Access Controls
Access Controls
Security Principles
Identification, Authentication, and Authorization Identification, Authentication, and Authorization are distinct functions.
Identification Authentication Authorization
Identity Management: A broad term to include the use of different products to identify, authenticate, and authorize users through automated means.
Identification
Identification
Method of establishing the subjects (user, program, process) identity.
Use of user name or other public information. Know identification component requirements.
Authentication Authentication
Method of proving the identity.
Something a person is, has, or does. Use of biometrics, passwords, passphrase, token, or other private information.
Authentication Biometrics
Verifies an identity by analyzing a unique person attribute or behavior (e.g., what a person is).
Most expensive way to prove identity, also has difficulties with user acceptance.
10
Authentication
Authentication
Passwords
User name + password most common identification, authentication scheme. Weak security mechanism, must implement strong password protections Implement Clipping Levels
12
Authentication
Passphrase
Is a sequence of characters that is longer than a password. Takes the place of a password. Can be more secure than a password because it is more complex.
14
Authentication
15
Authentication
Asynchronous
Authentication
18
Windows environment, know syskey modes. Salts: Random values added to encryption process for additional complexity.
19
Authentication
Cryptographic Keys
Use of private keys or digital signatures to prove identity
20
Authorization
Authorization
Determines that the proven identity has some set of characteristics associated with it that gives it the right to access the requested resources.
21
Authorization
22
Authorization
23
Authorization
24
Authorization Solutions that enterprise wide and single sign on solutions supply:
User provisioning Password synchronization and reset Self service Centralized auditing and reporting Integrated workflow (increase in productivity) Regulatory compliance
25
26
27
28
29
30
Access Control Techniques There are a number of different access controls and technologies available to support the different models.
Rule Based Access Control Constrained User Interfaces Access Control Matrix Content Dependent Access Control Context Dependent Access Control
31
33
Two types
Capability Table (bound to a subject) Access Control List (bound to an object)
34
Content Dependent Access Control: Access to an object is determined by the content within the object. Context Based Access Control: Makes access decision based on the context of a collection of information rather than content within an object.
35
First an organization must choose the access control model (DAC, MAC, RBAC). Then the organization must select and implement different access control technologies. Access Control Administration comes in two basic forms:
Centralized Decentralized
36
37
38
39
Access controls can be implemented at various layers of an organization, network, and individual systems Three broad categories:
Administrative Physical Technical (aka Logical)
40
41
Physical Controls
Network Segregation Perimeter Security Computer Controls Work Area Separation Data Backups Cabling Control Zone
42
43
Access Control Types Each control works at a different level of granularity, but can also perform several functions
44
45
Accountability Accountability is tracked by recording user, system, and application activities. Audit information must be reviewed
Event Oriented Audit Review Real Time and Near Real Time Review Audit Reduction Tools Variance Detection Tools Attack Signature Tools
46
Accountability
Other accountability concepts Keystroke Monitoring
Can review and record keystroke entries by a user during an active session. A hacker can also do this May have privacy implications for an organization
47
Access Control Practices Know the access control tasks that need to be accomplished regularly to ensure satisfactory security. Best practices include:
Deny access to anonymous accounts Enforce strict access criteria Suspend inactive accounts Replace default passwords Enforce password rotation Audit and review Protect audit logs
48
Emanation Security
Tempest White Noise Control Zone
49
Common Types
Intrusion Detection Intrusion Prevention Honeypots Network Sniffers
50
Rule Based
51
52
Honeypots
An attractive offering that hopes to lure attackers away from critical systems
Network sniffers
A general term for programs or devices that are able to examine traffic on a LAN segment.
53
Dictionary Attacks
Countermeasures include strong password policies, strong authentication, intrusion detection and prevention
Spoofing at Logon
Countermeasures include a guaranteed trusted path, security awareness to be aware of phishing scams, SSL connection
54