Basic Security Control
Sesi 7
     DigiTalent Scholarship 2018
                        Security Controls
                                          “
  technical or administrative safeguards or
 counter measures to avoid, counteract or
minimize loss or unavailability due to threats
 acting on their matching vulnerability, i.e.,
                 security risk
   https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(environment based)
Administrative controls                            technical controls
• process of developing and                        • controls in security that are
  ensuring compliance with policy                    carried out or managed by
  and procedures                                     computer systems
• tend to be things that
  employees may do, or must
  always do, or cannot do
       https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Types of Controls
(phase based)
  Prevention controls: Help to prevent a threat or attack from
  exposing a vulnerability.
  Detection controls: Help to discover if a threat or vulnerability has
  entered a computer system.
  Correction controls: Help to mitigate the consequences of a threat
  or attack from adversely affecting a computer system.
                                                              OR Preventative, Detective,
                                                              Corrective according SANS
Prevention Control   Detection Control   Correction Control
                  Compensating controls
                      “
 alternate controls designed to accomplish
the intent of the original controls as closely
 as possible, when the originally designed
controls can not be used due to limitations
            of the environment.
    https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Illustration of controls
  Preventative      Detective               Corrective               Compensatory
    Security         System                 OS Upgrade                  Backup
   Awareness        Monitoring                                         Generator
    Training
    Firewall            IDS                 Backup Data                   Hot Site
                                              Restoral
   Anti-virus       Anti-Virus               Anti-Virus              Server Isolation
 Security Guard   Motion Detector           Vulnerability
                                             Mitigation
      IPS               IPS
                     https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Physical controls include locks, fences, mantraps and even
geographic specific controls.
Access controls that limit or detect access to computer resources
(data, programs, equipment, and facilities), thereby protecting these
resources against unauthorized modification, loss, and disclosure.
Application software development and change controls that prevent
unauthorized programs or modifications to an existing program from
being implemented.
                      https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
The management framework. Entity Wide security program planning
and management that provides a framework and continuing cycle of
activity for managing risk, developing security policies, assigning
responsibilities, and monitoring the adequacy of the entity’s computer-
related controls
System software controls that limit and monitor access to the powerful
programs and sensitive files that (1) control the computer hardware
and (2) secure applications supported by the system.
                      https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Example
Segregation of duties that are policies, procedures, and an
organizational structure established so that one individual cannot
control key aspects of computer-related operations and thereby
conduct unauthorized actions or gain unauthorized access to assets or
records.
Service continuity controls to ensure that when unexpected events
occur, critical operations continue without interruption.
                      https://www.sans.edu/cyber-research/security-laboratory/article/security-controls
Security Management Process
                                  • Identification: Detecting
                                    problems and determining how
                                    best to protect the system.
    Monitoring   Identification   • Implementation: Installing
                                    control mechanisms to prevent
                                    problems in a system.
                                  • Monitoring: Involves detecting
         Implementation             and solving any security issues
                                    that arise after security controls
                                    are implemented.
  Identify security controls
  Principle                                             Description
                  Prevents intentional or unintentional disclosure of communications between sender and
                  recipient
Confidentiality
                  • Includes trade and military secrets, personnel, health, and tax records.
                  • Controlled via encryption, access control, and steganography.
                  Ensures the accuracy and consistency of information during all processing
Integrity         • Includes modification of test scores or other information stored on network servers.
                  • Controlled via hashing, digital signatures, certificates, and change control.
                  Assurance that authorized users can access resources in a reliable and timely manner
                  • Includes ensuring that vital data such as radar images are both captured and distributed
Availability
                    to airports.
                  • Controlled via redundancy, fault tolerance, and patching.
  Identify security controls (cont’d)
  Principle                                             Description
                 Ensuring that the party that sent a transmission or created data remains associated with
Non-
                 the data and cannot deny sending or creating the data.
Repudiation
                 • Controlled via Digital signatures, certificates, and change control.
                 Determining who to hold responsible for a particular activity or event.
Accountability
                 • Controlled via role and logging monitor
Identification, Authentication, and
Authorization
   Identification
                     Authentication
   The process by                     Authorization
   which a claim     A method of
   is made about     validating a     The process of
   the nature of a   particular       determining
   particular        entity’s or      what rights
   entity.           individual’s     and privileges
                     unique           a particular
                     credentials.     entity has.
Authentication Factors
 Something you are
 ◦ Fingerprints, handprints, and retinal patterns
 Something you have
 ◦ Key or ID card
 Something you know
 ◦ Password or PIN
 Somewhere you are or are not
 ◦ IP address or GPS location
 Something you do
 ◦ Keystroke patterns or tracing picture passwords
  Passwords
• User name and password combination is probably the most widely authentication schemes (what
  you know).
• Credentials are compared to those stored in a database.
    • Match -> Authenticated
    • No Match -> Access is denied
• No guarantee that the correct user is supplying the credentials.
• When credentials are not encrypted for transmission, they are susceptible to an attacker.
                                     Password
                                     User name
                                                 Source: Comptia S+
 Tokens
         Physical or virtual objects that store authentication information. Common
         examples include smart cards, ID badges, and data packets.
• Can store PINs, user information, and passwords (what you have).
• Token values can be generated to respond to authentication server challenges.
                                PIN
                     User Information                   Unique value
                           Password
                                               Token
                                Source: Comptia S+
Biometrics
        Authentication schemes based on the identification of individuals by
        their physical characteristics.
Fingerprint scanners
Retinal scanners
Hand geometry scanners
Voice-recognition software
                                                          Fingerprint Scanner
Facial-recognition software
                              Source: Comptia S+
Geolocation
        The process of identifying the geographic location of an object.
                                                                                     Authentication Approved
Association of street addresses with:
◦ IP addresses
◦ Wi-Fi positioning systems                             Authentication
                                                           Request
◦ GPS coordinates
                                                                         Approved
                                                                         Locations
Authentication requests from approved
locations are granted.                                                                Authentication Denied
                                   Source: Comptia S+
 Keystroke Authentication
         An authentication type that relies on detailed information describing
         exactly when a key is pressed and released as someone types information
         into a computer or other electronic device.
• Uses your personal typing
  tendencies (what you do).
• Records and stores your typing
  for comparison purposes.
• Keystroke logger and other
  metrics are collected to derive
  a keystroke pattern that is                                  Keystroke
                                                            Pattern Detector
  unique to a user.
                                    Source: Comptia S+
 Multi-factor Authentication
         An authentication scheme that requires validation of two or more distinct
         authentication factors.
• Bank debit card: card (token) and PIN
  (password).                                                     Password
   • Some chip cards might not be multi-factor, if
     you don’t have to enter the PIN.
• Authenticator app for email or other
  applications.
                                                                   ID card
   • Key in a validation code from a text message as
     part of logging into email or another
     application.
• Make sure the factors are different!
                                             Source: Comptia S+
 Mutual Authentication
         A security mechanism that requires that each party in a communication
         verifies the identity of every other party in the communication.
• The service or resource verifies the client’s credentials, while the client verifies the
  credentials of the service or resource.
• Prevents clients from sending confidential information to non-secure servers.
• Helps to avoid man-in-the-middle attacks.
                                      Source: Comptia S+
Terminology
 Access Control                          Accounting                          Auditing:
The process of determining and         The process of tracking and     The portion of accounting that
assigning privileges to resources,   recording system activities and    entails security professionals
        objects, and data.                  resource access.             examining logs of what was
                                                                                  recorded.
Principle of Least
Privilege
• The principle that establishes that users and
  software should have the minimal level of
  access that is necessary for them to
  perform the duties required of them.
    • Applies to access to facilities, computer
      hardware, software, and information.
    • Assign only the level of access required
      to perform the necessary tasks.
  Privilege Management
Privilege management: The use of                           Accounting/Auditing
authentication and authorization
mechanisms to provide centralized or
decentralized administration of user
and group access control.
SSO: An aspect of privilege                                                      Authorization
management that provides users with
one-time authentication to multiple    Access Control        Administrator
resources, servers, or sites.
                                                             Authentication
                                                        Source: Comptia S+
Further Reading
1. NIST Special Publication 800-18 Revision 1, Guide for
   Developing Security Plans for Federal Information Systems
2. NIST Special Publication 800-30 Revision 1, Guide for
   Conducting Risk Assessments
3. NIST Special Publication 800-53 Revision 4, Security and
   Privacy Controls for Federal Information Systems and
   Organizations
Thank you