Module 2 - Defence in depth - Cryptographic System
Module 2 - Defence in depth - Cryptographic System
and Security
Dr. E.Silambarasan
Assistant Professor
Department of CSE - Cyber Security
Indian Institute of Information Technology, Kottayam
Access Control
• Access control is a security technique that regulates who or what can view or use
resources in a computing
• environment. It is a fundamental concept in security that minimizes risk to the
business or organization.
• The main models of access control are the following:
Mandatory Access Control (MAC): A control model in which access rights are
regulated by a central authority based on multiple levels of security.
Security Enhanced Linux is implemented using MAC on the Linux operating system.
Access Control
Role-Based Access Control (RBAC): RBAC allows access based on the job title. RBAC
eliminates discretion on a large scale when providing access to objects.
For example, there should not be permission for human resources specialists to create
network accounts.
Rule-Based Access Control (RAC): The RAC method is largely context-based.
An example of this would be only allowing students to use the labs during a certain
time of day.
Defense in Depth
• A fundamental security strategy involves deploying multiple layers of defense to
protect systems and data.
• In the context of cloud security, defense in depth is crucial for mitigating various
threats and ensuring a comprehensive security posture.
• Here's an overview of defense-in-depth principles as applied to cloud security:
Network Security:
Firewalls: Implementing firewalls at different levels, such as perimeter firewalls,
subnet firewalls, and host-based firewalls, helps control and monitor incoming and
outgoing traffic.
Virtual Private Clouds (VPCs): Utilizing VPCs with proper network segmentation
adds a layer of protection by isolating different parts of the infrastructure.
Defense in Depth
Identity and Access Management (IAM):
Strong Authentication: Enforcing strong authentication mechanisms, including multi-factor
authentication (MFA), adds an extra layer of protection against unauthorized access.
Role-Based Access Control (RBAC): Implementing RBAC ensures that users and systems have
the least privilege necessary for their roles, reducing the impact of potential breaches.
Data Encryption:
Encryption at Rest: Applying encryption to stored data protects it from unauthorized access.
Cloud providers often offer services to enable encryption at rest for databases, storage, and
other data repositories.
Encryption in Transit: Encrypting data during transmission over networks prevents
eavesdropping and man-in-the-middle attacks
Least Privilage
• The principle of least privilege (PoLP) is a fundamental concept in cloud security
that emphasizes restricting user and system permissions to the minimum levels
necessary for performing specific tasks or accessing particular resources.
• This principle is designed to minimize the potential damage caused by accidental
mishandling or intentional misuse of privileges within a computing environment.
The principle of least privilege:
• Minimizes the attack surface, diminishing avenues a malicious actor can use to
access sensitive data or carry out an attack by protecting superuser and
administrator privileges.
• Reduces malware propagation by not allowing users to install unauthorized
applications.
• Improves operational performance with reductions in system downtime that might
otherwise occur because of a breach, malware spread or incompatibility issues
between applications.
• Safeguards against human error that can happen through mistake, negligence.
Cryptographic System
• Cryptography is the practice and study of techniques for securing communication
and information from adversaries.
• It involves the use of mathematical algorithms to transform data into a format that is
unintelligible without the appropriate knowledge or key.
Symmetric Cryptography
• Symmetric cryptography, also known as secret-key or shared-key cryptography, is a
cryptographic approach where the same key is used for both the encryption and
decryption of the data.
• In symmetric-key cryptography, the entities involved in communication (sender and
receiver) share a common secret key that must be kept confidential.
• This shared key is used to perform both the encryption and the corresponding
decryption of the information.
• Symmetric-key algorithms are generally faster and computationally more efficient
than their asymmetric counterparts.
Cryptographic System
• AES (Advanced Encryption Standard) and DES (Data Encryption Standard) are both
symmetric key block cipher algorithms used for encrypting and decrypting data.
• However, they differ in terms of key length, block size, and overall security