security guide to network security fundamentals third
play

Security+ Guide to Network Security Fundamentals, Third Edition - PDF document

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define Access Controls List the four Access Control Models Describe logical Access Control Methods Explain the


  1. Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives • Define Access Controls • List the four Access Control Models • Describe logical Access Control Methods • Explain the different types of physical access control • What is Access Control? Access control – The process by which resources or services are granted or denied on a computer system or network • Four standard Access Control models – Identification • User presents credentials or identification (e.g. username) – Authentication • Validate User’s credentials are authentic – Authorization • Granting permission to take the action – Access • Provide only certain services or applications in order to perform their duties Access Control Terminology (cont.) • Computer access control can be accomplished by one of three entities: – Hardware – Software – Policy • Access control can take different forms depending on the resources that are being protected • computer systems impose access controls based on: – Object – Subject – Operation Access Control Models • Access control model – Provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications – Used for hardware / software validation • Once an access control model is applied

  2. – Custodians can configure security based on the requirements set by the owner • So that end users can perform their job functions Access Control Models (cont.) • Mandatory Access Control (MAC) model – Users cannot implement, modify, or transfer any controls – Owner & Custodian responsible for managing access – Most restrictive model because all controls are fixed – In original MAC model, all objects and subjects were assigned a numeric access level • The access level of the subject had to be higher than that of the object in order for access to be granted Access Control Models (cont.) • Discretionary Access Control (DAC) model – The least restrictive – subject has total control over any objects that he or she owns • Includes programs associated with those objects • Subject can also change the permissions for other subjects over objects • Two significant weaknesses – Relies on subject to set the proper level of security – Subject’s permissions are “inherited” by programs that the subject executes Access Control Models (cont.) • User Account Control (UAC) – Operating systems prompt the user for permission whenever software is installed • Access Control Models (cont.) • Three primary security restrictions implemented by UAC: – Run with limited privileges by default – Applications run in standard user accounts – Standard users perform common tasks • Another way of controlling DAC inheritance is to automatically reduce the user’s permissions • Enforces the Principal of least Privilege Access Control Models (cont.) • Role Based Access Control (RBAC) model – Sometimes called Non-Discretionary Access Control – Considered a more “real world” approach than the other models – Assigns permissions to particular roles in the organization, and then assigns users to that role – Objects are set to be a certain type, to which subjects with that particular role have access

  3. Access Control Models (cont.) • Rule Based Access Control (RBAC) model – Also called the Rule-Based Role-Based Access Control (RB-RBAC) model or automated provisioning – Can dynamically assign roles to subjects based on a set of rules defined by a custodian – Each resource object contains a set of access properties based on the rules • Rule Based Access Control is often used for managing user access to one or more systems Practices for Access Control • Separation of duties – Requires that if the fraudulent application of a process could potentially result in a breach of security • Then the process should be divided between two or more individuals • Job rotation – Instead of one person having sole responsibility for a function, individuals are periodically moved from one job responsibility to another – Common use is to enforce mandatory vacations; allows a different user to access how security is implemented to prevent collusion Practices for Access Control (cont.) • Least privilege – Each user should be given only the minimal amount of privileges necessary to perform his or her job function • Implicit deny – If a condition is not explicitly met , then it is to be rejected • Implementing Access Controls – Two broad categories • Physical access control • Logical access control Logical Access Control Methods • Logical access control includes: – Access control lists (ACLs) – Group policies – Account restrictions – Passwords • Access Control Lists (ACLs) Access control list (ACL) – Permissions assigned to an object – Specifies subjects that are allowed specified access the object • Most often viewed in content of the OS • Structure behind ACL tables is complex

  4. • Access control entry (ACE) – Each entry in the ACL table in the Microsoft Windows, Linux, and Mac OS X operating systems Access Control Lists (ACLs) (cont.) • In Windows, the ACE includes four items of information: – A security identifier (SID) for the user account, group account, or logon session – An access mask that specifies the access rights controlled by the ACE – A flag that indicates the type of ACE – A set of flags that determine if objects can inherit permissions Group Policies • Group Policy – Feature within Microsoft Windows Active Directory (AD) – Provides centralized management and configuration of computers and remote users – Primarily used in enterprise environments to restrict user actions that pose a security risk – Group Policy settings are stored in Group Policy Objects (GPOs) Account Restrictions • Time of day restrictions – Limit when a user can log on to a system – These restrictions can be set through a Group Policy – Can also be set on individual systems • Account expiration – The process of setting a user’s account to expire based on a date – Orphaned accounts are user accounts that remain active after an employee has left an organization • Can be controlled using account expiration Passwords • Password – The most common logical access control – Sometimes referred to as a logical token – A secret combination of letters and numbers and possible characters that only the user knows • A password should never be written down

  5. – Must also be of a sufficient length and complexity so that an attacker cannot easily guess it (password paradox) Passwords (cont.) • Password Attacks: – Brute force attack • Guess a password through combining random characters • Passwords typically are stored as a “hash” – Attackers try to steal the file of hashed passwords and break the hash offline – Dictionary attack • Attacker obtains hashes of common dictionary words – Compares hashed dictionary words against stolen password file – Rainbow tables • Large tables of pre-generated hash values – Passwords (cont.) Rainbow Tables (Cont.) – Generating a rainbow table requires a significant amount of time – Rainbow table advantages: • Can be used repeatedly • Faster than dictionary attacks • Memory needed on the attacking machine is reduced – Success of rainbow tables tied to older Windows OS password hashing algorithms • A defense against breaking encrypted passwords with rainbow tables – Add complexity to hash by including a random sequence of bits as input along with the user-created password • These random bits are known as a salt – Make brute force, dictionary, and rainbow table attacks much more difficult Passwords (cont.) • Password policy – A strong policy can provide defenses against attacks – First policy: Create and use strong passwords • Best defenses against rainbow tables: Prevent attacker from capturing password hashes Use 3 rd party applications to track passwords complexity and life • • Domain Password Policies • Domain password policy – Restrictions set through Domain password policy – There are six common Windows domain password policy settings, called password setting objects • Used to build a domain password policy

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend