subject to be authenticated only once on a system
-
Kerberos
- authentication protocol that can be used to provide a single sign
-
Directory Service
- centralized database of objects and info about subjects
-
Access Control Techniques
-
Discretionary Access Controls
- allows the owner of an object to control and define which subject to access that object
-
Nondiscretionary Access Controls
- a set of rules defines what can and cannot occur on the system
-
Mandatory Access Controls
-
rely upon the use of classification labels (top secret, secret, confidential, sensitive but unclassified (SBU), and unclassified)
- Hierarchical environments
- Compartmentalized environments
- Hybrid environments
-
Role - Based Access Control
- define a subject's ability to access an object via subject roles (Tasks, Job Descriptin)
-
Lattice - Based Access Controls
- define upper and lower bounds of access for every relationship between a subject and an object
-
Access Control Methodologies and Implementations
-
Methodologies
- Centralized access control (all authorization verification is performed by a single entity)
-
Implementations
- Decentralized (RADIUS and TACACS)
-
Access Control Administration
-
three main responsibilities:
- User account management
- Activity tracking
- Access rights and permissions management
- The Principle of Least Privilege
- Need - to - Know Access
-
Users, Owners, and Custodians
- user: is any subject who accesses objects
- owner: responsible for classifying ,labeling objects and protecting and storing data
- Custodian: is a subject who responsible for properly storing and protecting objects
- Separation of Duties and Responsibilities