CISSP - 4 Access Control
CISSP - 4 Access Control
A C C ESS C O N TR O L
Authorization
SSO
Access Controls
Access controls are security features
that control how people can interact
with systems, and resources.
Authorization
SSO
Access
Access is the data flow between an
subject and an object.
Subject is a person, process or program
Object is a resource (file, printer etc)
Access controls should support the CIA
Access Controls
Access controls are security features
that control how people can interact
with systems, and resources.
Logical
Physical
Administrative
Identifi
cation
Public Information (usually we arent
User ID
Account Number
RFID
IP or MAC address
Authentication
Proving your identity
Type 1: Something you know
Type 2: Something you have
Type 3: Something you are
Password
Best practices
No less than 8 characters
Change on a regular basis
Enforce password history
Consider brute force and dictionary
10
attacks
Ease of cracking cognitive passwords
Graphic Image
Enable clipping levels and respond
11
12
13
User logs in
Authentication returns a
14
M em ory Cards
15
M em ory Cards
NOT a smart card
Holds information, does NOT process
A memory card holds authentication
Sm art Card
17
Contactless
18
21
intrusive
Retina scans can reveal health care
information
23
Strong Authentication
Strong Authentication is the combination
of 2 or more of these and is encouraged!
Strong Authentication provides a higher level
of assurance*
Strong Authentication is also called multifactor authentication*
Watch out! Most people want to choose
biometrics as the best authentication, but
any one source can be compromised. Always
look for more than one type!
Mutual Authentication is beneficial
24
Authorization
The concept of ensuring that someone
who is authenticated is allowed
access to a resource.
Authorization is a preventative control
Race conditions would try to cause
25
Auditing
Logging and reviewing accesses to
objects.
What is the purpose of auditing?
Auditing is a detective control*
26
A U TH O R IZ ATIO N
Authorization
Now that I proved I am who I say I am,
what can I do?
Both OSes and Applications can provide
this functionality.
Authorization can be provided based on
user, groups, roles, rules, physical
location, time of day (temporal
isolation)* or transaction type (example
a teller may be able to withdrawal small
amounts, but require manager for large
withdrawals)
28
Authorization principals
Default NO access (implicit deny)* -
29
Authorization Creep
As a subject stays in an environment
over time, their permissions
accumulate even after they are no
longer needed.
Auditing authorization can help mitigate
30
Single Sign O n
As environments get larger and more
complex it becomes harder and
harder to manage users accounts
securely.
Multiple users to create/disable
Passwords to remember, leads to
31
Single Sign O n
Single sign on systems try to mitigate
this problem. Some SSO systems are.
Kerberos
LDAP
Sesame
KryptoKnight
32
Pros
Ease of use for end users
Centralized Control
Ease of administration
Cons
Single point of failure
Standards necessary
Keys to the kingdom
33
SSO technologies
Kerberos
SESAME
LDAP
Microsoft Active Directory*
34
Kerberos
A network authentication protocol
35
Welcome to
the
Kerberos
Carnival
37
Realm
Database
Server
Welcome to
the
Kerberos
Carnival
File Server
Realm
TGS
G
3. T
t
rin
P
to
nt
i
r
op
----
et
k
c
-- -4. Ti
-A-
R
T+
r
rve
e
S
tt
s
e
u
eq
---
--
et +
k
c
i
T
5.
bo
J
t
n
P ri
1. Username
2. TGT
38
Print
Server A
------
AS
----
----
---------
Kerberos Concerns
Computers must have clocks synchronized
39
SESAM E
European technology, developed to extend
Kerberos and improve on its weaknesses
Sesame uses both symmetric and asymmetric
cryptography.
Uses Privileged Attribute Certificates rather
than tickets, PACS are digitally signed and contain
the subjects identity, access capabilities for the
object, access time period and lifetime of the PAC.
PACS come from the Privileged Attribute Server.
40
KryptoKnight
Should only be known as an older
41
A C C ESS C O N TR O L
M O D ELS
Established Later
RBAC (Role based Access Control)
44
D AC
Discretionary Access Control
Security of an object is at the owners
discretion
Access is granted through an ACL
(Access Control List)
Commonly implemented in commercial
products and all client based systems
Identity Based
45
M AC
Mandatory Access Control*
Data owners cannot grant access!
OS makes the decision based on a
security label system
Subjects label must dominate the objects
label
Users and Data are given a clearance
level (confidential, secret, top secret etc)*
Rules for access are configured by the
security officer and enforced by the OS.
46
M AC
MAC is used where classification and
confidentiality is of utmost
importance military.
Generally you have to buy a specific
MAC system, DAC systems dont do
MAC
SELinux
Trusted Solaris (now called Solaris with
Trusted Extensions)
47
M AC sensitivity labels
All objects in a MAC system have a
security label*
Security labels can be defined the
organization.
They also have categories to support
need to know at a certain level.
Categories can be defined by the
organization
48
49
51
54
compulsory
control because
the rules are
strictly enforced
and not
modifiable by
users.
Routers and
firewalls use Rule
View
56
Shell
57
Physically Constrained
Interface
58
59
60
61
A C C ESS C O N TR O L
A D M IN IS TR ATIO N
63
Authentication
Authorization
Auditing
64
RAD IU S
Remote Authentication Dial-in User Service (RADIUS) is an
authentication protocol that authenticates and authorizes
users
Handshaking protocol that allows the RADIUS server to
provide authentication and authorization information to
network server (RADIUS client)
Users usually dial in to an access server (RADIUS client)
65
that
communicates with the RADIUS server
RADIUS server usually contains a database of users and
credentials
Communication between the RADIUS client and server is
protected
Radius Pros/Cons
Radius Pros
Its been around, a lot of vendor support
Radius Cons
Radius can share symmetric key between NAS
66
TACACS+
Provides the same functionality of
Radius
TACACS+ uses TCP port 49
TACACS+ can support one time
passwords
Encrypts ALL traffic data
TACACS+ separates each AAA
function.
For example can use an AD for
67
D iam eter
DIAMETER is a protocol designed as the next generation
RADIUS
RADIUS is limited to authenticating users via SLIP and
PPP dial-up modem connections
Other device types use different protocol types
Internet protocol that supports seamless and continuous
connectivity for mobile devices - such as PDAs, laptops,
or cell phones with Internet data capabilities
Move between service provider networks and change
their points of attachment to the Internet
Including better message transport, proxying, session
control, and higher security for AAA transactions
68
69
A C C ESS C O N TR O L
M ETH O D S
released.
Examples:
Object reuse
Countermeasures
Destruction
Degaussing
overwriting
Em anation Security
All devices give off electrical /
magnetic signals.
A non-obvious example is reading
info from a CRT bouncing off
something like a pair of sunglasses.
Tempest is a standard to develop
countermeasures to protect against
this.
72
Authorization
SSO