0% found this document useful (0 votes)
99 views34 pages

Sy0-701 - Lesson 04

Lesson 4 of the CompTIA Security+ Exam SY0-701 focuses on implementing identity and access management, covering topics such as authentication methods, access control models, and identity management techniques. Key concepts include password management, multifactor authentication, role-based access control, and single sign-on solutions. The lesson emphasizes the importance of security policies and practices to protect user identities and access rights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views34 pages

Sy0-701 - Lesson 04

Lesson 4 of the CompTIA Security+ Exam SY0-701 focuses on implementing identity and access management, covering topics such as authentication methods, access control models, and identity management techniques. Key concepts include password management, multifactor authentication, role-based access control, and single sign-on solutions. The lesson emphasizes the importance of security policies and practices to protect user identities and access rights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

CompTIA Security+ Exam SY0-701

Lesson 4
Implement Identity and Access
Management

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


1
Objectives
• Implement password-based and multifactor authentication
• Implement account policies and authorization solutions
• Implement single sign-on and federated identity solutions

2
Lesson 4

Topic 4A
Authentication

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


3
Authentication Design
• Meet requirements for confidentiality,
integrity, and availability
• Keeps credentials secure (confidentiality
• Threat actors cannot bypass or subvert
the authentication mechanism (integrity)
• Mechanism does not cause undue delay
or support issues (availability)

• Something you know: knowledge factor


• Password
• Personal identification number (PIN)

Screenshot used with permission from Microsoft.

4
Password Concepts
• Length
• Complexity
• Character combinations

• Aging
• Reuse and history
• Expiration

• NIST guidance
• Password hints

5
Password Managers
• Vault and master password
• Built-in OS/browser password
managers
• Third-party cloud/plug-in

• Per-site password generation


• Secure filling

6
Multifactor Authentication
• Multifactor authentication (MFA)
• Something you KNOW and something you HAVE
• NOT something you KNOW and something else you KNOW

• Something you have


• Ownership factor: hardware tokens and fobs

• Something you are/do


• Biometric factor: fingerprint and facial scans

• Somewhere you are


• Geolocation via location services
• IP/network location
7
Biometric Authentication
• Enrollment
• Sensor and feature extraction

• Sensor/camera types

• Efficacy rates and considerations


• False Rejection Rate (FRR) or Type I error

• False Acceptance Rate (FAR) or Type II error

• Throughput, cost, and inaccessibility

• Fingerprint recognition
• Facial recognition

Android is a
trademark of
Google LLC.

8
Hard Authentication Tokens
• Token generation types
• Certificate-based (requires PKI)
• One-time password (OTP)
• Fast Identity Online (FIDO) Universal
2nd Factor (U2F)

• Authenticator form factors


• Smart card
• One-time password (OTP) fob
• Security key
• Activation method to show presence
Image © 123RF.com.
9
Soft Authentication Tokens
• Transmit a code via an out-of-
band channel
• Short message service (SMS)
• Email account
• Phone call
• Push notification

• Authenticator app
• Possibility of interception

10
Passwordless Authentication
• Rely on authenticator rather than password
• Accounts identified by public/private key pair, but doesn’t have to use PKI
• Private key stored only on authenticator

• Authenticator can require biometric or PIN proof of presence (local gesture)

• Attestation
• Verify authenticator as root of trust

11
Review Activity: Authentication
• Authentication design
• Something you know/are/have

• Password concepts and password managers


• Multifactor authentication
• Biometric authentication
• Hard authentication tokens
• Smart cards, OTP generators, FIDO U2F

• Soft authentication tokens


• Two-step verification

• Passwordless authentication

12
Lab Activity
• Assisted Lab Managing Password Security

13
Lesson 4

Topic 4B
Access Management

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


14
Discretionary and Mandatory Access Control
• Access control model determines how users receive permissions/rights
• Discretionary Access Control (DAC)
• Based on resource ownership
• Access Control Lists (ACLs)

• Vulnerable to compromised privileged user accounts

• Mandatory Access Control (MAC)


• Labels and clearance

• System policies to restrict access


15
Role-based and Attribute-Based Access Control
• Role-Based Access Control (RBAC)
• Non-discretionary and more centralized control

• Based on defining roles then allocating users to


roles

• Users should only inherit role permissions to


perform particular tasks

• Security groups
• Assign permissions to security groups and assign
user accounts to relevant groups

• Groups can be mapped to roles

• Attribute-Based Access Control (ABAC)


• Access decisions based on a combination of subject
Images © 123RF.com.
and object attributes plus any context-sensitive or
system-wide attributes

16
Rule-Based Access Control
• Non-discretionary
• System determines rules, not users
• MAC, RBAC, and ABAC

• Conditional access
• Continual authentication

• User account control (UAC) and sudo

17
Least Privilege Permission Assignments
• Principle of least privilege
• Sufficient permissions only

• Implications
• Insufficient permissions
• Authorization creep

• Auditing

18
User Account Provisioning
• Provisioning
• Identity proofing
• Issuing credentials
• Asset allocation
• Policy awareness and security education
• Permission assignments and implications
• Deprovisioning
• Employees or contractors leaving company or project, or changing roles
• Remove or disable permission assignments

19
Account Attributes and Access Policies
• Account attributes
• Security identifier (SID, account
name, credential)
• Extended profile attributes
• Per-app settings and files
• Access policies
• File permissions
• Access rights
Screenshot used with permission from Microsoft.
• Active Directory Group Policy
Objects (GPOs)
20
Account Restrictions
• Location-based policies
• Network/logical location
• Geolocation
• By IP address
• By Location Services

• Time-based restrictions
• Logon hours
• Logon duration
• Impossible travel time/risky login
• Temporary permissions

21
Privileged Access Management
• Policies, procedures, and technical controls to prevent the malicious
abuse of privileged accounts
• Accounts with system-wide access

• Secure administrative workstations

• Policies for zero standing privileges for administrators


• Temporary elevation

• Password vaulting/brokering
• Ephemeral credentials
22
Review Activity: Access Management
• Discretionary and mandatory access control

• Role-based and attribute-based access control

• Rule-based access control


• Least privilege permission assignments
• User account provisioning
• Identity proofing, secure credentials, asset allocation, policy/awareness training, permissions assignments

• Account attributes and access policies

• Account restrictions
• Location- and time-based

• Privileged access management


• Zero standing privileges and ephemeral/vaulted credentials
23
Lab Activity
• Assisted Lab: Managing Permissions

24
Lesson 4

Topic 4C
Identity Management

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


25
Local , Network, and Remote Authentication
• Authentication providers
• Passwords versus password hashes
• Windows authentication
• Local sign-in
• Network sign-in (Kerberos and NTLM)
• Remote sign-in
• Linux authentication
• /etc/passwd and /etc/shadow
• Pluggable authentication modules (PAMs)
26
Directory Services
• Database of subjects
• Users, computers, security groups/roles, and services

• Access Control Lists (authorizations)


• X.500 and Lightweight Directory Access Protocol (LDAP)
• Distinguished names

• Attribute=Value pairs

CN=WIDGETWEB, OU=Marketing, O=Widget, C=UK, DC=widget, DC=foo

27
Single Sign-on Authentication
• Kerberos
• Clients
• Application servers

• Key Distribution Center (KDC)

• Authentication Service – Ticket


Granting Ticket
• Ticket Granting Service –
Service Ticket
28
Single Sign-on Authorization

Images © 123rf.com. 29
Federation
• Networks under
separate administrative control
share user identities
• Identity providers and claims
• Interoperability
• Service providers and identity
providers

• Shared frameworks and protocols

Images © 123rf.com.
30
Security Assertion Markup Language
• Open standard for
implementing identity and service
provider communications
• Attestations/assertions
• XML format

• Signed using XML


signature specification

• Communications protocols
• HTTPS
• Simple Object Access Protocol (SOAP)

31
Open Authorization
• “User-centric” federated services better suited to consumer websites
• Representational State Transfer (REST) Application Programming Interfaces (APIs) (RESTful
APIs)
• Framework for implementation not a protocol

• OAuth
• Designed to communicate authorizations, rather than explicitly authenticate a subject

• Client sites and apps interact with OAuth IdPs and resource servers that hold the principal’s
account/data

• Different flow types for server to server or mobile app to server

• JavaScript object notation (JSON) web token (JWT)

32
Review Activity: Identity Management
• Local, network, and remote authentication
• Directory services
• LDAP and distinguished name attributes

• Single sign-on authentication and authorization


• Kerberos

• Federation
• Identity providers and service providers

• Security Assertion Markup Language


• Open authorization (OAuth)

33
CompTIA Security+ Exam SY0-701

Lesson 4
Summary

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


34

You might also like