Access Controls outline

advertisement
Access Controls
Group # 2
Access Controls
What are access controls?
 Controls that provide security against internal and external threats
 2 Types of access controls:
›
Physical controls
›
Logical controls
Physical assets that need control
 Buildings including their power and security
 Technology centers
 Telecommunication rooms (switches, hubs, routers)
 Customer documentation
 Audit files
 Inventory
Examples of physical controls
1.
2.
3.
4.
5.
Logical Controls
 Servers and their operating systems
 Network systems
Access Controls
Group # 2
 Database systems or file systems
 Users Applications
 Communication systems
 Online Reports
 Audit logs
Examples of Logical controls
1.
2.
3.
4.
Aligning risks and control
To make sure your access controls are sufficient.
The more risk; the stronger your controls should be.
Authorization vs. authentication
What is the difference?
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
Auditing access controls
 Risk assessment
 Test of controls
 Analysis and Feedback
Access Controls
Group # 2
Issues affecting risks
 Size of the system
 Complexity
 Local vs. Remote
 Wireless Technologies
 Shared files and databases
 Changes to infrastructure
Tests of controls
 Penetration tests
 Monitor controls
 Review controls
What are some examples of access to entry requirements?
_________________________________________________________________________________________
_________________________________________________________________________________________
Risk monitoring tactics
 Number of external intrusion attempts
 Number of internal unauthorized attempts
 Number of security incidents caused by unauthorized access
 Number of entitlement reviews not in compliance
Download