An Overview of Access Control: CISSP Domain 5 MindMap

To Download the FREE PDF of MindMaps

Your information will remain 100% private. Unsubscribe with 1 click.

Transcript

Introduction

Hey I’m Rob Witcher, in today’s video we will be walking through a MindMap for Domain 5 – Access Management, to highlight the major concepts and terms, and how they interrelate, to guide your studies and help you pass the CISSP exam.

This is the first of two videos for domain 5.

Access Control

Access controls are the collection of mechanisms that work together to protect the assets of an organization. These access controls can be both physical controls, like locks, and logical controls, such as a login mechanism to access an operating system.


Access controls enable management to:


  • Specify which users
  • Can access what resources
  • What operations they can perform
  • And provide individual accountability

Reference Monitor Concept

Image of reference monitoring concept, as well called RMC on cissp domain 3 - Destination Certification

Fundamentally, every access control system is about controlling a subject’s access to an object through some form of mediation, that mediation is based on a set of rules, and all of this is logged and monitored.

This is known as the Reference Monitor Concept.

The implementation of the RMC is known as a security kernel

Thus, every access control system is a security kernel.

Access Control Principles

Now, lets jump into the mind map

There are three major principles that we apply throughout access control.

Separation of Duties

The first is Separation of Duties. To divide up key processes into multiple parts assigned to different people.

Need to Know

Need to Know is the concept that we grant a user the minimum permissions required for them to perform their role and no more.

Least Privileged

Least Privilege achieves the same outcome but from a different perspective. Least privilege looks from the perspective of the asset – how can access to an asset (for example a system) be restricted to only those that absolutely require it.


Administration Approaches

When it comes to administering access to systems (the addition, modification and removal of users) there are three main approaches: centralized, decentralized, and hybrid.

Centralized

In a centralized approach, access to multiple separate applications is managed through one centralized system.

Decentralized

In a decentralized approach, access to multiple applications is managed individually within each application.

Hybrid

Many organizations used a hybrid approach, which is simply some combination of centralized and decentralized.

Access Controls Services

Now let’s talk about the access controls services. There are 4 major services that all access control system must provide: Identification, Authentication, Authorization, and Accountability

Identification

We’ll start with identification. This is where the user must assert their identity to the system. For example, my username is rwitcher.

Authentication

Authentication is where the system verifies the user’s identity via one of the three factors of authentication: knowledge, ownership, or characteristic

Knowledge

Authentication by knowledge, also referred to as something you know, is where a user verifies their identity by providing some information that they have memorized

Password

It could be a password.

Passphrase

Or a Passphrase. A long sequence of words that are easy to remember

Questions

Or security questions

Ownership

The second factor of Authentication is ownership, also referred to as something you have. Authentication by Ownership are things that we have in our possession

One-time Passwords

The most common form of authentication by ownership is one-time passwords. We call them one-time passwords because they are only meant to be used once.

Hard Tokens

Image of hard tokens - Destination Certification

Hard tokens are dedicated pieces of hardware that generate the one-time passwords. Such as an RSA ID key

Soft Tokens

Image of soft tokens - Destination Certification

Soft tokens are apps, software, that generate the one-time passwords. Such as the Microsoft or google authenticator apps that we can install on our mobile phones.

Synchronous

There are two types of hard or soft tokens, Synchronous and Asynchronous.
In a Synchronous system, both the hard or soft token, and the authentication server are generating the same one-time password every 30 to 60 seconds. They are synchronized.

Asynchronous

Image of asynchronus on mindmap - Destination Certification

Asynchronous involves a challenge and a response. To authenticate, the user is sent a challenge, which they enter into their hard or soft token device, and a response is generated – the one-time-password. Asynchronous systems are rare, as they are more expensive and complicated, but they are more secure. So in high value situations, like say Bloomberg Financial terminals, they are used.

Smart / Memory Cards

Going back to the other form of authentication by ownership we have Smart cards and memory cards. Smartcards are well named because they have a computer chip within them that provides some smarts. Memory cards on the other hand just store some data that can be read. The same data every time – less secure.

Characteristic

Going back to the other form of authentication by ownership we have Smart cards and memory cards. Smartcards are well named because they have a computer chip within them that provides some smarts. Memory cards on the other hand just store some data that can be read. The same data every time – less secure.

Physiological

Physiological characteristics are what make up our physiology, our bodies, and are therefore often referred to as biometrics.

Fingerprint

It’s pretty obvious what most of these physiological characteristics are looking at, our finger prints

Hand Geometry

Hand geometry is looking at the overall dimensions of our hands

Vascular Pattern

Vascular pattern scanners are looking at our vein patterns; often on the back of our hands. When you take the CISSP exam, you are likely to encounter a vascular scanner as many of the pearsonVue testing centers use them as part of registering you to take the exam. They want to make sure that if you step out during the exam to take a break, that it is you coming back into the room and not someone you have hired to write test for you.

Facial

Facial scanners look at our faces

Iris

Iris scanners look at the coloured ring of our eye. The outside of our eyeball

Retina

Retinal scanners on the other hand look at the vein pattern on the back our eyeballs. The inside of our eyeball. Retinal scanners are typically considered to be the most accurate of the biometric systems.

Behavioral

Behavioral characteristics are how we act, how we do certain things, like speak, type, and walk

Voice

Voice systems analyze the way we speak, the minutia of our voices

Signature

Signature systems look at how we write. How we sign our name for example

Key Stroke

Key stroke dynamics systems look at how we type. Characteristics such as dwell and flight time

Gait

And gait dynamics looks at how we walk.

Type 1: False Reject

A challenging aspect of biometric systems are not binary, and by that I mean they are not 100% sure that it is a valid user and not 100% sure it is an invalid user trying to authenticate. As such we have to deal with two type of errors related to biometric systems. The first is a Type 1: False Reject. This is where a valid user is falsely rejected.

Type 2: False Accept

A type 2: False accept is the inverse. This is where an invalid user, say an attacker, is falsely authenticated and given access. Not Good!

Crossover Error Rate

Image of cross over error rate (CER) - Destination Certification

The final piece here related to authentication by characteristic is the Cross Over Error rate. Type 1 and Type 2 errors are inverse to each other. If you graph them, you would see that the line for Type 1 errors will intersect the Line for Type 2 errors, and where they intersect is the aptly named Cross Over Error rate or Equal Error Rate (EER). The Crossover Error Rate is a good measure of the overall accuracy of a biometric system

Single / Multifactor

We have now discussed the 3 factors of authentication: Knowledge, Ownership and Characteristic. Single Factor authentication is simply one of these factors. Multi-factor authentication means using two or more DIFFERENT factors of authentication.

Authenticator Assurance Levels (AAL)

The Authenticator Assurance Levels is a model for measuring the robustness, the security, of an authentication process. There are 3 levels: AAL 1 is the least secure, and AAL3 is the most secure.

Authorization

Now let’s talk about authorization, this is where we define a user’s specific access within a system, what they are authorized to access, and this is where we apply principles like least privilege and need to know

Discretionary

The first access control philosophy is known as Discretionary Access and the defining characteristic of discretionary access is that the owner of the system is deciding who is authorized to access what. This is a very good security practice as owners best understand their systems, and are accountable for the security of their systems.

Rule

Within discretionary access we have Rule based, just a list of rules in a file, or an ACL, access control list

Role

Role based access, where we create roles, define the access for those roles, and then assign one or more roles to a user

Attribute / Context

And attribute-based access, sometime referred to as context based. Where we look at a series of different attributes to make an authorization decision: source IP address, geo location, OS type, classification of asset being accessed, etc.

Non-discretionary

The next access control philosophy is known as Non-Discretionary. Discretionary meant the owner decides. So non-discretionary means someone other than the owner decides who is authorized to access what – like an IT helpdesk person. This is not a good security practice.

Mandatory

The last and final access control philosophy is known as Mandatory. Mandatory means the system decides. Based on the security clearance of users and the classification of assets. Labeling is an important requirement for Mandatory access.

Accountability

The final and most important access control service is Accountability. To have security, we must ensure users are accountable for their actions on a system.

Principle of Access Control

Because accountability is the most important access control service, we give it a special name: the principle of Access Control. So, remember, the principle of access control is accountability and accountability is the principle of access control

Session Management

The Final piece here is session management. Whenever a user has identified themselves, been authenticated and authorized into a system, this begins a session. Session management is all about managing these sessions to ensure they are secure.

Session Hijacking

The major risk we are concerned with related to sessions is session hijacking.

Overview

And that is a summary of access control within Domain 5.

If you found this video helpful you can hit the thumbs up button and if you want to be notified when we release additional videos in this MinMap series you can subscribe and hit the bell icon.

I will provide links to the other MindMap videos in the description below.

Thanks very much for watching!

Image of a purple ad - Destination Certification