Chapter 2 (1)
Chapter 2 (1)
Discover why effective account and security Explore the two main access control models:
administration is crucial for protecting sensitive Discretionary Access Control (DA C) and Role-
information and preventing unauthorized Based Access Control (RBAC).
access.
Why is Access Control ?
○ A user may only access a resource if their security 2. Compartmentalization — Security labels limit the
label matches the resource’s security label. exposure of each resource to a subset of the user base.
○ A recent Thycotic Centrify study found that ○ Based on least-privilege access principles,
53% of organizations experienced theft of PAM gives administrators limited, ephemeral
privileged credentials and 85% of those thefts access privileges on an as-needed basis.
resulted in breaches of critical systems. These systems enforce network security best
Privileged access management is a type of practices such as eliminating shared
role-based access control specifically designed passwords and manual processes.
to defend against these attacks.
1. Reduced threat surface — Common passwords, 1. Internal resistance — Just as doctors make the
shared credentials, and manual processes are worst patients, IT professionals can be resistant to
commonplace even in the best-run IT tighter security measures.
departments. Imposing access control best
practices eliminates these security risks. 2. Complexity and cost — Implementing PAM
requires investments in time and money within
2. Minimizing permission creep — PAM systems already-constrained IT departments.
make it easier to revoke privileges when users no
longer need them, thus preventing users from
“collecting‚ access privileges.
○ Device posture and trust — An evaluation of ○ These and other variables should contribute to a per-
device security factors such as operating device, per-user, per-context risk assessment with
system, application, and antivirus updates every connection attempt. That assessment determines
should inform access decisions. whether or to what degree users can access sensitive
resources.
○ Location — Likewise, access privileges should
reflect the nature of the device’s network
connection whether from an on-prem LAN
connection or an unsecured café hotspot.
○ A user account is identified by a user name and ○ When you create a user account, you must not only
defines the attributes of the user, including the assign a user name, a password, and default
following: tablespaces for the account, but you must also do the
• Authentication method
following:
• Password for database authentication • Grant the appropriate system privileges, object privileges,
and roles to the account.
• Default tablespaces for permanent and temporary
data storage • If the user will be creating database objects, then give the
user account a space usage quota on each tablespace in
• Tablespace quotas which the objects will be created.
• Account status (locked or unlocked)
• Password status (expired or not)
○ The following countermeasures address network ○ Isolate your network through the use of
security concerns that could affect your site(s) a firewall: Installing a firewall enables the
and equipment. These strategies are organization to decide which types of messages should
recommended when risk assessment identifies be allowed into the system from external sources
or confirms the need to counter breaches in the
security of your network. ○ Locate equipment and information that is intended for
external users outside of the firewall or demilitarized
○ 1. Protect Your Network from Outsiders: Zone:
• Implement applicable security recommendations
○ If an organization's Web server is intended to provide
such as: Solid defense against external Internet
information and services to the public, it should not be
threats includes the proper implementation of
relatively straightforward security measures located on the private side of the firewall. Nor should it
like encryption software, virus be able to access confidential information that
scanners, remote access regulations, resides inside the firewall. This way, if the
and passwords. public Web server should ever be compromised,
confidential information is still protected.
Sys Admin NAME OR LOGO 18
Network Security Countermeasures,… Cont…
○ 2. Protect Transmissions Sent over the ○ Authenticate messages through the use of digital
Internet: signatures: A digital signature amounts to a
"fingerprint" of a message. It depicts the message
○ Use Secure Sockets Layer (SSL) Servers to such that if the message were to be altered in any
secure financial and information transactions way, the "fingerprint" would reflect it--thus making it
made with a Web browser: In a secure Web possible to detect counterfeits. The converse, of
session, your Web browser generates a course, is that if the "fingerprint" does not change
random encryption key and sends it to the Web during transmission, you can be confident that the
site host to be matched with its public message was not altered.
encryption key. Your browser and the Web site
then encrypt and decrypt all transmissions.
○ Authenticate messages through the use of time ○ Encrypt all messages sent over the Internet : As more
stamps or sequence numbers: Another way and more messages are sent over larger and larger
to recognize when messages have been networks, information becomes increasingly vulnerable
modified is to challenge the "freshness" of the to assault.
message. This is done by embedding time
stamps, sequence numbers, or random numbers ○ Encryption has become a leading tool to combat
in the message to indicate precisely when and in this vulnerability. Like other countermeasures, it can
what order the message was sent. If a received be very effective if used properly and regularly.
message's time and sequence are not
consistent, you will be alerted that someone
may have tampered with the transmission.
Create new user accounts with sp ecific Safely remove user accounts that are no
access privileg es, allowing individuals to long er required, ensuring data security and
access relevant resources. minimizing potential risks.
Efficiently manage access permissions for different user groups, allowing fine-
grained control over data and resource accessibility.
Managing Files and Folder Permission
1 File Sharing Settings
Configure file sharing settings to enable seamless collaboration and controlled access
within teams or specific user groups.
3 Permissions Inheritance
Stay Vig ilant Against Protect Confidential Reg ularly Review Access
Cyber Threats Documents Permissions
Implement robust Employ access controls and Perform reg ular audits of
cybersecurity measures like encryption for confidential access permissions to mitig ate
firewalls, encryption, and files, ensuring that only security risks, ensuring that
intrusion detection systems to authorized individuals can only appropriate individuals
safeg uard sensitive data. view, access, or modify have access to sp ecific data or
sensitive information. resources.
Achieving C om pliance and
Auditability
1 Compliance Policies
Establish and enforce compliance policies to adhere to industry reg ulations and
maintain data integ rity, confidentiality, and availability.
3 Audit Trails
Create comprehensive audit trails documenting chang es to access permissions,
enabling traceability and accountability.
Training and User Awareness
Education and Training
Provide comprehensive training programs to educate users about account and security
administration best practices, ensuring responsible usage.
Develop and implement incident response plans to quickly and effectively handle
security incidents, minimizing the impact on operations and data integrity.
3 Continuous Monitoring
Establish continuous monitoring mechanisms to detect and respond to security
events in real-time, ensuring a proactive security posture.
Thank
You