Podcast
Questions and Answers
What does NISTIR 7298 define?
What does NISTIR 7298 define?
- Cryptography
- Access control (correct)
- Network protocols
- Data encryption
Access control involves granting or denying requests to use information processing services.
Access control involves granting or denying requests to use information processing services.
True (A)
According to RFC 4949, what regulates the use of system resources?
According to RFC 4949, what regulates the use of system resources?
security policy
Access to system resources is permitted only by authorized ______.
Access to system resources is permitted only by authorized ______.
Which of the following is a basic security requirement for access control?
Which of the following is a basic security requirement for access control?
Allowing users to execute any type of transaction is a recommended access control practice.
Allowing users to execute any type of transaction is a recommended access control practice.
What should be controlled in accordance with approved authorizations?
What should be controlled in accordance with approved authorizations?
Separating the duties of individuals reduces the risk of malevolent activity without ______.
Separating the duties of individuals reduces the risk of malevolent activity without ______.
What principle involves granting only the necessary access rights to users?
What principle involves granting only the necessary access rights to users?
It's best practice to use privileged accounts for accessing nonsecurity functions.
It's best practice to use privileged accounts for accessing nonsecurity functions.
What should be prevented to maintain security and audit the execution of such functions?
What should be prevented to maintain security and audit the execution of such functions?
Limiting unsuccessful ______ attempts is an important aspect of access control.
Limiting unsuccessful ______ attempts is an important aspect of access control.
What should be provided to users consistent with applicable rules?
What should be provided to users consistent with applicable rules?
It is not necessary to terminate a user session after a defined period of inactivity.
It is not necessary to terminate a user session after a defined period of inactivity.
What type of mechanisms should be employed to protect the confidentiality of remote access sessions?
What type of mechanisms should be employed to protect the confidentiality of remote access sessions?
Remote access should be routed via managed access control ______.
Remote access should be routed via managed access control ______.
What should be authorized prior to allowing wireless connections?
What should be authorized prior to allowing wireless connections?
It is safe to skip authentication and encryption when using wireless access.
It is safe to skip authentication and encryption when using wireless access.
What type of devices should be under control for security reasons?
What type of devices should be under control for security reasons?
[Blank] should be encrypted on mobile devices to protect its confidentiality.
[Blank] should be encrypted on mobile devices to protect its confidentiality.
External information systems require what to limit connections?
External information systems require what to limit connections?
It's acceptable to use organizational portable storage devices freely on external information systems.
It's acceptable to use organizational portable storage devices freely on external information systems.
What type of information should be controlled when posted or processed on publicly accessible information systems?
What type of information should be controlled when posted or processed on publicly accessible information systems?
In a broad sense, all of computer security is concerned with ______ control.
In a broad sense, all of computer security is concerned with ______ control.
According to RFC 4949, computer security measures implement and assure:
According to RFC 4949, computer security measures implement and assure:
Discretionary Access Control (DAC) controls access based on the roles that users have.
Discretionary Access Control (DAC) controls access based on the roles that users have.
What is compared with security clearances in Mandatory Access Control (MAC)?
What is compared with security clearances in Mandatory Access Control (MAC)?
Role Based Access Control (RBAC) controls based on the roles users have within a ______.
Role Based Access Control (RBAC) controls based on the roles users have within a ______.
Attribute-Based Access Control (ABAC) considers attributes of whom or what?
Attribute-Based Access Control (ABAC) considers attributes of whom or what?
An 'object' in access control is an entity capable of accessing resources.
An 'object' in access control is an entity capable of accessing resources.
Flashcards
Access Control (NISTIR 7298)
Access Control (NISTIR 7298)
The process of granting or denying specific requests to obtain/use information and related processing services or enter facilities.
Access Control (RFC 4949)
Access Control (RFC 4949)
A process regulating system resource use according to a security policy, allowing only authorized entities.
Basic Security Requirement (Access)
Basic Security Requirement (Access)
Limit information system access to authorized entities only.
Derived Security Requirement (CUI)
Derived Security Requirement (CUI)
Signup and view all the flashcards
Derived Security Requirement (Duties)
Derived Security Requirement (Duties)
Signup and view all the flashcards
Principle of Least Privilege
Principle of Least Privilege
Signup and view all the flashcards
Session Lock Use
Session Lock Use
Signup and view all the flashcards
Automated Session Termination
Automated Session Termination
Signup and view all the flashcards
Wireless Access Security
Wireless Access Security
Signup and view all the flashcards
Mobile Device Connection
Mobile Device Connection
Signup and view all the flashcards
Access Control Scope
Access Control Scope
Signup and view all the flashcards
Discretionary Access Control (DAC)
Discretionary Access Control (DAC)
Signup and view all the flashcards
Mandatory Access Control (MAC)
Mandatory Access Control (MAC)
Signup and view all the flashcards
Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC)
Signup and view all the flashcards
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control (ABAC)
Signup and view all the flashcards
Subject
Subject
Signup and view all the flashcards
Object
Object
Signup and view all the flashcards
Access Right
Access Right
Signup and view all the flashcards
Protection Domain
Protection Domain
Signup and view all the flashcards
Inodes
Inodes
Signup and view all the flashcards
SetUID/SetGID
SetUID/SetGID
Signup and view all the flashcards
Sticky Bit
Sticky Bit
Signup and view all the flashcards
ABAC Distinguishing Feature
ABAC Distinguishing Feature
Signup and view all the flashcards
Identity, Credential, and Access Management (ICAM)
Identity, Credential, and Access Management (ICAM)
Signup and view all the flashcards
Identity Management Focus
Identity Management Focus
Signup and view all the flashcards
Credential Management Focus
Credential Management Focus
Signup and view all the flashcards
Access Management
Access Management
Signup and view all the flashcards
Identity Federation Goal
Identity Federation Goal
Signup and view all the flashcards
Open Identity Trust Framework (OITF)
Open Identity Trust Framework (OITF)
Signup and view all the flashcards
Study Notes
- Access control is the process of granting or denying requests to obtain and use information processing services and enter physical facilities.
- Access control regulates the use of system resources with a security policy, permitting access only by authorized entities according to that policy.
Basic Security Requirements
- Limit information system access to authorized users, processes acting on their behalf, or devices.
- Limit information system access to authorized transactions and functions.
Derived Security Requirements
- Control the flow of Controlled Unclassified Information (CUI) in accordance with approved authorizations.
- Separate duties to reduce the risk of malevolent activity carried out through collusion.
- Employ the principle of least privilege for specific security functions and privileged accounts.
- Use non-privileged accounts or roles when accessing nonsecurity functions.
- Prevent non-privileged users from executing privileged functions and audit the execution of such functions.
- Limit unsuccessful logon attempts.
- Provide privacy and security notices consistent with applicable CUI rules.
- Use session lock with pattern-hiding displays to prevent data access after inactivity.
- Terminate user sessions automatically after a defined condition.
- Monitor and control remote access sessions.
- Use cryptographic mechanisms to protect the confidentiality of remote access sessions.
- Route remote access via managed access control points.
- Authorize remote execution of privileged commands and remote access to security-relevant information.
- Authorize wireless access before allowing connections.
- Protect wireless access using authentication and encryption.
- Control connection of mobile devices.
- Encrypt CUI on mobile devices.
- Verify, control, and limit connections to and use of external information systems.
- Limit the use of organizational portable storage devices on external information systems.
- Control CUI posted or processed on publicly accessible information systems.
- A broad definition of computer security includes measures that implement and ensure security services in a computer system, particularly those that assure access control service.
Access Control Policies
- Discretionary Access Control (DAC): access based on the identity of the requestor and access rules.
- Mandatory Access Control (MAC): access based on comparing security labels with security clearances.
- Role-Based Access Control (RBAC): Access control based on the roles that users have within the system and the accesses that users in those roles are allowed.
- Attribute-Based Access Control (ABAC): Access control based on user attributes, resource attributes, and current environmental conditions.
Subjects, Objects, and Access Rights
- Subject: An entity capable of accessing objects, can be an Owner, Group or the World.
- Object: A resource to which access is controlled, entity used to contain and/or receive information.
- Access right: Describes the way in which a subject may access an object.
- Possible access rights include Read, Write, Execute, Delete, Create, and Search.
Discretionary Access Control (DAC)
- An entity may grant access rights to another entity to enable it to access some resource.
- Often provided using an access matrix, with subjects listed in one dimension and objects in the other.
- Each entry in the matrix indicates access rights of a particular subject for a particular object.
Access Control System Commands
- Transfer Command: Transfers access right to another subject.
- Grant Command: Grants access right to a subject, usually requiring ownership.
- Delete Command: Removes an access right from a subject.
- Read Command: Grants read access to a subject.
- Create Command: Creates a new object.
- Destroy Object Command: Removes an object from the system.
- Create Subject Command: Adds a new subject.
- Destroy Subject Command: Removes a subject.
Protection Domains
- Set of objects with access rights to those objects.
- More flexibility when associating capabilities with protection domains.
- Association between a process and a domain can be static or dynamic.
- In user mode protected, memory areas prevent use and certain instructions from being executed.
- In kernel mode, there is privileged instruction execution and access to protected memory areas.
UNIX File Access Control
- UNIX files are administered using inodes (index nodes), control structures with key information needed for a particular file.
- Several file names may be associated with a single inode.
- An active inode is associated with exactly one file.
- File attributes, permissions, and control information are sorted in the inode.
- The inode table or list contains all the files’ inodes stored on disk.
- When a file is opened, the inode is stored in a memory-resident inode table for quick access.
- Directories are structured in a hierarchical tree that contains files and/or other directories.
- Directories are structured in a hierarchical tree and contain filenames plus pointers to associated inodes.
- Each file has a unique user identification number (user ID) and belongs to a specific group.
- There are 12 protection bits to specify read, write, and execute permissions.
- Permissions are set for the owner of the file, members of the group, and all other users.
- The owner ID, group ID, and protection bits are part of the file's inode. “Set user ID” (SetUID) and “Set group ID” (SetGID) used.
- System temporarily uses rights of the file owner/group in addition to the real users rights when making access control decisions.
- Enables privileged programs to access files/resources not generally accessible.
- When applied to a directory the sticky bit specifies that only the owner of any file in the directory can rename, move, or delete that file.
- Superusers are exempt from usual access control restrictions and have system-wide access.
- Modern UNIX systems support Access Control Lists (ACLs) with FreeBSD, OpenBSD, Linux, and Solaris.
- FreeBSD uses the setfacl command to assign a list of UNIX user IDs and groups.
- Setfacl allows any number of users and groups to be associated with a file.
- In FreeBSD, a file does not need to have an ACL by default but can include an additional bit indicating an extended ACL.
- When a process requests to a file system object there are two steps performed.
- Step 1 selects the most appropriate ACL.
- Step 2 checks if the matching entry contains sufficient permissions.
Role Based Access Control (RBAC)
- RBAC0: Base model.
- RBAC1: Hierarchical roles
- RBAC2: Constraints are applied.
- RBAC3: Combined RBAC1 and RBAC2 to utilize Role Hierarchies and Constraints.
- Constraints adapt RBAC to the specifics and security policies of the organization.
- Mutually exclusive roles, cardinality (setting max number with respect to roles), and prerequisite roles.
- Prerequisite roles dictate that a user can only be assigned a particular role if already assigned some other specified role.
ABAC (Attribute Based Access Control)
- Authorizations can express conditions on properties of both the resources and subjects.
- Strength is in its flexibility and power of expression.
- Systems are capable of enforcing DAC, RBAC, and MAC concepts.
- Allows an unlimited number of attributes to be combined to satisfy any access control rule.
- Attributes of the subject, attributes of the object, and a formal relationship/rule defining allowable operations for subject-object attribute combinations.
- Attributes define the identity and characteristics of the subject.
- An object (or resource) attributes are a passive information system related entity containing or receiving information.
- Environment attributes describe the operational or situational context.
ABAC Policies
- A policy is a set of rules and relationships governing allowable behavior, based on privileges of subjects and how resources are protected under environmental conditions.
- Often written from object perspective, privileges are defined by an authority and embodied in a policy.
- Other terms for privileges: rights, authorizations, and entitlements.
Identity, Credential, and Access Management (ICAM)
- ICAM manages and implements digital identities, credentials, and access control.
- It creates trusted digital identity representations for individuals and nonperson entities (NPEs).
- Binds identities to credentials that may serve as a proxy for the individual of NPE in access transactions.
- A credential authoritatively binds an identity to a possessed token and controlled by a subscriber.
- It Uses the credentials to provide authorized access to an agency's resources.
Identity Management
- Identity management assigns attributes to a digital identity, connecting the digital identity to an individual or NPE.
- This establishes a trustworthy digital identity, independent of specific applications or contexts.
- The most common approach to access control creates a digital representation of identity for specific application use.
- Mechanisms, policies, and procedures for protecting person identity information, this includes controlling access to identity data.
- Important techniques include sharing authoritative identity day with applications where needed and revocation of an enterprise identity.
Credential Management
- It Encompasses five components and is the overall management of the lifecycle of credentials (smart cards, private/public cryptographic keys, and digital certificates).
- This includes An authorized individual to establish the need for the credential.
- In the process, the sponsored individual enrolls for identity proofing.
- Authority must maintain/incorporate attribute data maintained by the identity management component.
- Depending on the production method, it may use encryption, digital signatures and smart cards.
- The credential is issued to an individual or NPE and the credential must be maintained over it is cycle, revocation, replacement, PIN reset, or a suspension.
Access management manages and controls how entities access resources
- This covers both logical and physical access and may be internal to or an external element.
- This ensures the proper verification attempts to access a security, a building, a computer and any data.
- Three elements are required for an enterprise wide access control facility:
- Resource management.
- Privilege management.
- Policy Management.
Three Support Elements Required for an Enterprise Wide Access Control Facility:
- Concerned with defining rules for resources requiring access control, including credentials needed, user attributes, resource attributes, and environmental conditions.
- Establishes and maintains entitlement or privilege attributes comprising an individual's access profile, for determining access decisions to both physical and logical access.
- Govern what is allowable and unallowable in an access transaction.
Identity Federation
- The technology, standards, policies, and processes that provides trust.
- Allows organizations to use/trust digital entities from another organization.
- How do you trust the entities and identities from external entities?
- How do you vouch for the identities of individual in your own organization?
Open Identity Trust Framework (OITF)
- OpenID: Open standard allowing users to authenticate across sites.
- OIDF: International nonprofit promoting OpenID technologies.
- ICF: Nonprofit evolving the Information Card ecosystem.
OITF continued
- OITF: Standardized, open trust framework for identity and attribute exchange, by OIDF and ICF.
- OIX: Independent, neutral certification provider conforming .
- AXN: Internet-scale gateway for accessing user attributes affordably.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about access control, which grants or denies requests to use information processing services and enter physical facilities. It regulates system resource usage with a security policy, permitting access only to authorized entities. Discover basic and derived security requirements.