Access Controls encompass all operational levels of an organization.
Facilities; Support Systems; Information Systems; and Personnel
C-I-A
Confidentiality, Integrity and Availability
Two Philosophies for Access Control
Allow by Default and Deny by Default
Defense in Depth Strategy
Applying multiple layers of security protection between an information resource and a potential attacker.
Three step process for determining access controls
Consistent Access Control Strategy
Simplicity is the key to an effective security system.
Separation of Duties
Primary Objective is the prevention of fraud and errors. Distributing tasks and associated privileges for a specific process among multiple people
Processes
Collection of tasks that must be performed to achieve an objective.
Applicabililtiy of Separation of Duties
Sensitivity of the function under consideration; and the elements within a function are prone to abuse, which are easily segmented, and what skills are available.
Least privilege
User is given no more access priviliege than necessary to perform a job, task, or function
Need to know
Defines the minimum needed to know to perform job function
Compartmentalization
Seperating groups of people and information such that each group is isolated and information does not flow between groups.
Security domain
Area where common process and security control work to separate all entities involved in these processes from other entities or security domains.
Information Classification
Objective is to group an organization’s information assets by levels of sensitivity and criticality.
Information Classification Program
Access Control System Requirements
Reliability, Transparency, Scalability, Integrity, Maintainability, Authentication Data Security, and Auditability
Main Categories of Access Control
Access Control Types
Major Groups of Administrative Controls
BCP/DRP
Business continuity plan/disaster recovery plan
RADIUS
Remote Authentication Dial In User Service
Major Groups of Logical Controls
Discretionary Access Controls (DACS)
Controls placed on data by the owner of the data
Mandatory Access Controls (MACS)
Controls determined by the system and based primarily on organizational policy. Data needs to be labeled as to its classification. Access permissions are applied to an object based on the level of clearance given to a subject.