SlideShare a Scribd company logo
2
Most read
3
Most read
6
Most read
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 9: Access Control Management
Copyright 2014 Pearson Education, Inc. 2
Objectives
■ Explain access control fundamentals
■ Apply the concepts of default deny, need-to-know, and
least privilege
■ Understand secure authentication
■ Protect systems from risks associated with Internet
connectivity, remote access, and telework environments
■ Manage and monitor user and administrator access
■ Develop policies to support access control management
Access Control Fundamentals
■ Access controls
❑ Security features that govern how users and
processes communicate and interact with systems
and resources
❑ Primary objective is to protect information and
systems from unauthorized access, modification, or
disruption
■ Three common attributes of access controls
❑ Identification scheme
❑ Authentication method
❑ Authorization method
Copyright 2014 Pearson Education, Inc. 3
Copyright 2014 Pearson Education, Inc. 4
What Is a Security Posture?
❑ It is the organization’s approach to access control
❑ Two fundamental security postures:
■ Secure, which implements the “default deny” model
■ Open, which implements the “default allow” model
❑ Every access control decision for a company is
based on that company’s security posture
Copyright 2014 Pearson Education, Inc. 5
What Is a Security Posture? Cont.
■ Default allow versus default deny
❑ Default allow: By default, out-of-the-box, no
security is deployed, everyone can do everything
■ Easier to deploy, works out-of-the-box
■ No security
❑ Default deny
■ Aka “deny all”
■ Access is unavailable by default until the appropriate
control is altered to allow access
Copyright 2014 Pearson Education, Inc. 6
What Is a Security Posture? Cont.
■ Principle of Least Privilege
❑ Definition: The least amount of permissions granted users
that still allow them to perform whatever business tasks
they have been assigned, and no more.
❑ This is a strong foundation for any access control policy.
❑ Protects the data but also protects users. They can’t be
accused of having deleted a file to which they can’t gain
access!
❑ From a cultural stand point, it is important to explain to
employees why they are not “trusted” with all the
company’s data.
Copyright 2014 Pearson Education, Inc. 7
What Is a Security Posture? Cont.
■ Need-to-know
❑ Definition: Having a demonstrated and authorized
reason for being granted access to information
❑ Should be made a part of the company’s culture
❑ Should be incorporated in security training
curriculum
❑ At the least protects the confidentiality of
corporate data, but may also protect integrity and
availability depending on the attack type
How Is Identity Verified?
■ First step to granting access is user
identification
❑ Authentication: Subject must supply verifiable
credentials offered referred as factors
■ Single-factor authentication
■ Multifactor authentication
■ Multilayer authentication
Copyright 2014 Pearson Education, Inc. 8
How Is Identity Verified? Cont.
■ Three categories of factors
❑ Knowledge: Something you know
■ Password
■ PIN
■ Answer to a question
❑ Possession: Something you have
■ One-time passcodes
■ Memory cards
■ Smart cards
■ Out-of-band communication
❑ Inherence: Something you are
■ Biometric identification
Copyright 2014 Pearson Education, Inc. 9
Copyright 2014 Pearson Education, Inc. 10
What Is Authorization?
■ The process of assigning authenticated
subjects permission to carry out a specific
operation
■ Three primary authorization models
❑ Object capability
■ Used programmatically and based on a combination of a
unforgettable reference and an operational message
❑ Security labels
■ Mandatory access controls embedded in object and
subject properties
❑ Access Control Lists
■ Used to determine access based on some criteria
What Is Authorization? Cont.
■ Categories of access control lists
❑ MAC (Mandatory Access Control): Data is
classified, and employees are granted access
according to the sensitivity of information
❑ DAC (Discretionary Access Control): Data owners
decide who should have access to what
information
❑ RBAC (Role-based Access Control): Access is
based on positions (roles) within an organization
❑ Rule-based access control: Access is based on
criteria that is independent of the user or group
account
Copyright 2014 Pearson Education, Inc. 11
Infrastructure Access Controls
■ Include physical and logical network design, border
devices, communication mechanisms, and host security
settings
■ Network segmentation
❑ The process of logically grouping network assets, resources, and
applications
❑ Type of network segmentation
■ Enclave network
■ Trusted network
■ Semi-trusted network, perimeter network, or DMZ
■ Guest network
■ Untrusted network
Copyright 2014 Pearson Education, Inc. 12
What Is Layered Border Security?
■ Different types of security measures
designed to work in tandem with a single
focus
❑ Firewall devices
❑ Intrusion detection systems (IDSs)
❑ Intrusion prevention systems (IPSs)
❑ Content filtering and whitelisting/blacklisting
❑ Border device administration and management
Copyright 2014 Pearson Education, Inc. 13
Copyright 2014 Pearson Education, Inc. 14
Remote Access Security
■ Remote Access
❑ Users who have a demonstrated business-need to access the corporate
network remotely and are authorized to do so must be given that
privilege
❑ Not all employees should be given this privilege by default
❑ Remote access activities should be monitored and audited
❑ The organization’s business continuity plan must account for the
telecommuting environment
■ Remote access technologies
❑ Virtual Private Networks (VPNs)
■ Secure tunnel for transmitting data over unsecure network, such as the Internet
❑ Remote access portals
■ Offers access to one or more applications through a single centralized interface
User Access Controls
■ Used to ensure authorized users can access
information and resources while unauthorized
users cannot access information and
resources
■ Users should have access only to information
they need to do their job and no more
■ Administrative account controls
❑ Segregation of duties
❑ Dual control
Copyright 2014 Pearson Education, Inc. 15
Copyright 2014 Pearson Education, Inc. 16
What Types of Access Should Be
Monitored?
■ Three main monitoring areas:
■ Successful access
■ Failed access
■ Privileged operations
Copyright 2014 Pearson Education, Inc. 17
Is Monitoring Legal?
❑ Employees should have no expectation of privacy
while on company time or when using company
resources
❑ Courts have favored an employer’s right to protect
their interests over individual privacy rights
because:
■ Actions were taken at the employer’s place of work
■ Equipment used – including bandwidth – was company-
provided
■ Monitoring the work also helps ensure the quality of
work
■ The employer has the right to protect property from theft
and/or fraud
Copyright 2014 Pearson Education, Inc. 18
Is Monitoring Legal? Cont.
❑ Courts indicate that monitoring is acceptable if it is
reasonable:
■ Justifiable if serving a business purpose
■ Policies are set forth to define what privacy employees should
expect while on company premises
■ Employees are made aware of what monitoring means are
deployed
❑ Acceptable use agreement should include a clause
informing users that the company will and does monitor
system activity
❑ Users must agree to company policies when logging on
Copyright 2014 Pearson Education, Inc. 19
Summary
■ Access control is a complex domain. Access to
information is extremely important to regulate.
■ User access and user actions on the network
must be monitored and logged, whether they
are located on premises or gaining access to
the network remotely.
■ Monitoring is useless if the information
gathered is not reviewed regularly.

More Related Content

PPTX
Introduction to information security
PPTX
CYBER TERRORISM
PPTX
Cyber terrorism
PDF
HCIA-Data Center Facility V2.0 Training Material.pdf
PPSX
5g nertwork
PDF
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
PDF
Advanced: Private Networks & 5G Non-Public Networks
PPTX
Computer Security Presentation
Introduction to information security
CYBER TERRORISM
Cyber terrorism
HCIA-Data Center Facility V2.0 Training Material.pdf
5g nertwork
Beginners: Open RAN Terminology – Virtualization, Disaggregation & Decomposition
Advanced: Private Networks & 5G Non-Public Networks
Computer Security Presentation

What's hot (20)

PDF
An overview of access control
PPTX
Intrusion detection
 
PDF
Incident response methodology
PPTX
Network security
PPTX
Firewall in Network Security
PPTX
Network security
PPTX
Basic concepts in computer security
PPTX
Cryptographic tools
 
PPT
IT Security management and risk assessment
 
PPTX
Network security (vulnerabilities, threats, and attacks)
PPT
Perimeter security solutions
PDF
05 Duplication and Preservation of Digital evidence - Notes
PDF
Computer Security
PPTX
Incident response
PPT
Cyber security vs information assurance
PPT
Hacking web applications
PPTX
Operating System Security
PDF
Access Control Presentation
PPTX
User authentication
 
PPTX
Information security
An overview of access control
Intrusion detection
 
Incident response methodology
Network security
Firewall in Network Security
Network security
Basic concepts in computer security
Cryptographic tools
 
IT Security management and risk assessment
 
Network security (vulnerabilities, threats, and attacks)
Perimeter security solutions
05 Duplication and Preservation of Digital evidence - Notes
Computer Security
Incident response
Cyber security vs information assurance
Hacking web applications
Operating System Security
Access Control Presentation
User authentication
 
Information security
Ad

Viewers also liked (9)

PPTX
Rule-Based Access-Control Evaluation through Model-Transformation
PPT
Information Security Principles - Access Control
PPTX
Access Controls
PPT
Attribute Based Access Control
PPSX
8 Access Control
PDF
Access Control Models: Controlling Resource Authorization
PDF
Attribute based access control
PPSX
Multiple access control protocol
PPT
Intro To Access Controls
Rule-Based Access-Control Evaluation through Model-Transformation
Information Security Principles - Access Control
Access Controls
Attribute Based Access Control
8 Access Control
Access Control Models: Controlling Resource Authorization
Attribute based access control
Multiple access control protocol
Intro To Access Controls
Ad

Similar to Chapter 9: Access Control Management (20)

PPTX
Chapter 8: Communications and Operations Security
PPTX
Chapter 6: Human Resources Security
PPTX
Presentation2 (2)
PPTX
Chapter 5: Asset Management
PPTX
Chapter 7: Physical & Environmental Security
PPTX
Chapter 11: Information Security Incident Management
PDF
Information Security Incident Management.pdf
DOCX
Security Program and PoliciesPrinciples and Practicesby Sari.docx
PPTX
What is Information Assurance Model in Cyber Security.pptx
PPTX
Chapter 14: Regulatory Compliance for the Healthcare Sector
PDF
How to Build and Implement your Company's Information Security Program
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PPTX
Chapter 1 Introduction about information assurance.pptx
PPTX
Building HIPAA Compliance in service delivery teams
PPTX
Foundation of the information securiety
PPTX
Chapter 4: Governance and Risk Management
PPTX
Chapter 10: Information Systems Acquisition, Development, and Maintenance
PPTX
Week 9- 1 information security slides.pptx
PPTX
Chapter 13: Regulatory Compliance for Financial Institutions
PPTX
Introduction to Health Informatics Ch11 power point
Chapter 8: Communications and Operations Security
Chapter 6: Human Resources Security
Presentation2 (2)
Chapter 5: Asset Management
Chapter 7: Physical & Environmental Security
Chapter 11: Information Security Incident Management
Information Security Incident Management.pdf
Security Program and PoliciesPrinciples and Practicesby Sari.docx
What is Information Assurance Model in Cyber Security.pptx
Chapter 14: Regulatory Compliance for the Healthcare Sector
How to Build and Implement your Company's Information Security Program
CYB 102 – Fundamentals of Cyber Security .pdf
Chapter 1 Introduction about information assurance.pptx
Building HIPAA Compliance in service delivery teams
Foundation of the information securiety
Chapter 4: Governance and Risk Management
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Week 9- 1 information security slides.pptx
Chapter 13: Regulatory Compliance for Financial Institutions
Introduction to Health Informatics Ch11 power point

More from Nada G.Youssef (20)

PPTX
مجلة 1
PPTX
Chapter Tewlve
PPTX
Chapter Eleven
PPTX
Chapter Ten
PPTX
Chapter Nine
PPTX
Chapter Eight
PPTX
Chapter Seven
PPTX
Chapter Six
PPTX
Chapter Five
PPTX
Chapter Four
PPTX
Chapter Three
PPTX
Chapter Two
PPTX
Chapter one
PPTX
Chapter 15: PCI Compliance for Merchants
PPTX
Chapter 12: Business Continuity Management
PPT
Chapter 3: Information Security Framework
PPTX
Chapter 2: Policy Elements and style
PPTX
Chapter 1: Understanding Policy
PPTX
Preparatory Year of Saudi Electronic University
PPT
Chapter 12
مجلة 1
Chapter Tewlve
Chapter Eleven
Chapter Ten
Chapter Nine
Chapter Eight
Chapter Seven
Chapter Six
Chapter Five
Chapter Four
Chapter Three
Chapter Two
Chapter one
Chapter 15: PCI Compliance for Merchants
Chapter 12: Business Continuity Management
Chapter 3: Information Security Framework
Chapter 2: Policy Elements and style
Chapter 1: Understanding Policy
Preparatory Year of Saudi Electronic University
Chapter 12

Recently uploaded (20)

PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Lesson notes of climatology university.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Microbial diseases, their pathogenesis and prophylaxis
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
O7-L3 Supply Chain Operations - ICLT Program
Lesson notes of climatology university.
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Sports Quiz easy sports quiz sports quiz
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Insiders guide to clinical Medicine.pdf
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf

Chapter 9: Access Control Management

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 9: Access Control Management
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ■ Explain access control fundamentals ■ Apply the concepts of default deny, need-to-know, and least privilege ■ Understand secure authentication ■ Protect systems from risks associated with Internet connectivity, remote access, and telework environments ■ Manage and monitor user and administrator access ■ Develop policies to support access control management
  • 3. Access Control Fundamentals ■ Access controls ❑ Security features that govern how users and processes communicate and interact with systems and resources ❑ Primary objective is to protect information and systems from unauthorized access, modification, or disruption ■ Three common attributes of access controls ❑ Identification scheme ❑ Authentication method ❑ Authorization method Copyright 2014 Pearson Education, Inc. 3
  • 4. Copyright 2014 Pearson Education, Inc. 4 What Is a Security Posture? ❑ It is the organization’s approach to access control ❑ Two fundamental security postures: ■ Secure, which implements the “default deny” model ■ Open, which implements the “default allow” model ❑ Every access control decision for a company is based on that company’s security posture
  • 5. Copyright 2014 Pearson Education, Inc. 5 What Is a Security Posture? Cont. ■ Default allow versus default deny ❑ Default allow: By default, out-of-the-box, no security is deployed, everyone can do everything ■ Easier to deploy, works out-of-the-box ■ No security ❑ Default deny ■ Aka “deny all” ■ Access is unavailable by default until the appropriate control is altered to allow access
  • 6. Copyright 2014 Pearson Education, Inc. 6 What Is a Security Posture? Cont. ■ Principle of Least Privilege ❑ Definition: The least amount of permissions granted users that still allow them to perform whatever business tasks they have been assigned, and no more. ❑ This is a strong foundation for any access control policy. ❑ Protects the data but also protects users. They can’t be accused of having deleted a file to which they can’t gain access! ❑ From a cultural stand point, it is important to explain to employees why they are not “trusted” with all the company’s data.
  • 7. Copyright 2014 Pearson Education, Inc. 7 What Is a Security Posture? Cont. ■ Need-to-know ❑ Definition: Having a demonstrated and authorized reason for being granted access to information ❑ Should be made a part of the company’s culture ❑ Should be incorporated in security training curriculum ❑ At the least protects the confidentiality of corporate data, but may also protect integrity and availability depending on the attack type
  • 8. How Is Identity Verified? ■ First step to granting access is user identification ❑ Authentication: Subject must supply verifiable credentials offered referred as factors ■ Single-factor authentication ■ Multifactor authentication ■ Multilayer authentication Copyright 2014 Pearson Education, Inc. 8
  • 9. How Is Identity Verified? Cont. ■ Three categories of factors ❑ Knowledge: Something you know ■ Password ■ PIN ■ Answer to a question ❑ Possession: Something you have ■ One-time passcodes ■ Memory cards ■ Smart cards ■ Out-of-band communication ❑ Inherence: Something you are ■ Biometric identification Copyright 2014 Pearson Education, Inc. 9
  • 10. Copyright 2014 Pearson Education, Inc. 10 What Is Authorization? ■ The process of assigning authenticated subjects permission to carry out a specific operation ■ Three primary authorization models ❑ Object capability ■ Used programmatically and based on a combination of a unforgettable reference and an operational message ❑ Security labels ■ Mandatory access controls embedded in object and subject properties ❑ Access Control Lists ■ Used to determine access based on some criteria
  • 11. What Is Authorization? Cont. ■ Categories of access control lists ❑ MAC (Mandatory Access Control): Data is classified, and employees are granted access according to the sensitivity of information ❑ DAC (Discretionary Access Control): Data owners decide who should have access to what information ❑ RBAC (Role-based Access Control): Access is based on positions (roles) within an organization ❑ Rule-based access control: Access is based on criteria that is independent of the user or group account Copyright 2014 Pearson Education, Inc. 11
  • 12. Infrastructure Access Controls ■ Include physical and logical network design, border devices, communication mechanisms, and host security settings ■ Network segmentation ❑ The process of logically grouping network assets, resources, and applications ❑ Type of network segmentation ■ Enclave network ■ Trusted network ■ Semi-trusted network, perimeter network, or DMZ ■ Guest network ■ Untrusted network Copyright 2014 Pearson Education, Inc. 12
  • 13. What Is Layered Border Security? ■ Different types of security measures designed to work in tandem with a single focus ❑ Firewall devices ❑ Intrusion detection systems (IDSs) ❑ Intrusion prevention systems (IPSs) ❑ Content filtering and whitelisting/blacklisting ❑ Border device administration and management Copyright 2014 Pearson Education, Inc. 13
  • 14. Copyright 2014 Pearson Education, Inc. 14 Remote Access Security ■ Remote Access ❑ Users who have a demonstrated business-need to access the corporate network remotely and are authorized to do so must be given that privilege ❑ Not all employees should be given this privilege by default ❑ Remote access activities should be monitored and audited ❑ The organization’s business continuity plan must account for the telecommuting environment ■ Remote access technologies ❑ Virtual Private Networks (VPNs) ■ Secure tunnel for transmitting data over unsecure network, such as the Internet ❑ Remote access portals ■ Offers access to one or more applications through a single centralized interface
  • 15. User Access Controls ■ Used to ensure authorized users can access information and resources while unauthorized users cannot access information and resources ■ Users should have access only to information they need to do their job and no more ■ Administrative account controls ❑ Segregation of duties ❑ Dual control Copyright 2014 Pearson Education, Inc. 15
  • 16. Copyright 2014 Pearson Education, Inc. 16 What Types of Access Should Be Monitored? ■ Three main monitoring areas: ■ Successful access ■ Failed access ■ Privileged operations
  • 17. Copyright 2014 Pearson Education, Inc. 17 Is Monitoring Legal? ❑ Employees should have no expectation of privacy while on company time or when using company resources ❑ Courts have favored an employer’s right to protect their interests over individual privacy rights because: ■ Actions were taken at the employer’s place of work ■ Equipment used – including bandwidth – was company- provided ■ Monitoring the work also helps ensure the quality of work ■ The employer has the right to protect property from theft and/or fraud
  • 18. Copyright 2014 Pearson Education, Inc. 18 Is Monitoring Legal? Cont. ❑ Courts indicate that monitoring is acceptable if it is reasonable: ■ Justifiable if serving a business purpose ■ Policies are set forth to define what privacy employees should expect while on company premises ■ Employees are made aware of what monitoring means are deployed ❑ Acceptable use agreement should include a clause informing users that the company will and does monitor system activity ❑ Users must agree to company policies when logging on
  • 19. Copyright 2014 Pearson Education, Inc. 19 Summary ■ Access control is a complex domain. Access to information is extremely important to regulate. ■ User access and user actions on the network must be monitored and logged, whether they are located on premises or gaining access to the network remotely. ■ Monitoring is useless if the information gathered is not reviewed regularly.