Understand the purpose and concepts of access control.
Purpose of access control, for example: confidentiality, integrity and availability, limiting access to systems (physical and logical aspects), limiting access to data, providing ‘defence in depth’, identifying and classifying data assets.
Primary categories of access control, for example: directive (codes of conduct, security policies and procedures), deterrent (disciplinary procedures, monitoring, reporting), preventative (physically restricting access), compensating (additional guards during periods of heightened threat), detective (intrusion detection systems), corrective (software patches, firewall reconfiguration), recovery (updating of security policies to reflect changes in business).
Types of access control, for example:
Physical: perimeter fences, gates/doorways, security guards/patrols, badge locks/key locks, biometric scanners (retina, palm, finger print scanner).
Logical: firewalls, anti-virus, encryption, user IDs and passwords, passphrases, security tokens, one-time passwords, Remote Access Server (RADIUS).
Administrative: policies and procedures, security clearances, identity validation, staff training, support/helpdesk.
Access control techniques, for example: discretionary controls (DAC), delegated control to the user level (Windows, Unix, Linux), user/group centric, permissions (read/write/execute), Access Control Lists (ACLs).
Mandatory controls (MAC), organisation centric (classification levels and clearances), security labelling for data objects (classification and categories), specially developed operating systems (SELinux).
Non-Discretionary Controls, organisation centric, administrator assigns permissions, role based.
Identity management and authentication methods, for example: ID badges, user Ids, PINs, account numbers, digital certificates, RFID.
Authentication factors: something you know (passwords, passphrases, challenge-response), something you have (Smartcard, fobs and time code devices), something you are (biometrics), somewhere you are (proximity to a scanner, inside a firewall).
Concept of a ‘credential set’ as being the combination of a form of identification and a form of authorisation.
Assessment Criteria
-
1.1
Explain the role of access control in organisations and the primary categories used to define access to data.
-
1.2
Explain the different types of access control from a physical, logical and administrative perspective.
-
1.3
Evaluate different access control techniques used in organisations.
-
1.4
Compare different methods of identity management and authentication.