- CISSP
Certified Information Systems Security Professional (CISSP) certification
-
Access Controls
- Who can access & Control Resources
- First Line of Defense - Securing the organisations resources
- Protection against unauthorised access
-
1.User is correctly Identified
- Username and password is a form of access control
-
2. Authenticated
-
3. Authorized to Access Resources
- 4. User is Accountable for all the tasks performed using the resource
-
Authentication
- matching credentials stored in system with what is provided by the user
- Effective Authorization
-
3 types
-
1. Something you KNOW
- Easy
- Inexpensive
- Not Very Secure
- Passwords, PIN, lock combinations, pass phrases, personal information : favourite color, mothers maiden name
- easy to guess
- may be disclosed to others
- may be discovered through dictionary or other attacks types
- Knowledge-based
- Passwords
- A system may provide a default password
- a system may generate password
- System and a token card may generate a password for a user
- User may select a password
- Techniques
- password checkers
- Tools
- dictionary or brute force attacks
- Detect weak user-chosen passwords
- if detected
- reduce vulnerability
- force making them more secure
- Password generators
- software or hardware devices
- generate passwords
- prevent too easy passwords
- Password Aging
- configuring password to expire
- Attempt Thresholds
- Hashing and Encryption
- Cognitive Passwords
- OTP
- One-Time-Passwords
-
2. Something You HAVE
- Expensive
- Fairly secure
- Can be lost or stolen
- Smart cards, token devices, memory cards
- Can specify location
-
3. Something you ARE
- High level of security
- expensive
- Prone to false positives or negatives
- falsely accept or reject samples
- fingerprints, voiceprints, retina and iris patterns to stored patterns
-
Multifactor authentication
- increases security with more than one type of authentication
-
two-factor
- ATM card
- Something you have and something you know (PIN)
-
Three-Factor
- all three types
- highest level of security
- Examples
- Access a network resource
- password, token and fingerprint
- Location access
- PIN, Driver's License and a voice Sample
-
Performance
-
FRR
- False Rejection Rate
- % of Subjects a system falsely rejects
- Biometric Authentication
- increases with increasing system sensitivity
-
FAR
- False Acceptance Rate
- % of invalid subjects a system falsely accepts
- Biometric authentication
- decreases with increasing system sensitivity
-
CER
- Crossover Error Rate
- Gives the rate at which FRR equals FAR
- Compare the overall accuracy of different authentication devices
- Lower value = greater accuracy
-
Metrics
- Enrolment time
- time taken to register biometric characteristics
- Throughput rate
- rate at which a system identifies, authenticates and processes users
- Acceptability
- user acceptability of the system based on privacy and ease of use
-
Authorization
- System checks the rights to the user and permissions granted
-
Effective Authorization
-
Least Privilege principle
- Minimum set of priviledges to do their job
-
Need to Know principle
- Only assign users information to do their job
- Minimizes the number of subjects with access to specific resources
- Reduces the risk in breach in security
-
Compartmentalization principle
- process thats separates specific groups to prevent flows of information moving between groups
-
Security Domains
-
Correct Identifications of Roles
- need to know
- Role of User(s)
- Data Owners
- Classify data
- determine access controls for proper data handling
- Subtopic 3
- Custodians
- take care of data backups
- Instructions provided by the Data Owners
- Subjects assigned to these roles
-
Separation of Duties and responsibilities
- Ensures no single individual is solely responsible for performing a set of transactions
- Ensures less error
- Ensures no fraud
-
Entitlesments
- Entitlements are the resources available to a user and the authoritative rights that the user has within the department or organisation
-
Accountability
-
Ensuring Accountability
- recording activities
- System-Level Events
- Application-Level Events
- User-Level Events
-
Log Files
- Can help detect
- intrusions
- reconstruct events
- produce problem reports - assist in recovery
- Audit Trails
-
Confidentiality
-
protected from
- unauthorized access
- unauthorized disclosure
-
Specifies
- who can access the information
- What actions can be performed after accessing it
-
Access controls
- Encryption
- Transmission protocol
-
Integrity
- ensures information is complete , accurate
- Protected against unauthorized modifications
-
Availability
- Subjects need information and resources to be available promptly.
-
Control Mechanisms
- Fault Tolerance
- ensure availability of resources
- Recovery
- ensure availability of resources
-
Revoke Access
- Employee leaves an organization
-
Information entering a system is detected as Hostile
- access rights of the source of the information must be dynamically revoked
-
TYPES
-
Administrative
-
Security Policies and Procedures
- high-level plan for implementing security
- Identifying unacceptable Actions based on level of Risk an organization can accept
-
Personnel Controls
- what is expected of employees when using organizational resources and the consequences of noncompliance
- Organizational hierarchy
- which employees should report to and who is held responsible for employee's actions
-
Security Awareness Training
- helps educate employees about access control usage
- minimize unintentional breaches in access control
-
Periodic Testing of Controls
- helps check access control effectiveness in supporting the security policy of an organization
-
Techniques
- Hiring practices
- background Checks
- Termination practices
- revoking user accounts
- revoking network permissions
- Classification of data based on the level of sensitivity
- Supervision of employees
- tracking of employee activities
- Separation of Duties
- no single individual is solely responsible for a task
- Rotation of Duties
- limit the time for which individuals are assigned to particular tasks
- minimize potential for COLLUSION
-
Technical
- or LOGICAL controls
- Software tools that restrict access to objects and insures confidentiality, integrity and availability
-
Part of
- Applications
- Operating Systems
- Devices
- Protocols
- Encryption
- Add-on Security Packages
-
Discretionary Access Control Architecture
- how resources are accessed on a system
-
Network Access Control
- determine which subjects can enter a network and what actions they can perform AFTER authentication
- Network Segmentation
- Entities on a Network
- Routers
- Switches
- NICs
- Bridges
-
Encryption and Protocols
- Ensure Confidentiality and Integrity of Information flowing within the network
- Only Authorized users have access
- Unauthorized modifications dont occur
-
Control Zones
- Protect Network devices
- from emitting electrical signals so CONFIDENTIAL information doesnt leak out through airwaves
-
Software-based auditing controls
- track activities within a network or computer
- help identify security breaches
-
TECHNOLOGIES
- Controlled User Interfaces
- restrict network access to authorized users only
- Passwords
- User Authentication
- Tokens
- OTP
- One-Time-Passwords
- Change after every use
- Firewalls
- Filter Information
- Routers
- Connect Networks
- Transmission of information
- Provide Content Filtering
- Anti-Virus software
- detect and protect against viruses
- ACL- Access Control Lists
- list of subjects and their access permissions
- help prevent the unauthorized access of resources
- IDS - Intrusion Detection Systems
- detect unwanted data modifications
- detect malicious network traffic occurring due to hacker attacks
- Smart Cards
- Semiconductor chips
- Accepts, Store and Transmit Information
- Help in User Identification
- Biometrics
- Identify and Authenticates Users
- Analyse physical attributes and behaviours
- Examples
- Keyboard Dynamics
- Facial Scans
- Handgeometry
- Fingerprints
- Voice Patterns
- Retina
- Iris Patterns
- Signatures
-
Physical
-
Network and Work-Area Segregation
- Enforces Access controls on Entry & Exit to the Network or Area
-
Perimeter and Computer Security Controls
- help protect individuals, facilities and components within facilities
-
Cable Control
- prevent Theft
- prevent copying of information
-
Data Backups
- help ensure information access in case of system failures or natural disasters
-
Techniques
- Guards and Guard Dogs
- Fences
- Motion Detectors
- Door and Window Locks
- Cable Sheaths
- Prevent electrical interference
- Prevent Crimping and sniffing
- Computer Locks
- Swipe Cards and Badges
- Video Cameras
- Alarms
-
Access Control Layers of an Object
-
Information Classification
- classify information by EVALUATING its Risk Level
- Assets of little value get only basic protection
- High-sensitive assets receive high levels of protection
-
3 Critical Activities
-
1. Establish Program
- information classification program
- create an infrastructure for the program
- 1. Objectives
- Document Objectives
- Define Vision
- Help describe the program to others
- Provide Benchmarks which you can evaluate the program
- 2. Executive Manager
- Top-Manager backing and support
- without support program is likely to fail
- Illustrate to management both financial and business cost and benefits of the program
- 3. Information Classification Policy Documentation
- Work with Stakeholders to create an information classification policy
- Document should communicate WHY the organization needs to classify information
- What the requirements are
- Scope of users and system policy affects
- Users roles and responsibilities in implementing the program
- Should clearly describe the different classification for information
- 4. Process Flow Chart
- operational procedures
- Process flows
- Show how info must be classified
- How the different categories of information should be protected
- Identify Key Role Players
- Process Owners
- May be Custodians
- Application Owners
- Specify what data and resources are required for
- specific tasks
- roles
- Provide insight into the classification requirements of data within their functional areas.
- Identify Information owners and delegates
- Information Owners
- understand the information in their business areas
- responsible for deciding how the information should be used
- Owners may assign read, modify or delete permissions to information delegates so Information delegates can carry out operational decisions
- Identify Stakeholders
- understand relationship between
- System Owners
- Information Owners
- Application Owners
- If System owner and Information Owner are the same individual, the incentive to enhance system security is greatly increased
- Protection of Information assets is important here
- Classify Information and Applications
- need to define categories to use first
- Categories should be periodically reviewed
- in-line with organizational needs
- Categories
- 1. Public
- can be disclosed to general public
- No harm to company, partners, individuals
- Require no special protection
- 2. Internal Use
- info disclosed only inside the company
- could harm company if disclosed externally
- Must be protected from unauthorized external access
- 3. Confidential
- Information to stay within a single business Unit
- May cause serious harm if disclosed
- Must protect information within the business unit
- 4. Restricted
- Information that would cause irreparable damage if accessed by unauthorized personnel
- requires highest level of security
- Create a central repository for classification information
- Database
- data can be analysed from multiple perspectives
- Classification can be updated easily
- Develop Tools
- templates
- distributed to Data Owners
- collect Classification information on the data managed in their functional areas
- Once Collected should be in the DB central repository
- Ensure consistency for gathering data and for tracking and analyzing information
- results can be exported to a database for consolidation
- Database
- Train users
- Employees should be trained to ensure they understand the classification categories and know what procedures to follow
- Training program
- purpose of the program
- Why its important
- Practical examples
- different types of information
- How they should be handled
- Develop and implement auditing procedures
- include spot checks
- determine whether sensitive information has been left unguarded
- Reviews of current classifications
- Reviews of current protection measures
-
2. Labeling and Marking
- marking media
- marking the classification levels
- Ensures that those working with the data know what control measures to apply
- No Labelling
- can use business areas and locations to assign control measures according to the classification level of data
- Eg. a backup library may require a confidential level of control and a separate area may be used for restricted information.
-
3. Assurance
- obtaining assurance that classification is occurring correctly
- Periodic testing so control measure are correctly applied
- May involve random audits for checking that confidential data isnt left on desks or in insecure areas
- Encourage employees to report security breaches
-
Advantages
- helps establish ownership of information
- Provide central point of control
- Protection of sensitive data
- Increases C.I.A of information
- Improves employee awareness of security issues
- Supports business recovery by ID critical Info
- Reduces spending of unnecessary spending on security and inefficient storage of data
- helps to ensure compliance with requirements to protect confidential information
-
Job Requirements
- NAB Technology Secuirty Team
- Providing oversight and consultancy for overall security management and compliance within BPMO IT.
- Creating and assigning users rights including groups, directories and applications.
- Management, review and control of directory access (NetApp filers, NAS);
- Provision of second level support for user access to Citrix, file shares, directory mappings, user profiles, and application access issues.
- Review, control and compliance of the Global Security Administration function;
- Conduct regular compliance reviews (e.g. review of user access rights);
- Setup, maintenance and support of the Control-SA user provisioning tool;
- Management ongoing updates to the user access request / approval system (SARD);
- Promote, encourage and enforce segregation of duties and information security principles and policies
- Creating, verifying, and modifying new and existing user accounts for Windows, Unix, and other security applications.
- To be successful in this role, you will have the following skills and experience to bring to this role:
- Windows / Unix / Security technology related role
- Solid communication skills (i.e. ability to discuss / explain technologies) and provide a Service Delivery focus in addressing business requirements
- Experience liaising and explaining to Senior business and Technology users security problems, issues, restrictions and policies;
- Knowledge of exploits (i.e. viruses and other vulnerabilities);
- Practical knowledge in Windows, Active Directory and LDAP security (i.e. either as a Security Administrator or Windows / Unix Support experience).
- Experience in the use of Control-SA or equivalent user provisioning tools.
- Excel skills.
- Knowledge of other Identity Management products