20
 CORPORATE EXECUTIVE BOARD NOVEMBER 2005 IT Practice Project Support Desk KEY FINDINGS IT Security Frameworks: Access Control © 2005 Corporate Executive Board Catalog No.: IREC14J4ML1 K EY QUESTIONS  What access control guidelines are included in the high-profile IT security frameworks?  What are the shared and unique areas of access control guidelines in the high-profile IT security frameworks? TABLE OF CONTENTS Overview 2 COBIT 5 ISO 17799 7 ITIL 9 The ISF Standard 11 NIST 800-14 15 SSE-CMM 18 SECURITY FRAMEWORKS PROFILED EXECUTIVE SUMMARY The single most problematic obstacle to regulatory compliance is access management, according to regulatory auditors . The fluid and unprecedented level s of access to information enjoyed by both internal and external constituents has rendered traditional, static methods of access control largely obsolete. Organizations often have difficulty comprehensively cataloguing the extensive control measures necessitated  by complex information access environments. The security frameworks profiled in this brief provide, with varying degrees of scope and detail, collections of best  practices and tactical guidel ines in order to assist IT organizations in their attempts to establish comprehensive and secure access control processes. High-profile IT security frameworks that address access control include:  COBIT (Control Objects for Information and related Technology)  ISO 17799 (International Organization for Standardization)  ITIL (Information Technology Infrastructure Library)  The ISF Standard (Information Security Forum)   NIST 800-14 (Nation al Institute of Standards and Technology)  SSE-CMM (Systems Security Engineering-Capability Maturity Model)

GIRM - ARC Web Site Article IT Security Frameworks Access Control

Embed Size (px)

Citation preview

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

CORPORATE EXECUTIVE BOARD NOVEMBER 2005IT Practice Project Support Desk  KEY FINDINGS

IT Security Frameworks: Access Control

© 2005 Corporate Executive Board

Catalog No.: IREC14J4ML1

K EY QUESTIONS 

  What access control guidelines are

included in the high-profile ITsecurity frameworks?

  What are the shared and uniqueareas of access control guidelines inthe high-profile IT securityframeworks?

TABLE OF CONTENTS

Overview 2

COBIT 5

ISO 17799 7

ITIL 9

The ISF Standard 11

NIST 800-14 15

SSE-CMM 18

SECURITY FRAMEWORKS PROFILED 

EXECUTIVE SUMMARY 

The single most problematic obstacle to regulatorycompliance is access management, according toregulatory auditors. The fluid and unprecedented levelsof access to information enjoyed by both internal andexternal constituents has rendered traditional, staticmethods of access control largely obsolete.

Organizations often have difficulty comprehensivelycataloguing the extensive control measures necessitated by complex information access environments. Thesecurity frameworks profiled in this brief provide, withvarying degrees of scope and detail, collections of best practices and tactical guidelines in order to assist ITorganizations in their attempts to establishcomprehensive and secure access control processes.

High-profile IT security frameworks that address accesscontrol include: COBIT (Control Objects for Information and related

Technology)

 ISO 17799 (International Organization for Standardization)

 ITIL (Information Technology Infrastructure Library)

 The ISF Standard (Information Security Forum)

  NIST 800-14 (National Institute of Standards andTechnology)

 SSE-CMM (Systems Security Engineering-CapabilityMaturity Model)

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 2 

OVERVIEW 

 IT Security Frameworks Aid Organizations in Identifying Wide-Range of Relevant Access

Control Objectives

The single largest source of difficulty in achieving regulatory compliance, according to auditors,is the failure to segregate access privileges to applications and the failure to set-up new access

accounts and terminate old ones in a timely manner.1

 

Traditional access control models no longer meet the requirements of information sharing as practiced by the vast majority of organizations – requirements that are created by the fluid andunprecedented levels of access to information enjoyed by both internal and external constituents.2 It is difficult for organizations to comprehensively catalogue the extensive control measuresnecessitated by such complex information access control environments.

The security frameworks profiled in this brief provide, with varying degrees of scope and detail,collections of best practices and tactical guidelines to assist IT organizations in their attempts toestablish comprehensive and secure access control processes.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 3 

OVERVIEW (CONTINUED)

 IT Security Frameworks: Organization of Access Control Information

The various IT security frameworks take different approaches to organizing and presenting their access control guidelines. The following table briefly characterizes how each framework organizes its access control information. Namely, the table identifies the frameworks that do, and

do not, separate access control-related objectives from other security objectives by collectingaccess control guidelines into their own specific sections.

IT Security Frameworks: Organization of Access Control Information 

Separates access control guidelines intospecific sections 

Does NOT separate access controlguidelines into specific sections 

ISO 17799

ITIL

The ISF Standard

NIST 800-14 

COBIT

SSE-CMM 

Source: Corporate Executive Board Research. 

 ISO 17799 Contains Highest Volume of General Guidelines; The ISF Standard Provides

 Largest Amount of Tactical Detail 

The following graph plots the IT security frameworks covered in this research brief according tothe tactical, implementation-related details versus the volume of general access control guidelines provided by each framework. Frameworks that provide a great deal of tactical detail in support of general guidelines are plotted further-out on the X-axis and those that contain a high volume of general access control guidelines are plotted higher-up on the Y-axis.

IT Security Frameworks: Depth and Breadth of Provided Access Control Guidelines 

COBIT

ISO 17799

ITIL

NIST 800-14

SSE-CMM

The ISF Standard

Amount of Tactical Detail Provided

   V  o   l  u  m

  e  o   f   G  e  n  e  r  a   l   G  u   i   d  e   l   i  n  e  s   P  r  o  v   i   d  e   d

Source: Corporate Executive Board Research. 

Depth

   B  r  e  a   d   t   h

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 4 

OVERVIEW (CONTINUED)

 IT Security Frameworks: Practice Area Coverage

The table below presents a snapshot of the shared and unique access control practice areas thatare explicitly covered in the access control sections of each security framework or, when aseparate access control section is unavailable, in the practice areas relevant to access control.

IT Security Frameworks: Scope of Access Control Coverage

Access Control Practice Areas COBIT ISO 17799 ITILThe ISF

StandardNIST 800-14 SSE-CMM

Centralized identification andaccess rights management

     Network access control      

Operating system access control       Application access control      

Managed allocation of accessrights

         Management review of user 

accounts         

User control of user accounts  Key/encryption/advanced

authentication management     

 Activity monitoring        Violation and security activity

reports     

 Audit trail maintenance     

Online data access security    Secure teleworking access  

Communication of end-user safeaccess responsibilities

     Counterparty trust  

Transaction authorization    Non-repudiation  

Intra-group coordination   Anti-virus control  Service constraints  

 Access configuration changecommunication

 Source: Corporate Executive Board Research.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 5 

COBIT

Control Objects for Information and related Technologies (COBIT) is a collection of 318 controlobjectives that are categorized under 34 IT processes. The control objectives are non-technicalcontrols statements that define what elements must be managed in each identified IT process.These IT processes are then further classified into four process domains:

 Planning and Organizing Acquiring and Implementing Delivering and Supporting

 Monitoring and Evaluating

The IT control framework, produced by the IT Governance Institute, was first published in 1994and is now in its third edition. Version 4.0 of COBIT is slated for release in late November 2005.

COBIT does not collect access control practices into a single location in the framework. Instead, practices that are relevant to access control are presented along with general security practicesunder the “Ensure Systems Security” IT process in the “Delivering and Supporting” category. In

total, there are 21 control objectives under the Ensure Systems Security process. The following isthe subset of those 21 objectives that are most relevant to identity and access management.3 

COBIT: ACCESS CONTROL PRACTICES 

 Identification, Authentication and Access

The logical access to and use of IT computing resources should be restricted by theimplementations of adequate identification, authentication, and authorization mechanisms,linking users and resources with access rules. Such mechanisms should prevent authorized personnel, dial-up connections, and other system (network) entry ports from access computer 

resources and minimize the need for authorized users to use multiple sign-ons. Procedures shouldalso be in place to keep authentication and access mechanisms effective (e.g. regular passwordchanges).

 Security of Online Access to Data

In an online IT environment, IT management should implement procedures in line with thesecurity policy that provides access security control based on the individual’s demonstrated needto view, add, change, or delete data.

User Account Management  Management should establish procedures to ensure timely action relating to requesting,establishing, issuing, suspending, and closing of user accounts. A formal approval procedure

outlining the data or system owner granting the access privileges should be included. The securityof third-party access should be defined contractually and address administration and non-disclosure requirements. Outsourcing arrangements should address the risks, security controls and procedures for information systems and networks in the contract between the parties.

 Management Review of User Accounts Management should have a control process in place to review and confirm access rights periodically. Periodic comparison of resources with recorded accountability should be made tohelp reduce the risk of errors, fraud, misuse or unauthorized alteration.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 6 

COBIT (CONTINUED)

User Control of User Accounts

Users should systematically control the activity of their proper account(s). Also informationmechanisms should be in place to allow them to oversee normal activity as well as to be alerted tounusual activity in a timely manner.

 Security Surveillance

IT security administration should ensure that security activity is logged and any indication of imminent security violation is reported immediately to all who may be concerned, internally andexternally, and is acted upon in a timely manner.

Central Identification and Access Rights Management 

Controls are in place to ensure that the identification and access rights of users as well as theidentity of system and data ownership are established and managed in a unique and centralmanner to obtain consistency and efficiency of global access control.

Violation and Security Activity Reports

IT security administration should ensure that violation and security activity is logged, reported,reviewed and appropriately escalated on a regular basis to identify and resolve incidentsinvolving unauthorized activity. The logical access to the computer resources accountabilityinformation (security and other logs) should be granted based upon the principle of least privilege, or need-to-know.

Counterparty Trust 

Organizational policy should ensure that control practices are implemented to verify theauthenticity of the counterparty providing electronic instructions or transactions. This can beimplemented through trusted exchange of passwords, tokens or cryptographic keys.

Transaction Authorization

Organizational policy should ensure that, where appropriate, controls are implemented to provideauthenticity of transactions and establish the validity of a user’s claimed identity to the system.This requires use of cryptographic techniques for signing and verifying transactions.

 Non-Repudiation

Organizational policy should ensure that, where appropriate, transactions cannot be denied byeither party, and controls are implemented to provide non-repudiation of origin or receipt, proof of submission, and receipt of transactions. This can be implemented through digital signatures,time stamping and trusted third-parties, with appropriate policies that take into account relevantregulatory requirements.

Cryptographic Key Management 

Management should define and implement procedures and protocols to be used for generation,change, revocation, destruction, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and unauthorizeddisclosure. If a key is compromised, management should ensure this information is propagated toany interested party through the use of Certificate Revocation Lists or similar mechanisms.

Source: Control Objectives for Information and related Technology 3rd 

Edition, IT Governance Institute, July 2000.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 7 

ISO 17799

ISO collects 132 controls under 39 IT process categories. Each process has a control objectiveand the specific controls provided suggest ways of satisfying that objective. The 39 IT processesare divided amongst 11 process domains:

 Security Policy Organizing Security Asset Management Human Resources Security

 Physical and Environmental Security

 Communications and Operational Management

 Access Control Information Systems Acquisition, Development, and Maintenance Information Security Incident Management

 Business Continuity Management Compliance

The most recent version of ISO 17799 was published in June 2005 by the InternationalOrganization for Standardization and the International Electrotechnical Commission. Its predecessor, BS 7799, was first published in 1995. ISO 17799 is expected to be replaced by ISO27002 sometime in 2007.

There are seven IT processes, each with several specific controls, under the “Access Control”domain. In addition, several controls that were included under the access control domain in ISO17799:2000 have been removed or moved to different IT domains in the new ISO 17799:2005.Most notably, all of the access control mechanisms relating to systems monitoring have beenmoved from the access control domain to the operational management domain. But in order to provide a more complete overview of relevant access management guidelines in ISO 17799, thosecontrols remain in the list below.4 

ISO 17799:2000 AND ISO 17799:2005 ACCESS CONTROL PRACTICES 

Control Access to Information

 Develop a policy and rules to control accesso  Develop a policy to control information access

o  Develop information access control rules

 Manage the Allocation of Access Rights

 Establish a user registration procedure Control the authorization of system privileges

 Establish a process to manage passwords

 Review user access rights and privileges

 Encourage Responsible Access Practices  Encourage users to protect passwords

 Encourage users to protect equipment

 Clear desk and clear screen policy

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 8 

ISO 17799 (CONTINUED)

Control Access to Computer Networks

 Formulate a network use policy Use enforced paths to control access Authenticate remote user connections

 Use node authentication to control remote users Equipment identification in networks Control remote access to diagnostic and configuration ports Segregate internal and external networks

 Restrict connection to shared networks

 Establish shared network routing controls

 Verify the security of network services

 Restrict Access at Operating System Level 

 Use automatic terminal identification techniques Establish terminal log-on procedures

 Identify and authenticate all users Set-up a password management system Control the use of all system utilities

 Provide duress alarms to protect users Use time-outs to protect inactive terminals

 Restrict terminal connection times

 Manage Access to Application Systems

 Regulate access to applications and information Isolate sensitive application systems

 Monitor System Access and Use

 Establish and maintain system logs

 Monitor information processing facilities

o  Establish procedures to monitor facilitieso  Review the results of monitoring activitieso  Study logs to identify security events

 Protect logs by synchronizing clocks

 Protect Mobile Equipment and Information

 Protect mobile equipment and information Protect telecommuter equipment and information

Sources: ISO 17799:2000 , International Organization for Standardization, June 2000; ISO 17799:2005 , InternationalOrganization for Standardization, June 2005.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 9 

ITIL

The Information Technology Infrastructure Library (ITIL) consists of generally accepted best practices in seven distinct IT management areas. Access control best practices are collected inITIL’s Security Management publication.

An updated version of ITIL, produced by the UK government’s Office of Government Commerce(OGC), is scheduled to be released in mid-2007.5 

ITIL: ACCESS CONTROL PRACTICES 

 Maintenance of Access Control 

Ensure that effective control over access is maintained and includes the management of users,accounts, rights, means of identification and authentication (including passwords and tokens) andkeeping access rights up-to-date.

 End-User Responsibilities  Encourage customer organizations to address their responsibilities explicitly in the SLA.Encouraging security awareness is essential. Areas in which explicit user responsibilities should be established include:

 The use of passwords Securing active sessions

  Not leaving equipment and data carriers unattended

 Procedures for import and export of software and data carriers (to prevent viruses and illegalsoftware)

 Use of external sources (Internet and other external data communication) Backup

 Responsibilities for laptop usage

 Network Access Control 

 Control access rights and restrictions to network services for internal as well as external users Separate networks and create enforced paths through the separate network domains

 Identify and authenticate computers systems, workstations, and PCs in the network 

 Control securely remote management (especially in relation to diagnostic ports) Explicitly set the security requirements for third-party network services

Computer Access Control 

 Identify and authenticate all workstations and terminals

 Enforce a standard log-on procedure in which only the minimum of information is provided(e.g. avoid providing details of the system type or organization name)

 Always identify and authenticate end-users to be able to trace all network activities to a natural person

 Install duress alarms

 Automatic time-out Institute time slots by limiting the use of IT resources to normal office hours

 Lock-out after a fixed number of failed access attempts Implement more stringent log-in checks for off-site access

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 10 

ITIL (CONTINUED)

 Application Access Control 

Use “roles” and “functions” in the applications themselves. Segregate duties for applicationssystem functions, system help, libraries, and the files of the programs themselves. For verysensitive information systems, an isolated computing environment without any shared facilities

can be established.

 Anti-Virus Control Policy

Anti-virus software must be updated at both the server and the client:

 Determine how frequently software needs to be updated

 Purchase the correct number and type of licenses

 Monitor updates receipt Manage the updating process for both networked and stand-alone systems

 Monitoring and Auditing IS Activity

 Record any exceptional or suspicious events in an audit trail

 Monitor system use Synchronize system clocks Report on attempted virus infections

Source: ITIL Security Management , Office of Government Commerce, April 1999.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 11 

ISF: THE STANDARD OF GOOD PRACTICE 

The Information Security Forum’s (ISF) The Standard of Good Practice (the Standard) publication presents detailed recommendations to mediate business risks associated with criticalinformation systems. Access control recommendations are included under the “Critical BusinessApplications” and “Computer Installations” sections. The latest version of the Standard, Version

4.1, was published by ISF in January 2005.6

 THE ISF STANDARD: ACCESS CONTROL PRACTICES 

Critical Business Applications: User Environment 

 Access Control 

 Users of the application should be identified (e.g. by a UserID), authenticated (e.g. by a password or token) and authorized (e.g. to use functionality required to perform their role).

 System administrators should be subject to strong authentication (e.g. using fingerprints, irisscans, challenge/response devices featuring one-time passwords or smartcards).

 There should be a method of ensuring that users do not share identification or authentication

details. There should be a process for issuing new or changed passwords that:

o  ensures that passwords are not sent in the form of clear text e-mail messages

o  directly involves the person to whom the password uniquely applieso  verifies the identity of the target user, such as via a special code or through

independent confirmationo  includes notification to users that passwords will expire soon.

 Users’ access rights should be:

o  restricted according to a defined policy, such as on a ‘need to know’ or ‘need torestrict’ basis

o  restricted according to users’ individual roleso  authorized by the application ‘owner’

o  revoked promptly when an individual user is no longer entitled to themo  enforced by automated access control mechanisms to ensure individual

accountability. Access to the application should be logged. Access logs should include sufficient information to provide a satisfactory audit trail (including users’ identities and locations, dates/times of accessand details of particular files or system utilities accessed).

 Access logs should be:o  set to include all security-related events (e.g. successful and failed access

attempts)o  reviewed periodically

o  retained for a specified period to comply with legal and regulatory requirements

o   protected against unauthorized change.

Computer Installations: Access Control 

 Access Control Arrangements

 Arrangements should be made to restrict access to the computer installation, and theinformation held in it.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 12 

ISF: THE STANDARD OF GOOD PRACTICE (CONTINUED)

 Access control arrangements should be supported by documented standards/procedures, whichshould take account of:

o  an information security policy, security classifications, agreements withapplication ‘owners’, requirements set by the installation ‘owner’ and legal,

regulatory and contractual obligationso  the need to achieve individual accountability, apply additional control to users

with special access privileges and provide segregation of duties. Access control arrangements should cover access:

o   by all types of staff (e.g. business users, individuals running the installation andspecialist IT staff, such as technical support staff)

o  to all types of information and software. Access control arrangements should:

o  restrict access in line with access control policies set by application ‘owners’

o  restrict the system capabilities that can be accessed, for example by providingmenus enabling access only to the particular capabilities needed to fulfill adefined role

o

  identify the location of terminals in useo   prevent misuse of passwords, for example by using encryption, one-time

 passwords or stronger authentication, such as token-based authenticationo  minimize the need for special access privileges (e.g. UserIDs that have additional

capabilities, such as ‘Administrator’ in Windows systems, or special capabilities,such as UserIDs that can be used to authorize payments)

o   be reviewed periodically

o  upgraded in response to new threats, capabilities, business requirements or experience of incidents.

Computer Installations: Access Control 

User Authorization

 All users of the computer installation should be subject to an authorization process before theyare granted access privileges. The processes for authorizing users should:

o   be defined in writing, approved by the installation ‘owner’ and applied to allusers

o  associate access privileges with defined users, for example with UserIDs rather than passwords

o  issue default access privileges of ‘none’ (i.e. rather than ‘read’)o  ensure redundant UserIDs are not re-issued for use.

 A file or database containing details of all authorized users should be established, which should be maintained by designated individuals, such as particular system administrators, and protectedagainst unauthorized change or disclosure.

 Details of authorized users should be reviewed:

o  to ensure that access privileges remain appropriate

o  to check that redundant authorizations have been deleted (e.g. for employees whohave changed role or left the organization)

o  on a regular basis (e.g. at least every six months)

o  on a more regular basis for users with special access privileges (e.g. at least everythree months).

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 13 

ISF: THE STANDARD OF GOOD PRACTICE (CONTINUED)

Computer Installations: Access Control 

 Access Privileges

 Access privileges for business users should be assigned by application ‘owners’ (the individualsin charge of business applications supported by the installation) and access privileges for 

computer staff (e.g. computer operators and system administrators) assigned by the installation‘owner’.

 Before access privileges come into effect:o  authorizations should be checked to confirm access privileges are appropriate

o  details of users should be recorded (e.g. their true identity, associated UserIDsand access privileges to be granted)

o  users should be advised of – and required to confirm – their access privileges andassociated conditions.

 Access privileges should not be assigned collectively (e.g. UserIDs/passwords shared in agroup) unless special circumstances apply. Whenever they need to be assigned collectively, theyshould be documented, approved by the relevant business ‘owner’ and subject to additionalcontrols (e.g. restricted access privileges and contractual conditions).

 Additional controls should be applied to special access privileges, including high-level privileges (such as ‘root’ in UNIX or ‘Administrator’ in Windows NT systems), powerfulutilities and privileges that can be used to authorize payments. These controls should include:

o  specifying the purpose of special access privileges

o  restricting the use of special access privileges to narrowly defined circumstanceso  requiring individual approval for the use of special access privileges

o  requiring users with special access privileges to sign-on using identificationcodes or tokens that differ from those used in normal circumstances.

 A process for terminating the access privileges of users should be established to ensure that:o  authentication details and access privileges are revoked promptly on all systems

to which the user had access

o  access profiles/accounts are deleted

o

  components dedicated to providing access, such as tokens or modems, aredisabled or removed.

Computer Installations: Access Control 

 Sign-On Process

 There should be a sign-on process that users must follow before they can gain access to anysystems within the computer installation, which should enable UserIDs to be identifiedindividually.

 Sign-on mechanisms should be configured so that they:

o  display no identifying details until after sign-on is completed successfully

o  warn that only authorized users are permitted accesso  validate sign-on information only when it has all been entered

o

  limit the number of unsuccessful sign-on attempts (for example a re-try limit of three)

o  record all successful and unsuccessful sign-on attempts

o  restrict additional sign-on attemptso  limit the duration of any one sign-on session

o  automatically re-invoke sign-on after an interruption of the process, for examplewhen a connection is broken

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 14 

ISF: THE STANDARD OF GOOD PRACTICE (CONTINUED)

o  advise users – on successful sign-on – of the date/time of their last successfulsign-on and all unsuccessful sign-on attempts since their most recent successfulsign-on

o  do not store authentication details as clear text in automated routines, such as in

scripts, macros or cache memory. The approval of the installation ‘owner’ should be obtained before any important features of the

sign-on process are bypassed, disabled or changed.

Computer Installations: Access Control 

User Authentication

 All users should be authenticated, either by using UserIDs and passwords or by stronger authentication such as smartcards or biometric devices (e.g. fingerprint recognition) before theycan gain access to any information or systems within the installation.

 Where authentication is achieved by a combination of UserIDs and passwords, users should beadvised to keep passwords confidential (i.e. to avoid disclosing them to anyone or writing themdown) and to change passwords that may have been compromised.

 User authentication should be enforced by automated means that:

o  ensure UserIDs are unique

o  ensure passwords are not displayed on screen or on print-outso  issue temporary passwords to users that must be changed on first use

o  force new passwords to be verified before the change is acceptedo  ensure users set their own passwords

o  ensure passwords are a minimum number of characters in length, differ fromtheir associated UserIDs, contain no more than two identical characters in a rowand are not made up of all numeric or alpha characters

o  ensure passwords are changed periodically (e.g. every 30 days) and morefrequently for users with special access privileges

o  restrict the re-use of passwords (e.g. so that they cannot be used again within a

set period or set number of changes). There should be a process for issuing new or changed passwords that:o  ensures that passwords are not sent in the form of clear text e-mail messageso  directly involves the person to whom the password uniquely applies

o  verifies the identity of the target user, such as via a special code or throughindependent confirmation

o  includes notification to users that passwords will expire soon. Strong authentication (e.g. smartcards or biometric devices, such as fingerprint recognition)

should be applied to users with access to critical business applications or sensitive informationand to users with special access privileges or access capabilities from external locations.

Source: The Standard of Good Practice for Information Security Version 4.1, Information Security Forum, January 2005.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 15 

NIST 800-14

 NIST 800-14, published by the National Institute of Standards and Technology, presentsgenerally accepted principles of IT systems security and common IT security practices. There are13 profiled practice areas with two areas, “Identification and Authentication” and “LogicalAccess Control,” collecting the best practices most relevant to access control.7 

NIST 800-14: ACCESS CONTROL PRACTICES 

 Identification and Authentication

 Identification

 Unique Identification. An organization should require users to identify themselves uniquely before being allowed to perform any actions on the system unless user anonymity or other factors dictate otherwise.

 Correlate Actions to Users. The system should internally maintain the identity of all active usersand be able to link actions to specific users.

 Maintenance of User IDs. An organization should ensure that all user IDs belong to currentlyauthorized users. Identification data must be kept current by adding new users and deletingformer users.

 Inactive User IDs. User IDs that are inactive on the system for a specific period of time (e.g., 3months) should be disabled.

 Identification and Authentication

 Authentication

 Require Users to Authenticate. An organization should require users to authenticate their claimed identities on IT systems. It may be desirable for users to authenticate themselves with asingle log-in. This requires the user to authenticate themselves only once and then be able toaccess a wide variety of applications and data available on local and remote systems.

 Restrict Access to Authentication Data. An organization should restrict access to authenticationdata. Authentication data should be protected with access controls and one-way encryption to prevent unauthorized individuals, including system administrators, or hackers from obtainingthe data.

 Secure Transmission of Authentication Data. An organization should protect authentication datatransmitted over public or shared data networks. When authentication data, such as a password,is transmitted to an IT system, it can be electronically monitored. This can happen on thenetwork used to transmit the password or on the IT system itself. Simple encryption of a password that will be used again does not solve this problem because encrypting the same password will create the same ciphertext; the ciphertext becomes the password. Limit Log-on Attempts. Organizations should limit the number of log-on attempts. Many

operating systems can be configured to lock a user ID after a set number of failed log-on

attempts. This helps to prevent guessing of authentication data. Secure Authentication Data as it is Entered. Organizations should protect authentication data as

it is entered into the IT system, including suppressing the display of the password as it is enteredand orienting keyboards away from view.

 Administer Data Properly. Organizations should carefully administer authentication data andtokens including procedures to disable lost or stolen passwords or tokens and monitoringsystems to look for stolen or shared accounts.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 16 

NIST 800-14 (CONTINUED)

 Identification and Authentication

 Passwords

 Specify Required Attributes. Secure password attributes such as a minimum length of six,inclusion of special characters, not being in an online dictionary, and being unrelated to the user 

ID should be specified and required. Change Frequently. Passwords should be changed periodically. Train Users. Teach users not to use easy-to-guess passwords, not to divulge their passwords,

and not to store passwords where others can find them.

 Identification and Authentication

 Advanced Authentication

 How to Use. In the use of the authentication system including secrecy of PINs, passwords, or cryptographic keys, physical protection of tokens is also required.

 Why it is Used. To help decrease possible user dissatisfaction, users should be told why thistype of authentication is being used.

 Logical Access Control  Access Criteria

 Identity (user ID). The identity is usually unique in order to support individual accountability, but it can be a group identification or even anonymous.

 Roles. Access to information may also be controlled by the job assignment or function (i.e., therole) of the user who is seeking access. The process of defining roles should be based on athorough analysis of how an organization operates and should include input from a widespectrum of users in an organization.\

 Location. Access to particular system resources may be based upon physical or logical location.Similarly, users can be restricted based upon network addresses (e.g., users from sites within agiven organization may be permitted greater access than those from outside).

 Time. Time-of-day and day-of-week/month restrictions are another type of limitation on access.

For example, use of confidential personnel files may be allowed only during normal workinghours. Transaction. Another criterion can be used by organizations handling transactions. For example,

access to a particular account could be granted only for the duration of a transaction, e.g., in anaccount inquiry a caller would enter an account number and pin. A service representative would be given read access to that account. When completed, the access authorization is terminated.This means that users have no choice in the accounts to which they have access.

 Service Constraints. Service constraints refer to those restrictions that depend upon the parameters that may arise during use of the application or that are pre-established by theresource owner/manager. For example, a particular software package may be licensed by theorganization for only five users at a time. Access would be denied for a sixth user, even if theuser were otherwise authorized to use the application. Another type of service constraint is

 based upon application content or numerical thresholds. For example, an ATM machine mayrestrict transfers of money between accounts to certain dollar limits or may limit maximumATM withdrawals to $500 per day.

 Access Modes. Organizations should consider the types of access, or access modes. The conceptof access modes is fundamental to access control. Common access modes, which can be used in both operating and application systems, include read, write, execute, and delete. Other specialized access modes (more often found in applications) include create or search. Of course,these criteria can be used in conjunction with one another.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 17 

NIST 800-14 (CONTINUED)

 Logical Access Control 

 Access Control Mechanisms

 Access control lists (ACLs). ACLs are a register of users (including groups, machines, processes) who have been given permission to use a particular system resource and the types of 

access they have been permitted. Constrained User Interfaces. Access to specific functions is restricted by never allowing users to

request information, functions, or other resources for which they do not have access. Threemajor types exist: menus, database views, and physically constrained user interface, e.g., anATM.

 Encryption. Encrypted information can only be decrypted, and therefore read, by those possessing the appropriate cryptographic key. While encryption can provide strong accesscontrol, it is accompanied by the need for strong key management.

 Port Protection Devices. Fitted to a communications port of a host computer, a port protectiondevice (PPD) authorizes access to the port itself, often based on a separate authentication (suchas a dial-back modem) independent of the computer's own access control functions.

 Secure Gateways/Firewalls. Secure gateways block or filter access between two networks, often

 between a private network and a larger, more public network such as the Internet. Securegateways allow internal users to connect to external networks while protecting internal systemsfrom compromise.

 Host-Based Authentication. Host-based authentication grants access based upon the identity of the host originating the request, instead of the identity of the user making the request. Manynetwork applications in use today use host-based authentication to determine whether access isallowed. Under certain circumstances, it is fairly easy to masquerade as the legitimate host,especially if the masquerading host is physically located close to the host being impersonated.

Source: Guttman, Barbara and Marianne Swanson, Generally Accepted Principles and Practices for Securing InformationTechnology Systems, National Institute of Standards and Technology, September 1996.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 18 

SSE-CMM

The Systems Security Engineering-Capability Maturity Model (SSE-CMM) is a reference modelto gauge the maturity of various processes related to information systems security. Theframework collects several base practices related to very specific security processes.

SSE-CMM Version 3.0, published by the International Systems Security Engineering Association(ISSEA), was released on June 15, 2003.

The SSE-CMM does not collect access control base practices into a single location in theframework. Instead, practices that are relevant to access control are distributed across multiplesecurity processes and are listed below.8 

SSE-CMM: ACCESS CONTROL PRACTICES 

 Perform Intra-Group CoordinationThis type of coordination addresses the need for an engineering discipline to ensure that decisionswith regard to technical issues (e.g. Access Controls) are arrived at through consensus. Thecommitments, expectations, and responsibilities of the appropriate engineers are documented andagreed upon among those involved. Engineering issues are tracked and resolved.

 Manage Security Services and Control Mechanisms

Each of the security services must involve establishing appropriate security parameters,implementing those parameters, monitoring and analyzing performance, and adjusting the parameters. These requirements are particularly applicable to such security services asIdentification and Authentication for the maintenance of users and authentication data, and accesscontrol for the maintenance of permissions:

 Maintenance and administrative logs – record of maintenance, integrity checks, and operationalchecks performed on system security mechanisms.

 Periodic maintenance and administration reviews – contains analysis of recent system securityadministration and maintenance efforts.

 Administration and maintenance failure – tracks problems with system security administrationand maintenance in order to identify where additional effort is required.

 Administration and maintenance exception – contains descriptions of exceptions made to thenormal administration and maintenance procedures, including the reason for the exception andthe duration of the exception.

 Sensitive information lists – describes the various types of information in a system and how thatinformation should be protected.

 Sensitive media lists – describes the various types of media used to store information in a

system and how each should be protected. Sanitization, downgrading, and disposal – describes procedures for ensuring that no

unnecessary risks are incurred when information is changed to a lower sensitivity or whenmedia are sanitized or disposed.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 19 

SSE-CMM (CONTINUED)

 Protect Security Monitoring Artifacts

If the products of monitoring activities can not be depended upon they are of little value. Thisactivity includes the sealing and archiving of related logs, audit reports and related analysis: List all archived logs and associated period of retention – identifies where artifacts associated

with security monitoring are stored and when they can be disposed Periodic results of spot checks of logs that should be present in archive – describes any missing

reports and identifies the appropriate response Usage of archived logs – identifies the users of archived logs, including time of access, purpose,

and any comments

 Periodic results of testing the validity and usability of randomly selected archived logs – analyzes randomly selected logs and determines whether they are complete, correct, and usefulto ensure adequate monitoring of system security

 Identify System Security Context 

Identify the purpose of the system in order to determine the security context. An expandedsecurity perimeter enables physical measures to be considered as effective safeguards for access

control in addition to purely technical measures. Identify how the system’s context impacts security. This involves understanding the purpose of 

the system (for example, intelligence, financial, medical). Performance and functional requirements are assessed for possible impacts on security.

 Interface elements are determined to be either inside or outside of the security perimeter.

Communicate Configuration Status

Communicate status of access configuration to affected groups. Status reports – should include information on when accepted changes will be processed, and

the associated work products that are affected by the change. Provide access permissions to authorized users

Source: Systems Security Engineering-Capability Maturity Model , International Systems Security Engineering Association,15 June 2003.

5/14/2018 GIRM - ARC Web Site Article IT Security Frameworks Access Control - slidepdf.com

http://slidepdf.com/reader/full/girm-arc-web-site-article-it-security-frameworks-access-cont

IT SECURITY FRAMEWORKS: ACCESS CONTROL PAGE 20 

1 Worthen, Ben, “How to Dig Out from Under Sarbanes-Oxley,” CIO Magazine, 1 July 2005.2 Bouma, Tim, “Governance-Based Access Control: Improved Information Sharing, Reduced Risks,” CIO

 Magazine, 20 June 2005.3 Control Objectives for Information and related Technology 3rd Edition, IT Governance Institute, July2000.4

  ISO 17799:2000, International Organization for Standardization, June 2000; ISO 17799:2005,International Organization for Standardization, June 2005.5  ITIL Security Management , Office of Government Commerce, April 1999.6 The Standard of Good Practice for Information Security Version 4.1, Information Security Forum,January 2005.7 Guttman, Barbara and Marianne Swanson, Generally Accepted Principles and Practices for Securing 

 Information Technology Systems, National Institute of Standards and Technology, September 1996.8 Systems Security Engineering-Capability Maturity Model , International Systems Security EngineeringAssociation, 15 June 2003.

Professional Services Note:

The Corporate Executive Board has worked to ensure the accuracy of the information it provides to its members. This

 project relies upon data obtained from many sources, however, and the Corporate Executive Board cannot guarantee

the accuracy of the information or its analysis in all cases. Furthermore, the Corporate Executive Board is not engaged

in rendering legal, accounting, or other professional services. Its projects should not be construed as professional advice

on any particular set of facts or circumstances. Members requiring such services are advised to consult an appropriate

 professional. Neither Corporate Executive Board nor its programs are responsible for any claims or losses that may

arise from any errors or omissions in their reports, whether caused by Corporate Executive Board or its sources. 

Corporate Executive Board

2000 Pennsylvania Ave NWWashington, DC 20006

Telephone: 202-777-5000Facsimile: 202-777-5100

www.executiveboard.com www.irec.executiveboard.com