Lesson 8: Implementing Identity and Account Management Controls
Lesson 8: Implementing Identity and Account Management Controls
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Syllabus Objectives Covered
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Identity Management Controls
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Background Check and Onboarding Policies
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Personnel Policies for Privilege Management
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Offboarding Policies
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Security Account Types and Credential Management
• Standard users
• Limited privileges
• Should not be able to change the system configuration
• Restricted to account profile
• Credential management policies for personnel
• Password policy
• Protect access to the account and prevent compromise
• Educate risks from reusing credentials and social engineering
• Guest accounts
• Account with no credentials (anonymous logon)
• Unauthenticated access to hosts and websites
• Must have very limited privileges or be disabled
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Security Group-Based Privileges
• User-assigned privileges
• Assign privileges directly to user
accounts
• Unmanageable if number of users
is large
• Group-based privileges
• Assign permissions to security
groups and assign user accounts
to relevant groups
• Issues with users inheriting
multiple permissions
Images © 123RF.com.
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Administrator/Root Accounts
• Privileged/administrative accounts
• Can change system configuration
• Generic administrator/root/superuser
• User account with full control over system
• Key target for attackers
• Often disabled or usage restricted after install
• Administrator credential policies
• Create specific accounts with least privileges (generic account
prohibition)
• Enforce multifactor authentication
• Default security groups
• Administrators/sudoers
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Service Accounts
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Shared/Generic/Device Accounts and Credentials
• Shared accounts
• Accounts whose credentials are known to more than one person
• Generic accounts
• Accounts created by default on OS install
• Only account available to manage a device
• Might use a default password
• Risks from shared and generic accounts
• Breaks principle of non-repudiation
• Difficult to keep credential secure
• Credential policies for devices
• Privilege access management software
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Secure Shell Keys and Third-party Credentials
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Topic 8B
Implement Account Policies
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Syllabus Objectives Covered
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Account Attributes and Access Policies
• Account attributes
• Security ID, account name,
credential
• Extended profile attributes
• Per-app settings and files
• Access policies
• File permissions
• Access rights
• Active Directory Group
Policy Objects (GPOs)
Screenshot used with permission from Microsoft.
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Account Password Policy Settings
• Length
• Complexity
• Character combinations
• Aging
• History and reuse
• NIST guidance
• Password hints
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Account Restrictions
• Network location
• Connecting from a VLAN or IP subnet/remote IP
• Connecting to a machine type or group (clients versus servers)
• Interactive versus remote logon
• Geolocation
• By IP address
• By Location Services
• Geofencing
• Geotagging
• Time-based restrictions
• Logon hours
• Logon duration
• Impossible travel time/risky login
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Account Audits
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Account Permissions
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Usage Audits
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Account Lockout and Disablement
Screenshot used with permission from Microsoft.
• Disablement
• Login is disabled until manually re-
enabled
• Combine with remote logoff
• Lockout
• Login is prevented for a period
and then re-enabled
• Policies to enforce automatic
lockout
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Topic 8C
Implement Authorization Solutions
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Syllabus Objectives Covered
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Discretionary and Role-Based Access Control
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
File System Security
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Mandatory and Attribute-Based Access Control
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Rule-Based Access Control
• Non-discretionary
• System determines rules, not users
• Conditional access
• Continual authentication
• User account control (UAC)
• Privileged access management
• Policies, procedures, and technical controls to prevent the malicious abuse of
privileged accounts
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Directory Services
• Database of subjects
• Users, computers, security groups/roles, and services
• Access Control Lists (authorizations)
• X.500 and Lightweight Directory Access Protocol (LDAP)
• Distinguished names
• Attribute=Value pairs
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Federation and Attestation
• Federated identity
management
• Networks under separate
administrative control
share users
• Identity providers and
attestation
• Cloud versus on-premises
requirements
Images © 123rf.com.
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Security Assertions Markup Language
<saml p: Response xml ns: saml p=" ur n: oasi s: names: t c: SAML: 2. 0: pr ot ocol "
<saml : I ssuer >ht t ps: / / i dp. f oo/ sso</ saml : I ssuer >
• Attestations/assertions <saml : Asser t i on xml ns: xsi =" ht t p: / / www. w3. or g/ 2001/ XMLSchema- i nst ance"
xml ns: xs=" ht t p: / / www. w3. or g/ 2001/ XMLSchema" I D=" 2000" Ver si on=" 2. 0"
• XML format I ssueI nst ant =" 2020- 01- 01T20: 00: 09Z" >
<saml : I ssuer >ht t ps: / / i dp. f oo/ sso</ saml : I ssuer >
• Signed using XML signature <ds: Si gnat ur e>. . . </ ds: Si gnat ur e>
specification
<saml : Subj ect >. . .
• Communications protocols
<saml : Audi enceRest r i ct i on>. . .
• HTTPS
<saml : At t r i but eSt at ement >
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
OAuth and OpenID Connect
• “User-centric” federated services better suited to consumer
websites
• Representational State Transfer (REST) Application Programming
Interfaces (APIs) (RESTful APIs)
• Framework for implementation not a protocol
• OAuth
• Designed to communicate authorizations rather than explicitly
authenticate a subject
• Client sites and apps interact with OAuth IdPs and resource servers
that hold the principal’s account/data
• Different flow types for server to server or mobile app to server
• JavaScript object notation (JSON) web token (JWT)
• OpenID Connect (OIDC)
• Adds functions and flows to OAuth to support explicit
authentication
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Topic 8D
Explain the Importance of Personnel Policies
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Syllabus Objectives Covered
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Conduct Policies
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35
User and Role-based Training
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 36
Diversity of Training Techniques
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 37
Lesson 8
Summary
CompTIA Security+ Lesson 8 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 38