Kategorier: Alla - authorization - access - data - devices

av Kenneth Gourlay för 13 årar sedan

286

Access Contol

When dealing with access control, it's crucial to recognize both internal and external threats. Internally, issues such as password sharing and privileged access can lead to unauthorized sabotage.

Access Contol

Access Contol

Why

Compliance
Security
Privacy

How

Technology
LDAP
ACLs
PKI
Active Directory
Anonymous vs known
Oversight
Policy
FIPS
Segregation of Duties
Least Priviledge Principal
Processes
Governance
Centralized
Decentralized
Mixed mode

Where

Remote
Partners
Employee facing
Client facing

When

Pre/post employment
Day of Week
Time of Day

Who

IT Security
Audit
ATIP
DSO
Clients
Identified
Anonymous
Super Administrators
Super Users
Administrators
Owners
Users
Status
Position

What

Threats
External

  • Phishing attacks
  • Spear-Phishing attacks
  • Social Engineering
  • DOS attacks
  • Spoofing
  • Man-in-the-middle attacks
  • Internal

  • Sabotage
  • Password sharing
  • Unlocked sessions
  • Uncontrolled access to logs
  • Privilleged access

  • Services
    Non Critical
    Critical
    Devices
    Phones

    Smartphone

    Cell

    Desktop

    Mainframe
    Storage
    I/O devices
    Connectivity Devices(switches, etc.)
    Workstations
    Servers
    Facilities
    Media

    Integrated Circuit Disk (thumb drives)

    Removable disk

    Web-sites

    Disk

    Tapes

    Applications

    Screens

    Information
    Metadata
    Lists

    Directory Service

    Documents
    Data
    Classification

    Classification is difficult for most users to understand and is, therefore, often neglected.

    Classification is essential for data protection.

    Unclassified

    Top Secret

    Secret

    Classified

    Protected C

    Protected B

    Protected A

    Flat files
    Database

    Enterprise Controlled Access

    Database Controled Access

    Application Contoled Access

    Functions

    Monitoring and Reporting
    Authorization/Access Control

    Authorization can be direct (person 1 has access to system 1) or it can be abstracted by roles and entitlements (the auditor role has a read-only entitlement on to all data and meta-data)

    Profiles
    Roles
    Authentication

    Authentication is how you prove who you are:

    Authentication can be performed using passwords, tokens or biometrics or a combination of the three.

    Idenitification

    Identification is about who you are:

    "I am Santa Clause"