2- Exploring Control Types/ Methods Flashcards
(33 cards)
Control Types/ Functions
3 Control Types: technical, management, and operational.
3 primary control functions: preventative, detective, and corrective.
NIST (National Institute of Standards and Technology) & Publications
The National Institute of Standards and Technology (NIST) is a part of the U.S. Department of Commerce, and it includes a Computer Security Division with the Information Technology Laboratory (ITL). The ITL publishes Special Publications (SPs) in the 800 series.
Many IT security professionals use these documents as references to design secure IT systems and networks.
Many security-related certifications (beyond the Security + certification) also reference the SP 800 documents both directly and indirectly.
NIST’s SP 800-53 revision three provides a formal definition of security controls. They are “the management, operational, and technical safeguards or countermeasures employed within an organizational information system to protect the confidentiality, integrity, and availability of the system and its information.”
Control Type: Technical
Technical controls use technology to reduce vulnerabilities. Some examples include the principle of least privilege, antivirus software, IDSs, and firewalls.
Control Type: Management
Management controls are primarily administrative in function. They use planning and assessment methods to provide an ongoing review of the organization’s ability to reduce and manage risk. (ie. vulnerability assessments and penetration tests)
A quantitative risk assessment uses cost and asset values to quantify risks based monetary values. A qualitative risk assessment uses judgments to categorize risks based on probability and impact.
Control Type: Operational
Operational controls help ensure that day-to-day operations of an organization comply with their overall security plan.
- Awareness and training.
- Configuration management.
- Contingency Planning
- Media protection.
- Physical and environmental protection.
Control-based Functions
Many controls are identified based on their function as opposed to the type of control. The three primary functions of controls are preventative, detective, and corrective.
Control-based Functions: Preventive
- Security guards.
- Change management.
- Account disablement policy.
- System hardening.
A preventative control attempts to prevent an incident from occurring. Security guards can prevent unauthorized personnel from entering a secure area. A change management control helps prevent outages from ad-hoc (or as-needed) configuration mistakes. An account disablement policy ensures that a terminated employee’s account can’t be used.
Control-based Functions: Detective
Detective controls can detect when a vulnerability has been exploited. Two examples are security audits and CCTV systems.
Control-based Functions: Corrective
- Active IDS.
- Backups and system recovery.
Access Control Models
Models you’ll learn are:
- Role-/ rule-based access control (RBAC)
- Discretionary access control (DAC)
- Mandatory access control (MAC)
Access Control Models: RBAC (Role-/ rule-based access control)
The RBAC model uses roles (often implemented as groups) to grant access by placing users into roles based on their assigned jobs, functions, or tasks. ie. Microsoft’s Project Server. Each of these roles has rights and permissions assigned to it, and to give someone the associated privileges, you’d simply add the user’s account to the role.
RBAC is also called hierarchy based or job based.
In Windows domains, groups are often created to correspond to departments of an organization.
Rule-based access control is based on a set of approved instructions, such as an access control list.
If you’re using groups as part of a role-based access model, you can also use user templates.
Access Control Models: RBAC (Role-/ rule-based access control)– summary
The use of roles, or groups, greatly simplifies user administration. Groups make it easier to grant appropriate permissions to new users, and they help enforce least privilege. The RBAC model can use user account templates to enforce the principle of least privilege. This ensures that new users are granted the access they need, and no more.
Access Control Models: DAC (Discretionary access control)
In the DAC model, every object (such as files and folders) has an owner, and the owner establishes access for the objects. Many operating systems, such as Windows and most UNIX-based systems, use the DAC model.
A common example of the DAC model is the New Technology File System (NTFS) used in Windows. NTFS provides security by allowing users and administrators to restrict access to files and folders with permissions.
Access Control Models: DAC (Discretionary access control)– summary
The DAC model specifies that every object has an owner, and the owner has full, explicit control of the object. Microsoft’s NTFS uses the DAC model.
Access Control Models: DAC– SIDs & DACLs
Each user is identified with a security identifier (SID), although you will rarely see it.
Every object (such as a file or folder) includes a Discretionary Access Control List (DACL) that identifies who can access it in a system using the DAC model. The DACL is a list of Access Control Entries (ACEs). Each ACE is composed of a SID and the permission( s) granted to the SID.
Access Control Models: DAC vs MAC
The DAC model is significantly more flexible than the MAC model described in the next section. MAC has predefined access privileges, and the administrator is required to make the changes. With DAC, if you want to grant me access to a file you own, you simply make the change, and I have access.
Access Control Models: DAC (Discretionary access control)– inherent flow
An inherent flaw associated with the DAC model is the susceptibility to Trojan horses.
Trojan horses are executable files that masquerade as something useful but are actually malicious software.
Trojan horses are executable files that masquerade as something useful but are actually malicious software.
Access Control Models: MAC
The MAC model uses labels (sometimes referred to as sensitivity labels or security labels) to determine access. Both subjects (users) and objects (files or folders) are assigned labels. When the labels match, the appropriate permissions are granted.
Military units make wide use of this model to protect data. You may have seen movies where a folder is shown with a big red and black cover page with a label of “Top Secret.” The cover page identifies the sensitivity label for the data contained within.
Access Control Models: MAC– summary
The MAC model uses sensitivity labels for users and data. SELinux (deployed in both Linux and UNIX platforms) is a trusted operating system platform using the MAC model that prevents malicious or suspicious code from executing on the system.
Access Control Models: MAC– Labels and Lettice
The MAC model uses different levels of security to classify both the users and the data. These levels are defined in a lattice. The lattice can be a complex relationship between different ordered sets of multiple labels that define upper-level bounds and lower-level bounds.
Physical Security Controls: Access Controls
Access controls are used to control entry and exit at different boundary points.
- Perimeter
- Building
- Secure work areas.
- Server and network devices.
Physical Security Controls: Door Access Systems
Door access systems include cipher locks and proximity cards. In the event of a fire, they should allow personnel to exit the building without any form of authentication. Access points to datacenters and server rooms should be limited to a single entrance and exit whenever possible.
Proximity cards are credit-card-sized access cards, and users pass the card near a proximity card reader. The card reader then reads data on the card. Proximity cards are used as access control in some areas to electronically unlock doors, and fall into the something you have factor of authentication. However, if users swap cards, it results in authorization verification without authentication. In other words, they are granted access (authorization) but their identity hasn’t actually been proved (authentication).
Physical Security Controls: Tailgating
Tailgating occurs when one user follows closely behind another user without using credentials. Mantraps and security guards are effective controls against tailgating.
Physical Security Controls: Mantraps
Mantraps control the access between a secure area and a nonsecure area. They are very effective at preventing unauthorized access to sensitive areas of a building. They can prevent the social engineering tactic known as tailgating or piggybacking. Mantraps can be highly technical, including rooms made of bulletproof glass, or simplistic, similar to a turnstile used in subways.