CIA
CIA- Confidentiality, Integrity, Availability
DAD
DAD (disclosure, alteration, destruction) opposes CIA
IAAA
IAAA –
Non-repudiation
Non-repudiation- user can’t deny performing a transaction
Least Privilege
Least Privilege- minimum amount of access to do job (this is an ideal or target)
Need to Know
Need to Know- more granular than Least Privilege (object level). E.g. have a secret clearance, and cleared for a program.
Subject
Subject- active entity on a system (user, running program)
Object
Object- passive data on system (file)
Defense in Depth
Defense in Depth- (Layered Defense) multiple safeguards in layers (or controls); e.g., you had to get to a workspace, authn to workstation, the network, then the application
Access Control Models (3 main models)
Access Control Models (3 main models)
DAC
DAC (Discretionary Access Control)- gives data owners full control of objects; access given via ACL based on Id (rather than roles as in RBAC)
MAC
MAC (Mandatory Access Control)- based on subject clearance + object labels
Examples: SELinux, Trusted Solaris, Honeywell’s SCOMP, Purple Penelope, LIDS (Linux Intrusion Detection System)
RBAC
RBAC (Role-Based Access Control) (some consider a form of MAC):
Other Access Control Technologies
Access Control Technologies
IBM Access provisioning lifecycle rules
IBM Access provisioning lifecycle rules
Access Aggregation
Access Aggregation- users gain access to more systems over time
Authorization Creep
Authorization Creep- users gain more entitlements without shedding the old ones
RADIUS
RADIUS- Remote AuthN Dial-In User Service; most often used
Request and response carried in AVP (attribute-value pairs) (8 bits):
Diameter
Diameter- successor & improver on RADIUS
o Centralized
o Is currently draft standard
o Uses 32 bit AVP
o Support for mobile
o Single server to manage policies
o Uses TCP (Transmission Control Protocol)
TACACS
TACACS (Terminal Access Controller Access Control System)
o Similar function to RADIUS
o UDP (can also use TCP)
o Centralized
o Authn using Id and static (reusable) password >> vulnerability
TACACS+
TACACS+
o TCP
o Centralized
o Multifactor AuthN
o Not backward compatible to TACACS
o Encrypts all data (uname & password) below the header
PAP
PAP (Password Authentication Protocol) o Password sent in clear text
CHAP
CHAP (Challenge Handshake Authentication Protocol) o Protection against playback attack o Uses secret (not sent over the link) known to authenticator and peer for authN o Possible for mutual authN o has stored passwords in clear-text Three-way authN process: 1) server sends challenge (nance); 2) client sends hashed challenge and password to server; 3) server compares hash against expected results
Separation of duties
Separation of duties- have more than one user perform sensitive transactions