32
Chapter 9: Access Control

Chapter 9: Access Control

  • Upload
    sheena

  • View
    48

  • Download
    0

Embed Size (px)

DESCRIPTION

Chapter 9: Access Control. Objectives. Apply the concepts of default deny, need-to-know, and least privilege Secure user accounts throughout the employee lifecycle Understand secure authentication. Objectives Cont. - PowerPoint PPT Presentation

Citation preview

Page 1: Chapter 9: Access Control

Chapter 9: Access Control

Page 2: Chapter 9: Access Control

2

Objectives

Apply the concepts of default deny, need-to-know, and least privilege

Secure user accounts throughout the employee lifecycle

Understand secure authentication

Page 3: Chapter 9: Access Control

3

Objectives Cont.

Protect systems from risks associated with remote access and telecommuting environments

Monitor and log all access-related activities and events

Develop policies to support access control to information assets

Page 4: Chapter 9: Access Control

4

What Is a Security Posture?

It is the organizational attitude toward security that is reflected in its default position

Two fundamental security postures: Secure, which implements the “default deny” model Reactive, which implements the “default permit” model

Every access control decision for a company is based on that company’s security posture

Page 5: Chapter 9: Access Control

5

What Is a Security Posture? Cont.

Default permit vs. default deny Default permit: by default, out of the box, no

security is deployed, everyone can do everything. Easier to deploy, works out of the box No security

Default deny A.k.a. “deny all” Access is unavailable by default until the appropriate

control is altered to allow access

Page 6: Chapter 9: Access Control

6

What Is a Security Posture? Cont.

Principle of Least Privilege Definition: the least amount of permissions granted a user

that still allows them to perform whatever business tasks they have been assigned, and no more

This is a strong foundation for any access control policy Protects the data but also protects the user. They can’t be

accused of having deleted a file to which they can’t gain access!

From a cultural stand point, it is important to explain to employees why they are not “trusted” with all the company’s data

Page 7: Chapter 9: Access Control

7

What Is a Security Posture? Cont.

Need-to-know Definition: having a demonstrated and authorized

reason for being granted access to information Should be made a part of the company’s culture Should be incorporated in security training

curriculum At the very least protects the confidentiality of

corporate data, but may also protect integrity and availability depending on the attack type

Page 8: Chapter 9: Access Control

8

What Is a Security Posture? Cont.

Three main access control models MAC (Mandatory Access Control): data is

classified, and employees are granted access according to the sensitivity of information

DAC (Discretionary Access Control): Data owners decide who should have access to what information

RBAC (Role-based Access Control): Access is based on positions (roles) within an organization

Companies need to decide which access control model they will implement

Page 9: Chapter 9: Access Control

9

What Is a Security Posture? Cont.

Classification models Used in public sector:

Top secret, secret, confidential Used in the private sector:

Sensitive, confidential, public Classification level combined with need-to-

know should define actual access level

Page 10: Chapter 9: Access Control

10

What Is a Security Posture? Cont.

The role of the information owner The information owner is the one who defines the

access rules pertinent to the information for which they are responsible

They may enlist the assistance of the Information Security Officer

Page 11: Chapter 9: Access Control

11

Managing User Access

Simple yet important questions that should be asked – and answered! – when managing user access: Who creates the user accounts? How are they created? How will this function be logged? What happens when user situations evolve? How to insure that each user’s account is unique?

Page 12: Chapter 9: Access Control

12

Managing User Access Cont.

User Account Creation Transcends departmental boundaries Requires involvement & communication between:

Human Resources Information Technology Information Security Officer

Page 13: Chapter 9: Access Control

13

Managing User Access Cont.

User Access Management Account creation needs to be regulated with an

official, approved process HR should initiate the initial paperwork to require

creation of a new account The request form should include:

Demographic information Employee role Access & equipment requirements

Page 14: Chapter 9: Access Control

14

Managing User Access Cont.

User Access Management Filled HR form should be sent to appropriate

supervisor / manager for authorization ISO may also be consulted, especially if level of

access for this user account is high Once authorized, form is sent to the department

responsible for user account creation (usually IT) Account should not be created, and privileges

should not be assigned, until full authorization has been granted

Page 15: Chapter 9: Access Control

15

Managing User Access Cont.

User Access Management Inside the department in charge of account

creation, there should be a position responsible for all user account-related functions, such as creation, modification, deletion.

All user account tasks should be logged and auditable for accountability purposes

All logging should be automated A separate person/department should be in

charge of reviewing this log

Page 16: Chapter 9: Access Control

16

Managing User Access Cont.

Changes to the user status The accounts and the level of access they are

granted are a reflection of an employee’s status within the company Promotions may imply new responsibilities and/or tasks,

and therefore more/different privileges to be assigned to the account

If the career move is in a different department, the account should be audited to make sure that privileges that applied to the previous position are still needed for the new one. If not, they should be revoked

Page 17: Chapter 9: Access Control

17

Managing User Access Cont.

Changes to the user status The accounts and the level of access they are

granted are a reflection of an employee’s status within the company In the case of employee termination, HR must

communicate with the proper department in charge of user account management so that the account is at the very least disabled, if not deleted

A lack of communication in this sort of situation can result in a user account still being valid while the employee to whom it was assigned is not in the employ of the company anymore!

Page 18: Chapter 9: Access Control

18

With Privilege Comes Responsibility The privilege / responsibility correlation

Certain positions in a company require for the employee to have a high level of privilege in order for them to execute the tasks inherent to their job

Accounts with high level of privilege should be monitored and audited

Such employees should be provided two accounts: one with the high privilege level, and another, “regular” account for all non-high privilege tasks such as email and web surfing

Page 19: Chapter 9: Access Control

19

Keeping Passwords Secure

Password Management Single factor authentication means using only one

way to verify a users identity. This is generally a password

Users should be required to keep their passwords confidential

Passwords should be changed whenever there is a chance they were compromised

Compromising a password may result in unauthorized access as well as identity theft

Page 20: Chapter 9: Access Control

20

User Authentication for Remote Connections Remote Access

Users who have a demonstrated business-need to access the corporate network remotely and are authorized to do so must be given that privilege

Not all employees should be given this privilege by default

Remote access activities should be monitored and audited

The organization’s business continuity plan must account for the telecommuting environment

Page 21: Chapter 9: Access Control

21

Monitoring System Access and Use

Auditing should be turned on, and logs generated should be reviewed daily

The policy should define: What will be logged Who will be in charge of reviewing those logged What the log review schedule will be

Page 22: Chapter 9: Access Control

22

Monitoring System Access and Use Cont. What activity should be monitored?

Four main monitoring areas: Authorized access Privileged operations Unauthorized attempts System alerts or failures

Page 23: Chapter 9: Access Control

23

Monitoring System Access and Use Cont. What activity should be monitored?

Authorized access: Log when users and systems that have proper

authorization connect and use information resources Information gathered should include

ID of the user or system performing the authorized action Date and time of each important event What kind of event it was Which program/utility was used

Page 24: Chapter 9: Access Control

24

Monitoring System Access and Use Cont. What activity should be monitored?

Authorized access : Many event kinds associated with authorized access:

Account logon events Account management events Directory service events Logon events Object access events Policy change events Privilege use events Process tracking events System events

Page 25: Chapter 9: Access Control

25

Monitoring System Access and Use Cont. What activity should be monitored?

Authorized access: For all events recorded, the administrator has to decide

which of the following will be logged: Success of the event Failure of the event Both

The more information logged, the larger the log grows, which often leads to the logs becoming unmanageable and ignored – therefore not reviewed

Page 26: Chapter 9: Access Control

26

Monitoring System Access and Use Cont. What activity should be monitored?

Privileged operations: Events for activities/operations reserved for those users

with special privilege to perform critical operations The use of the administrator account (or root,

supervisor) must be closely monitored Other critical events to be monitored include:

Startup / shutdown Attachment of devices Hardware installation Software installation

Page 27: Chapter 9: Access Control

27

Monitoring System Access and Use Cont. What activity should be monitored?

Unauthorized attempts include: Failed attempts at access Access policy violations Also includes events collected from firewall logs

Dropped incoming connections Disallowed outgoing connections

Page 28: Chapter 9: Access Control

28

Monitoring System Access and Use Cont. What activity should be monitored?

System Alerts or Failures generated by: Hardware failures Application failures Power problems

Page 29: Chapter 9: Access Control

29

Monitoring System Access and Use Cont. Log Review and retention

How often should the logs be reviewed? By whom?

By an authorized employee who does not have full admin rights on the network for separation of duties purposes

How long will the log files be archived for? How will they be stored securely?

Page 30: Chapter 9: Access Control

30

Is Monitoring Legal?

Courts have favored an employer’s right to protect their interests over individual privacy rights because: Actions were taken at the employer’s place of work Equipment used – including bandwidth – was company-

provided Monitoring the work also helps ensure the quality of

work The employer has the right to protect property from theft

and/or fraud

Page 31: Chapter 9: Access Control

31

Is Monitoring Legal? Cont.

Courts indicate that monitoring is acceptable if it is reasonable: Justifiable if serving a business purpose Policies are set forth to define what privacy employees should

expect while on company premises Employees are made aware of what monitoring means are

deployed Acceptable use agreement should include a clause

informing users that the company will and does monitor system activity

Users must agree to company policies when logging on

Page 32: Chapter 9: Access Control

32

Summary

Access control is a complex domain. Access to information is extremely important to regulate.

User access and user actions on the network must be monitored and logged, whether they be located on premises or gaining access to the network remotely.

Monitoring is useless if the information gathered is not reviewed regularly.