CHAPTER 6 Access Controls Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Learning Objective(s) and Key Concepts Key Concepts Explain the role of access controls in an IT infrastructure. Access control concepts and technologies Identification, authentication, and authorization Formal models of access control Threats to access controls and control violations Centralized and decentralized access controls Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Learning Objective(s) Defining Access Control Prevents unauthorized use Mitigations put in place to protect a resource from a threat Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The process of protecting a resource so that it is used only by those allowed to use it Four-Part Access Control Description Identification Who is asking to access the asset? Authentication Can their identities be verified? Authorization What, exactly, can the requestor access? And what can they do? Accountability How are actions traced to an individual to ensure the person who makes data or system changes can be identified? Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Access Control Component Policy Definition and Policy Enforcement Phases Policy definition phase Policy enforcement phase Grants or rejects requests for access based on the authorizations defined in the first phase Tied to identification, authentication, and accountability phases Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Who has access and what systems or resources can they use? Tied to the authorization phase Two Types of Access Controls Physical Logical Controls access to a computer system or network Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Controls entry into buildings, parking lots, and protected areas Physical Access Control Example: Smart cards Programmed with ID number Used at parking lots, elevators, office doors Shared office buildings may require an additional after-hours card Cards control access to physical resources Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Logical Access Control Deciding which users can get into a system Restraining or influencing a user’s behavior on that system Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Monitoring what each user does on that system The Security Kernel Enforces access control for computer systems Implements the reference monitor concept Mediates all access requests Permits access only when appropriate rules or conditions are met Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Central point of access control Enforcing Access Control Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Access Control Policies Four central components of access control: People who use the system or processes (subjects) Resources Protected objects in the system Actions Activities that authorized users can perform on resources Relationships Optional conditions that exist between users and resources Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Users Authorization Policies Authorization In most organizations, authorization is based on job roles, background screening, and government requirements Conditions or policies are decided by: Individual users (user is assigned privileges; most detailed and difficult to maintain) Group membership policy Authority-level policy Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com The process of deciding who has access to which resources Methods and Guidelines for Identification Methods Guidelines Nonrepudiation Accounting Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Username Smart card Biometrics Processes and Requirements for Authentication Knowledge Ownership Something you have Characteristics Something unique to you (something you are) Action/performance Something you do/how you do it Some observable trait or behavior that is unique to you Location Somewhere you are Relationship A trusted individual with whom you have a relationship/someone you know Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Something you know Behavior Authentication by Knowledge Password Password account policies Passphrase Stronger than a password Account lockout policies Audit logon events Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Weak passwords easily cracked by brute-force or dictionary attack Password best practices Authentication by Ownership Synchronous token Time-based synchronization system Event-based synchronization system Continuous authentication Asynchronous token Uses challenge-response technology Key-fob sized device Token software installed on a validated mobile device USB token Smart card Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Calculates a number at both the authentication server and the device Asynchronous Token Challenge–Response Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Authentication by Characteristics/Biometrics Static (physiological) measures Dynamic (behavioral) measures What you do Examples: Voice inflections, keyboard strokes, signature motions Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com What you are Examples: Fingerprint patterns, iris granularity, retina blood vessels Concerns Surrounding Biometrics Accuracy Reaction time Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Acceptability Types of Biometrics Facial recognition Palm print Voice pattern Hand geometry Keystroke dynamics Vein analysis Signature dynamics Retina scan Gait analysis Iris scan Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Fingerprint Advantages and Disadvantages of Biometrics Advantages Person must be physically present to authenticate There is nothing to remember Biometrics are difficult to fake Lost IDs or forgotten passwords are not problems Disadvantages Physical characteristics might change Physically disabled users might have difficulties Not all techniques are equally effective Response time may be too slow Required devices can be expensive Privacy issues Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Authentication by Location and Action Location Action Stores the patterns or nuances of how you do something Record typing patterns Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Strong indicator of authenticity Additional information to suggest granting or denying access to a resource Single Sign-On (SSO) Reduces human error Difficult to put in place Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Sign on to a computer or network once and then be allowed into all computers and systems where authorized Advantages and Disadvantages of SSO Advantages Logon process is efficient Users are generally willing to use stronger passwords Provides continuous, clear reauthentication Provides failed logon attempt thresholds and lockouts Provides centralized administration Disadvantages Compromised passwords grants access to an intruder Static passwords provide very limited security Difficulty adding SSO to unique computers or legacy systems Scripts can expose data and do not provide two-factor authentication Authentication server can become a single point of failure Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com SSO Processes Kerberos Lightweight Directory Access Protocol (LDAP) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Secure European System for Applications in a Multi-vendor Environment (SESAME) Policies and Procedures for Accountability Log files Data retention Media disposal Compliance requirements Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Monitoring and reviews Formal Models of Access Control Discretionary access control (DAC) Nondiscretionary access control Rule-based access control Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Mandatory access control (MAC) DAC Operating systems-based DAC policy considerations Application-based DAC Denies access based on context or content through the application by presenting only options that are authorized for the current user Permission levels User based Job-based, group-based, or role-based access control (RBAC) Project based Task based Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Access control method New user registration Periodic review MAC Determine level of restriction by sensitivity of resource (classification label) System and owner make the decision to allow access Temporal isolation/time-of-day restrictions MAC is stronger than DAC Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Individuals then formally authorized (i.e., obtain clearance) to access sensitive information Nondiscretionary Access Control Sensitive files are write-protected for integrity and readable only by authorized users More secure than DAC Ensures that system security is enforced and tamperproof Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Access rules are closely managed by security administrator, not system owner or ordinary users Rule-Based Access Control Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Access Control Lists (1 of 2) Linux and macOS Read, write, execute Applied to File owners, groups, global users Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Permissions Access Control Lists (2 of 2) Windows Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Share permissions Full, change, read, deny Security permissions Full, modify, list folder contents, read-execute, read, write, special, deny An Access Control List Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Role-Based Access Control Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Content-Dependent Access Control Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Constrained User Interface Methods of constraining users Menus Database views Physically constrained user interfaces Encryption Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Other Access Control Models Bell–LaPadula model Clark–Wilson integrity model Brewer–Nash integrity model Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Biba integrity model Brewer–Nash Integrity Model Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Effects of Breaches in Access Control Disclosure of private information Loss of business intelligence Danger to facilities, staff, and systems Damage to equipment Failure of systems and business processes Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Corruption of data Threats to Access Controls Gaining physical access Bypassing security Exploiting hardware and software Reusing or discarding media Electronic eavesdropping Intercepting communication Accessing networks Exploiting applications Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Eavesdropping by observation Effects of Access Control Violations Loss of customer confidence New legislation and regulations imposed on the organization Bad publicity More oversight Financial penalties Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Loss of business opportunities Credential and Permissions Management Microsoft offers Group Policy and Group Policy Objects (GPOs) to help administrators manage access controls Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Systems that provide the ability to collect, manage, and use the information associated with access control Centralized and Decentralized Access Controls Centralized authentication, authorization, and accounting (AAA) servers Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com RADIUS: Most popular; two configuration files TACACS+: Internet Engineering Task Force (IETF) standard; one configuration file DIAMETER: Base protocol and extensions; uses User Datagram Protocol (UDP) in peer-to-peer (P2P) mode rather than client/server mode SAML: Open standard based on XML for exchanging both authentication and authorization data P2P Mode and Client/Server Mode Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Decentralized Access Control Common decentralized access control protocols: Password Authentication Protocol (PAP) Challenge-Handshake Authentication Protocol (CHAP) Mobile device authentication, Initiative for Open Authentication (OATH) HMAC-based one-time password (HOTP) Time-based one-time password (TOTP) Identity and access management (IAM) and Privileged Access Management (PAM) can work together to provide controlled access to an organization’s services, resources, and data Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Handles access control decisions and administration locally; access control is in hands of the people closest to the system users Privacy Monitoring in the workplace includes: Opening mail or email Using automated software to check email Monitoring keystrokes and time spent at the keyboard Checking logs of websites visited Getting information from credit-reference agencies Collecting information through point-of-sale (PoS) terminals Recording activities on closed-circuit television (CCTV) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Communicate expectations for privacy in acceptable use policies (AUPs) and logon banners Cloud Computing Description Private All components are managed for a single organization; may be managed by the organization or by a third-party provider Community Components are shared by several organizations and managed by one of the participating organizations or by a third party Public Available for public use and managed by third-party providers Hybrid Contains components of more than one type of cloud, including private, community, and public clouds Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Category Cloud Service Provider (CSP) Common cloud services Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Advantages and Disadvantages of Cloud Computing Advantages No need to maintain a data center No need to maintain a disaster recovery site Outsourced responsibility for performance and connectivity On-demand provisioning Disadvantages More difficult to keep private data secure Greater danger of private data leakage Greater demand for constant network access Greater need for clients to trust outside vendors Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Summary Access control concepts and technologies Formal models of access control Threats to access controls and control violations Centralized and decentralized access controls Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Identification, authentication, and authorization