What Is Access Control?
What Is Access Control?
Access control is the process by which resources or services are granted or denied to a system
or user on a computer system or network. In other words, it controls who or what is allowed to
First, a system or user must identify themselves, then they must verify that they are who they
say they are. Once their credentials are verified to be both accurate and authentic, the users are
authenticated. From here, they can begin to request resources. Once a request is made, the user
must be vetted to ensure they have the proper authorization (permissions) to access the
resources.
For example, a computer user signs on to the computer, requests access to applications to do
their work, is verified that they have the appropriate permissions and is granted access only to
the requested applications in order to perform their duties. In the image below, we can see that
the rules for accessing the SALARY Excel file is that only department managers are allowed to
read it. If MWiley is a department manager, then she would be able to read the SALARY file.
How to Implement Access Control
Computer access control can be accomplished by using hardware, software or policy.
An example of hardware access control is a firewall which only allows traffic from certain
A software example is using permissions in an accounting software to allow only certain users to
Policy access control may be requiring that all visitors check in at the reception desk and must
be escorted while in the building. Access control can take different forms depending on the
Other terminology used to describe how computer systems impose access control are object,
subject, and operation. The subject is the person or system making the request. The object is
the resource being requested. The operation is what action the subject wants to make on the
object. In the above image, MWiley is the subject and she is requesting to access (operation) the
Separation of duties
Separation of duties requires that if the fraudulent application of a process could potentially
result in a breach of security, the process should be divided between two or more
individuals. This is often the case used when an organization is processing payments.
Job rotation
Instead of one person having sole responsibility for a function, individuals are periodically
moved from one job responsibility to another. This not only allows employees to be cross-
trained, but makes it easier for the organization to detect if an employee has been misusing their
permissions.
Least privilege
The principle of least privilege states that each user should be given only the minimal amount of
privileges necessary to perform his or her job function. In this way it is less likely that a mistake
Implicit deny
When using an implicit deny practice, if a condition is not explicitly met, then it is to be
rejected. This is often the case with networking access controls like firewalls where, by default,
all connections are blocked. This means that a device or resource starts in the most secure state
controls. Only owners and custodians are responsible for managing access controls. This model
is typically used when a high level of security is needed. It is commonly used in military and
government organization. MAC is the most restrictive model because all controls are fixed. In
this model, the operating system constrains the ability of a subject or initiator to access or
has total control over any objects and programs he or she owns. Microsoft Windows typically
uses this model where the creator or owner of a file or folder can grant and revoke permissions
as required. Depending on the level of permissions you allow a subject to have, they may be able
individually made available or secured against access. Access rights are configured at the
discretion of the accounts that have the authority over each resource, including the capability to
DAC has two significant weaknesses. It relies on the end-user subject to set the proper level of
security and a subject’s permissions will be “inherited” by any programs that the subject
executes.
attribute-based control model for sharing information among diverse organizations. It is based
on Extensible Access Control Markup Language (XACML). Attributes are characteristics that
define specific aspects of an entity. When authorization is requested, the rules and policies
against the entity's attributes, like subject, object, operation, or environment, are evaluated.
When attribute values are changed, access is changed to match the values of the attribute. ABAC
systems are capable of enforcing both MAC and DAC, making them a good fit for large and
Access Control dynamically assign roles to users based on a set of rules defined by a
custodian. Each asset object contains a set of access properties based on the rules. Rule-based
Access Control is often used for managing user access to one or more systems and it includes
controls such as the time of day, day of the week, access to a specific host, geographical location
of the user, and many other factors. These rules are often based on organizational policy.
In role-based access control, permissions and access rights are first assigned to roles within the
organization. When user accounts become associated with these roles, there is no need to
directly assign any rights for specific users. Scalability is a great benefit to using role-based
access control. In large organizations with hundreds or thousands of employees, it would not be
at all efficient to explicitly grant rights to individual users. One thing to keep in mind when using
role-based access control is the movement of employees within the organization. If an employee
changes roles, an administrator must make those changes in the system to prevent unauthorized
access to data.
Privileged Access Management (PAM)
Privileged Access Management addresses the need to ensure least privilege. It is used to prevent
attackers from escalating their privileges in order to gain access and disrupt the network. PAM
PAM is able to identify privileged accounts as those which use administrative login credentials
Governing access
PAM allows for account management throughout its lifecycle, including how accounts gain
Auditing Activity
PAM is capable of logging all activity of privileged access use and attempts. It also is able to track
network anomalies.
Automated task management
PAM is able to automate tasks that happen repeatedly, such as software installation, scheduled
Administrative
Deterrent
Physical
Technical
2. Which of the following states that users should be given only the level of access needed to
perform their duties?
Separation of duties
Accountability
Principle of least privilege
Authorization
3. Which of the following access control models allows object creators and owners to reassign
permissions to users?
Group policies
Passwords
Mantraps
Firewalls
organization. Once the risks are identified, an organization must decide the best way to handle
A more detailed risk management process for an organization is shown in the diagram below:
Protect Life
Contain
Being able to contain the harm caused by an attack will help to limit additional damage and loss
Assess
Following an attack, determine the extent of the damage. This should be done immediately after
Determine Cause
Understand the resources at which the attack was aimed and what vulnerabilities were
Repair
Damage should be repaired as quickly as possible to restore normal business operations and
Review
Review the process thoroughly. Determine with your team the steps that were executed
uses those values to determine the next steps. The goal is to calculate objective numeric values
for each of the components gathered during the risk assessment and cost benefit analysis by
Overall value of asset to organization; immediate financial impact of losing asset; indirect
SLE is the total amount of revenue that is lost from a single occurrence of the risk.
How many times you reasonably expect the risk to occur during one year.
Annual Loss Expectancy (ALE)
Total amount of money your organization will lose in one year if nothing is done to mitigate the
risk.
Cost of Controls
Accurate estimates for cost of acquiring, testing, deploying, operating, and maintaining each
control.
ROSI = ALE before control – ALE after control – annual cost of controls.
The proportion of an asset’s value that would be lost due to a particular risk, expressed as a
percentage.
Example: You have an asset valued at $100,000 and the Exposure Factor (EF) for this asset is
25%. If the Annual Rate of Occurrence for an incident is 3, what is the Annual Loss Expectancy?
So, we can expect to lose ~$75,000 each year if this risk isn't mitigated. How much would you
After performing a quantitative risk analysis, you should have the following information:
Assigned monetary values for asset
The loss potential for the company on a per-threat basis over 12 months
instead of objective costs. The basic process is very similar to what happens in the quantitative
approach. For example, in qualitative risk management, we calculate relative values and don’t
assign hard financial values to assets, expected losses, and cost of controls.
collaborative workshops involving people from a variety of groups within the organization. It is
important to carefully identify who should be a part of this process to ensure that you have a
The results are presented to management for consideration during a cost-benefit analysis.
Quantitative Qualitative
respond. For this, we have 4 basic decisions. We can choose to avoid, transfer, accept, or
Risk Avoidance
The most effective way to deal with risk is to avoid it, but this isn't always possible. When it is
Risk Transference
The risk or effect of the risk can be transferred to another party responsible for restoration and
recovery in the event that the threat manifests. For example, an organization may purchase
Risk Acceptance
Perhaps we do not need to do anything at all. If the organization recognizes a risk, identifies it,
and accepts that it will have limited impact, then we have accepted the risk.
Risk Mitigation
The most common response to a particular risk is reducing the likelihood or impact of a risk’s
exposure. For example, to mitigate the risk of a ransomware attack, we ensure that all systems
are up-to-date and start an employee cybersecurity awareness program. We may also segment
Implementing controls
Now that we have decided how to handle the risk, we can implement controls for those risks for
which we are planning to mitigate. To do this we will deploy and operate control solutions to
reduce risk to the business. We will try to seek holistic approaches which will incorporate
people, process, and technology into the mitigating solution. We will also organize by defense-
in-depth by working across the organization to integrate this solution with other implemented
solutions.
effective. This is an ongoing phase in which the Security Risk Management Team periodically
verifies that the controls implemented during the preceding phase are actually providing the
expected degree of protection. The team will analyze the risk management process for
effectiveness and verify that controls are providing the expected degree of protection. And they
1. Which of the following is the monetary loss that can be expected for an asset from risk for the
entire year?
ALE
SLE
ARO
BIA
Avoidance
Transference
Acceptance
Mitigation
Identify threats
Identify vulnerabilities
Determine the risk
Determine the response
4. Financial is one type of business impact. Which of the following is another type?
Pride
Technical
Device
Reputation
A friend sends you an email that says you must forward it to 20 other friends or else you
will have bad luck for the rest of your life. This is an example of
o Phishing
o Whaling
o Rabbit
o Hoax
Which type of malware requires the user to pay to remove the malware?
o Trojan
o Ransomware
o Adware
o Keylogger
You download a new game from a website. You begin installing the game, then walk
away from your computer to answer the phone. When you come back to play the new
game, you notice your computer is extremely slow to respond and it crashes. What most
likely happened?
o Easy to deactivate
o Easy to create
o Able to reinfect
Which of the following does NOT require any user interaction to spread?
o Hoax
o Trojan
o Virus
o Worm