Developing Cybersecurity Programs and Policies
Developing Cybersecurity Programs and Policies
Cybersecurity Curriculum
Written by Omar Santos
Covers Chapter 9: Access Control Management
Objectives
Explain access control fundamentals.
Apply concepts such as default deny, need-to-know, and least privilege.
Understand secure authentication methods.
Protect systems from risks associated with Internet connectivity, remote access, and telework environments.
Manage and monitor user and administrator access.
Develop policies necessary to support access control management.
Access Control Fundamentals
Access Controls: Security features that govern user and process communication and interaction with systems and resources. - Primary Objective: Protect information and systems from unauthorized access, modification, or disruption.
Three Common Attributes of Access Controls: 1. Identification Scheme: Establishes who the user is. 2. Authentication Method: Verifies user identity. 3. Authorization Model: Determines what users can do.
Security Posture
Security Posture: The organization’s overarching approach to access control.
Every access control decision is based on the company’s security posture.
Two Fundamental Security Postures: 1. Secure: Implements the "default deny" model. 2. Open: Implements the "default allow" model.
Default Allow vs. Default Deny
Default Allow: - By default, no security is deployed; all users have unrestricted access. - Easier to deploy and works out-of-the-box; lacks inherent security.
Default Deny: - Also known as "deny all". - Access is blockaded by default until specific controls are altered to permit access.
Principle of Least Privilege
Principle of Least Privilege: Users are granted the least amount of permissions necessary to perform their assigned tasks, and no more.
Forms a robust foundation for any access control policy.
Benefits: - Protects data integrity and availability. - Prevents users from accidentally deleting important files they cannot access.
Important for employees to understand why they do not have unrestricted access to all company data.
Need-to-Know
Need-to-Know: Authorization for access based on a demonstrated reason for requiring information.
Should be incorporated into the company culture and security training.
Protects the confidentiality of corporate data and can also protect integrity and availability based on the attack type.
Key Concepts of Identification
Identities should have the following characteristics: - Uniqueness: Each identity must be distinct within the system. - Nondescript: Identities should not reveal personal information. - Securely Issued: Identities must be distributed securely to prevent impersonation. - Location-based: Identities can be tied to specific locations or contexts.
Verifying Identity: Authentication
Authentication: The process requiring subjects to supply verifiable credentials.
Types of Authentication: - Single-Factor Authentication: Utilizes one credential factor for verification. - Multifactor Authentication: Employs two or more credential factors for user verification. - Multilayer Authentication: Utilizes two or more of the same type of credentials (e.g., multiple passwords).
Three Categories of Authentication Factors
Knowledge: What the user knows. - Examples: Password, PIN, security question answers.
Possession: What the user has. - Examples: One-time passcodes, memory cards, smart cards, out-of-band communication.
Inherence: What the user is. - Examples: Biometric identification (fingerprints, facial recognition).
Authorization
Authorization: The method of assigning permissions to authenticated subjects for specific operations.
Three Primary Authorization Models: 1. Object Capability: Programmatically grants access based on a unique reference and an operational message. 2. Security Labels: Uses mandatory access controls embedded within object and subject properties. 3. Access Control Lists (ACLs): Determines access rights based on established criteria.
Categories of Access Control Lists
Mandatory Access Control (MAC): Data is classified, and access is granted based on information sensitivity.
Discretionary Access Control (DAC): Data owners determine who has access to specific data.
Role-Based Access Control (RBAC): Access rights are determined by user roles within the organization.
Rule-Based Access Control: Access given based on criteria that exists outside of user or group accounts.
Attribute-Based Access Control: Access is determined by evaluating rules against attributes of entities, operations, and the environment.
Accounting
Accounting: The process of auditing and monitoring user actions after accessing resources.
Audit Trail Logs must capture: - When the user accessed the resource. - What actions the user performed with that resource. - When the user ceased using the resource.
Infrastructure Access Controls
Network Infrastructure: Comprised of interconnected hosts and devices.
Infrastructure Access Controls include: - Physical and logical network design. - Border devices (firewalls, gateways). - Communication mechanisms (protocols). - Host security settings (firewalls within systems).
Network Segmentation
Network Segmentation: Logical grouping of network assets, resources, and applications.
Types of Network Segments: 1. Enclave Network: Secure and isolated network segment. 2. Trusted Network: Network trusted by the organization. 3. Semi-Trusted Network: Includes perimeter networks or demilitarized zones (DMZ). 4. Guest Network: Network available to visitors (can be wired or wireless). 5. Untrusted Network: External networks not trusted by the organization.
Layered Border Security
Layered Border Security: Multiple security measures working in concert, focusing on a single objective.
Components include: - Firewall devices. - Intrusion Detection Systems (IDS). - Intrusion Prevention Systems (IPS). - Content filtering and validations (whitelisting/blacklisting). - Management of border devices.
Remote Access
Remote Access: Authorized users with a business need must be allowed to access the corporate network remotely. - Not all employees should have remote access by default. - Remote activities should be monitored and audited. - Organization's business continuity plan must consider telecommuting environments.
Remote Access Technologies
Virtual Private Networks (VPNs): Establishes a secure tunnel for transmitting data over unsecure networks (e.g., the Internet). - Creates a virtual pathway connecting systems through a broader Internet infrastructure.
Remote Access Portals: - Portal Server: Centralized access point for applications. - Terminal Server: Provides each remote user access to a standardized virtual desktop.S
User Access Controls
User Access Controls: Ensure authorized users can access necessary information and resources while preventing unauthorized users from accessing limited information.
Users should only have access to information necessary for their roles and responsibilities.
Administrative Account Controls
Administrative Account Controls: Certain accounts with elevated privileges are essential (e.g., network admin, system admin, etc.).
Mitigating Controls: - Segregation of Duties: Assigning different tasks to different individuals to prevent fraud. - Dual Control: Requiring two individuals to perform a task together for greater security.
Types of Access to be Monitored
Access Monitoring Types: - Successful access attempts. - Failed access attempts. - Privileged operations conducted.
Is Monitoring Legal?
Employees should have no expectation of privacy during company time or when using company resources.
Courts prioritizing employer interests over individual privacy rights based on factors such as: - Actions taken at work. - Use of company-provided equipment and bandwidth. - Quality assurance in work performance. - Employer rights to protect property from theft and fraud.
Legal Guidelines for Monitoring
Monitoring is acceptable when: - It serves a legitimate business purpose. - Clearly defined policies set expectations for employee privacy. - Employees are informed about monitoring practices and policies.
Acceptable Use Agreement: Must include a clause about monitoring with user consent required upon login.
Summary
Three Attributes of Access Control: Identification scheme, authentication method, and authorization model.
Two Fundamental Security Postures: Secure and Open.
Principle of Least Privilege: Essential for effective access control policies.
Identity characteristics: Unique, nondescriptive, and securely issued.
Authentication Types: Single-factor, multifactor, multilayer.
Authentication Factors: Knowledge, possession, and inherence.
Authorization Models: Object capability, security labels, access control lists.
Network Segment Types: Enclave, trusted, semi-trusted, guest, and untrusted networks.
Remote Access Technologies: VPNs and remote access portals.
Access Monitoring Types: Successful, failed, and privileged operations.