L3 Access Control Concepts: What Is Security Control?
L3 Access Control Concepts: What Is Security Control?
Introduction
Types of access control, physical and logical controls and how they are combined to
strengthen the overall security of an organization.
Controls Overview
Earlier in this course we looked at security principles through foundations of risk
management, governance, incident response, business continuity and disaster recovery.
But in the end, security all comes down to, “who can get access to organizational assets
(buildings, data, systems, etc.) and what can they do when they get access?”
Access controls are not just about restricting access to information systems and data,
but also about allowing access. It is about granting the appropriate level of access to
authorized personnel and processes and denying access to unauthorized functions or
individuals.
Access is based on three elements:
• subjects: any entity that requests access to our assets. The entity requesting
access may be a user, a client, a process or a program, for example. A subject is the
initiator of a request for service; therefore, a subject is referred to as “active.” A
subject:
• Rules: Rules form the foundation of the access control framework by defining the
conditions under which access is granted or denied to objects. These rules establish
the criteria and parameters that govern the access permissions and restrictions
within the organization’s environment. They can encompass a wide range of factors,
including user roles and responsibilities, permissions levels, time-based access
policies, location-based restrictions, and other attributes relevant to the
organization’s security policies. Rules ensure that access is managed in a consistent,
predictable, and enforceable manner, helping to safeguard sensitive information,
prevent unauthorized access, and mitigate security risks effectively.
Controls Assessments
Risk reduction depends on the effectiveness of the control. It must apply to the current
situation and adapt to a changing environment.
Defense in Depth
We are looking at all access permissions including building access, access to server rooms,
access to networks and applications and utilities. These are all implementations of access
control and are part of a layered defense strategy, also known as defense in depth,
developed by an organization.
Defense in depth describes an information security strategy that integrates people,
technology and operations capabilities to establish variable barriers across multiple
layers and missions of the organization. It applies multiple countermeasures in a
layered fashion to fulfill security objectives. Defense in depth should be implemented to
prevent or deter a cyberattack, but it cannot guarantee that an attack will not occur.
A technical example of defense in depth, in which multiple layers of technical controls are
implemented, is when a username and password are required for logging in to your
account, followed by a code sent to your phone to verify your identity. This is a form
of multi-factor authentication using methods on two layers, something you have and
something you know. The combination of the two layers is much more difficult for an
adversary to obtain than either of the authentication codes individually.
Another example of multiple technical layers is when additional firewalls are used to
separate untrusted networks with differing security requirements, such as the internet
from trusted networks that house servers with sensitive data in the organization. When a
company has information at multiple sensitivity levels, it might require the network traffic
to be validated by rules on more than one firewall, with the most sensitive information
being stored behind multiple firewalls.
For a non-technical example, consider the multiple layers of access required to get to the
actual data in a data center. First, a lock on the door provides a physical barrier to access
the data storage devices. Second, a technical access rule prevents access to the data via the
network. Finally, a policy, or administrative control defines the rules that assign access to
authorized individuals.
• Change of position: When an employee has been promoted, their permissions and
access rights might change as defined by the new role, which will dictate any added
privileges and updates to access. At the same time, any access that is no longer
needed in the new job will be removed.
• Separation of employment: When employees leave the company, depending on
company policy and procedures, their accounts must be disabled after the
termination date and time. It is recommended that accounts be disabled for a period
before they are deleted to preserve the integrity of any audit trails or files that may
be owned by the user. Since the account will no longer be used, it should be
removed from any security roles or additional access profiles. This protects the
company, so the separated employee is unable to access company data after
separation, and it also protects them because their account cannot be used by others
to access data.
Environmental Design
Crime Prevention through Environmental Design (CPTED) approaches the challenge of
creating safer workspaces through passive design elements. This has great applicability for
the information security community as security professionals design, operate and assess
the organizational security environment. Other practices, such as standards for building
construction and data centers, also affect how we implement controls over our physical
environment. Security professionals should be familiar with these concepts so they can
successfully advocate for functional and effective physical spaces where information is
going to be created, processed and stored.
CPTED provides direction to solve the challenges of crime with organizational (people),
mechanical (technology and hardware) and natural design (architectural and circulation
flow) methods. By directing the flow of people, using passive techniques to signal who
should and should not be in a space and providing visibility to otherwise hidden spaces, the
likelihood that someone will commit a crime in that area decreases.
Biometrics
To authenticate a user’s identity, biometrics uses characteristics unique to the individual
seeking access. A biometric authentication solution entails two processes.
Enrollment—during the enrollment process, the user’s registered biometric code is either
stored in a system or on a smart card that is kept by the user. Verification—during the
verification process, the user presents their biometric data to the system so that the
biometric data can be compared with the stored biometric code.
Even though the biometric data may not be secret, it is personally identifiable information,
and the protocol should not reveal it without the user’s consent. Biometrics takes two
primary forms, physiological and behavioral.
Physiological systems measure the characteristics of a person such as a fingerprint, iris
scan (the colored portion around the outside of the pupil in the eye), retinal scan (the
pattern of blood vessels in the back of the eye), palm scan and venous scans that look for
the flow of blood through the veins in the palm. Some biometrics devices combine
processes together—such as checking for pulse and temperature on a fingerprint scanner
—to detect counterfeiting.
Behavioral systems measure how a person acts by measuring voiceprints, signature
dynamics and keystroke dynamics. As a person types, a keystroke dynamics system
measures behavior such as the delay rate (how long a person holds down a key) and
transfer rate (how rapidly a person moves between keys).
Biometric systems are considered highly accurate, but they can be expensive to implement
and maintain because of the cost of purchasing equipment and registering all users. Users
may also be uncomfortable with the use of biometrics, considering them to be an invasion
of privacy or presenting a risk of disclosure of medical information (since retina scans can
disclose medical conditions). A further drawback is the challenge of sanitization of the
devices.
Monitoring
The use of physical access controls and monitoring personnel and equipment entering and
leaving as well as auditing/logging all physical events are primary elements in maintaining
overall organizational security.
Cameras
Cameras are normally integrated into the overall security program and centrally
monitored. Cameras provide a flexible method of surveillance and monitoring. They can be
a deterrent to criminal activity, can detect activities if combined with other sensors and, if
recorded, can provide evidence after the activity They are often used in locations where
access is difficult or there is a need for a forensic record.While cameras provide one tool for
monitoring the external perimeter of facilities, other technologies augment their detection
capabilities. A variety of motion sensor technologies can be effective in exterior locations.
These include infrared, microwave and lasers trained on tuned receivers. Other sensors can
be integrated into doors, gates and turnstiles, and strain-sensitive cables and other
vibration sensors can detect if someone attempts to scale a fence. Proper integration of
exterior or perimeter sensors will alert an organization to any intruders attempting to gain
access across open space or attempting to breach the fence line.
Logs
In this section, we are concentrating on the use of physical logs, such as a sign-in sheet
maintained by a security guard, or even a log created by an electronic system that manages
physical access. Electronic systems that capture system and security logs within software
will be covered in another section.
A log is a record of events that have occurred. Physical security logs are essential to
support business requirements. They should capture and retain information as long as
necessary for legal or business reasons. Because logs may be needed to prove compliance
with regulations and assist in a forensic investigation, the logs must be protected from
manipulation. Logs may also contain sensitive data about customers or users and should be
protected from unauthorized disclosure.
The organization should have a policy to review logs regularly as part of their
organization’s security program. As part of the organization’s log processes, guidelines for
log retention must be established and followed. If the organizational policy states to retain
standard log files for only six months, that is all the organization should have.
A log anomaly is anything out of the ordinary. Identifying log anomalies is often the first
step in identifying security-related issues, both during an audit and during routine
monitoring. Some anomalies will be glaringly obvious: for example, gaps in date/time
stamps or account lockouts. Others will be harder to detect, such as someone trying to
write data to a protected directory. Although it may seem that logging everything so you
would not miss any important data is the best approach, most organizations would soon
drown under the amount of data collected.
Business and legal requirements for log retention will vary among economies, countries
and industries. Some businesses will have no requirements for data retention. Others are
mandated by the nature of their business or by business partners to comply with certain
retention data. For example, the Payment Card Industry Data Security Standard (PCI DSS)
requires that businesses retain one year of log data in support of PCI. Some federal
regulations include requirements for data retention as well.
If a business has no business or legal requirements to retain log data, how long should the
organization keep it? The first people to ask should be the legal department. Most legal
departments have very specific guidelines for data retention, and those guidelines may
drive the log retention policy.
Security Guards
Security guards are an effective physical security control. No matter what form of physical
access control is used, a security guard or other monitoring system will discourage a
person from masquerading as someone else or following closely on the heels of another to
gain access. This helps prevent theft and abuse of equipment or information.
Alarm Systems
Alarm systems are commonly found on doors and windows in homes and office buildings.
In their simplest form, they are designed to alert the appropriate personnel when a door or
window is opened unexpectedly.
For example, an employee may enter a code and/or swipe a badge to open a door, and that
action would not trigger an alarm. Alternatively, if that same door was opened by brute
force without someone entering the correct code or using an authorized badge, an alarm
would be activated.
Another alarm system is a fire alarm, which may be activated by heat or smoke at a sensor
and will likely sound an audible warning to protect human lives in the vicinity. It will likely
also contact local response personnel as well as the closest fire department.
Finally, another common type of alarm system is in the form of a panic button. Once
activated, a panic button will alert the appropriate police or security personnel.