Identity and Access Management
Identity and Access Management
Management
General Aspects
• Object
• A passive entity that contains information or functionality
• Subject
• A user, program or process that requests access to an object or the
data within an object
• Access
• The flow of information between a subject and an object
• Access control
• Security features that control how user and systems communicate with
each other and the resources
• Access control systems need to applied in a layered defense-in-depth
method
• It is the extremely important first line-of-defense
General Aspects
• Identification
• Describes a method by which a subject claims to have a specific identity
• It is the assertion of unique identity for a person or system
• It is the critical first step in applying access control
• Can be provided by the use of username or account number etc
• Authentication
• Describes a method to validate a subject claims of who it claims it to be
• Authentication involves two step process; entering the public information (identification)
and then entering the private information
• It establishes trust between the user and the system for the allocation of privileges
• Authorization
• Providing access to an authenticated resource based on its rights
• Identification and Authentication are “All or nothing” aspects of access
control, in contrast authorization occupies a wide range of variations
• Accountability
• Keeping a track of actions performed by the subject on an object
• Identification and auditing are the key aspects for ensuring accountability
• Accountability relies on identification and authentication, but it does not
require effective authorization
Authorization Identification
provides provides
control uniqueness
Authentication
provides validity
General Aspects
• Permissions
• Access granted to subject for an object and determines what you can
do with it – tagged to object
• Rights
• Ability to take an action on an object – tagged to subject
• Privileges
• Its is a combination of permissions and rights
Identification and Authentication
• Three general factors for authentication
• Something a person knows (knowledge)
• Something a person has (ownership)
• Something a person is (characteristic)
• Use of more than one factor is called multi-factor authentication
• Multi-factor authentication is the most secure authentication mechanism
• 1:1 Verification
• Measurement of an identity against a single claimed identity
• Access card
• 1:N verification
• Measurement of an identity against multiple identities
• Fingerprint database
• Mutual Authentication
• Two communicating entities must be authenticated to each other before passing data
Identity Proofing and Registration
• Process of collecting and verifying information about a person for the
purpose of providing an account, credential
• It is performed before an account is created or the credential is issued or
special privilege is granted
• It is more lengthy the first time it is created
• FIPS 201-2 is the identity verification chain-of-trust for federal agencies
• Chain-of-trust assures all parties involved, that each participating entity followed a
vetting process to securely and accurately validate an individuals' identity
Ownership • Based on something the user has in • Most commonly used in facility or
Type 2 possession building access control
• Eg: Access card, smart card, ID card • If lost or stolen, it can result in
un-authorized access
Characteristic • Based on physiological and behaviour • It is considered intrusive
Type 3 of a user • It is expensive compared to other
• Eg: Biometric, signature dynamic methods
• It is reliable than other methods
Place • Somewhere you are, based on the • It isn’t reliable on its own, but
place or identifier of the source effective when used in
• Eg: IP based, Geography based combination with other factors
Identification Process
• Creating and issuing identity should involve 3 aspects
• Uniqueness
• The identifiers must have a unique identity to be accountable
• Non-descriptive
• Neither piece of the credential set should indicate the purpose of the account
• Issuance
• Another authority should be providing the identity after proper verification
Identity Management
• Management of uniquely identified entities, their attributes, credentials
and entitlements
• IdM allows organizations to create and manage digital identity life cycles
in a timely and automated fashion
• Goals of IdM technology are:
• Streamline management of identity, authentication, authorization
• Auditing of subjects on multiple systems throughout the organization
IdM - Directories
• Directories contain information pertaining to the companies network resources and users
• It is a specialized database software that is optimized for reading and searching functionality
• It is the main component of an identity management solution
• Most directories follow X.500 standard based hierarchical database format and LDAP as the protocol
• LDAP allows subjects and objects to interact with each other
• SASL (Simple Authentication and Security Layer) for LDAP provides support for a range of
authentication types.
• Directory service
• Manages the entities and data in a directory and also enforces the configured security policy
• It allows administrators to configure and manage how IAA and access control take place
• Active directory is a directory service in windows environments
• It assigns distinguishing names (DN) to each object
• Each DN represents the collection of attributes specific to the object
• Eg: cn:karthikeyan Dhayalan, dc=CyIntegriti,dc=com
Directory Types
Meta-directory Virtual Directory
• Gathers the necessary information from • Gathers the necessary information from
multiple sources and stores it in one central multiple sources and stores the pointers in
repository one central repository
• Synchronizes itself with all identity sources Synchronizes itself with all identity sources
periodically to ensure the up-to date periodically to ensure the up-to date information
information is being used by all applications is being used by all applications
• Physically has the identity data in its • Does not have the identity data, instead only
directory has pointers to where the actual data resides
X.500 Based Directory
• The following rules are for organizing objects in directories that are
based on X.500
• Tree structure directory to organize the entries in a parent-child configuration
• Each entry has an unique name made up of attributes of a specific object
• The attributes are dictated by a defined schema
• The unique identifiers are called distinguished names
• Schema
• It describes the directory structure and what names can be used within the
directory
X.400 Standard
• Controls, what users can access using web browser when accessing
web based enterprise assets
• The WAM software is the gateway between users and the corporate
web-based resources
• This type of access control is commonly put in place to control
external entities requesting access to corporate web based
resources
Single-Sign On
• Allows the user to login one time and then access resources in the
environment without having to authenticate again
• SSO software intercepts requests from network resources and fills in
the necessary identification/authentication information for the user
• If the attacker uncovers the credential, all access will become
available
• It is also a bottleneck or single-point of failure
• It is expensive to implement in large complex environments
IdM - Account Management
• Declaring a match or no match is based on acquired template being similar, but not identical
• Composition Password
• System generated password which includes two unrelated words joined together
with a number or symbol in between
• These are easy for systems to generate but their lifetime should not be for longer
periods because they are vulnerable for password guessing attacks
IdM – One-time password
• System Population
• When system connects to a resource, it supplies the current username and
password, if this is not sufficient CM attempts to supply username and password. All
stored username and passwords are examined from the most specific to the least
specific as appropriate.
Token Device
• A hand held device that has an LCD display and possible keypad
• The token device and the authentication service must be synchronized in some
manner to be able to authenticate a user
• Contactless based
• The smart card has an antenna wire that surrounds the perimeter of the card
• Antenna generates enough energy to power the internal chip
• They are resistant to reverse-engineering and tampering attacks
• They are costlier than normal overhead of card generation
Smart Card Attacks
• Fault Generation Attacks
• Introducing computational errors into the cards with the goal of uncovering the
encryption keys used and stored in the cards
• Some methods include, changing the voltage, clock rate, temperature fluctuation
• Attacker analysis the encryption process with induced error against the correct
results; the results help reverse engineer the encryption process, revealing the key
• Side channel Attacks
• These type of attacks are used to uncover the sensitive information about how they
work without compromising any type of flaw.
• They are primarily used for data collection
• Differential power analysis – examines the power emissions during processing
• Electromagnetic analysis – examines the frequencies emitted
• Timing – how long a specific process takes to complete
Smart Card Attacks
• Software attacks
• Considered non-invasive attacks
• Attack involves inputting instructions into the card to extract information from
the card (primarily account information)
• Good example is the PoS machines are used to swipe money
• Microprobing
• More intrusive attack
• Involves using needles and ultrasonic vibrations to remove the protective
covering over the circuits
• Once removed, data can be extracted by directly tapping into the ROM chips
Radio-Frequency Identification (RFID)
• Technology that provides data communication over the use of Radio
waves
• Two components are involved – Tag and Reader
• Tag has an integrated circuit for storing and processing data,
modulating and demodulating the RF signal
• Reader has built-in antenna for reading and receiving the signal
• This technology can be integrated into smart cards or other mobile
transport technologies for access control purposes
• Security Issue:
• Data can be captured as it passes between tag and reader
• Encryption is not common because RFID is implemented in technologies that
has low processing power
Authorization
• Access Criteria
• Granting access to subject should be based on the level of trust and the
need-to-know
• Can be enforced by roles, groups, location, time and transaction types
Role Based The role is based on job assignment or function
It is an efficient way of providing access for user who performs a certain
task
Group Based Combining users to a group and providing access to the group instead of
individual users
Another effective way of assigning access control rights
Physical or Logical Providing access based on the location of the subject
location Eg: Geo based access, IP based access
Time of day Access restrictions are based on the time of the day or the creation date
(Temporal Isolation) of a file, lifetime for a object
Eg: lean hour access restrictions;
Transaction-type Can be used to control what data is accesses during a certain type of
function and what commands can be carried out on the data
Authorization
• Default to No Access
• If nothing has been specifically configured for the subject, the subject should not have implicit access to any
resources
• Access control to default to blocking all requests until a valid access is provided for the subject ~ implicit
deny rule
• Need to Know
• Subjects should be given access only to the information that they absolutely require for performing their job
duties
• It is similar to least-privilege function
• It is the management’s responsibility to decide on the access rights of the user and how the
access is authorized
• Excessive Privileges
• Occurs when users have more privileges than their assigned work tasks dictate.
• Authorization Creep (creeping privileges)
• Accumulation of excessive rights over time as the user is assigned more and more access rights and
permissions
• Enforcing least privilege will help in addressing this problem.
• Authorization creep results in excessive privileges
• Account reviews are effective at discovering Creeping privileges and excessive privileges
Single Sign-On (SSO)
• It allows a user to enter their credentials one time and access all pre-
authorized resources within the domain
• It improves security by reducing the need for the user to remember
multiple passwords
• It reduces the administrator overhead on time managing the user
accounts
• Major Disadvantage:
• If the credential gets into the hand of the attacker, he has access to all the
resources within the domain; kind of single point of failure
• Single Sign-on Technologies
• Kerberos, Security domains, directory services, thin clients
Kerberos
• Kerberos is a de facto authentication standard for heterogeneous
networks and used in distributed environments
• Its an authentication protocol
• It works on a client/server model
• Uses Symmetric key algorithm
• It has 4 elements necessary for enterprise access control
• Transparency, reliability, scalability, security
• It provides end-to-end security
• Most Kerberos authentications work with shared secret keys, it eliminates
the need to share the passwords over the network
• Trust is the foundation of Kerberos security
• They are extremely time sensitive and often require NTP
Kerberos - components
• Key Distribution Centre (KDC)
• It is the most important component
• It holds all users and services secret keys
• Kerberos 5 uses symmetric AES encryption protocol
• It provides authentication as well as key distribution service
• It provides confidentiality and integrity for authentication traffic using end-to-end encryption and helps prevent
against eavesdropping and replay attacks
• Clients and services must trust the integrity of the KDC
• It provides security services to principals (users, services, applications)
• The KDC must have an account and share a secret key with each principle
• When a KDC provides security services to a set of principles it is called realm
• One KDC can be responsible for one realm or several realms
• Realms are used by administrator to group users or services
• Kerberos is a open protocol allowing vendors to manipulate it to work properly within their products
• Domains are a set of resources available to the subjects within this logical
structure and are working together under the same security policy
• A network directory service contains information about the different resources and the
subjects.
• The directory service develops unique distinguishing names for each object and
appends the corresponding attribute to each object as needed
• The directory service enforces a security policy to control how subjects and objects
interact
• Directory service based on X.500 standard uses LDAP protocol for access request
management
• Users are authenticated only to the central server and then are provided access
to all authorized and necessary services
Digital Identity
• Attributes can be department, role in the company, shift timing, clearance etc
• Federated Identity management systems use SAML and SPML to meet the
requirement for common language between organizations identity process
Federated Identity management Process
• Cross-certification model
• Each entity must authenticate with every other entity is worthy of its trust
• The biggest problem is the scalability issue when more entities start
participating
• Trusted third party model (bridge model)
• Each of the participating entity subscribes to the standard and practices of a
third-party that manages the verification and due diligence process for all
participating companies
• The third-party acts a bridge between the participating organizations for
identity verification purposes.
Access control and Markup Languages
• Markup language is a way to structure text and data sets; and it dictates how to
view and use them
• The use of standard markup language allows for interoperability
• Hypertext Markup Language (HTML)
• it is used to display static web pages.
• It was derived from Standard General Markup Language (SGML) and the Generalized
Markup Language (GML)
• Describes how data is displayed using tags manipulating size and color of text
• Extensible Markup Language (XML)
• XML universal and foundational standard that provides a structure for other independent
markup languages to be built from and still allow for interoperability
Service Provisioning Markup Language (SPML)
• SPML allows for exchange of provisioning data between applications
residing in one organization or between organizations
• It allows for automation of user management, access entitlement
configuration, across multiple provisioning systems
• It allows for integration and interoperation of service provisioning
requests across various platforms
• It is based on Directory Service Markup Language (DSML)
• Has 3 main entities:
• Requesting Authority Entity that is making up the request to setup a new account or change existing
account
• Provisioning service provider software that responds to account requests
• Service Target Entity that carries out provisioning activities on the requested system
Security Assertion Markup Language (SAML)
• XML standard that allows the exchange of authentication and authorization data
between security domains
• It provides the authentication pieces to the Federated Identity management
systems
• There are three components
• Principal – user access requesting
• Identity provider – entity authenticating the user
• Service provider – entity providing service to the user
• SAML does not tell the receiving system how to interpret and use the
authentication data
• Federated identity systems often use SAML and SPML for access needs
• It is used to provided SSO capabilities for browser access
• SAML does not have security mode and relies on TLS for message
confidentiality and digital signature for message integrity
Simple Object Access Protocol (SOAP)
• It is a specification that outlines the way information pertaining to
web services is exchanged in a structure manner
• It is a simple messaging framework to be used by users to request a
service and in turn the service is made available to the user
• Transmission of SAML data takes place over SOAP
• The use of web services in this manner also allows for organization
to provide Service Oriented Architecture (SOA)
• SOA is a way to provide independent services residing in different
applications in different domains in one consistent manner
Extensible Access Control Markup Language (XACML)
• The user authenticates once and then has access to all the
resources participating in the model
• In this model the system behind the initial authentication do not have
any authentication mechanism to speak of
• The fact that the user is able to access the system in the first place
means that the user is authorized
• Eg: Casinos “unlimited Beer”
Other SSO Examples
• SESAME
• Ticket based authentication system developed to address the weakness in
Kerberos
• It did not compensate for all weaknesses and has not be adopted
• KryptoKnight
• Ticket-based authentication system developed by IBM
• They are put in place by the central authoritative entity with the goal
of protecting the most critical assets
• It reviews the previous actions or the current situations and then takes the
decision
Centralized Access Control Administration
• Drawback:
• Since only one entity is responsible for all access decisions, it can be slow
RADIUS
• Network protocol that provides client/server authentication, authorization and audits remote users
• ISPs use RADIUS to authenticate remote users before allowing access to Internet
• Encrypts user’s password only as it is transmitted between the client and the server
• Clipping level or threshold parameters can be set of items for alert trigger
• Audit-reduction tools help discard mundane task information and records events of interest
• The integrity of the audit logs can be ensured with Digital signature, Hashing and strong access
control
• The most significant aspect of ensuring accountability is the culture of the organization
Keystroke Monitoring
• 2 Types
• Signature based
• Pattern matching
• Stateful matching
• Anomaly based
• Statistical anomaly based
• Protocol anomaly based
• Traffic anomaly based
• Rule or heuristic based
Signature Based IDS
• In this model, the initial state is the state prior to the execution of the attack, and
compromised state is the state after successful execution of the attack
• IDS has rules that outline which state transition sequences should sound an
alarm
• Its scans for attack signatures in the context of a stream of activity instead of
looking at individual packets
• The IDS is allowed to learn the network traffic to create a baseline, post which any traffic pattern
that meets a defined threshold variation will trigger an alert
• The key factor is to ensure during learning phase the environment does not have any malicious
activity
• Disadvantages
• Prone to serious false-positives in a complex network
• Need highly skilled security engineers to investigate the alerts
Protocol Anomaly IDS
• They can capture very specific application attack types, but does not
have visibility to more general OS attacks
• Enticement:
• Setting up the environment that allows an attacker to easily hack into
• Entrapment
• Setting up the environment and also indicating the users to perform an action
with an intention of charging them with violation
• It is illegal and cannot be used when charging anyone with hacking attempts
Access Control Threats
• Threat Modelling
• Process of identifying, understanding and categorizing potential threats
• Goal is to identify a potential list of threats to the system and analyze the
threats
• It attempts to identify the attackers goals and categorize them based on the
priority of the underlying assets
Threat Modelling Approaches
• Focused on Assets:
• This method uses asset valuation results and attempts to identify threats to the
valuable assets
• Personnel evaluate the specific threats to determine the susceptibility to attacks
• Focused on Attacker:
• This method focuses on identifying the attackers and identify the threats they
represent based on the attackers goals
• Commonly used by governments
• Challenge is that this approach will not be able to consider new threats that may not
be anticipated
• Focused on Software:
• Organization developing software consider potential threats to the software
Access control Attacks
• Access Aggregation Attacks
• Collecting multiple pieces of non-sensitive information and combining them
to learn sensitive information
• Reconnaissance attacks are access aggregation attacks
• Combining defense-in-depth, need-to-know and least privilege helps prevent
access aggregation attacks
• Dictionary Password Attacks
• Attempt to discover password by using every possible password in a pre-
defined database
• Includes character combinations commonly used as password, but not found
in dictionary
• It can scan for one-upped-constructed passwords
Access control Attacks
• Brute-force Attacks
• Attempts to discover passwords for user accounts by systematically attempting all combinations
of letters, numbers, symbols.
• Uses comparative analysis to guess the password from the hash files
• Rainbow tables
• Its a database of precomputed password hashes that can be used by password crackers to
brute force password attacks
• It significantly reduces the time it takes to crack a password
• Sniffing Attack (Snooping)
• A tool that can capture network traffic.
• If it has capability to understand and interpret individual protocols it is called as protocol analyzer
• Sniffers are dangerous and very hard to detect
• Their activities are difficult to audit
Access control Attacks
• Spoofing attack
• Also known as masquerading attack
• Pretending to be something, someone
• Email spoofing, phone number spoofing, IP spoofing
• Login spoofing attack can be mitigated by trusted path
• Shoulder Surfing
• Looking over the shoulder of an individual to read information on the screen
• Screen filters help restrict this attack
• Phishing
• Tricking users to give sensitive information
• Spear phishing is a phishing attack targeted to a specific group
• Whaling is a phishing attack that is targeted to senior or high profile executives
• Vishing is a phishing variant that uses phone or voip.
Karthikeyan Dhayalan
MD & Chief Security Partner