Thor Teaches Study Guide CISSP Domain 5
Thor Teaches Study Guide CISSP Domain 5
Thor Teaches Study Guide CISSP Domain 5
• Access Control:
• Our Access Control is determined by our policies, procedures, and standards.
• This outlines how we grant access whom to what:
• We use least privilege, need to know, and we give our
staff and systems exactly the access they need and no
more.
• Access control spans all the layers of our defense in depth model,
different permissions are granted to different subjects depending
on their need to access the systems or data and that adheres to
the procedures for that area.
• We covered some of the physical parts of access control in Domain
3’s Physical Security, how we use fences, locks, turnstiles, bollards,
...
• On the logical side we do this by implementing the access security models we talked
about in Domain 1, how we Identify, Authenticate, Authorize our subjects and how we
keep them Accountable (IAAA).
• We never use group logins or accounts; they have no accountability.
1|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Something you have - Type 2 Authentication (ID, Passport, Smart Card,
Token, cookie on PC etc.).
• Something you are - Type 3 Authentication (and Biometrics)
(Fingerprint, Iris Scan, Facial geometry etc.).
• Newer and less commonly used authentication factors:
• Somewhere you are - Type 4 Authentication: IP/MAC Address.
• Something you do - Type 5 Authentication: Signature, Pattern unlock.
• Multi-factor authentication requires authentication from 2 or more categories.
• Card and Pin, fingerprint and password qualify, but password and
username does not (both are something you know).
2|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Common and less secure passwords often contain:
• The name of a pet, child, family member, significant
other, anniversary dates, birthdays, birthplace, favorite
holiday, something related to a favorite sports team, or
the word "password".
• Winter2017 is not a good password, even if it does fulfil
the password requirements.
• Key stretching – Adding 1-2 seconds to password verification.
• If an attacker is brute forcing a password and needs millions of
tries it will become an unfeasible attack.
3|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• The keylogger calls home or uploads the keystrokes to a
server at regular intervals.
4|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Something you know - Type 1 Authentication:
• Password Management:
• We covered some password requirements, here are the official
recommendations by the U.S. Department of Defense and
Microsoft.
• Password history = set to remember 24 passwords.
• Maximum password age = 90 days.
• Minimum password age = 2 days (to prevent users from
cycling through 24 passwords to return to their favorite
password again).
• Minimum password length = 8 characters.
• Passwords must meet complexity requirements = true.
• Store password using reversible encryption = false.
5|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• It is their money; they actually care about keeping those
safe.
6|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• They say the employees are lining up for the technology.
• Employees who have the rice-grain-sized RFID chip
implanted between their thumb and forefinger can then
use it "to make purchases in their break room micro
market, open doors, login to computers, use the copy
machine,"
• "The chip is not trackable and only contains information
you choose to associate with it," the company said, "This
chip does not have GPS capabilities."
• I would never do this; I understand they save 5 seconds at the copier.
• I just have an innate skepticism when companies say, “We can’t, or we
won’t use this for anything else than intended”.
• History proves they rarely do just that.
7|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• IAAA Access Management:
• Something you are - Type 3 Authentication (Biometrics):
• Biometric identifiers are often categorized as physiological and behavioral
characteristics.
• Physiological characteristics uses the shape of the body, these do not
change unless a drastic event occurs.
• Fingerprint, palm veins, facial recognition, DNA, palm print,
hand geometry, iris recognition, retina and odor.
• Behavioral characteristics uses the pattern of behavior of a person,
these can change, but most often revert back to the baseline.
• Typing rhythm, how you walk, signature and voice.
• We also need to respect and protect our employee’s privacy:
• Some fingerprint patterns are related to chromosomal diseases.
• Iris patterns could reveal genetic sex, retina scans can show if a person
is pregnant or diabetic.
• Hand vein patterns could reveal vascular diseases.
• Most behavioral biometrics could reveal neurological diseases, etc.
8|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• When Home Depot loses 10 million credit card numbers it is
bad, but they can be reissued.
• The US Office of Personnel Management got hacked and lost 5.6
million federal employees’ fingerprints.
• The FBI has a database with 52 million facial images and
Homeland Security and U.S. Customs and Border Patrol is
working on adding the iris scans and 170 million foreigner
fingerprints to the FBI’s database.
• The compromises of the future will have much more wide-
reaching ramifications than the ones we have seen until now.
9|Page
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Based on a formal decision on a subject's current and future
trustworthiness.
• The higher the clearance the more in depth the background checks
should be.
10 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Providing the username and password combination followed by a challenge and
response mechanism such as CAPTCHA, filtering the access based on MAC
addresses on wireless, or a firewall filtering the data based on packet analysis
are all examples of context-dependent access control mechanisms.
• Content-based access control:
• Access is provided based on the attributes or content of an object, then it is
known as a content-dependent access control.
• In this type of control, the value and attributes of the content that is being
accessed determine the control requirements.
• Hiding or showing menus in an application, views in databases, and access to
confidential information are all content-dependent.
• Access control:
• Access control systems:
• We can use centralized and/or decentralized (distributed) access control
systems, depending on which type makes the most sense. Both options provide
different benefits.
• Access control decisions are made by comparing the
credential to an access control list.
• This look-up can be done by a host or server, by an
access control panel, or by a reader.
• Most common is hub and spoke with a control panel as
the hub, and the readers as the spokes.
• Today most private organizations use Role Based Access
Control (RBAC).
• You are in Payroll you get the payroll staff access and permissions, if you
move to HR, you lose your payroll access and get HR access assigned.
• Access control:
• Access control systems:
• Normal systems are much larger, but you get the idea from this drawing how
they would connect.
11 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• In a perfect world,
access control systems
should be physically
and logically
segmented from the
rest of our IP Network,
in reality it is most
often segmented
logically with VLANs, but in many cases not even that.
• Access control:
• Access control systems:
• Centralized Pro’s: (Decentralized Con’s):
• All systems and locations have the same security posture.
• Easier to manage: All records, configurations and policies are centralized
and only configured once per policy.
• Attackers look for the weakest link in our chain, if a small
satellite office is not following our security posture, they can be
an easy way onto our network.
• It is more secure, only a few people have access and can make changes
to the system.
• It can also provide separation of duties, the local admin can’t
edit/delete logs from their facility.
• SSO can be used for user access to multiple systems with one login.
• Centralized Con’s: (Decentralized Pro’s):
• Traffic overhead and response time, how long does it take for a door
lock to authenticate the user against the database at the head office?
• Is connectivity to the head office stable, is important equipment on
redundant power and internet?
• Access control:
• Access control systems:
• Hybrid:
• Controlled centralized, but the access lists for that location are pushed
daily/hourly to a local server, local admins have no access.
• We still need to ensure the local site uses the organization security
posture on everything else.
• Access control:
• Identity and access provisioning:
• We can have multiple identities per entity and each identity can have multiple
attributes.
• I can be staff, alumni and enrolled student at a college.
12 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• As staff I could have access to different areas
and data than I would as alumni and student.
• Companies can have the same, they can be the
parent company, then smaller companies under
the parent umbrella, all with different
attributes.
• Access control:
• Identity and access provisioning lifecycle:
• This is a suggested lifecycle example from “Identity Management Design Guide
with IBM Tivoli Identity Manager”.
• You obviously don’t have to implement it verbatim but find a clear policy that
works for your organization.
• Life cycle rules provide administrators with the ability to define life cycle
operations to be executed as the result of an event. Life cycle rules are
especially useful in automating recurring administrative tasks.
• Password policy compliance checking.
• Notifying users to change their passwords before they expire.
• Identifying life cycle changes such as accounts that are inactive
for more than 30 consecutive days.
• Identifying new accounts that have not been used for more
than 10 days following their creation.
• Identifying accounts that are candidates for deletion because
they have been suspended for more than 30 days.
• When a contract expires, identifying all accounts belonging to a
business partner or contractor’s employees and revoking their
access rights.
• Access control:
• Federated identity:
• How we link a person's electronic identity and attributes across multiple distinct
identity management systems.
• FIDM (Federated Identity Management):
• Having a common set of policies, practices and protocols in place to
manage the identity and trust into IT users and devices across
organizations.
• SSO is a subset of federated identity management, it only uses
authentication and technical interoperability.
• Technologies used for federated identity include SAML, OAuth, OpenID, Security
Tokens, Microsoft Azure Cloud Services, Windows Identity Foundation...
13 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• SAML (Security Assertion Markup Language):
• An XML-based, open-standard data format for exchanging
authentication and authorization data between parties.
• The single most important requirement that SAML addresses is
web browser SSO.
• Access control:
• Federated identity:
• SSO (Single sign-on):
• Users use a single sign-on for multiple systems.
• Often deployed in organizations where users have
to access 10+ systems, and they think it is too
burdensome to remember all those passwords.
• SSO have the same strong password requirements as normal single
system passwords.
• If an attacker compromises a single password, they have access to
everything that user can access.
• Super sign-on.
• One login can allow you to access many
systems and sites.
• Social media logins are common super sign-
ons, if an account is compromised an
attacker can often access multiple other
sites or systems, the social media account is linked all the other
systems.
• Access control:
• IDaaS (Identity as a Service):
• Identity and access management that is built, hosted and managed by a third-
party service provider.
• Native cloud based IDaaS solutions can provide SSO functionality through the
cloud, Federated Identity Management for Access Governance, Password
Management, ...
• Hybrid IAM solutions from vendors like Microsoft and Amazon provide cloud-
based directories that link with on-premises IAM systems.
14 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• It is the most important layer of protection needed for secure communication between
networks.
• Kerberos:
• Authentication protocol that works on the basis of tickets to allow nodes
communicating over a non-secure network to prove their identity to each other
in a secure manner.
• The protocol was named after the character Kerberos (or Cerberus) from Greek
mythology, the three-headed guard dog of Hades.
• It is based on a client–server model and it provides mutual authentication both
the user and the server verify each other's identity.
• Messages are protected against eavesdropping and replay attacks.
15 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• It uses PKI encryption (asymmetric), which fixed the Kerberos the plaintext
storage of symmetric keys issue.
• Uses a PAS (Privilege Attribute Server), which issues PACs (Privilege Attribute
Certificates) instead of Kerberos’ tickets.
• Not widely used, Kerberos is widely used since it is natively in most OS’s.
16 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• TACACS+:
• Provides better password protection by using two-factor strong authentication.
• Not backwards compatible with TACACS.
• Uses TCP port 49 for authentication with the TACACS+ server.
• Similar to RADIUS, but RADIUS only encrypts the password TACACS+, encrypts
the entire data package.
17 | P a g e
https://thorteaches.com/
CISSP Domain 5 Lecture notes
• Access control - Authentication protocols:
• AD (continued):
• Can use Trust domains which allow users in one domain to access resources in
another.
• One-way trust: One domain allows access to users on another domain,
but the other domain does not allow access to users on the first
domain.
• Two-way trust: Two domains allow access to users on both domains.
• Trusted domain: The domain that is trusted; whose users have access to
the trusting domain.
• Transitive trust: A trust that can extend beyond two domains to other
trusted domains in the forest.
• Intransitive (non-transitive) trust: A one-way trust that does not extend
beyond two domains.
18 | P a g e
https://thorteaches.com/