Federated Identify management
cloud based identify manage provider enables access to many platforms. similar to Kerberos SSO
• Certificates and smart cards
Tokens
* Avoids need for user to authenticate to each service
• Identity provider
• Separation of duties
• Least privilege
Assign sufficient permissions only
• Reduce risk from compromised accounts
• Job rotation
* Reduces critical dependencies
• Mandatory vacations
During that time, the
corporate audit and security employees have time to investigate and discover any
discrepancies in employee activity.
• User-assigned privileges
• Assign privileges directly to user
accounts
• Unmanageable if number of users
is large
• Group-based privileges
• Assign permissions to security groups and assign user accounts to relevant groups • Issues with users inheriting multiple permissions
Service accounts
are used by scheduled processes and application server software, such
as databases.
Must manage share service acccount credentials
Shared/Generic/Device Accounts and Credentials
• Privilege access management software
stores high-risk credentials somewhere other than a spreadsheet
SSH
• Secure Shell (SSH) used for remote access • Host key identifies the server • User key pair used to authenticate to server • Server holds copy of valid users’ public keys • Keys must be actively managed
• Third-party credentials
Passwords and keys to manage
cloud services
• Highly vulnerable to accidental
disclosure
Account Password Policy Settings
Account Restrictions
Network location • Connecting from a VLAN or IP subnet/remote IP • Connecting to a machine type or group (clients versus servers) • Interactive versus remote logon • Geolocation • By IP address • By Location Services • Geofencing • Geotagging • Time-based restrictions • Logon hours • Logon duration • Impossible travel time/risky login
geoloction vs geotagging vs geofencing
geolocation: location of a user or device can also be calculated using a geolocation
Geofencing: refers to accepting or rejecting access requests based on location.\
Geotagging refers to the addition of location
metadata to files or devices.
Account Audits
• Accounting and auditing to detect account misuse • Use of file permissions to read and modify data • Failed login or resource access attempts
• Recertification • Monitoring use of privileges • Granting/revoking privileges • Communication between IT and HR
Account Permissions
• Impact of improperly configured accounts • Insufficient permissions • Unnecessary permissions • Escalating and revoking privileges • Permission auditing tools
Disablement vs lockout
• Disablement • Login is disabled until manually reenabled • Combine with remote logoff • Lockout • Login is prevented for a period and then re-enabled • Policies to enforce automatic lockout
Discretionary vs Role-based access
File System Security
Mandatory vs Attribute-based access control
Mandatory Access control
Labels applied to objects (secret, top seecrat) and clearanced applied subjects
Attribute-Based Access Control (ABAC)
• Access decisions based on a combination of subject and object attributes plus
any context-sensitive or system-wide attributes
• Conditional access