Identity and Account Management Controls
Identity and Account Management Controls
Ahmed Sultan
Senior Technical Instructor
ahmedsultan.me/about
1
Outlines
Labs
Lab 10: Managing Access Controls in Windows Server
Lab 11: Configuring a System for Auditing Policies
Lab 12: Managing Access Controls in Linux
• Identity and access management (IAM) involves both IT/security procedures and
technologies and Human Resources (HR) policies.
• A background check determines that a person is who they say they are and are
not concealing criminal activity, bankruptcy, or connections that would make
them unsuitable or risky.
• For some jobs, especially federal jobs requiring a security clearance, background
checks are mandatory.
• Some background checks are performed internally, whereas others are done by
an external third party.
• Separation of Duties
✓ Separation of duties is a means of establishing checks and balances against the possibility
that critical systems or procedures can be compromised by insider threats.
✓ Duties and responsibilities should be divided among individuals to prevent ethical conflicts or
abuse of powers.
• Administrative or privileged accounts are able to install and remove apps and
device drivers, change system-level settings, and access any object in the file
system.
• In practice, it is very hard to eliminate the presence of default administrator
accounts.
• A default account is one that is created by the operating system or application
when it is installed.
• The default account has every permission available.
• In Windows, this account is called Administrator; in Linux, it is called root.
• This type of account is also referred to as a superuser.
• Each account can be assigned permissions over files and other network resources
and access policies or privileges over the use and configuration of network hosts.
• These permissions might be assigned directly to the account or inherited through
membership of a security group or role.
• Access policies determine things like the right to log on to a computer locally or
via remote desktop, install software, change the network configuration, and so
on.
• On a Windows Active Directory network, access policies can be configured via
group policy objects (GPOs).
• GPOs can be used to configure access rights for user/group/role accounts.
• To make the task of compromising the user security system harder, account
restrictions can be used.
• Location-Based Policies
✓ A user or device can have a logical network location, identified by an IP address, subnet,
virtual LAN (VLAN), or organizational unit (OU).
✓ This can be used as an account restriction mechanism.
✓ For example, a user account may be prevented from logging on locally to servers within a
restricted OU.
• Geofencing
✓ Refers to accepting or rejecting access requests based on location.
✓ Geofencing can also be used for push notification to send alerts or advice to a device when a
user enters a specific area.
✓ This is often used for asset management to ensure devices are kept with the proper location.
• Accounting and auditing processes are used to detect whether an account has
been compromised or is being misused.
• A security or audit log can be used to facilitate detection of account misuse:
✓ Accounting for all actions that have been performed by users.
✓ Change and version control systems depend on knowing when a file has been modified and
by whom.
✓ Accounting also provides for non-repudiation (that is, a user cannot deny that they accessed
or made a change to a file).
✓ The main problems are that auditing successful access attempts can quickly consume a lot of
disk space, and analyzing the logs can be very time-consuming.
✓ Detecting intrusions or attempted intrusions.
• Here records of failure-type events are likely to be more useful, though success-
type events can also be revealing if they show unusual access patterns.