access controls cissp guide to security essentials chapter 2

87
Access Controls CISSP Guide to Security Essentials Chapter 2

Upload: annice-dickerson

Post on 26-Dec-2015

236 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Access Controls CISSP Guide to Security Essentials Chapter 2

Access Controls

CISSP Guide to Security Essentials

Chapter 2

Page 2: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 2

Objectives

• Identification and Authentication

• Centralized Access Control

• Decentralized Access Control

• Access Control Attacks

• Testing Access Controls

Page 3: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 3

Identification and Authentication

• Identification: unproven assertion of identity– “My name is…”– userid

Page 4: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 4

Identification and Authentication (cont.)

• Authentication: proven assertion of identity– Userid and password– Userid and PIN– Biometric

Page 5: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 5

Authentication Methods

• What the user knows– Userid and password– Userid and PIN

• What the user has– Smart card– Token

Page 6: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 6

Authentication Methods (cont.)

• What the user is– Biometrics (fingerprint, handwriting, voice, etc.)

Page 7: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 7

How Information Systems Authenticate Users

• Request userid and password– Hash password– Retrieve stored userid and hashed password– Compare

• Make a function call to a network based authentication service

Page 8: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 8

How a User Should Treat Userids and Passwords

• Keep a secret

• Do not share with others

• Do not leave written down where someone else can find it

• Store in an encrypted file or vault

Page 9: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 9

How a System Stores Userids and Passwords

• Typically stored in a database table– Application database or authentication database– Userid stored in plaintext

• Facilitates lookups by others

Page 10: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 10

How a System Stores Userids and Passwords (cont.)

• Stored (cont.)– Password stored encrypted or hashed

• If encrypted, can be retrieved under certain conditions

– “Forgot password” function, application emails to user

• If hashed, cannot be retrieved under any circumstance

Page 11: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 11

Strong Authentication

• Traditional userid + password authentication has known weaknesses– Easily guessed passwords– Disclosed or shared passwords

Page 12: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 12

Strong Authentication (cont.)

• Stronger types of authentication available, usually referred to as “strong authentication”– Token– Certificate– Biometrics

Page 13: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 13

Two Factor Authentication

• First factor: what user knows

• Second factor: what user has– Password token– USB key– Digital certificate– Smart card

Page 14: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 14

Two Factor Authentication (cont.)

• Without the second factor, user cannot log in– Defeats password guessing / cracking

Page 15: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 15

Biometric Authentication

• Stronger than userid + password

• Stronger than two-factor

Page 16: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 16

Biometric Authentication (cont.)

• Measures a part of user’s body– Fingerprint– Iris scan– Signature– Voice– Etc.

Page 17: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 17

Authentication Issues

• Password quality

• Consistency of user credentials across multiple environments

• Too many userids and passwords

Page 18: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 18

Authentication Issues (cont.)

• Handling password resets

• Dealing with compromised passwords

• Staff terminations

Page 19: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 19

Access Control Technologies

• Centralized management of access controls– LDAP– Active Directory– RADIUS

Page 20: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 20

Access Control Technologies (cont.)

• Centralized management (cont.)– Diameter– TACACS– Kerberos

Page 21: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 21

Single Sign-On (SSO)

• Authenticate once, access many information systems without having to re-authenticate into each

• Centralized session management

Page 22: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 22

Single Sign-On (cont.)

• Often the “holy grail” for identity management– Harder in practice to achieve – integration issues

Page 23: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 23

Single Sign-On (cont.)

• Weakness: intruder can access all participating systems if password compromised

• Best to combine with two-factor / strong authentication

Page 24: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 24

Reduced Sign-On

• Like single sign-on (SSO), single credential for many systems

• But… no inter-system session management

• User must log into each system separately

Page 25: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 25

Reduced Sign-On (cont.)

• Weakness: intruder can access all systems if password is compromised

• Best to combine with two-factor / strong authentication

Page 26: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 26

Access Control Attacks

• Intruders will try to defeat, bypass, or trick access controls in order to reach their target

Page 27: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 27

Access Control Attacks (cont.)

• Attack objectives– Guess credentials– Malfunction of access controls– Bypass access controls– Replay known good logins– Trick people into giving up credentials

Page 28: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 28

Buffer Overflow

• Cause malfunction in a way that permits illicit access

• Send more data than application was designed to handle properly– “Excess” data corrupts application memory– Execution of arbitrary code– Malfunction

Page 29: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 29

Buffer Overflow (cont.)

• Countermeasure: “safe” coding that limits length of input data; filter input data to remove unsafe characters

Page 30: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 30

Script Injection

• Insertion of scripting language characters into application input fields– Execute script on server side

• SQL injection – obtain data from application database

Page 31: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 31

Script Injection (cont.)

• Insertion (cont.)– Execute script on client side – trick user or browser

• Cross site scripting

• Cross site request forgery

• Countermeasures: strip “unsafe” characters from input

Page 32: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 32

Data Remanence

• Literally: data that remains after it has been “deleted”

• Examples– Deleted hard drive files– Data in file system “slack space”

Page 33: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 33

Data Remanence (cont.)

• Examples (cont.)– Erased files– Reformatted hard drive– Discarded / lost media: USB keys, backup

tapes, CDs

• Countermeasures: improve media physical controls

Page 34: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 34

Denial of Service (DoS)

• Actions that cause target system to fail, thereby denying service to legitimate users– Specially crafted input that causes application

malfunction– Large volume of input that floods application

Page 35: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 35

Denial of Service (cont.)

• Distributed Denial of Service (DDoS)– Large volume of input from many

(hundreds, thousands) of sources

• Countermeasures: input filters, patches, high capacity

Page 36: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 36

Dumpster Diving

• Literally, going through company trash in the hopes that sensitive printed documents were discarded that can be retrieved– Personnel reports, financial records– E-mail addresses

Page 37: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 37

Dumpster Diving (cont.)

• Dumpster Diving (cont.)– Trade secrets– Technical architecture

• Countermeasures: on-site shredding

Page 38: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 38

Eavesdropping

• Interception of data transmissions– Login credentials– Sensitive information

• Methods– Network sniffing

(maybe from a compromised system)– Wireless network sniffing

Page 39: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 39

Eavesdropping (cont.)

• Countermeasures: encryption, stronger encryption

Page 40: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 40

Emanations

• Electromagnetic radiation that emanates from computer equipment– Network cabling

• More prevalent in networks with coaxial cabling

– CRT monitors– Wi-Fi networks

Page 41: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 41

Emanations (cont.)

• Countermeasures: shielding, twisted pair network cable, LCD monitors, lower power or eliminate Wi-Fi

Page 42: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 42

Spoofing and Masquerading

• Specially crafted network packets that contain forged address of origin

• TCP/IP protocol permits forged MAC and IP address

• SMTP protocol permits forged e-mail “From” address

Page 43: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 43

Spoofing and Masquerading (cont.)

• Countermeasures: router / firewall configuration to drop forged packets, judicious use of e-mail for signaling or data transfer

Page 44: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 44

Social Engineering

• Tricking people into giving out sensitive information by making them think they are helping someone

• Methods– In person– By phone

Page 45: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 45

Social Engineering (cont.)

• Schemes– Log-in, remote access, building entrance help

• Countermeasures: security awareness training

Page 46: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 46

Phishing

• Incoming, fraudulent e-mail messages designed to give the appearance of origin from a legitimate institution– “Bank security breach”– “Tax refund”– “Irish sweepstakes”

Page 47: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 47

Phishing (cont.)

• Tricks user into providing sensitive data via a forged web site (common) or return e-mail (less common)

• Countermeasures: security awareness training

Page 48: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 48

Pharming

• Redirection of traffic to a forged website– Attack of DNS server (poison cache, other attacks)– Attack of “hosts” file on client system– Often, a phishing e-mail to lure user to

forged website– Forged website has appearance of the real thing

Page 49: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 49

Pharming (cont.)

• Countermeasures: user awareness training, patches, better controls

Page 50: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 50

Password Guessing

• Trying likely passwords to log in as a specific user– Common words– Spouse / partner / pet name– Significant dates / places

Page 51: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 51

Password Guessing (cont.)

• Countermeasures: strong, complex passwords, aggressive password policy

Page 52: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 52

Password Cracking

• Obtain / retrieve hashed passwords from target

• Run password cracking program– Runs on attacker’s system – no one will notice

• Attacker logs in to target system using cracked passwords

Page 53: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 53

Password Cracking (cont.)

• Countermeasures: frequent password changes, controls on hashed password files, more

Page 54: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 54

Malicious Code

• Viruses, worms, Trojan horses, spyware, key logger

• Harvest data or cause system malfunction

• Countermeasures: anti-virus, anti-spyware, security awareness training

Page 55: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 55

Access Control Concepts

• Principles of access control

• Types of controls

• Categories of controls

Page 56: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 56

Principles of Access Control

• Separation of duties– No single individual should be allowed

to perform high-value or sensitive tasks on their own

• Financial transactions

• User account creation / changes

Page 57: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 57

Principles of Access Control (cont.)

• Least privilege– Persons should have access to only the

functions / data that they require to perform their stated duties

Page 58: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 58

Principles of Access Controls (cont.)

• Defense in depth– Use of multiple controls to protect an asset– Heterogeneous controls preferred

• If one type fails, the other remains

• If one type is attacked, the other remains

Page 59: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 59

Principles of Access Controls (cont.)

• Examples– Nested firewalls– Anti-virus on workstations, file servers,

e-mail servers

Page 60: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 60

Types of Controls

• Technical– Authentication, encryption, firewalls, anti-virus

• Physical– Key card entry, fencing, video surveillance

• Administrative– Policy, procedures, standards

Page 61: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 61

Categories of Controls

• Detective controls

• Deterrent controls

• Preventive controls

• Corrective controls

• Recovery controls

• Compensating controls

Page 62: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 62

Detective Controls

• Monitor and record specific types of events

• Does not stop or directly influence events– Video surveillance– Audit logs– Event logs– Intrusion detection system

Page 63: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 63

Deterrent Controls

• Designed to prevent specific actions by influencing choices of would-be intruders

Page 64: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 64

Deterrent Controls (cont.)

• Does not prevent or even record events– Signs– Guards, guard dogs– Razor wire

Page 65: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 65

Preventive Controls

• Block or control specific events– Firewalls– Anti-virus software– Encryption– Key card systems

Page 66: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 66

Preventive Controls (cont.)

• Block or control specific events (cont.)– Fencing– Bollards– Crash guards

Page 67: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 67

Corrective Controls

• Post-event controls to prevent recurrence

• “Corrective” refers to when it is implemented– Can be preventive, detective, deterrent,

administrative

Page 68: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 68

Corrective Controls (cont.)

• Examples– Spam filter– Anti-virus on e-mail server– WPA Wi-Fi encryption

Page 69: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 69

Recovery Controls

• Post-incident controls to recover systems

• “Recovery” refers to when it is implemented– Can be detective, preventive, deterrent,

administrative

Page 70: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 70

Recovery Controls (cont.)

• Examples– System restoration– Database restoration

Page 71: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 71

Compensating Controls

• Control that is introduced that compensates for the absence or failure of a control

• “Compensating” refers to why it is implemented– Can be detective, preventive, deterrent,

administrative

Page 72: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 72

Compensating Controls (cont.)

• Examples– Daily monitoring of anti-virus console– Monthly review of administrative logins

Page 73: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 73

Testing Access Controls

• Access controls are the primary defense that protect assets

• Testing helps to verify whether they are working properly

Page 74: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 74

Testing Access Controls (cont.)

• Types of tests– Penetration tests– Application vulnerability tests– Code reviews

Page 75: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 75

Penetration Testing

• Automatic scans to discover vulnerabilities– Scan TCP/IP for open ports, discover

active “listeners”– Potential vulnerabilities in open services

Page 76: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 76

Penetration Testing (cont.)

• Penetration Testing (cont.) – Test operating system, middleware, server,

network device features– Missing patches

• Example tools: Nessus, Nikto, SATAN, Superscan, Retina, ISS, Microsoft baseline security scanner

Page 77: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 77

Application Vulnerability Testing

• Discover vulnerabilities in an application

• Automated tools and manual tools

Page 78: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 78

Application Vulnerability Testing (cont.)

• Example vulnerabilities– Cross-site scripting, injection flaws, malicious file

execution, broken authentication, broken session management, information leakage, unsecure use of encryption, and many more

Page 79: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 79

Audit Log Analysis

• Regular examination of audit and event logs

• Detect unwanted events– Attempted break-ins– System malfunctions– Account abuse

Page 80: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 80

Audit Log Analysis (cont.)

• Audit log protection– Write-once media– Centralized audit logs

Page 81: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 81

Summary

• Identification is unproven assertion of identity

• Authentication is proven assertion of identity

• Two-factor authentication includes something the user knows and something the user has

Page 82: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 82

Summary (cont.)

• Biometric authentication includes something the user is. Examples include fingerprint, hand scan, iris scan

• Authentication standards include LDAP, TACACS, RADIUS, and Diameter

Page 83: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 83

Summary (cont.)

• Single sign-on (SSO) provides a single identity with session management across applications

• Reduced sign-on provides a single identity across applications but no session management

Page 84: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 84

Summary (cont.)

• Access controls are attacked by several methods, including buffer overflow, script injection, malicious code, denial of service, eavesdropping, spoofing, social engineering, phishing, and password attacks

Page 85: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 85

Summary (cont.)

• Separation of duties: split tasks between two or more

• Least privilege: minimize user access

• Defense in depth: protect assets with many controls

• Types of controls: technical, physical, administrative

Page 86: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 86

Summary (cont.)

• Categories of controls: detective, deterrent, preventive, corrective, recovery, compensating

• Access controls are tested with penetration testing, application vulnerability testing, and code reviews

Page 87: Access Controls CISSP Guide to Security Essentials Chapter 2

CISSP Guide to Security Essentials 87

Summary (cont.)

• Audit log analysis helps to detect unwanted events