2023+CC+Domain+3+Study+Guide+by+ThorTeaches Com+v1 1
2023+CC+Domain+3+Study+Guide+by+ThorTeaches Com+v1 1
Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-
virus.
▪ Corrective:
Controls that Correct an attack – Anti-virus, patches, IPS.
▪ Recovery:
Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
▪ Deterrent:
Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.
1|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
Physical Security Controls:
• Perimeter defense:
▪ Fences (Deterrence, Preventative):
⬥ Smaller fences such as 3ft. (1m) can be a deterrence, while taller ones,
such as 8ft. (2.4m) can be a prevention mechanism.
⬥ The idea of the fences is to ensure entrance/exits from the facility
happen through only a few entry points (doors, gates, turnstiles).
▪ Gates (Deterrence, Preventative):
⬥ Placed at control points at the
perimeter.
⬥ Used with the fences to ensure access
only happens through a few entry
points.
⬥ ASTM Standard:
🢭 Class I Residential (your house)
🢭 Class II Commercial/General
Access (parking garage).
🢭 Class III Industrial/Limited Access (loading dock for 18-wheeler
trucks).
🢭 Class IV Restricted Access (airport or prison).
▪ Bollards (Preventative):
⬥ Used to prevent cars or trucks from entering an area while allowing foot
traffic to pass.
⬥ Often shops use planters or similar; it looks prettier but achieves the
same goal.
⬥ Most are static heavy-duty objects, but some cylindrical versions can
also be electronically raised or lowered to allow authorized traffic past a
"no traffic" point. Some are permanent fixtures and can be removed
with a key or other unlock functions.
▪ Lights (Detective and Deterrence):
⬥ Lights should be used to fully illuminate the entire area.
⬥ Lights can be static, motion activated (static) or automatic/manual
Fresnel lights (search lights).
⬥ Measured in lumen - 1 lumen per square foot or lux - 1 lumen per
square meter more commonly used.
▪ CCTV (Closed Circuit Television) (Detective, Deterrence) - used to monitor the
facility’s perimeter and inside it.
⬥ Older cameras are analog and use video tapes for storage (often VHS);
quality is often bad, unclear.
⬥ Modern cameras are digital and use CCD (Charged Couple Discharge);
also use a DVR (Digital Video Recorder).
⬥ Organizations may have retention requirements either from policies or
legislation that require a certain retention of their video (this could be
bank ATM, data center or entry point footage).
⬥ Cameras can be either static or non-static (automatic or manual).
2|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
🢭 We have all seen the spy or heist movies where they avoid them
by knowing the patterns and timers.
🢭 This risk can be mitigated with a randomizer or pseudo
randomizer, we want to ensure full coverage.
▪ Locks (Preventative):
⬥ Key locks:
🢭 Requires a physical key to unlock;
keys can be shared/copied.
🢭 Key Bitting Code (How far the key is
bitten down for that section.) – Can
be copied and replicated without the
key from either the numbers or a
photo of it.
🢭 Pin Tumbler Lock (or Yale lock) – A
lock mechanism that uses pins of
varying lengths to prevent
the lock from opening without the correct key.
🢭 Lock Picking - with a lock pick set or bumping, opening a lock
without the key.
🢭 Any key lock can be picked or bumped, how long it
takes depends on the quality of the lock.
🢭 Lock pick sets lift the pins in the tumbler, opening the
lock.
🢭 Lock Bumping - Using a shaved-down key that matches the lock,
the attacker “bumps“ the key handle with a hammer or
screwdriver which makes the pins jump, then the attacker
quickly turns the key.
🢭 Master Keys open any lock in a given area or security zone.
🢭 Both who has them and where they are kept should be
very closely guarded at all times.
🢭 Core Key is used to remove a lock core in
"interchangeable core locks."
🢭 An interchangeable core, or IC, is a
compact keying mechanism in a
specific figure-eight shape.
🢭 Relies upon a specialized "control" key
for insertion and extraction of the core.
🢭 Should be kept secure and access
should be very restricted.
⬥ Combination Locks:
🢭 Not very secure and have limited accountability even
with unique codes.
🢭 Should be used for low security areas.
🢭 Can be Dial type (think safe), Button or Keypad.
3|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
🢭 Very susceptible to brute force, shoulder surfing and are often
configured with weak security (I know of a good deal of places
where the code is the street number).
🢭 Over time, the buttons used for the code will have more wear
and tear.
🢭 For 4-number PIN where 4 keys are used, the possible
combinations are no longer 10,000, but 256: if 3 keys, then 81
options.
4|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
Both Mantraps and Turnstiles should be designed to allow safe evacuation in
case of an emergency. (Remember that people are more important to protect
than stuff.)
5|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
they are also connected to alarms that sound when opened (clearly
labeled Emergency Only - Alarm WILL Sound).
6|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
▪ Restricted Work Areas and Escorts.
⬥ To track and funnel authorized visitors, we can use visitor badges, visitor
logs, and escorts.
⬥ Non-electronic visitor badges are easy to make copies of and easy to
fake.
⬥ Electronic can be just a cheap re-programmable magnetic strip (like for
hotel rooms, easy to copy). Make sure they have a short window of use,
or more secure individually printed ones for each visit, and only used
once.
⬥ The return of all badges and physical sign-out should be enforced when
the visitor leaves.
⬥ When a vendor is coming to repair, install or remove something in your
facility, they need to be checked in and escorted from the entry point to
where they are going to work by an employee, and the employee
should stay with the vendor until the work is completed.
⬥ The vendor’s employees should already have passed a security check
when they were hired; the vendor is liable.
⬥ This sounds and is boring, but it is more likely to prevent the vendor
from compromising your security than if they were free to roam the
facility and the data center unsupervised.
• Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
⬥ Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
⬥ Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-
virus.
▪ Corrective:
⬥ Controls that Correct an attack – Anti-virus, patches, IPS.
7|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
▪ Recovery:
⬥ Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
▪ Deterrent:
⬥ Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.
8|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
When a contract expires, identifying all accounts belonging to a
business partner or contractor’s employees and revoking their
access rights.
Federated Identity:
▪ How we link a person's electronic identity and attributes across multiple distinct
identity management systems.
▪ FIDM (Federated Identity Management):
Having a common set of policies, practices, and protocols in place to
manage the identity and trust into IT users and devices across
organizations.
SSO: A subset of federated identity management. Users use a single
sign-on for multiple systems.
9|Page
https://thorteaches.com/
CC Chapter 3 Lecture notes
Attackers look for the weakest link in our chain, if a small
satellite office is not following our security posture, they can be
an easy way onto our network.
It is more secure, only a few people have access and can make changes
to the system.
It can also provide separation of duties, the local admin can’t
edit/delete logs from their facility.
SSO can be used for user access to multiple systems with one login.
▪ Centralized Con’s (Decentralized Pro’s):
Traffic overhead and response time, how long does it take for a door
lock to authenticate the user against the database at the head office?
Is connectivity to the head office stable, is important equipment on
redundant power and internet?
▪ Hybrid:
Centrally controlled; access lists for that location are pushed to a local
server on a daily/hourly basis; local administrators have no access.
We must still ensure that the local site follows the organization's
security posture in all other areas.
Authorization:
▪ We use Access Control models to determine what a subject is allowed to access.
▪ What and how we implement depends on the organization and what
our security goals are, type can often be chosen dependent on which
leg of the CIA Triad is the most important one to us.
▪ If it is Confidentiality, we would most likely go with Mandatory
Access Control.
▪ If it is Availability, we would most likely go with Discretionary
Access Control.
▪ If it is Integrity, we would most likely go with Role Based Access Control
or Attribute Based Access Control.
There technically is also RUBAC (Rule Based Access Control), it is mostly used on
firewalls with IF/THEN statements but can be used in conjunction with the other models
to provide defense in depth.
DAC (Discretionary Access Control) - Often used when Availability is most important:
▪ Access to an object is assigned at the discretion of the object owner.
▪ The owner can add, remove rights, commonly used by most OS's’.
▪ Uses DACL’s (Discretionary ACL), based on user identity.
MAC (Mandatory Access Control) - Often used when Confidentiality is most important:
▪ Access to an object is determined by labels and clearance, this is often used in
the military or in organizations where confidentiality is very important.
10 | P a g e
https://thorteaches.com/
CC Chapter 3 Lecture notes
▪ Labels: Objects have Labels assigned to them; the subject's clearance must
dominate the object's label.
The label is used to allow Subjects with the right clearance access them.
Labels are often more granular than just “Top Secret”, they can be “Top
Secret – Nuclear”.
▪ Clearance: Subjects have Clearance assigned to them.
Based on a formal decision on a subject's current and future
trustworthiness.
The higher the clearance the more in depth the background checks
should be.
RBAC (Role-Based Access Control) - Often used when Integrity is most important:
▪ Policy neutral access control mechanism
defined around roles and privileges.
▪ A role is assigned permissions, and subjects
in that role are added to the group, if they
move to another position they are moved to
the permissions group for that position.
▪ It makes administration of 1,000's of users
and 10,000's of permissions much easier to
manage.
▪ The most commonly used form of access
control.
▪ If implemented right it can also enforce
separation of duties and prevent
authorization/privilege creep .
▪ We move employees transferring within the organization from one role to
another and we do not just add the new role to the old one.
ABAC (Attribute-Based Access Control):
▪ Access to objects is granted based on subjects,
objects, AND environmental conditions.
▪ Attributes could be:
Subject (user) – Name, role, ID, clearance, etc.
Object (resource) – Name, owner, and date of
creation.
Environment – Location and/or time of
access, and threat levels.
Context-Based Access Control:
▪ Access to an object is controlled based on certain
contextual parameters, such as location, time, sequence of
responses, access history.
▪ Providing the username and password combination followed
by a challenge and response mechanism such as CAPTCHA,
11 | P a g e
https://thorteaches.com/
CC Chapter 3 Lecture notes
filtering the access based on MAC addresses on wireless, or a firewall filtering
the data based on packet analysis are all examples of context-dependent access
control mechanisms.
Administrative Security:
▪ Job Rotation:
For the exam think of it to detect errors and frauds. It is easier to detect
fraud and there is less chance of collusion between individuals if they
rotate jobs.
It also helps with employee’s burnout and it helps employees
understand the entire business.
This can be to cost prohibitive for the exam/real life, make sure on the
exam the cost justifies the benefit.
▪ Mandatory Vacations:
Done to ensure one person is not always performing the same task,
someone else has to cover and it can keep fraud from happening or help
us detect it.
Their accounts are locked, and an audit is performed on the accounts.
If the employee has been conducting fraud and covering it up, the audit
will discover it.
The best way to do this is to not give too much advance notice of
vacations.
12 | P a g e
https://thorteaches.com/
CC Chapter 3 Lecture notes
NDA (Non-Disclosure Agreement):
▪ We covered NDAs between our and other organizations, it is also normal to
have them for internal employees.
▪ Some employment agreements will include a clause restricting employees' use
and dissemination of company-owned confidential information.
Background Checks:
▪ References, Degrees, Employment, Criminal, Credit history (less common, more
costly).
▪ For sensitive positions the background check is an ongoing process.
Privilege Monitoring:
▪ The more access and privilege an employee has the more we keep an eye on
their activity.
▪ They are already screened more in depth and consistently, but they also have
access to many business-critical systems, we need to audit their use of that
access.
▪ With more access comes more responsibility and scrutiny.
13 | P a g e
https://thorteaches.com/
CC Chapter 3 Lecture notes
➢ Domain 3: What we covered.
Physical Controls:
▪ Locks, fences, guards, dogs,
gates, bollards, ...
Technical Controls:
▪ Hardware/software/firmware –
Firewalls, routers, encryption, ...
14 | P a g e
https://thorteaches.com/