1 / 148

Authentication and Remote Access

Authentication and Remote Access. Chapter 11. Objectives (1 of 2). Identify the differences among user, group, and role management. Implement password and domain password policies. Describe methods of account management (SSO, time of day, logical token, account expiration).

chandler
Télécharger la présentation

Authentication and Remote Access

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Authentication and Remote Access Chapter 11

  2. Objectives (1 of 2) • Identify the differences among user, group, and role management. • Implement password and domain password policies. • Describe methods of account management (SSO, time of day, logical token, account expiration). • Describe methods of access management (MAC, DAC, and RBAC). • Discuss the methods and protocols for remote access to networks.

  3. Objectives (2 of 2) • Identify authentication, authorization, and accounting (AAA) protocols. • Explain authentication methods and the security implications in their use. • Implement virtual private networks (VPNs) and their security aspects.

  4. Key Terms (1 of 9) • AAA • Access control • Access control list (ACL) • Access control matrix • Accounting • Account expiration • Account maintenance • Account recertification • Administrator • Attribute-based access control (ABAC) • Authentication • Authentication server (AS) • Authorization • Basic authentication • Biometric factors

  5. Key Terms (2 of 9) • Certificate • Challenge-Handshake Authentication Protocol (CHAP) • Client-to-server ticket • Common Access Card (CAC) • Credential Management • Crossover error rate • Digest authentication • Digital certificate • Directory • Discretionary access control (DAC) • Domain controller • Domain password policy

  6. Key Terms (3 of 9) • eXtensible Access Control Markup Language (XACML) • Extensible Authentication Protocol (EAP) • False acceptance rate • False negative • False positive • False rejection rate • Federated identity management • FTPS • Generic accounts • Group • Group policy object (GPO)

  7. Key Terms (4 of 9) • Guest accounts • HMAC-based One-Time Password (HOTP) • Identification • IEEE 802.1X • Kerberos • Key distribution center (KDC) • Layer 2 Tunneling Protocol (L2TP) • Lightweight Directory Access Protocol (LDAP) • Mandatory access control (MAC) • Multifactor identification • Mutual authentication

  8. Key Terms (5 of 9) • OAuth (Open Authorization) • Offboarding • Onboarding • OpenID • OpenID Connect • Password Authentication Protocol (PAP) • Permissions • Personal identity verification (PIC) • Point-to-point protocol (PPP) • Point-to-Point Tunneling Protocol (PPTP) • Privilege management

  9. Key Terms (6 of 9) • Rights • Role • Role-based access control (RBAC) • Root • Rule-based access control • Privileged accounts • Privileges • Remote access server (RAS) • Remote Authentication Dial-In User Service (RADIUS) • Remote Desktop Protocol (RDP)

  10. Key Terms (7 of 9) • Security Assertion Markup Language (SAML) • Secure token • Service accounts • SFTP • Single sign-on (SSO) • Shared accounts • Shibboleth • Smart card • Software tokens • Something you are • Something you do • Something you have • Something you know • Somewhere you are

  11. Key Terms (8 of 9) • Superuser • Terminal Access Controller Access Control System+ (TACACS+) • Ticket-granting server (TGS) • Ticket-granting ticket (TGT) • Time-based One-Time Password (TOTP) • Time-of-day restrictions • Token • Transitive truest • Tunneling • Usage auditing and review

  12. Key Terms (9 of 9) • User • Username • Virtual private network (VPN)

  13. Introduction • Privileges mean you have the ability to “do something” on a computer. • Privilege management is the process of restricting a user’s ability to interact with the computer system. • Remote access enables users outside a network to have network access and privileges as if they were inside the network. • Authentication is the process of establishing a user’s identity to enable the granting of permissions.

  14. User, Group, and Role Management • To effectively manage privileges, a mechanism for separating people into distinct entities (users) is required. • It is convenient and efficient to be able to lump users together when granting many different people (groups) access to a resource at the same time. • It is useful to be able to grant or restrict access based on a person’s job or function within the organization (role).

  15. User (1 of 4) • The term user generally applies to any person accessing a computer system. • In privilege management, a user is a single individual. • A username is a unique alphanumeric identifier the user will use to identify himself or herself when logging into or accessing the system.

  16. User (2 of 4) • Rights define the actions a user can perform on the system itself. • Permissions control what the user is allowed to do with objects on the system.

  17. User (3 of 4) • “Special” user accounts are reserved for special functions and typically have much more access and control. • The administrator account under Windows and the root account under UNIX • Both known as the superuser • Must be protected with strong passwords • The system account used by Windows operating systems • Granted full control to all files on an NTFS volume by default

  18. User (4 of 4) Figure 11.1 Users tab on a Windows Server 2008 system

  19. Shared and generic accounts/credentials • Shared accounts go against the specific treatise that accounts exist so that user activity can be tracked. • Shared accounts are called generic accounts • Shared accounts exist only to provide a specific set of functionality • Example: PC running in kiosk mode, with a browser limited to specific sites as an information display • Tracing the activity to a user is not particularly useful.

  20. Guest accounts • Guest accounts are frequently used on corporate networks • Provide visitors’ access to the Internet • Provide common corporate resources • Accounts are restricted in their network capability to a defined set of machines with a defined set of access • Logging and tracing activity have little to no use • Overhead of establishing an account does not make sense

  21. Service accounts • Service accounts are used to run processes that do not require human intervention to start/stop/administer. • Windows systems may not allow them to log into the system. • Limits attack vectors that can be applied to these accounts • Can apply time restrictions for accounts that run batch jobs at night and then monitor when they run. • Service accounts that run in an elevated privilege mode should receive extra monitoring and scrutiny.

  22. Privileged accounts • Privileged accounts have greater than normal user access. • Privileged accounts are typically root or admin-level accounts and represent risk in that they are unlimited in their powers. • Require regular real-time monitoring, if at all possible, and should always be monitored when operating remotely. • There may be reasons why system administrators are acting via a remote session, but when they are, the purposes should be known and approved.

  23. Group (1 of 3) • Under privilege management, a group is a collection of users with some common criteria, such as a need for access to a particular dataset or group of applications. • A new user added to a group will automatically allow that user to access that resource “inherits” the permissions of the group as soon as she is placed in that group. • Some operating systems have built-in groups. • Makes the tasks of assigning and managing permissions easier

  24. Group (2 of 3) Figure 11.2 Logical representation of groups

  25. Group (3 of 3) Figure 11.3 Groups tab on a Windows Server 2008 system

  26. Role • A role is usually synonymous with a job or set of functions. • Security admins need to accomplish specific functions • In general, anyone serving in the role of security admin needs the same rights and privileges as every other security admin. • For simplicity and efficiency, rights and privileges can be assigned to the role security admin, and anyone assigned to fulfill that role automatically has the correct rights and privileges to perform the required tasks.

  27. Domain Password Policy (1 of 2) • A domain password policy is a password policy for a specific domain. • The domain controller is a computer that responds to security authentication requests, such as logging into a computer. • The domain password policy usually falls under a group policy object (GPO) and has several elements. • Domains are logical groups of computers that share a central directory database, known as the Active Directory database.

  28. Domain Password Policy (2 of 2) Figure 11.4 Password policy options in Windows Local Security Policy

  29. Single Sign-On (1 of 2) • Single sign-on (SSO) is a form of authentication that involves the transferring of credentials between systems. • Single sign-on allows a user to transfer her credentials, so that logging into one system acts to log her into all of them. • SSO is usually a little more difficult to implement than vendors would lead you to believe.

  30. Single Sign-On (2 of 2) Figure 11.5 Single sign-on process

  31. Security controls and permissions (1 of 2) • Most operating systems use the concepts of permissions and rights to control and safeguard access to resources. • Windows operating system provides an example. • Uses the concepts of permissions and rights to control access to files, folders, and information resources • Uses user rights or privileges to determine actions a user or group is allowed to perform or access

  32. Security controls and permissions (2 of 2) • Windows operating system (continued) • Rights tend to be actions that deal with accessing the system itself, process control, logging, and so on. • Even access and use of peripherals such as printers can be controlled using permissions. • A very important concept to consider when assigning rights and privileges is the concept of least privilege. • Requires that users be given the absolute minimum number of rights and privileges required to perform their authorized duties.

  33. Access Control Lists (1 of 4) • Access control list (ACL) is used in more than one manner in the field of computer security. • Routers and firewalls: An ACL is a set of rules used to control traffic flow into or out of an interface or network. • System resources: An ACL lists permissions attached to an object. • An access control matrix provides the simplest framework for illustrating the process. • Seldom used in computer systems because it is extremely costly in terms of storage space and processing

  34. Access Control Lists (2 of 4) Figure 11.9 Permissions for Billy Williams on the Data folder

  35. Access Control Lists (3 of 4) Figure 11.10 Permissions for Leah Jones on the Data folder

  36. Access Control Lists (4 of 4)

  37. Mandatory Access Control (MAC) (1 of 2) • Mandatory access control (MAC) is the process of controlling access to information based on the sensitivity of that information and whether or not the user is operating at the appropriate sensitivity level and has the authority to access that information. • Information and resources labeled with a sensitivity level • Users assigned a clearance level • Access control and sensitivity labels required in a MAC system

  38. Mandatory Access Control (MAC) (2 of 2) Figure 11.11 Logical representation of mandatory access control

  39. Discretionary Access Control (1 of 2) • Discretionary access control (DAC) is the process of using file permissions and optional ACLs to restrict access to information based on a user’s identity or group membership. • Most common access control system and is commonly used in both UNIX and Windows operating systems. • Under the DAC model, the file’s owner can changethe file’s permissions any time he wants.

  40. Discretionary Access Control (2 of 2) Figure 11.12 Discretionary file permissions in the UNIX environment

  41. Role-Based Access Control (RBAC) • Role-based access control (RBAC) is the process of managing access and privileges based on the user’s assigned roles. • RBAC is the access control model that most closely resembles an organization’s structure. • Under RBAC, you must first determine the activities that must be performed and the resources that must be accessed. • When a role is assigned to a specific user, the user gets all the rights and privileges assigned to that role.

  42. Rule-Based Access Control • In rule-based access control, access is either allowed or denied based on a set of predefined rules. • Each object has an associated ACL (much like DAC), and when a particular user or group attempts to access the object, the appropriate rule is applied. • A good example for rule-based access control is permitted logon hours. • Many operating systems give administrators the ability to control the hours during which users can log in.

  43. Attribute-Based Access Control (ABAC) • Attribute-based access control (ABAC) is a new access control schema based on the use of attributes associated with an identity. • These can use any type of attributes. • User attributes, resource attributes, environment attributes, and so on • ABAC can be represented via the eXtensible Access Control Markup Language (XACML), a standard that implements attribute- and policy-based access control schemes.

  44. Account policies • Good set of policies guide security professionals in daily tasks • Policies needed for a wide range of elements • Naming conventions to operating rules, such as audit frequency and other specifics • Having issues resolved as a matter of policy enables security professionals to go about the task of verifying and monitoring systems • Avoids adjudication of policy type issues with each user case

  45. Account policy Enforcement (1 of 2) • Passwords: primary method of account policy enforcement • Foundation of a solid account policy: • Each user ID is traceable to a single person’s activity • No sharing of passwords and credentials • Passwords need to be managed to provide appropriate levels of protection

  46. Account policy Enforcement (2 of 2) • Passwords need to be strong enough to resist attack, and yet not too difficult for users to remember. • Password policy ensures necessary steps taken to enact a secure password solution • By users and by the password infrastructure system

  47. Credential Management • Credential management: • Processes, services, and software used to store, manage, and log the use of user credentials • Credential management solutions: • Typically aimed at assisting end users manage their growing set of passwords • Credential management products • Provide secure means of storing user credentials • Make credentials available across a wide range of platforms

  48. Group Policy • Microsoft Windows systems in an enterprise environment can be managed via group policy objects (GPOs). • GPOs act through a set of registry settings that can be managed via the enterprise. • A wide range of settings can be managed via GPOs • Many are related to security including user credential settings such as password rules.

  49. Standard Naming Convention • Having a standard naming convention enables users to extract meaning from a name. • However, calling out has two potential problems. • Alerts adversaries to which accounts are the most valuable. • Creates a problem when the person is no longer a member of the system administrators group, as now the account must be renamed. • Plan on having plenty of room ahead for fixing any naming scheme.

  50. Account Maintenance (1 of 2) • Account maintenance is the routine screening of all tributes for an account. • Best practice: perform in accordance with risk associated with the profile. • System administrators, and other privileged accounts, need greater scrutiny that normal users. • Shared accounts, such as guest accounts, also require scrutiny to ensure they are not abused.

More Related