Server and Network Security Flashcards
premises access
- fencing
- bollard posts (protect buildings from vehicles)
- lighting
- locked gates
- security guards
- guard dogs
- limited access to areas of a facility
- motion-sensing security systems
- security cameras
- key codes/card readers
mantraps
- vestibule where 2nd inner door opens only after 1st outer door has closed
- only space for 1 person between doors
internal security controls
- clean desk policy
- locking up sensitive documents
card-based access
- RFID cards to control access
- less secure than smartcards (payment cards)
human security element
- strict hiring/background check policies
- segregation of duties
- user awareness/training
authentication
- prove identity of users/devices/services/applications
- username/password
- PKI
- successful authentication required be access granted
identity federation
- provide single centralized identity store
- can be replicated to multiple servers
- trust tokens issued from trusted identity store
- tokens contain claims
- enables SSO
- Microsoft active directory federation services (ADFS)
- Shibboleth (open source)
claims (security tokens)
- assertions about user/device
- different apps consume different claims
- provide different scopes of access depending on claim values
configuring authentication between on-premise/cloud environments
- identity federation
- replicating on-premise directory services to cloud-based directory service
something you know
- security measures stored in user’s head
- usernames/passwords
- security questions
- single-factor authentication
- password policies
something you have
- physical possession of security device
- smartcard/hardware token/MFA application
- PKI security certificate
- multi-factor authentication
OTP
- one-time password
- never the same
- used for single authentication session
something you are
- biometric authentication
- can expand existing systems to accept biometric authentication (i.e. AD)
logical access control
- mechanisms to secure authentication/authorization to use network resources
- smart cards
- adding users to web app roles to control app access
- managing individual users on large scale is difficult
- auditing individual users reduces information overload
security groups
- create group following organization standards
- grant resource permissions to group
- add members to group
- Microsoft AD users need to log off/back in to pick up changes
- groups are managed statically
distribution groups
- designed for use by email systems
- can’t be assigned permissions
DAC
- Windows server dynamic access control
- built into OS
- examines user/device AD attributes to determine access level
- can be used with/without groups
- user/device attributes must be completed in AD
RBAC
- role-based access control
- assign resource permissions to role
- assign role occupant(s)
- can target individual
rights vs permissions
- rights are either allow/deny
- permissions allow degrees of access
- principle of least privilege
Windows NTFS permissions
- local file/folder permissions
- file/folder encryption using encrypting file system (EFS)
- file system auditing
- file system journaling (quicker disk recovery/repair)
- data deduplication
- disk space quotas
- disable inheritance
- apply permissions to subordinates
- uses DACL
levels of Windows NTFS permissions
- full control
- modify (enables file deletion)
- read and execute
- list folder contents (applies only to folders)
- read
- write (doesn’t enable file deletion)
- special permissions
DACL
- discretionary access control list
- administrator sets file system permissions
Windows shared folder permissions
- only folders can be shared over network (not individual files)
- share permissions
Windows shared folder permission levels
- full control
- change
- read