CISSP For Dummies

The two categories of access controls are

System access controls

System access controls are the hard and crunchy outside of a system, providing the first line of defense in information security. They protect systems and information by restricting access to the system.

Although system access controls can provide complete authentication, authorization, and accountability (AAA), it’s authentication for which they are renowned.

Authentication can be based on any of three factors.

 Instant Answer   Authentication is based on something you know, something you have, or something you are.

Two-factor authentication requires two of these three authentication factors for authentication. Three-factor authentication requires all three factors for authentication.

 Warning   A commonly cited example of an access control system that uses two-factor authentication is an automatic teller machine (ATM) card and a PIN. Purists might argue that the ATM card is actually a form of identification that you present to the ATM machine to establish your identity and that the PIN is the only authentication factor involved; thus, this doesn’t provide two-factor authentication. Save this debate for engaging conversation at a wild party. For the CISSP exam, this scenario is considered two-factor authentication.

Identification and authentication

The various identification and authentication (I&A) techniques that we discuss in this section include passwords/passphrases and PINs (knowledge-based), biometrics and behavior (characteristic-based), one-time passwords, tokens, and single sign-on (SSO).

The identification component is normally a relatively simple mechanism based on a username or, in the case of a system or process, based on a computer name, Media Access Control (MAC) address, Internet Protocol (IP) address, or Process ID (PID). The only requirements for identification are that it must uniquely identify the user and shouldn’t identify that user’s role or relative importance in the organization (there should be no labels like accounting or ceo). Common or shared accounts, such as root, admin, or system, should be avoided. Such accounts provide no accountability and are prime targets for a hacker.

 Instant Answer   Identification is the act of claiming a specific identity. Authentication is the act of verifying that identity.

“Polly wanna hacker?”

The distinction between hackersand crackers is now more commonly understood, particularly within the security community, but to ensure that there is absolutely no confusion, we shall do our civic duty here and make the distinction: Hacker=good, Cracker=bad. Hackers perform a vital role in the Internet and computing community by helping to debug source code, identify vulnerabilities, and improve software development - all of which serve the greater good. Conversely, crackers typically include script kiddies, cyberpunks, cyberterrorists, common criminals, and other vermin . . . all motivated by less noble causes.

The term hackeris commonly used to describe both hackers and crackers in general, much as the words he or him are sometimes used to describe males and females generally.

Passwords and passphrases

“A password should be like a toothbrush. Use it everyday; change it regularly; and DON’T share it with friends.” –USENET

Passwords are easily the most common authentication mechanism in use today. Although more advanced and secure authentication technologies are available, including tokens and biometrics, they’re typically used as supplements to or in combination with - rather than as replacements for - traditional usernames and passwords.

A passphrase is a variation on passwords that uses a sequence of characters or words rather than a single password. Although they’re generally more difficult to break than regular passwords, they’re also inconvenient to enter and share the same problems associated with passwords.

The CISSP candidate should understand the general problems associated with passwords as well as common password controls and management features.

Problems with passwords/passphrases include:

Passwords have the following login controls and management features that should be configured in accordance with an organization’s security policy and security best practices:

We’re sure that you know many of the following widely available and well-known guidelines for creating more secure passwords:

The problem with these guidelines is that they’re widely available and well known. In fact, hackers use some of these same guidelines to create their aliases or handles: super-geek becomes 5up3rg33k. A password like Qwerty12! satisfies these guidelines, but it’s not really a good password because it’s a relatively simple and obvious pattern. Many dictionary attacks include not only word lists, but also patterns such as these. One solution is to employ a software tool that helps users evaluate the quality of their passwords as they create them. These tools are commonly known as password/passphrase generators or password appraisers.

Personal Identification Numbers (PINs)

A PIN in itself is a relatively weak authentication mechanism because there are only 10,000 possible combinations for a 4-digit numeric PIN. Therefore, some other safeguard is usually used in combination with a PIN. For example, most ATMs confiscate your ATM card after three incorrect PIN attempts. A PIN used with a one-time token password and an account lockout policy is also very effective, allowing a user to attempt only one PIN/password combination per minute and then locking the account after three or five failed attempts as determined by the security policy.

Biometrics and behavior

The only absolute method for positively identifying an individual is to base authentication on some unique physiological or behavioral characteristic of that individual. Physiological characteristics, including fingerprints, hand geometry, and facial features such as retina and iris patterns, are used for biometric identification. Behavioral biometrics are based on measurements and data derived from an action and indirectly measure characteristics of the human body. Behavioral characteristics include voice, signature, and keystroke patterns.

Biometrics are based on the third factor of authentication - something you are. (To read about all three factors, peruse the earlier section “System access controls.”) The concept of I&A is applied slightly differently in biometric access control systems depending on their use, as follows.

The necessary factors for an effective biometrics access control system include

Table 4-1 summarizes the generally accepted standards for the factors described in the preceding list.

Table 4-1: Generally Accepted Standards for Biometric Systems

Open table as spreadsheet

Characteristic

Standard

Accuracy

CER<10%

Speed

5 seconds

Throughput

6–10 minutes

Enrollment time

<2 minutes

Common types of physiological biometric access control systems include

Common types of behavioral biometric systems include

 Tip   In general, the CISSP candidate doesn’t need to know the specific characteristics and specifications of the different biometric systems, but you should know how they compare with other biometric systems. For example, know that iris pattern systems are more accurate than retina pattern systems.

One-time passwords

A one-time password is a password that is valid for one logon session only. A one-time password is considered a dynamic password; that is, it changes at some regular interval or event. Conversely, a static password is a password that is the same for each logon. Similar to the concept of a one-time pad in cryptography (which we discuss in Chapter 8), a one-time password provides maximum security for access control.

 Cross-Reference   Two examples of one-time password implementations are tokens (which we discuss in the next section) and the S/Key protocol. The S/Key protocol, developed by Bellcore and defined in RFC 1760, is client/server based and uses MD4 and MD5 to generate one-time passwords (MD4 and MD5 are algorithms used to verify data integrity through the creation of a 128-bit message digest from data input. We discuss both in Chapter 8.)

Tokens

Tokens are access control devices such as key fobs, dongles, smart cards, magnetic cards, and keypad or calculator-type cards that store static passwords (or digital certificates) or generate dynamic passwords. The three general types of tokens are

Generate a new password or passcode asynchronously by calculating the correct response to a system-generated random challenge string that’s manually entered into the token by its owner.

Tokens provide two-factor authentication ( something you have and something you know) by either requiring the owner to authenticate to the token first or by requiring that a secret PIN is entered along with the generated password. Both RADIUS and Terminal Access Controller Access Control System (TACACS+; which we discuss later in the upcoming section “Centralized access controls”) support various token products.

 Instant Answer   Tokens can be used to generate one-time passwords and provide two-factor authentication.

Single sign-on (SSO)

The concept of single sign-on (SSO) addresses a common problem for users and security administrators alike.

From the security administrator’s perspective, multiple accounts mean multiple vulnerabilities. Every account that exists in a system, network, or application is a potential point of unauthorized access. Multiple accounts belonging to a single user represent an even greater vulnerability:

 Cross-Reference   See Chapter 8 for a review of the basics of cryptography.

Alas, SSO is that great Utopian solution that users and security administrators alike thirst for and seek. SSO allows a user to present a single set of logon credentials, typically to an authentication server, which then transparently logs the user on to all other enterprise systems and applications for which that user is authorized. Of course, SSO is not without disadvantages, which include

SSO is commonly implemented by third-party ticket-based solutions, including

 Instant Answer   Kerberos, SESAME, and KryptoKnight are three examples of ticket-based authentication protocols that provide SSO services.

Methodologies and implementation

Access control methodologies are generally classified as either centralized or decentralized. Within each of these classifications, numerous protocols and models are available for implementation. For the CISSP exam, you should be able to identify the various protocols and models used in centralized and decentralized access control systems.

Centralized access controls

Centralized access control systems maintain user account information in a central location. Examples of centralized access control systems and protocols commonly used for authentication of remote users include

 Instant Answer   LDAP, RAS (PAP and CHAP), RADIUS, Diameter, and TACACS are examples of centralized access control for remote access.

Decentralized access controls

Decentralized access control systems maintain user account information in separate locations by different administrators throughout an organization or enterprise. Examples of decentralized access control systems include

 Instant Answer   A database view is a type of constrained user interface.

Methods of attack

Gaining access (getting through that hard and crunchy outside) to a system or network is a hacker’s first objective. Several methods of attack are commonly used against access control systems, including

Data access controls

Data access controls are, well, the hard and crunchy middle. Probably not your favorite candy, something like a freeze-dried Cadbury’s Creme Egg, but effective information security requires defense in depth.

Data access controls protect systems and information by restricting access to system files and user data based on object (user) identity. Data access controls also provide authorization and accountability, relying on system access controls to provide identification and authentication.

Access control techniques

Data access control techniques are generally categorized as either discretionary or mandatory. The CISSP candidate must fully understand the concept of discretionary and mandatory access controls and be able to describe specific access control methods under each category.

Discretionary access control

A discretionary access control (DAC) is an access policy determined by the owner of a file (or other resource). The owner decides who is allowed access to the file and what privileges they have.

 Instant Answer   In DAC, the owner determines the access policy.

Two important concepts in DAC are

Access control lists (ACLs) provide a flexible method for applying discretionary access controls. An ACL lists the specific rights and permissions that are assigned to a subject for a given object.

 Remember   ACLs are implemented differently on various operating systems. Although the CISSP exam doesn’t directly test your knowledge of specific operating systems or products, you should be aware of this fact. Also, understand that ACLs in this context are different from ACLs used on routers, which have nothing to do with DAC.

Role-based access control is another method for implementing discretionary access controls. Role-based access control assigns group membership based on organizational or functional roles. Individuals may belong to one or many groups (acquiring cumulative permissions or limited to the most restrictive set of permissions for all assigned groups), and a group may contain only a single individual (corresponding to a specific organizational role assigned to one person). Access rights and permissions for objects are assigned to groups rather than (or in addition to) individuals. This strategy greatly simplifies the management of access rights and permissions.

Major disadvantages of discretionary access control techniques include

Mandatory access control

A mandatory access control (MAC) is an access policy determined by the system rather than the owner, in contrast to DAC. MAC is used in multilevel systems that process highly sensitive data, such as classified government and military information. A multilevel system is a single computer system that handles multiple classification levels between subjects and objects. Two important concepts in MAC are

 Instant Answer   In MAC, the system determines the access policy.

Rule-based access control is one method for applying mandatory access control. Actually, all MAC-based systems implement a simple form of rule-based access control by matching an object’s sensitivity label and a subject’s sensitivity label to determine whether access should be granted or denied. Additional rules can be applied by using rule-based access control to further define specific conditions for access to a requested object.

Lattice-based access controls are another method for implementing mandatory access controls. A lattice model is a mathematical structure that defines greatest lower-bound and least upper-bound values for a pair of elements, such as a subject and an object. This model can be used for complex access control decisions involving multiple objects and/or subjects. For example, given a set of files with multiple classification levels, the lattice model determines the minimum clearance level that a user requires to access all the files.

Major disadvantage of mandatory access control techniques include

Access control models

Models are used to express access control requirements in a theoretical or mathematical framework that precisely describes or quantifies its function. Common access control models include Bell-LaPadula, Biba, Clark-Wilson, noninterference, access matrix, and information flow. We introduce these models in the following sections and also cover them more in Chapter 9.

Bell-LaPadula (Basic security theorem)

Published in 1973, the Bell-LaPadula model was the first formal confidentiality model of a mandatory access control system. Bell-LaPadula is a state machine model that addresses only the confidentiality of information. A secure state is defined and maintained during transitions between secure-states. The basic premise of Bell-LaPadula is that information cannot flow downward. Bell-LaPadula defines the following two properties:

 Instant Answer   Bell-LaPadula addresses confidentiality.

Biba

Published in 1977, the Biba integrity model (sometimes referred to as Bell-LaPadula upside down) was the first formal integrity model. Biba is a lattice-based model that addresses the first goal of integrity - ensuring that modifications to data are not made by unauthorized users or processes. (For more on lattice-based models, read the earlier section “Mandatory access control.” See Chapter 6 for a complete discussion of the three goals of integrity.) Biba defines the following two properties:

Clark-Wilson

Published in 1987, the Clark-Wilson integrity model establishes a security framework for use in commercial activities, such as the banking industry. Clark-Wilson addresses all three goals of integrity (read more about this in Chapter 6) and identifies special requirements for inputting data based on the following items and procedures:

 Instant Answer   Biba and Clark-Wilson both address integrity.

Noninterference model

A noninterference model, in general, ensures that the actions of different objects and subjects are not seen by and don’t interfere with other objects and subjects on the same system.

Access matrix model

An access matrix model, in general, provides object access rights ( read/write/ execute, or R/W/X) to subjects in a DAC system. An access matrix consists of access control lists (ACLs) and capability lists. (For more on DAC and ACLs, peruse the earlier section “Discretionary access control.”)

Information flow model

An information flow model, in general, is a lattice-based model in which objects are assigned a security class and value and their direction of flow is controlled by a security policy.

Категории