SlideShare a Scribd company logo
Security Authorization Strategy
User and Group Usage
October 1st. 2009 Eguibar Information Technology S.L. © 2015 1
Table of Contents
1. IT Business Requirements
2. Groups Usage Definition
3. Groups Usage Implementation
4. Policy Best Practices
5. Group Strategy based on IT Delegation Model
6. Microsoft Recommended Best Practices
7. Example
October 1st. 2009 Eguibar Information Technology S.L. © 2015 2
IT Business Requirements
October 1st. 2009 Eguibar Information Technology S.L. © 2015 3
IT Business Requirements
Simplify the security assignment to the end user.
Reduce overall time for authorization management.
Authorizations have to be removed when changing departments.
Authorizations on “temporary leave” have to be considered.
Record each user access on corresponding company DB.
Prepare environment for data privacy (including compliancy).
Allow consistent Security Audits on the environment.
Perform a regular Risk and Health Assessment Program for Active
Directory (ADRAP) to identify and mitigate risks regarding infrastructure,
policies, security, procedures, capacity, etc.
Provide the AD with IT Management Organizational data.
Facilitate the implementation of external management tools.
October 1st. 2009 Eguibar Information Technology S.L. © 2015 4
Groups Usage Definition
October 1st. 2009 Eguibar Information Technology S.L. © 2015 5
Groups Usage Definition
Object Description Usage
User Representation of a person. Identity within the directory. Can have direct ACL but
not recommended. An exception is Home Folder.
Global
Group
Group of users with a common
interest.
Intended to group Users and/or other Global Groups.
Can have direct ACL but not recommended. Tool to
provide Active Directory with Business Organization.
Local
Group
Group which controls access to a
given resource. Local Group is within
the server. Domain Local Group is
within Active Directory.
For each type of access, these kind of groups will
control who has granted/denied access. These groups
have direct ACL. These groups can have users, but is
not recommended.
ACL Access Control List. List of objects (recommended to be Local Group) with
granted or denied access to certain resource.
Resource Any piece of information that its
access and has to be controlled.
Resource can be an application, a file, a folder, a
printer, etc. Any electronic information, subject of
controlling access to it, is considered a resource.
Universal
Group
A Group of Groups with the widest
scope (all infrastructure scope)
This is also known as a Cross-Domain group, and is
recommended to be used for collaboration between
domains and should only contain Global Groups. Can
have direct ACL and individual users, but not
recommended
October 1st. 2009 Eguibar Information Technology S.L. © 2015 6
Groups Usage Implementation
October 1st. 2009 Eguibar Information Technology S.L. © 2015 7
Groups Usage Implementation (1/3)
http://technet.microsoft.com/en-
us/library/cc755692(WS.10).aspx
a) Do not assign ACL to individual
users. The ONLY valid exception is
the Home Folder.
b) Users are members ONLY of
Global Groups (avoid adding users
to Local Groups, Domain Local
Groups or Universal Groups).
c) Global Groups can be nested
within other Global Groups (also
Universal Groups).
October 1st. 2009 Eguibar Information Technology S.L. © 2015 8
Groups Usage Implementation (2/3)
http://technet.microsoft.com/en-
us/library/cc755692(WS.10).aspx
d) Global Groups (or Universal
Groups) are members (nested)
within Local Groups and/or Domain
Local Groups.
e) Local Groups will be granted
Access Control List (ACL) to the
corresponding resource. Individual
Local Group based on the given
ACL if different access levels are
needed (Read Access, Change
Access, FullControl Access…).
October 1st. 2009 Eguibar Information Technology S.L. © 2015 9
Groups Usage Implementation (3/3)
http://technet.microsoft.com/en-us/library/cc755692(WS.10).aspx
a) No direct permission to user.
b) Users as members of Global Groups
c) Global Groups nested into Global Groups (or Universal Groups).
d) Global Groups (or Universal) nested within Local Groups / Domain Local Groups.
e) Local Groups granted ACL to the corresponding resource.
October 1st. 2009 Eguibar Information Technology S.L. © 2015 10
Policy Best Practices
October 1st. 2009 Eguibar Information Technology S.L. © 2015 11
Policy Best Practices
It is recommended to create a policy stating the Business Delegation rules
concerning IT systems and Infrastructure.
Policy should be flexible to accommodate all business units.
Policy should provide enough business organization to the IT systems
implemented.
Avoid reproducing the company organization chart into the directory.
Instead reproduce the functional organization.
The policy must follow manufacturer best practices as well as standard
security practices from the design and governance point of view.
The policy should be Technical Agnostic, and should focus on the
functional organization.
The policy is the input information for any related external provider.
October 1st. 2009 Eguibar Information Technology S.L. © 2015 12
Group Strategy based on IT
Delegation Model
October 1st. 2009 Eguibar Information Technology S.L. © 2015 13
Group Strategy based on IT Delegation Model
October 1st. 2009 Eguibar Information Technology S.L. © 2015 14
Microsoft Recommended Best
Practices
October 1st. 2009 Eguibar Information Technology S.L. © 2015 15
Microsoft Recommended Best Practices (1/2)
Security is a must nowadays, and should always start from the governance of the
systems.
It is recommended to create a policy regarding data compliancy within the
organization.
The policy should be flexible enough to accommodate all business needs, but strong
to avoid security leaks.
Create a data security category and enforce its usage.
Confidential data (around 5% of total data); Private data (15% of total data);
Common data (60% of total data) and Public data (20% of total data).
Grant and Revoke access based on the Administration Delegation Model and the
given category.
Avoid mixing data of different security levels.
Create Delegated Areas (Shares or Sub-Folders) based on access category and not
by common or parent area.
Prepare data for security auditing and data compliancy.
October 1st. 2009 Eguibar Information Technology S.L. © 2015 16
Microsoft Recommended Best Practices (2/2)
Create Global Groups for each Department
Create Global Groups for each Project
Assign users to the corresponding Global Groups
If required authorization can’t be covered by the above Global
Groups, it is necessary to create Sub-Groups
If security categories are required (e.g. Confidential Data) create
separate shares and separate groupings.
Use Universal Groups to group different areas (or Global Groups)
and/or to cross boundaries (ej. Different forest)
Implement best practices process (as shown on the result of
Microsoft® Risk and Health Assessment Program for Active
Directory – ADRAP)
October 1st. 2009 Eguibar Information Technology S.L. © 2015 17
Example
October 1st. 2009 Eguibar Information Technology S.L. © 2015 18
Example
October 1st. 2009 Eguibar Information Technology S.L. © 2015 19

More Related Content

PDF
Modalidades suporte oracle
PDF
Whitepaper best practices for integrated physical security supporti…
PDF
18 Tips for Data Classification - Data Sheet by Secure Islands
PDF
CloudExpo 2015NewYork: Turning The Corner on Cloud Data Security Governance
PPTX
Strategies for policy driven information classification
PPT
develop security policy
PPT
Gs Ch1
PDF
Enterprise Information Security Architecture_Paper_1206
Modalidades suporte oracle
Whitepaper best practices for integrated physical security supporti…
18 Tips for Data Classification - Data Sheet by Secure Islands
CloudExpo 2015NewYork: Turning The Corner on Cloud Data Security Governance
Strategies for policy driven information classification
develop security policy
Gs Ch1
Enterprise Information Security Architecture_Paper_1206

What's hot (9)

PDF
2013 OHSUG - Use Cases for using the Program Type View in Oracle Life Science...
PDF
Critical it assets
PPT
Network security policies
PPT
Research/thesis poster
PPTX
Policy Optimized Healthcare Networks - US Ignite Application Summit 2013
PDF
HealthCare Heal Thyself - The Patient as the hub of a new health system
PPTX
ISO 27005 - Digital Trust Framework
PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PPTX
Pistoia Alliance Debates: PhUSE Framework for the Adoption of Cloud Technolog...
2013 OHSUG - Use Cases for using the Program Type View in Oracle Life Science...
Critical it assets
Network security policies
Research/thesis poster
Policy Optimized Healthcare Networks - US Ignite Application Summit 2013
HealthCare Heal Thyself - The Patient as the hub of a new health system
ISO 27005 - Digital Trust Framework
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Pistoia Alliance Debates: PhUSE Framework for the Adoption of Cloud Technolog...
Ad

Viewers also liked (20)

PDF
MongoDB Developer's Notebook, March 2016 -- MongoDB Connector for Business In...
PDF
Mass cycling event raises more than $780,000 for children charity Club Rainbo...
PPTX
Gallery - General
PPTX
Great facts about great war (world war i) part xiii
PDF
Piping Today Article
PPTX
Frozen Heroes and Villains Liselott O
PDF
Mdb dn 2016_04_check_constraints
PPS
And then? 2
PPTX
Presentación2
DOCX
Epidemia
PPT
Sport extreme
PPT
IR10 Presentation Milwaukee Oct 9 2009
PPTX
Etude de comportement des composites fritté a différentes températures
PPTX
Traitement d’image par HUBBLE Space Telescope 'BESSAAD Nassim'
PPT
Echantillonnage
PDF
Even 6 year olds can do "IT" - elearning & ICT in a year 1/2 classroom
PDF
"10 Laws of Building a Unicorn" at SaaStr Annual 2016
PDF
"Running the Box Playbook: Even Better The Second Time" at SaaStr Annual 2016
PPTX
Unit 3. my body
PPT
Presentación Textos CientíFicos D
MongoDB Developer's Notebook, March 2016 -- MongoDB Connector for Business In...
Mass cycling event raises more than $780,000 for children charity Club Rainbo...
Gallery - General
Great facts about great war (world war i) part xiii
Piping Today Article
Frozen Heroes and Villains Liselott O
Mdb dn 2016_04_check_constraints
And then? 2
Presentación2
Epidemia
Sport extreme
IR10 Presentation Milwaukee Oct 9 2009
Etude de comportement des composites fritté a différentes températures
Traitement d’image par HUBBLE Space Telescope 'BESSAAD Nassim'
Echantillonnage
Even 6 year olds can do "IT" - elearning & ICT in a year 1/2 classroom
"10 Laws of Building a Unicorn" at SaaStr Annual 2016
"Running the Box Playbook: Even Better The Second Time" at SaaStr Annual 2016
Unit 3. my body
Presentación Textos CientíFicos D
Ad

Similar to Security Authorization Strategy (20)

PDF
Automating Security Management in PBCS!
PDF
File000169
PDF
Security Policy Checklist
PPTX
Impact of cloud services on software development life
DOCX
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Co.docx
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PDF
Allot Optenet Parental Control: Solution Brief
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PPTX
Domain wide organisation policy
PPTX
basha 1.pptx fsdbjn'ksfdipsdknd hvlflyifkjvkufuikf.uk
PPT
Ch10 Conducting Audits
PDF
Wp security-data-safe
PDF
Ise viii-information and network security [10 is835]-solution
PDF
Cisco cybersecurity essentials chapter - 6
DOCX
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
DOCX
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
PDF
March 2023 CIAOPS Need to Know Webinar
PDF
Gartner_Critical Capabilities for SIEM 9.21.15
PPTX
How to improve an ECM system
Automating Security Management in PBCS!
File000169
Security Policy Checklist
Impact of cloud services on software development life
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Co.docx
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
Allot Optenet Parental Control: Solution Brief
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
Domain wide organisation policy
basha 1.pptx fsdbjn'ksfdipsdknd hvlflyifkjvkufuikf.uk
Ch10 Conducting Audits
Wp security-data-safe
Ise viii-information and network security [10 is835]-solution
Cisco cybersecurity essentials chapter - 6
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
March 2023 CIAOPS Need to Know Webinar
Gartner_Critical Capabilities for SIEM 9.21.15
How to improve an ECM system

Security Authorization Strategy

  • 1. Security Authorization Strategy User and Group Usage October 1st. 2009 Eguibar Information Technology S.L. © 2015 1
  • 2. Table of Contents 1. IT Business Requirements 2. Groups Usage Definition 3. Groups Usage Implementation 4. Policy Best Practices 5. Group Strategy based on IT Delegation Model 6. Microsoft Recommended Best Practices 7. Example October 1st. 2009 Eguibar Information Technology S.L. © 2015 2
  • 3. IT Business Requirements October 1st. 2009 Eguibar Information Technology S.L. © 2015 3
  • 4. IT Business Requirements Simplify the security assignment to the end user. Reduce overall time for authorization management. Authorizations have to be removed when changing departments. Authorizations on “temporary leave” have to be considered. Record each user access on corresponding company DB. Prepare environment for data privacy (including compliancy). Allow consistent Security Audits on the environment. Perform a regular Risk and Health Assessment Program for Active Directory (ADRAP) to identify and mitigate risks regarding infrastructure, policies, security, procedures, capacity, etc. Provide the AD with IT Management Organizational data. Facilitate the implementation of external management tools. October 1st. 2009 Eguibar Information Technology S.L. © 2015 4
  • 5. Groups Usage Definition October 1st. 2009 Eguibar Information Technology S.L. © 2015 5
  • 6. Groups Usage Definition Object Description Usage User Representation of a person. Identity within the directory. Can have direct ACL but not recommended. An exception is Home Folder. Global Group Group of users with a common interest. Intended to group Users and/or other Global Groups. Can have direct ACL but not recommended. Tool to provide Active Directory with Business Organization. Local Group Group which controls access to a given resource. Local Group is within the server. Domain Local Group is within Active Directory. For each type of access, these kind of groups will control who has granted/denied access. These groups have direct ACL. These groups can have users, but is not recommended. ACL Access Control List. List of objects (recommended to be Local Group) with granted or denied access to certain resource. Resource Any piece of information that its access and has to be controlled. Resource can be an application, a file, a folder, a printer, etc. Any electronic information, subject of controlling access to it, is considered a resource. Universal Group A Group of Groups with the widest scope (all infrastructure scope) This is also known as a Cross-Domain group, and is recommended to be used for collaboration between domains and should only contain Global Groups. Can have direct ACL and individual users, but not recommended October 1st. 2009 Eguibar Information Technology S.L. © 2015 6
  • 7. Groups Usage Implementation October 1st. 2009 Eguibar Information Technology S.L. © 2015 7
  • 8. Groups Usage Implementation (1/3) http://technet.microsoft.com/en- us/library/cc755692(WS.10).aspx a) Do not assign ACL to individual users. The ONLY valid exception is the Home Folder. b) Users are members ONLY of Global Groups (avoid adding users to Local Groups, Domain Local Groups or Universal Groups). c) Global Groups can be nested within other Global Groups (also Universal Groups). October 1st. 2009 Eguibar Information Technology S.L. © 2015 8
  • 9. Groups Usage Implementation (2/3) http://technet.microsoft.com/en- us/library/cc755692(WS.10).aspx d) Global Groups (or Universal Groups) are members (nested) within Local Groups and/or Domain Local Groups. e) Local Groups will be granted Access Control List (ACL) to the corresponding resource. Individual Local Group based on the given ACL if different access levels are needed (Read Access, Change Access, FullControl Access…). October 1st. 2009 Eguibar Information Technology S.L. © 2015 9
  • 10. Groups Usage Implementation (3/3) http://technet.microsoft.com/en-us/library/cc755692(WS.10).aspx a) No direct permission to user. b) Users as members of Global Groups c) Global Groups nested into Global Groups (or Universal Groups). d) Global Groups (or Universal) nested within Local Groups / Domain Local Groups. e) Local Groups granted ACL to the corresponding resource. October 1st. 2009 Eguibar Information Technology S.L. © 2015 10
  • 11. Policy Best Practices October 1st. 2009 Eguibar Information Technology S.L. © 2015 11
  • 12. Policy Best Practices It is recommended to create a policy stating the Business Delegation rules concerning IT systems and Infrastructure. Policy should be flexible to accommodate all business units. Policy should provide enough business organization to the IT systems implemented. Avoid reproducing the company organization chart into the directory. Instead reproduce the functional organization. The policy must follow manufacturer best practices as well as standard security practices from the design and governance point of view. The policy should be Technical Agnostic, and should focus on the functional organization. The policy is the input information for any related external provider. October 1st. 2009 Eguibar Information Technology S.L. © 2015 12
  • 13. Group Strategy based on IT Delegation Model October 1st. 2009 Eguibar Information Technology S.L. © 2015 13
  • 14. Group Strategy based on IT Delegation Model October 1st. 2009 Eguibar Information Technology S.L. © 2015 14
  • 15. Microsoft Recommended Best Practices October 1st. 2009 Eguibar Information Technology S.L. © 2015 15
  • 16. Microsoft Recommended Best Practices (1/2) Security is a must nowadays, and should always start from the governance of the systems. It is recommended to create a policy regarding data compliancy within the organization. The policy should be flexible enough to accommodate all business needs, but strong to avoid security leaks. Create a data security category and enforce its usage. Confidential data (around 5% of total data); Private data (15% of total data); Common data (60% of total data) and Public data (20% of total data). Grant and Revoke access based on the Administration Delegation Model and the given category. Avoid mixing data of different security levels. Create Delegated Areas (Shares or Sub-Folders) based on access category and not by common or parent area. Prepare data for security auditing and data compliancy. October 1st. 2009 Eguibar Information Technology S.L. © 2015 16
  • 17. Microsoft Recommended Best Practices (2/2) Create Global Groups for each Department Create Global Groups for each Project Assign users to the corresponding Global Groups If required authorization can’t be covered by the above Global Groups, it is necessary to create Sub-Groups If security categories are required (e.g. Confidential Data) create separate shares and separate groupings. Use Universal Groups to group different areas (or Global Groups) and/or to cross boundaries (ej. Different forest) Implement best practices process (as shown on the result of Microsoft® Risk and Health Assessment Program for Active Directory – ADRAP) October 1st. 2009 Eguibar Information Technology S.L. © 2015 17
  • 18. Example October 1st. 2009 Eguibar Information Technology S.L. © 2015 18
  • 19. Example October 1st. 2009 Eguibar Information Technology S.L. © 2015 19