CC Domain3
CC Domain3
3
Subject, Object and Rules
Subject
(Rule)
4
Security Controls and Risk Reduction
5
Defense in Depth
⦿ Administrative controls
⦿ Technical controls Layered Security Controls Examples
⦿ Physical Controls
6
Least Privilege Need to Know
The principle that users and Grant users access only to the
programs should have only the data they need to perform their
minimum privileges necessary job and no more.
to complete their tasks.
8
Before using Privileged Access Management
(PAM) Example
Admin 1
Admin 2
9
After using Privileged Access
Management (PAM) Example
Admin 1
Admin 2
10
Segregation of Duties (SoD)
(A core element of authorization)
Dual Control
A procedure that uses two or more entities (usually
persons) operating in concert to protect a system
resources, such that no single entity acting alone
can access that resource.
12
Users Provisioning
(Onboarding, Role Change and Offboarding)
Network
Admin
System
Admin
13
Domain 3 Domain 3 Agenda
Access Control Concepts Module 1: Access Control Concepts
Module 2: Physical Access Controls
Module 3: Logical Access Controls
Module 4: Summary
Access Controls Types
3
Physical Access Controls
• Controls implemented through a tangible
mechanism.
Examples include walls, fences, guards, locks, etc.
4
Why Physical Controls!
Prevent unauthorized individuals from
entering a physical site to protect not only
physical assets such as computers
5
Physical Security Controls
(Perimeter Defenses)
➢ Fences (range from 1M to 2.4M with barbed wire on top)
6
Physical Security Controls
➢ Gates (Deterrent, Preventative)
7
Physical Security Controls
➢ Bollards (Preventative) ➢ Lights (Detective and
Deterrent)
A strong post designed to stop
a car but allows foot traffic to Light should be bright enough
pass. to illuminate desired area.
8
Physical Security Controls
➢ Mantraps: preventative ➢ Turnstiles: form of gate that
physical control with two doors. prevents more than one person
The first door must close at a time from gaining entry
before the second door can and often restricts movement
open. in one direction.
9
Why Turnstiles and Mantraps!
11
Lock picking is the
Locks art of opening a lock
(Can be Preventative or Deterrent) without keys
12
Guards
Security guard Guard dog
13
Access Cards types
14
Crime Prevention through
Environmental Design (CPTED)
15
Domain 3 Domain 3 Agenda
Access Control Concepts Module 1: Access Control Concepts
Module 2: Physical Access Controls
Module 3: Logical Access Controls
Module 4: Summary and Review
Access Controls Categories
(Logical Controls)
3
Access Controls Types
4
Technical (Logical) Access
Controls
Logical access controls are electronic methods that
limit someone from getting access to systems, and
sometimes even to tangible assets or areas
5
Federated Identity
6
Access Controls Models
7
Discretionary Access Control (DAC)
(Restricting access to objects based on the identity of subjects)
9
Discretionary Access Control (DAC)
File 1 File 2
10
Mandatory Access Control (MAC)
(Restricting access to system resources based on the sensitivity of the information)
12
Mandatory Access Control (MAC)
13
Role-Based Access Control (RBAC)
(The access to is based on an individual's role and a “need to know” )
15
Attribute-based access control
(ABAC)
(A detailed approach to role-based access control, but more granular and much
secure)
16
Administrative Controls
Policies, procedures, or guidelines that define personnel or business practices in
accordance with the organization's security goals.
A. Firewalls
B. Mandatory Access Controls
C. Policy
D. Security Control
5
Q2. An entity that requests access to our assets:
A. Object
B. Application
C. Subject
D. User
6
Q3. An organization would like to implement an authorization mechanism
that would simplify the assignment of various system access permissions
for many users with similar job responsibilities. Which type of
authorization mechanism would be the BEST choice for the organization
to implement?
7
Q4. Which of the following statements BEST describes least
privilege principle in a cloud environment?
8
Q5. Within a large organization, what business unit is BEST
positioned to initiate provisioning and deprovisioning of user
accounts?
A. Internal audit
B. Training department
C. Human resources
D. Information technology (IT)
9
Q6. Which of the following is the PRIMARY purpose of installing a
mantrap within a facility?
A. Control traffic
B. Prevent piggybacking
C. Control air flow
D. Prevent rapid movement
10
Q7. The addition of multiple firewalls to separate untrusted
networks with different security requirements is called:
A. Defense in Depth
B. Patching
C. Least Privilege
D. Access Control
11
Q8. An architectural approach to the design of buildings and
spaces which emphasizes passive features to reduce the
likelihood of criminal activity.
A. Network Protection
B. Monitoring
C. Crime Prevention through Environmental Design (CPTED)
D. Security Guards
12
Q9. Which of the following is MOST important to follow when
developing information security controls for an organization?
14