L3 Access Control Concepts
L3 Access Control Concepts
L3 Access Control Concepts
Introduction
Types of access control, physical and logical controls and how they are
combined to strengthen the overall security of an organization.
Controls Overview
1|Page
Access is based on three elements:
subjects: any entity that requests access to our assets. The entity
requesting access may be a user, a client, a process or a program,
for example. A subject is the initiator of a request for service;
therefore, a subject is referred to as “active.” A subject:
o Is a user, a process, a procedure, a client (or a server), a
program, a device such as an endpoint, workstation,
smartphone or removable storage device with onboard
firmware.
o Is active: It initiates a request for access to resources or
services.
o Requests a service from an object.
o Should have a level of clearance (permissions) that relates to
its ability to successfully access services or resources.
Controls Assessments
Defense in Depth
2|Page
A technical example of defense in depth, in which multiple layers of
technical controls are implemented, is when a username and password
are required for logging in to your account, followed by a code sent
to your phone to verify your identity. This is a form of multi-factor
authentication using methods on two layers, something you have
and something you know. The combination of the two layers is much
more difficult for an adversary to obtain than either of the authentication
codes individually.
The more critical information a person has access to, the greater the
security should be around that access. They should definitely have multi-
factor authentication, for instance.
Privileged Accounts
Typical measures used for moderating the potential for elevated risks
from misuse or abuse of privileged accounts include the following:
5|Page
* More extensive and detailed logging than regular user
accounts. The record of privileged actions is vitally important,
as both a deterrent (for privileged account holders that might be
tempted to engage in untoward activity) and an administrative
control (the logs can be audited and reviewed to detect and
respond to malicious activity).
* More stringent access control than regular user accounts. As we
will see emphasized in this course, even nonprivileged users
should be required to use MFA methods to gain access to
organizational systems and networks. Privileged users—or more
accurately, highly trusted users with access to privileged
accounts—should be required to go through additional or more
rigorous authentication prior to those privileges. Just-in-time
identity should also be considered as a way to restrict the use
of these privileges to specific tasks and the times in which the
user is executing them.
* Deeper trust verification than regular user
accounts. Privileged account holders should be subject to more
detailed background checks, stricter nondisclosure agreements and
acceptable use policies, and be willing to be subject to
financial investigation. Periodic or event-triggered updates to
these background checks may also be in order, depending on the
nature of the organization’s activities and the risks it faces.
* More auditing than regular user accounts. Privileged account
activity should be monitored and audited at a greater rate and
extent than regular usage.
Segregation of Duties
6|Page
These steps can prevent fraud or detect an error in the process before
implementation. It could be that the same employee might be authorized
to originally submit invoices regarding one set of activities, but not
approve them, and yet also have approval authority but not the right to
submit invoices on another. It is possible, of course, that two individuals
can willfully work together to bypass the segregation of duties, so that
they could jointly commit fraud. This is called collusion.
Other situations that call for provisioning new user accounts or changing
privileges include:
8|Page
Module 2: Understand Physical Access Controls
Domain D3.1, D3.1.1, D3.1.2
Physical access controls are items you can physically touch, which
include physical mechanisms deployed to prevent, monitor, or detect
direct contact with systems or areas within a facility. Examples of
physical access controls include security guards, fences, motion
detectors, locked doors/gates, sealed windows, lights, cable protection,
laptop locks, badges, swipe cards, guard dogs, cameras,
mantraps/turnstiles, and alarms.
9|Page
Badge Systems and Gate Entry
Physical security controls for human traffic are often done with
technologies such as turnstiles, mantraps and remotely or system-
controlled door locks. For the system to identify an authorized
employee, an access control system needs to have some form of
enrollment station used to assign and activate an access control device.
Most often, a badge is produced and issued with the employee’s
identifiers, with the enrollment station giving the employee specific
areas that will be accessible. In high-security environments, enrollment
may also include biometric characteristics. In general, an access control
system compares an individual’s badge against a verified database. If
authenticated, the access control system sends output signals allowing
authorized personnel to pass through a gate or a door to a controlled
area. The systems are typically integrated with the organization’s
logging systems to document access activity (authorized and
unauthorized)
Environmental Design
10 | P a g e
CPTED provides direction to solve the challenges of crime with
organizational (people), mechanical (technology and hardware) and
natural design (architectural and circulation flow) methods. By directing
the flow of people, using passive techniques to signal who should and
should not be in a space and providing visibility to otherwise hidden
spaces, the likelihood that someone will commit a crime in that area
decreases.
Biometrics
11 | P a g e
Behavioral systems measure how a person acts by measuring
voiceprints, signature dynamics and keystroke dynamics. As a person
types, a keystroke dynamics system measures behavior such as the delay
rate (how long a person holds down a key) and transfer rate (how rapidly
a person moves between keys).
Monitoring
Cameras
Cameras are normally integrated into the overall security program and
centrally monitored. Cameras provide a flexible method of surveillance
and monitoring. They can be a deterrent to criminal activity, can detect
activities if combined with other sensors and, if recorded, can provide
evidence after the activity They are often used in locations where access
is difficult or there is a need for a forensic record.While cameras provide
one tool for monitoring the external perimeter of facilities, other
technologies augment their detection capabilities. A variety of motion
sensor technologies can be effective in exterior locations. These include
infrared, microwave and lasers trained on tuned receivers.
12 | P a g e
Other sensors can be integrated into doors, gates and turnstiles, and
strain-sensitive cables and other vibration sensors can detect if someone
attempts to scale a fence. Proper integration of exterior or perimeter
sensors will alert an organization to any intruders attempting to gain
access across open space or attempting to breach the fence line.
Logs
A log is a record of events that have occurred. Physical security logs are
essential to support business requirements. They should capture and
retain information as long as necessary for legal or business reasons.
Because logs may be needed to prove compliance with regulations and
assist in a forensic investigation, the logs must be protected from
manipulation. Logs may also contain sensitive data about customers or
users and should be protected from unauthorized disclosure.
13 | P a g e
Although it may seem that logging everything so you would not miss
any important data is the best approach, most organizations would soon
drown under the amount of data collected.
Business and legal requirements for log retention will vary among
economies, countries and industries. Some businesses will have no
requirements for data retention. Others are mandated by the nature of
their business or by business partners to comply with certain retention
data. For example, the Payment Card Industry Data Security Standard
(PCI DSS) requires that businesses retain one year of log data in support
of PCI. Some federal regulations include requirements for data retention
as well.
Security Guards
Alarm Systems
14 | P a g e
For example, an employee may enter a code and/or swipe a badge to
open a door, and that action would not trigger an alarm. Alternatively, if
that same door was opened by brute force without someone entering the
correct code or using an authorized badge, an alarm would be activated.
15 | P a g e
Module 3: Understand Logical Access Controls
Domain D3.2, D3.2.3, D3.2.4, D3.2.5
Passwords
Biometrics (implemented on a system, such as a smartphone or
laptop)
Badge/token readers connected to a system
These types of electronic tools limit who can get logical access to an
asset, even if the person already has physical access.
16 | P a g e
Most information systems in the world are DAC systems. In a DAC
system, a user who has access to a file is usually able to share that file
with or pass it to someone else. This grants the user almost the same
level of access as the original owner of the file. Rule-based access
control systems are usually a form of DAC.
17 | P a g e
Although MAC sounds very similar to DAC, the primary difference is
who can control access. With Mandatory Access Control, it is
mandatory for security administrators to assign access rights or
permissions; with Discretionary Access Control, it is up to the object
owner’s discretion.
19 | P a g e