0% found this document useful (0 votes)
18 views21 pages

ch13 Accesscontrol

Module 13 focuses on Access Control in cybersecurity, detailing the configuration of local and server-based access controls. It covers physical, logical, and administrative access controls, emphasizing the importance of authentication, authorization, and accounting (AAA) in managing user access. The module also discusses various access control models and methods, including multi-factor authentication and the CIA triad principles.

Uploaded by

nngcobo060525
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views21 pages

ch13 Accesscontrol

Module 13 focuses on Access Control in cybersecurity, detailing the configuration of local and server-based access controls. It covers physical, logical, and administrative access controls, emphasizing the importance of authentication, authorization, and accounting (AAA) in managing user access. The module also discusses various access control models and methods, including multi-factor authentication and the CIA triad principles.

Uploaded by

nngcobo060525
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Module 13: Access

Control
Cybersecurity Essentials 3.0
Module Objectives
Module Title: Access Control
Module Objective: Configure local and server-based access control.

Topic Title Topic Objective

Access Controls Configure secure access on a host.

Access Control Concepts Explain how access control protects network data.

Account Management Explain the need for account management and access control strategies.

AAA Usage and Operation Configure server-based authentication with TACACS+ and RADIUS.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
13.1 Access Controls

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Access Controls
Physical Access Controls
• Physical access controls are actual barriers deployed to prevent direct physical contact with
systems.

• The goal is to prevent unauthorized users from gaining physical access to facilities, equipment,
and other organizational assets.

• Some examples of physical access controls are:


• Guards to monitor the facility
• Fences to protect the perimeter
• Motion detectors to detect moving objects
• Laptop locks to safeguard portable equipment
• Locked doors to prevent unauthorized access
• Swipe cards to allow access to restricted areas
• Guard dogs to protect the facility
• Video cameras to monitor a facility by collecting and recording images
• Mantrap-style entry systems to stagger the flow of people into the secured area and trap any
unwanted visitors
• Alarms to detect intrusion
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Access Controls
Logical Access Controls
• Logical access controls are the hardware and software solutions used to manage access to
resources and systems.

• These technology-based solutions include tools and protocols that computer systems use for
identification, authentication, authorization, and accountability.

• Logical access control examples


• Encryption is the process of taking plaintext and creating ciphertext.
• Smart cards have an embedded microchip.
• Passwords are protected strings of characters.
• Biometrics are users’ physical characteristics.
• Access control lists (ACLs) define the type of traffic allowed on a network.
• Protocols are sets of rules that govern the exchange of data between devices.
• Firewalls prevent unwanted network traffic.
• Routers connect at least two networks.
• Intrusion detection systems monitor a network for suspicious activities.
• Clipping levels are certain allowed thresholds for errors before triggering a red flag.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Access Controls
Administrative Access Controls
• Administrative access controls are the policies and procedures defined by organizations to
implement and enforce all aspects of controlling unauthorized access.

• Administrative controls focus on personnel and business practices.

• Examples of administrative controls


• Policies are statements of intent.
• Procedures are the detailed steps required to perform an activity.
• Hiring practices define the steps an organization takes to find qualified employees.
• Background checks are a type of employee screening that includes information of
past employment verification, credit history, and criminal history.
• Data classification categorizes data based on its sensitivity.
• Security training educates employees about the security policies at an organization.
• Reviews evaluate an employee’s job performance.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Access Controls
Administrative Access Controls in Detail
• The concept of administrative access controls involves three security services: authentication,
authorization, and accounting (AAA).

• These services provide the primary framework to control access, preventing unauthorized access
to a computer, network, database, or other data resource.

• Authentication:
• It verifies the identity of each user, to prevent unauthorized access.
• Users prove their identity with a username or ID.
• In addition, users need to verify their identity by providing one of the following:
• Something they know (such as a password)
• Something they have (such as a token or card)
• Something they are (such as a fingerprint)
• In the case of two factor authentication, which is increasingly becoming the norm,
the system requires a combination of two of the above rather than just one to verify
someone’s identity.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Access Controls
Administrative Access Controls in Detail (Cont.)
• Authorization:
• It determines which resources users can access, along with the operations that users can
perform.​
• Some systems accomplish this by using an access control list, or an ACL.
• An ACL determines whether a user has certain access privileges once the user
authenticates.
• ​It can also control when a user has access to a specific resource.

• Accounting:
• It keeps track of what users do — including what they access, the amount of time they
access resources, and any changes they make.
• Cybersecurity accounting services track each data transaction and provide auditing results.
• System administrators can set up computer policies to enable system auditing.
• Cybersecurity accounting tracks and monitors in real time.

• The concept of AAA is like using a credit card that identifies who can use it, how much that user
can spend, and accounts for items or services the user purchased.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Access Controls
What Is Identification?
• It enforces the rules established by the authorization policy.

• Every time access to a resource is requested, the access controls determine whether to grant or
deny access.

• A unique identifier ensures the proper association between allowed activities and subjects.

• A username is the most common method used to identify a user.

• A username can be an alphanumeric combination, a personal identification number (PIN), a smart


card or biometric — such as a fingerprint, retina scan, or voice recognition.

• A unique identifier ensures that a system can identify each user individually, therefore allowing an
authorized user to perform the appropriate actions on a particular resource.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Access Controls
Federated Identity Management
• It refers to multiple enterprises that let their users use the same identification credentials to gain
access to the networks of all enterprises in the group.
• Unfortunately, this broadens the scope and increases the probability of a cascading effect should
an attack occur.
• A federated identity links a subject’s electronic identity across separate identity management
systems, such as being able to access several websites using the same social login credentials.
• The goal of federated identity management is to share identity information automatically across
castle boundaries.
• From the individual user’s perspective, this means a single sign-on to the web.
• It is imperative that organizations scrutinize the identifying information shared with partners, even
within the same corporate group, for example.
• The sharing of social security numbers, names, and addresses may allow identity thieves the
opportunity to steal this information from a partner to perpetrate fraud.
• The most common way to protect federated identity is to tie login ability to an authorized device.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Access Controls
Authentication Methods
• Users prove their identity with a username or ID and need to verify their identity by providing one of
the following.

What you know:


• Passwords, passphrases, or PINs are all examples of something that the user knows.

• The terms passphrase, passcode, passkey, and PIN are all generically referred to as
password — a string of characters used to prove a user’s identity.

• A password should be at least eight characters and contain a combination of upper and
lowercase letters, numbers, and special characters.

• Users need to use different passwords for different systems because if a criminal cracks the
user’s password once, the criminal will have access to all the user’s accounts.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Access Controls
Authentication Methods (Cont.)

What you have:


• Smart cards and security key fobs are examples of something that users possess that can
be used for authentication purposes.

• A smart card is a small plastic card, about the size of a credit card, with a small chip
embedded in it that is capable of processing, storing, and safeguarding data.

• A security key fob is a device that is small enough to attach to a keyring.

• In most cases, security key fobs are used for two factor authentication (2FA), which is much
more secure than a username and password combination.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Access Controls
Authentication Methods (Cont.)
Who you are:
• Biometric security compares unique physical characteristics against stored profiles to
authenticate users.

• There are two types of biometric identifiers:


• Physiological characteristics — fingerprints, DNA, face, hands, retina, or ear features.
• Behavioral characteristics — patterns of behavior such as gestures, voice, gait, or
typing rhythm.

• Biometrics is becoming increasingly popular in public security systems, consumer electronics


and point-of-sale applications.

• Implementing biometrics involves a reader or scanning device, software that converts the
scanned information into digital form and a database that has biometric data stored for
comparison.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Access Controls
Multi-Factor Authentication
• It uses at least two methods of verification — such as a password and something you have, for
example, a security key fob.

• This can be taken a step further by adding something you are, such as a fingerprint scan.

• Multi-factor authentication can reduce the incidence of online identity theft because it means
knowing a password will not give cybercriminals access to a user’s account.

• Note that two-factor authentication (2FA) is a method of multi-factor authentication that entails two
factors, but the two terms are often used interchangeably.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Access Controls
Authorization
Authorization controls what a user can and cannot do on the network after successful authentication.
• After a user proves their identity, the system checks to see what network resources the user
can access and what they can do with the resources.

When to implement authorization


• Authorization uses a set of attributes that describes the user’s access to the network, to answer the
question, ‘What read, copy, edit, create, and delete privileges does this user have?’

• The system compares these attributes to the information contained within the authentication
database, determines a set of restrictions for that user, and delivers it to the local device where the
user is connected.

• Authorization is automatic and does not require users to perform additional steps after
authentication.

• System administrators have set the network up to implement authorization immediately after the user
authenticates.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Access Controls
Authorization (Cont.)
Using authorization
• Defining authorization rules is the first step in controlling access.

• An authorization policy establishes these rules.

• A group membership policy defines authorization based on users’ membership in a specific group.

• All employees of an organization may have a swipe card, for example, which provides access to
the premises, but it might not allow access to a server room.

• An authority-level policy defines access permissions based on an employee’s position within the
organization.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Access Controls
Packet Tracer - Configure Access Control
In the following Packet Tracer activity, you will complete the following objectives:

Part 1: Configure and Use AAA Authentication Credentials


Part 2: Configure and Use Email Services
Part 3: Configure and Use FTP Services

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Access Control Concepts
Access Control Models (Cont.)
Access Control Models Description
This is the least restrictive model and allows users to control access to their data as owners of
Discretionary access control
that data. DAC may use ACLs or other methods to specify which users or groups of users have
(DAC)
access to the information.
This applies the strictest access control and is typically used in military or mission critical
Mandatory access control
applications. It assigns security level labels to information and enables users with access based
(MAC)
on their security level clearance.
Access decisions are based on an individual’s roles and responsibilities within the organization.
Role-based access control Different roles are assigned security privileges, and individuals are assigned to the RBAC profile
(RBAC) for the role. Roles may include different positions, job classifications, or groups of job
classifications. Also known as a type of non-discretionary access control.
ABAC allows access based on attributes of the object (resource) to be accessed, the subject
Attribute-based access control
(user) accessing the resource, and environmental factors regarding how the object is to be
(ABAC)
accessed, such as time of day.
Network security staff specify sets of rules regarding or conditions that are associated with
Rule-based access control
access to data or systems. These rules may specify permitted or denied IP addresses, or
(RBAC)
certain protocols and other conditions. Also known as Rule-Based RBAC.
Time-based access control TAC Allows access to network resources based on time and day.
(TAC) © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
13.5 Access Control Summary

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Access Control Summary
What Did I Learn in this Module?
• Physical access controls are actual barriers deployed to prevent direct physical contact with systems.
• Logical access controls are hardware and software solutions used to manage access resources and systems.
• Administrative access controls involves three security services: authentication, authorization, and accounting.
• Identification enforces the rules established by the authorization process.
• Authorization controls what a user can and cannot do on the network after successful authentication.
• Accountability traces an action back to a person or process making the change to the system.
• The CIA triad consists of confidentiality, integrity, and availability.
• Zero trust is a comprehensive approach to securing all access across networks, applications, and environments.
• Access control methods include DAC, MAC, RBAC, ABAC, RBAC, and TAC.
• Privilege escalation is a common exploit where vulnerabilities in servers or access control systems are exploited to grant
access to an unauthorized user or software process.
• Account types can include administrator accounts, user accounts, service accounts, and guest accounts.
• Permission levels can be assigned to files and folders to include full control, modify, read and execute, write, and read.
• Robust practices for securing privileged accounts must be taken because they are often the target of cybercriminals.

© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Access Control Summary
What Did I Learn in this Module?
• Authentication management aims to ensure secure sign in while still providing ease of use.
• HMAC uses an encryption key with a hash function to authenticate a web user.
• An authentication protocol authenticates data between two entities to prevent unauthorized access.
• A network must be designed to control who is allowed to connect to it and what they are allowed to do when they are
connected.
• AAA systems provide the necessary framework to enable scalable security.
• AAA authentication can be used to authenticate users for local access, or it can be used to authenticate users for remote
network access.
• Cisco provides two common methods of implementing AAA services: Local AAA Authentication and Server-based AAA
Authentication.
• Centralized AAA is more scalable and manageable than local AAA and is the preferred AAA implementation.
• A centralized AAA system can leverage Active Directory or LDAP for user authentication and group membership, while
maintaining its own authorization and accounting databases.
• Devices communicate with the centralized AAA server using with the RADIUS or TACACS+ protocols.
• Centralized AAA also enables the use of the accounting method that reports usage data in AAA logs.
• Various types of accounting information that can be collected are network accounting, connection
accounting, EXEC accounting, system accounting, command accounting, and resource ©accounting.
2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67

You might also like