In-Depth Notes on Authentication & Access Control
Authentication & Access Control
Overview of Key Concepts
- Authentication: Verifying the identity of a user/system to ensure only authorized access.
- Access Control: Restricting access to data/resources based on user roles and identity.
- Importance: Prevents unauthorized access, protects sensitive information, reduces insider threats, ensures compliance with regulations.
Authentication
- Definition: Process of verifying a user's or system's identity.
- Common Methods:
- Password-based authentication: Most common; weaknesses include vulnerability to guessing and brute-force attacks.
- Multi-factor authentication (MFA): Combines two or more factors for stronger security; e.g., password + OTP.
- Biometric authentication: Uses unique physical traits; types include fingerprint, retina scan, and facial recognition.
- Password Best Practices:
- Use complex passwords
- Regularly change passwords
Access Control
- Definition: Restricting access to data/resources based on various factors.
- Based On:
- User identity
- Role
- Permissions
Types of Access Control Models
Discretionary Access Control (DAC):
- Owner defines access permissions (e.g., Windows file permissions).
- Strengths: Flexible; Weaknesses: Prone to insider threats.
Mandatory Access Control (MAC):
- Permissions defined by a central authority (e.g., military classifications).
- Strengths: Strong control; Weaknesses: Less flexibility.
Role-Based Access Control (RBAC):
- Access defined by roles (e.g., Admin, User, Guest).
- Strengths: Easier management; reduces human error.
Principle of Least Privilege (PoLP)
- Users/applications should have minimal access necessary.
- Reduces insider threats and lateral movement during attacks.
Database-Level Authentication Methods
- Username and password.
- Certificate-based authentication.
- Integrated authentication using LDAP (e.g., Active Directory).
Privilege Escalation and Monitoring
- Privilege Escalation: Gaining higher access than intended, often due to weak controls or misconfigured permissions.
- Example: Exploiting weak file permissions to elevate a user account to admin.
- Auditing and Monitoring: Track user activity to identify suspicious behavior (e.g., SQL Server Audit).
Access Control Best Practices
- Apply least privilege principles.
- Enable multi-factor authentication.
- Monitor and log access activities.
- Regularly review permissions.
Handling Failed Logins
- Implement account lockout policies.
- Monitor failed login attempts.
Insider and External Threats
- Insider Threats: Threats from authorized users; mitigated by least privilege and monitoring.
- External Threats: Include brute-force attacks and phishing; mitigated via strong password policies.
Identity Protection
- Microsoft Identity Protection helps safeguard identities & sensitive data using machine learning and adaptive policies.
- Detects unusual activities and prompts additional verifications like MFA.
Incident Response for Access Violations
- Steps to follow:
- Identify
- Contain
- Recover
- Report
Future Trends in Authentication
- Include passwordless authentication and AI-driven access control.
Compliance Requirements
- GDPR: Protects personal data of EU citizens; requires user consent and rights for data access and deletion.
- HIPAA: Protects health information; mandates secure handling with safeguards.
- PCI DSS: Ensures secure credit card handling; applies to businesses storing/transmitting card data.
- Non-Compliance Penalties: Range from fines to operational restrictions based on the regulation.