Untitled Quiz
5 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What principle should be employed to minimize the risk of unauthorized access or actions?

  • Aggregate access permissions
  • Principle of least privilege (correct)
  • Separation of duties
  • Open access policy
  • Which of the following is NOT a basic security requirement for access control?

  • Restrict access to specific physical facilities
  • Limit access to types of transactions authorized users can execute
  • Limit system access to authorized users
  • Capture privileged function executions in audit logs (correct)
  • How should access to sensitive information be regulated according to access control principles?

  • By allowing access based on user convenience
  • By creating an open access environment
  • According to a defined security policy for authorized entities (correct)
  • Through a flexible security policy
  • What security measure can be employed to prevent unauthorized data access after periods of inactivity?

    <p>Session lock with pattern-hiding displays</p> Signup and view all the answers

    What is the purpose of limiting unsuccessful logon attempts?

    <p>To prevent unauthorized access attempts</p> Signup and view all the answers

    Study Notes

    Chapter 4: Access Control

    • NISTIR 7298 defines access control as the process of granting or denying specific requests to obtain and use information and related information processing services, and to enter specific physical facilities.
    • RFC 4949 defines access control as a process that regulates system resource use according to a security policy, allowing only authorized entities (users, programs, processes, or other systems) to access these resources.
    • Access Control Security Requirements (SP 800-171) includes basic requirements for limiting system access to authorized users, processes acting on their behalf, and devices. These also include limiting transactions and functions authorized users can execute.
    • Derived security requirements include controlling sensitive information flow, separating individual duties to mitigate malicious activity, and employing the least privilege principle for all security functions/accounts and non-security functions using non-privileged accounts or roles.
    • Other requirements include limiting failed log-in attempts and providing privacy & security notices aligned with sensitive information rules. Maintaining session locks with pattern hiding to prevent access after periods of inactivity, automatically terminating inactive sessions, monitoring remote access sessions, encrypting remote access sessions, routing remote access through managed control points, and authorizing remote privileged commands/access to security-relevant information and wireless access.
    • Protecting wireless access with authentication and encryption, controlling mobile device connections, encrypting controlled unclassified information on mobile devices, verifying and controlling external system connections and use of portable storage on external systems, and controlling controlled unclassified information posted or processed on publicly accessible systems.
    • Computer security, in general, is concerned with access control. RFC 4949 describes computer security as measures assuring security services in a computer system, specifically those ensuring access control service.
    • The Access Control diagram shows the relationship between security administrator, user, and system resources, incorporating authentication and authorization functions and auditing.
    • Access Control Policies include DAC (Discretionary Access Control) based on the identity and access rules of the requester. This method includes authorizations that define what requestors are permitted to do.
    • MAC (Mandatory Access Control) controls access by comparing security labels with security clearances.
    • RBAC (Role-Based Access Control) grants access based on user roles and system rules for user access in given roles.
    • ABAC (Attribute-Based Access Control) uses conditions based on object and subject properties.
    • Subjects in a system are active entities that cause information to flow among objects, changing the system's state.
    • Objects are passive entities that contain or receive information.
    • Access rights describe how subjects can access objects (e.g., read, write, execute, delete, create, search).
    • DAC operates with access matrices. One dimension lists subjects. The second dimension lists objects. The matrix entry specifies the access rights for a particular subject for a specific object.
    • UNIX files use inodes (index nodes) to manage control structures for particular files. One inode can reference several file names. File attributes (permissions, etc.) are stored in the inode. Inodes are stored in an inode table.
    • Directories are structured hierarchically and contain file names and pointers to inodes.
    • UNIX users have unique user IDs (UIDs) and belong to a primary group identified by a group ID.
    • Protection bits are part of the file's inode, specifying read, write, and execute permissions for the owner, group, and others.
    • Traditional UNIX uses a minimal access control list (ACL), allowing any number of users/groups to be associated with a file. Files don't inherently require an ACL. An extended ACL indicates that the file has an extended ACL.
    • Modern UNIX systems support ACLs. When a process asks for access to an object, it first checks the appropriate ACL. If the ACL entry grants the permission, access is permitted; otherwise, it's denied.
    • Mandatory Access Control (MAC) is based on comparing security labels to security clearances.
    • Bell-LaPadula (BLP) model ensures that high-classified data is not accessible to users with lower security clearance (avoid data downgrades), via a hierarchy of security classes.
    • Multilevel Security (MLS) defines multiple data categories/levels. Data properties define simple security and write-down restrictions.
    • DAC includes ds-property. An individual may grant access based on owner discretion, constrained by MAC rules.
    • MAC models (e.g., Multics, SELinux, AppArmor, Fedora/Red Hat) have limitations regarding object downgrades and configuration challenges.
    • Mandatory Integrity Control (MIC) is a variant of MAC concentrating on processing integrity levels within a login session, and restricting app permissions for the same user.
    • RBAC (Role-Based Access Control) models manage access based on roles and constraints. Relationships exist between users, roles, and resources. Role hierarchies can exist, using methods of mutually exclusive roles, access permission for one role in a set, and cardinality/limitations. Prerequisites for a role assignment are common.
    • ABAC (Attribute-Based Access Control) defines authorizations based on attributes of subjects (users), objects (resources), and the environment. It offers high flexibility. Web services and cloud services have shown interest in adapting ABAC. The ABAC model uses subject, object, and environmental attributes to evaluate access requests, based on access control rules.
    • ICAM (Identity, Credential, and Access Management) is a comprehensive U.S. government-developed strategy for managing and implementing digital identities, credentials, and access control. ICAM prioritizes establishing trustworthy digital representations of individuals and non-person entities (NPEs).
    • Credential management factors include enrollment, background checks, credential lifecycle management, and provisioning/deprovisioning processes, policies, and procedures to protect personal identity information and grant access to it.
    • Access management is the control of access for various resources, internally or externally. It ensures proper identity verification before access to secure buildings, systems, or data.
    • Three support elements are needed for access control: resource management for roles, privilege management, and policy management.
    • Identity Federation is used for digital identity management and authentication when individuals from other organizations require access. Open Identity Trust Framework uses standards, technology, policies, and processes for trust and exchange of information across multiple organizations.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Use Quizgecko on...
    Browser
    Browser