Information Security Essentials
Information Security Essentials
What’s a control:
1. Controls and Risk Mitigation:
2. Definition of Controls:
Controls, according to NIST, are measures designed to protect CIA and meet
defined security requirements.
3. Control Assessment:
Controls Overview
1. Access Elements:
Subjects:
Are Initiators of access requests (users, clients, processes, etc.).
Objects:
Are the entities being accessed (devices, processes, users, etc.).
Rules:
Are Instructions allowing or denying access to objects.
Objects have owners who decide access rules, often recorded in rule bases or
access control lists.
Key Concepts 1
Defense in Depth
1. Defense in Depth Concept:
Users and processes should have the minimum level of authority (permissions)
necessary to perform their functions.
Key Concepts 2
User Life Cycle Management
1. Provisioning:
Meaning: Creating and configuring user accounts and access rights for new
employees.
2. Identity Proofing:
Meaning: Checking someone's identity during the provisioning process.
6. Separation of Duties:
Meaning: Segregation of duties involves assigning distinct roles (requester,
approver) to prevent fraud or misuse, often with multiple approval levels.
7. Dual Controls:
Meaning: Dual controls require two or more people to collaborate to complete
sensitive operations.
Key Concepts 3
accounts based on needed assurance.
2. Privileged Accounts:
Logging: Privileged actions require more extensive and detailed logging than
regular user accounts.
Segregation of Duties
1. Definition: Security practice ensuring that no single individual controls an entire
high-risk transaction from initiation to completion.
2. Application:
Key Concepts 4
Example: Invoice submission for payment requires approval from a manager
before processing.
4. Flexibility in Authorization:
5. Risk of Collusion:
Example: Bank vault with two combination locks, each known by different
personnel, necessitating collaboration to access the vault.
7. Two-Person Integrity:
Access Control: Access systems may enforce the two-person rule for
entering high-security areas, minimizing insider threats.
##FOR INFORMATION##
Key Concepts 5
Request Process: Hiring manager sends a request to the security
administrator.
2. Change of Position:
3. Separation of Employment:
Security Measures: Remove the account from security roles and access
profiles.
Note:
Best Practice: Avoid copying user profiles for new users to prevent "permission
or privilege creep."
Example: If an employee gains additional access for a specific task, and this
access isn't removed after task completion, copying the profile for a new user
may result in unnecessary permissions.
Key Concepts 6
##END##
Key Concepts 7
Administrative Controls
Direct behavior by telling people what to do
Types of Administrative Controls:
1. Policies:
Definition: High-level statements outlining actions, often signed off by senior
managers.
Purpose: Communicate what and, ideally, why certain actions are taken to
promote compliance.
2. Procedures/Processes:
User Agreement: Unlike most policies, end users sign an agreement to adhere
to the policy.
4. Nondisclosure Agreement:
6. Standards:
Administrative Controls 1
7. Guidelines:
Administrative Controls 2
Physical Controls
Key Concepts
1. Interdependence of Control Types:
There is a need for a balance between administrative, physical, and logical controls
in security management.
Definition: CPTED involves designing environments with the aim of managing risk
and preventing crime.
Open Green Spaces: Used to enhance visibility and deter potential criminals.
Accuracy: Involves balancing false acceptance (wrongly granting access) and false
rejection (denying access to authorized users) rates.
Physical Controls 1
Security Guards: Human personnel trained to monitor and secure a facility.
Motion Detectors: Devices that sense movement and trigger alarms or other
responses.
Technologies like turnstiles, mantraps, and remotely controlled door locks are
employed for human traffic control.
Directs the flow of people, signals access permissions, and provides visibility to
reduce the likelihood of criminal activities.
3. Biometrics:
Biometrics authenticates a user's identity based on unique characteristics.
Verification Process: User presents biometric data for comparison with the
stored code.
Physical Controls 2
Behavioral Biometrics: Measures behavioral traits such as voiceprints,
signature dynamics, and keystroke dynamics.
Biometric systems are highly accurate but can be expensive and may raise
privacy concerns among users.
Security
1. Physical Security and Deterrence:
2. CCTV Systems:
Two types: analog (traditional and expensive) and digital (IP-based, lower
cost, and requires less cabling).
Retention period and media type should be strategic decisions based on needs.
4. Alarm Systems:
Auditory sensors, such as glass break sensors, listen for specific sounds.
Decision-making on what is logged and how long logs are retained is crucial.
Physical Controls 3
Monitoring
1. Physical Access Controls and Monitoring:
Involves monitoring personnel and equipment entering and leaving, along with
auditing/logging all physical events.
2. Monitoring Examples:
Cameras:
Logs:
Security Guards:
Alarm Systems:
Organizations should establish guidelines for log retention as part of their log
processes.
Physical Controls 4
Logical Controls
1. Logical or Technical Controls:
Often seen in shared drives where the document creator manages permissions.
Fast, cheap, and low-cost administration, but can be inconsistent and prone to
misuse.
May simplify security templates but often results in more roles and exceptions in
practice.
5. Blended Approach:
Exceptions and specific use cases often lead to a more flexible approach.
A simple form of control, often a text file with allow or deny statements.
Logical Controls 1
Contains logical conditions specifying what is allowed or denied.
Can be an allow list (specifying what is allowed) or a deny list (specifying what
is blocked).
Checking logs is not enough; monitoring and auditing logs are crucial for
effective security.
4. Purpose:
Logical Controls 2
Logical access controls determine who can gain access to a system, even if
the individual already has physical access.
3. Widespread Use:
5. Example Scenario:
In a UNIX environment with DAC, users like Steve and Aidan can
establish or modify permissions for files they own.
6. Data Structure:
Access control lists show subjects with any permissions for an object.
Logical Controls 3
7. Scalability Challenges:
DAC relies on the discretion of individual object owners, which may limit
scalability.
2. Administrator Control:
3. Assigned Privileges:
4. Restrictions on Subjects:
Subjects cannot:
Logical Controls 4
Pass information to unauthorized entities.
While MAC and DAC may sound similar, the fundamental difference lies
in who has the authority to control access rights.
2. Access Assignment:
4. Access Adjustment:
If a user leaves a particular role, the administrator removes that user from
the corresponding role.
Logical Controls 5
5. Access Removal:
When a user is removed from a role, access associated with that role is
also removed.
Logical Controls 6
Controls Review
Terms and Definitions
Audit - Independent review and examination of records and activities to assess the
adequacy of system controls, to ensure compliance with established policies and
operational procedures. NIST SP 1800-15B
Encrypt - To protect private information by putting it into a form that can only be
read by people who have permission to do so.
Insider Threat - An entity with authorized access that has the potential to harm an
information system through destruction, disclosure, modification of data, and/or
denial of service. NIST SP 800-32
iOS - An operating system manufactured by Apple Inc. Used for mobile devices.
Layered Defense The use of multiple controls arranged in series to provide several
consecutive controls to protect an asset; also called defense in depth.
Linux - An operating system that is open source, making its source code legally
available to end users.
Controls Review 1
Log Anomaly - A system irregularity that is identified when studying log entries
which could represent events of interest for further surveillance.
Logging - Collecting and storing user activities in a log, which is a record of the
events occurring within an organization’s systems and networks. NIST SP 1800-
25B.
Mandatory Access Control - Access control that requires the system itself to
manage access controls in accordance with the organization’s security policies.
Principle of Least Privilege - The principle that users and programs should have
only the minimum privileges necessary to complete their tasks. NIST SP 800-179
Ransomware - A type of malicious software that locks the computer screen or files,
thus preventing or limiting a user from accessing their system and data until money
is paid.
Controls Review 2
Role-based access control (RBAC) - An access control system that sets up user
permissions based on roles.
Turnstile - A one-way spinning door or barrier that allows only one person at a time
to enter a building or pass through an area.
Controls Review 3