IAM Material - Midsem
IAM Material - Midsem
The consequences of weak or nonexistent access controls range from inconvenient to downright
disastrous, depending on the nature of the resources being protected. For the average user, it may
be a personal invasion of privacy to have someone else reading your email. On the other
hand, without strong access controls, companies could lose billions of dollars when disgruntled
employees bring down mission-critical systems. Identity theft is a major concern in modern life
because so much of our private information is stored in accessible databases. The only way that
information can be both useful and safe is through solid access controls.
Access control is the formalization of those rules for allowing or denying access. Access controls
define the allowable interactions between subjects and objects. It is based on the granting of
rights, or privileges, to a subject concerning an object.
Any time you have to decide whether to allow or deny access by a subject to a resource, you
have entered the access control problem domain.
Organizations typically use procedures and tools together to enforce policies. For
example, most companies have strict policies to determine who has access to
personnel records. These records contain sensitive and confidential information that
could be used to inflict serious harm on individual employees and the company as a
whole if those records were compromised. The policy may state that only employees
within the human resources department, with a specific need for the information
contained within a given record, may have access to it.
There are three types of subjects when it comes to access control for a specific
resource:
Identification
The first step in any access control process is identification. The system must be
able to apply labels to the two parts of the access equation: the subject and the
object.
Authentication
Authentication builds upon identification by requiring that the subject provide proof of
identity. There are many ways to authenticate a subject. The most common ones are:
Most authentication systems require only a single authentication factor, but those
protecting highly sensitive assets might use multiple factors. The three most
common factors are:
Authorization
Once a subject has identified him- or herself and the access control system
authenticates the subject’s identity, the access control system must determine
whether the subject is authorized to access the requested resources. Authorization
is a set of rights defined for a subject and an object. They are based on the subject’s
identity.
Most IT professionals spend their time focusing on logical access controls: the tools
used to provide identification, authentication, and authorization for computer
systems.
Authentication Factors
For access to highly sensitive data, you might combine the first two factors,
requiring a token just to access the login screen, where the user would enter his or
her username and password. The most sensitive data are protected by all three
factors.
Biometric Authentication:
Ownership-Based Authentication:
Ownership-based authentication is a security approach that focuses on confirming
an individual's ownership of a specific device or object as a means of
authentication. This method is particularly relevant in the context of Internet of
Things (IoT) devices, which may need to verify that a person has physical
possession of a device before granting access or control.
firms may use technical measures such as a radio-frequency identification (RFID)-enabled badge
reader, combined with administrative measures, such as training employees to scrutinize the
identity badges of people they don’t recognize. A policy cannot prevent an information leak if
employees regularly hold open the lab doors and allow each other to enter without swiping their
ID badge, a threat known as piggybacking.
Classification of Information
Information classification assigns information to different categories based on its
sensitivity. Both nations and many major corporations have sensitive information
that gets classified, limiting its availability both to the organization and to the
outside world.
Classification Schemes
A classification scheme is a method of organizing sensitive information into
various access levels. Only a person with the approved level of access is allowed to
view the information. This access is called clearance. Every organization has its
own method of determining clearance levels. The methods usually include a
background check, interviews, and a determination of the user’s need for the
information. Most nations and many corporations have classification schemes set up
to handle the organization and access of sensitive information.
National Security Classification
The government classifies sensitive information into four main categories based on
the degree of damage that would occur to national security if the information were
disclosed in an unauthorized manner. Individuals cleared for a particular
classification level may access information at that level and below, provided that
they have a specific need to know the particular information in question. The four
classification levels used by the government are:
Likewise, information that was of Top Secret importance in 1939 may no longer be
sensitive enough to be classified at all.
Corporations
The classification schemes used by private organizations vary widely but often share
some elements with the government scheme. One commonly used approach to
corporate classification has the following classification levels:
NOTE
The RTI Act, or the Right to Information Act, is a legislation enacted by the
Government of India in 2005 to promote transparency and accountability in
government operations. It empowers citizens of India to access information held
by public authorities, making the government more open and accountable to its
citizens. The RTI Act is one of the most important tools for promoting
transparency and fighting corruption in India.
● Right to Information: Under this law, every citizen of India has the right to
request information from public authorities. Public authorities encompass
government departments, ministries, public sector undertakings, and any
organization that is substantially funded by the government.
● Application Process: To request information, a citizen must submit a
written application to the relevant public information officer (PIO) of the
concerned department or agency. The application can be submitted in
English, Hindi, or the official language of the state where the request is
made.
● Timeframe for Response: The RTI Act stipulates that information should
be provided to the applicant within 30 days from the date of the request. In
some cases, this period may be extended to 45 days, with the applicant
being informed about the extension and the reasons for it.
● Exceptions: While the RTI Act promotes transparency, it also recognizes
certain exemptions where information cannot be disclosed. These
exceptions include matters related to national security, personal privacy,
and certain confidential government documents.
● Fee Structure: Public authorities are allowed to charge a nominal fee for
providing information. The fee varies depending on the type of information
and the format in which it is provided. For individuals below the poverty
line, there are fee waivers available.
● Appeals: If an applicant is not satisfied with the response received from the
PIO, they can file an appeal with the relevant appellate authority, typically
within 30 days. Further appeals can be made to the Information
Commission if needed.
● Protection for Whistleblowers: The RTI Act includes provisions to protect
whistleblowers who expose corruption or wrongdoing in government
organizations. It aims to shield individuals who use the Act to expose
malpractices from retaliation.
● Transparency and Accountability: The RTI Act has been instrumental in
promoting transparency and accountability in various government
activities, including the allocation of resources, decision-making processes,
and public expenditure.
The Right to Information Act has played a crucial role in empowering citizens and
enabling them to hold the government accountable for its actions. It has been used
to uncover instances of corruption, misuse of public funds, and other irregularities,
leading to increased transparency and improved governance in India. However, the
effective implementation of the Act and the timely provision of information can
vary across different government departments and regions.
Corporations
The classification schemes used by private organizations vary widely but often share
some elements with the government scheme. One commonly used approach to
corporate classification has the following classification levels:
Declassification is the process used to move a classified document into the public
domain. Every country and organization that classifies documents has a method of
declassification. Let’s look at the
U.S. model as a baseline.
There are four ways a U.S. government document can become declassified:
Automatic declassification
Automatic declassification happens with any document over 25 years old. Unless
it meets strict criteria, the document is automatically declassified after the
department that owns the document reviews it. It is then moved to the publicly
accessible shelves of the national archives.
Systematic declassification
With systematic declassification, any document that is under 25 years old but of
significant importance to the historic record of the United States is reviewed for
early declassification. Once identified, these documents go through the same
procedures as automatically declassified documents.
FOIA request
Protection of this information is mandated by numerous federal and state laws, and
any security breaches must be disclosed in a timely manner. It is especially tightly
controlled in the healthcare and financial industries.
Data Quality and Integrity: Is the organization taking appropriate steps to ensure
the quality and integrity of PII that it collects and maintains?
Valuation of Information
The value of information depends on both its strategic and tactical importance to
the organization and the impact on the organization’s business if that information
were disclosed, changed, or destroyed without permission. Some information, such
as federally protected health information, if improperly disclosed, can cost an
organization millions of dollars in fines, and even lead to prison sentences for those
responsible for the disclosure.
Cost-Benefit Analysis
A cost-benefit analysis is essentially a pro-and-con list that helps businesses make
decisions. To decide whether a given piece of information justifies the effort and
investment of access controls, consider two factors: the advantage gained from
keeping the information secret and the risks avoided by controlling access to the
information.
Advantage Gained
One consideration of access control is that of advantage. Does a company gain an
advantage from securing its information? Could its competitors gain a similar
advantage if they had access to the information? Is the information already secret?
Risk Avoided
Another consideration of access control is risk. As you read earlier in this chapter,
there can be significant penalties for allowing sensitive information to be disclosed,
even if the disclosure is purely accidental. Every organization should know what
information it possesses and how important that information is in terms of access
control. Organizations should also be aware of negative consequences that could
arise if that information is not adequately secured.
The inventory of information assets (also called “intellectual property”) can help you
determine what should be classified and what information is not important or
advantageous enough to warrant access control resources.
The list of threats and vulnerabilities is another guideline you can follow when deciding
what to secure. When taking this approach, you might choose to secure the most
vulnerable assets first.information makes it more crucial to secure information that may
not otherwise be considered a top priority. The fact that it can be used to obtain more
critical information makes it critical itself.
Business Facilitation
Information is the backbone of many business processes. In manufacturing, inventory and
order numbers determine how productive the assembly line must be in any given week. In
the financial industry, constantly changing stock prices dictate buy and sell decisions.
Controlling who has access to this information, and at what level, is critical for facilitating
the day-to-day operations of a business.
Access Levels
In terms of business facilitation, there are essentially three levels of information access: no
access, read access, and read-write access.
Restricting Access
Restricting access to information can be a way to ensure productivity in business
processes. Access restrictions to information can also be a way to ensure that a
consistent message is conveyed throughout the organization. When information has
one author—one individual with read-write access— you can easily verify that the
information is accurate and has not been changed.
Cost Containment
What would it cost a company if a given piece of information were released to the
public? This is the essential question to ask when determining whether to secure
information from a cost-containment perspective. In some cases, there may be
actual monetary fines for releasing information. A more likely scenario is that the
cost to the company would be measured in terms of a competitive advantage or lost
productivity.
The cost containment benefits of access controls must be balanced with the cost of
those restrictions. There are overhead costs involved in any effort to restrict access
to information. It does not make sense to spend large amounts of time and money
developing a customized access control system to protect information with little or
no value.
Operational Efficiency
There is such a thing as too much information, and too much of the wrong
information. The key to operational efficiency is in giving the right people the right
information, at the right time. The following factors are discussed in this section:
If a warehouse manager comes into work on Monday morning and finds the
quarterly financial report on her desk instead of the inventory report, she cannot do
her job. She has to track down the necessary information, costing her valuable
time. The warehouse manager has no immediate need for the financial report
(although if she is vested in the company, she may be interested in the
information), so having access to the report does not increase her efficiency. The
inventory report, on the other hand, is information she has a direct need for. In IT, it
is your job to ensure that the warehouse manager has the inventory report on
Monday morning and has access to the financial report only upon request.
If the wrong people have access to information, productivity can come to a halt. If
a customer can change the details of his or her order after it has already been
assembled, there can be a breakdown in processes and efficiencies. The same thing
can happen if too many people are brought into a decision-making process.
IT Risk Management
The risk assessment itself can be considered sensitive information. The risk
assessment report contains a number of pieces of information that could have a
devastating effect in the wrong hands:
Vulnerability Assessment
For a risk assessment to be useful, it must look at the weaknesses in the
infrastructure. Every system has weaknesses. They are an unavoidable fact of life.
The point of a risk assessment is to look honestly at those weaknesses and
determine how to eliminate them or minimize their impact.
Threat Assessment
A threat assessment is similar to a vulnerability assessment, with one slight
difference. While the vulnerability assessment looks at weaknesses within the
existing infrastructure, the threat assessment deals with the potential for those
weaknesses to be exploited.
Mitigation Plans
A risk assessment usually has a section that details plans to mitigate the
vulnerabilities and risks described in the previous two sections. If an attacker has
those mitigation plans, he knows how much time he has before a given attack is no
longer effective. He can also pick apart those plans, looking for new vulnerabilities
that may be introduced in the course of mitigating older vulnerabilities.
Risk-Assessment Policies
The final section of a risk-assessment report is usually a description of the
company’s policies governing how often a risk assessment should be carried out,
what methods should be used, and who should be involved. It also contains a list
of individuals who will receive a copy of the report.
Some information is confidential internally Trade secrets and business plans are some
and externally. Salary and benefit of the information that should be secured
information is a classic example of from external disclosure. You learned
privileged information that must be earlier in this chapter the consequences of
controlled internally. Certain employees failing to secure that type of confidential
have a right to salary information, while information, but it is crucial enough to
most do not. warrant repeating it. In most cases, the cost
(in time and resources) of implementing
access controls to protect confidential
information is justified by the penalties for
failure to do so.
1. Contractors
When outside contractors are hired to provide products or services to an
organization, they often require information that could be considered confidential.
A good example of this is an external consultant. In many cases, external
consultants are either self-employed or employed by a consulting firm and work on
an hourly basis for the client company. They are generally highly skilled
professionals who are brought in to work on a specific project. When the project is
finished, they move on to the next client company. Some client companies hire
contractors indefinitely, so in day-to- day practice, they are just like regular
employees of the company.
2. Vendors
A good example of this scenario is an insurance company that outsources its claims
management application to a third-party vendor. The vendor runs the application on
its servers, allowing the insurance agents to access it from any browser. This is
convenient for the agents, who can submit a claim report directly from the site of the
incident. It is also convenient for the insurance company because it no longer has to
maintain and update its own servers.
As business needs evolve, so do the partnerships that meet those needs. In the realm
of access control, the key thing to remember is that the owner of the confidential
information—the client company— is responsible for ensuring that it is handled
securely. If the client company fails to do due diligence and hires a third party
without investigating the third party’s access control policies, the client company
can be held partly responsible for the inevitable disclosure of confidential
information.
Chapter 3 Human Nature and Organizational Behavior
Human nature is the sum of qualities and traits shared by all humans.
Human nature affects how we interpret events, how we react to others, and the choices we
make every day. It is grounded in thousands of years of evolutionary history.
Although human nature is an important element of who we are and what we do, it
does not completely control us. We can choose to act contrary to human nature when
we believe it suits our best interests or to fulfill some deeper need. Generally, human
nature dictates that we should follow societal norms and avoid punishment, yet
some people choose to violate those norms. Some people who make these choices
feel that they have no viable alternatives, while others simply discount the
probability that they will be caught and punished.
The majority of hackers fall into this category. They are highly intelligent and
believe firmly that they are smart enough not to get caught.
Social Engineering
Social engineering techniques are often used to gain the information required to
conduct identity theft or defeat access control systems.
Applicant’s Rights
Some things to watch for when identifying potentially disgruntled employees are:
● Lock the terminated employee’s workstation and network accounts and back
up data prior to the termination meeting. This will prevent the employee
from causing damage after receiving notice of the termination decision.
● Lock or remove accounts on databases and file servers prior to or during the
termination meeting. Change all passwords, especially those to online
accounts that the terminated employee could access from outside the
organization, prior to the termination meeting.
● Arrange for company property to be returned. This may include a corporate
mobile phone, tablet, keys, a company car, an ID badge, a parking pass, a
laptop computer, client files, and contact lists. A terminated employee
could use these items to gain unauthorized access to facilities or data.
● Consider how the terminated employee will be allowed to retrieve personal
belongings after the termination meeting. After the meeting, the employee
should be considered a potentially
● hostile visitor to the facility and appropriate physical security measures
should be taken. The employee should not be allowed to return to his or her
office or another area of the facility unescorted.
● Consider whether security should be called to escort the terminated
employee out of the building after the termination meeting.
● Change the locks on the terminated employee’s office door and change
keypad codes as needed. Lock or remove the terminated employee’s email
account. If the email account is left active, the employee could use that
account to send seemingly official emails containing sensitive information to
clients or members of the media.
● Change the terminated employee’s voicemail message and forward his or her
office phone to another employee or to a manager. Change the personal
identification number (PIN) on the voicemail system.
Cross-Training: Job rotation can enhance the skills and knowledge of employees by exposing
them to different facets of the organization. It can lead to a more versatile and adaptable
workforce.
Access Control: IAM systems play a crucial role in implementing job rotation. Access
permissions must be adjusted and audited as employees move between roles to ensure that they
have appropriate access based on their new responsibilities.
Position Sensitivity:
Access Control: Position sensitivity informs the access control policies and permissions within
an IAM system. Different positions may require varying levels of access to data and systems, and
position sensitivity helps define those access levels.
Data Classification: Organizations often classify their data into categories such as public,
internal, confidential, and highly sensitive. Position sensitivity is aligned with these
classifications, ensuring that employees in sensitive roles have appropriate access to
corresponding data.
Regular Review: Position sensitivity should be regularly reviewed and updated to reflect
changes in an organization's structure, technology, or business processes. As roles evolve, so do
their sensitivity levels and associated access requirements.
Training and Awareness: Employees in sensitive positions should receive appropriate training
and awareness programs to understand their responsibilities regarding data protection and
security.
Reducing Risk: SoD helps mitigate risks associated with both intentional and unintentional
security breaches. By dividing responsibilities, it becomes more challenging for a single user to
carry out malicious actions or make mistakes that could lead to security incidents.
Access Control: IAM systems are used to enforce SoD by defining and managing user roles and
permissions. Access requests that violate SoD policies can trigger alerts or require additional
approvals.
Regular Review: SoD policies should be regularly reviewed and updated to reflect changes in
an organization's structure, processes, or technology. As roles evolve, SoD requirements may
change as well.
Two-Person Control:
Two-Person Control, also known as dual control or dual authorization, is a security practice that
requires the involvement of at least two authorized individuals to perform certain critical tasks or
access sensitive information. It is often used in high-security environments where the risk of
unauthorized access or misuse is significant.
Enhancing Security: Two-Person Control adds an extra layer of security by ensuring that no
single individual can carry out sensitive actions independently. This can include actions like
authorizing large financial transactions, accessing highly classified data, or making critical
system changes.
Reducing Insider Threats: It helps mitigate insider threats because it requires collusion
between two insiders to compromise security. This reduces the likelihood of a single rogue
employee causing significant harm.
Auditability: The involvement of two individuals creates a built-in audit trail, making it easier
to track and investigate any suspicious or unauthorized activities.
Separation of Duties (SoD) and Two-Person Control are essential components of IAM that
enhance security by ensuring that responsibilities are distributed and that critical actions require
the involvement of multiple authorized individuals. These practices help organizations protect
sensitive data, reduce the risk of fraud, and meet regulatory compliance requirements.
Ethics in IAM
Ethics in IAM involves adhering to principles and values that promote fairness, transparency,
and respect for individuals' rights while managing access to information and systems. Here are
some best practices for handling ethics in IAM:
Transparency: Clearly communicate the IAM policies, procedures, and access controls to all
employees. Make sure everyone understands how access decisions are made and the
consequences of unauthorized access.
Privacy: Respect individuals' privacy rights by collecting and storing only the necessary
personal information for IAM purposes. Implement data protection measures and comply with
relevant data privacy regulations (e.g., GDPR, CCPA).
Consent: Obtain informed consent from individuals when collecting and using their personal
information for IAM purposes. Allow individuals to control their data and opt-out when possible.
Non-Discrimination: Ensure that IAM policies and practices do not discriminate against
individuals based on factors like race, gender, religion, or disability. Access decisions should be
solely based on job roles and responsibilities.
Audit Trails: Maintain detailed audit logs of access-related activities. These logs should be
protected and regularly reviewed to detect any unethical behavior or policy violations.
Training and Awareness: Provide training and awareness programs to employees to educate
them about the importance of IAM and ethical behavior in access management.
Social Engineering Awareness: Train employees to recognize and resist social engineering
attacks, which often exploit human psychology to gain unauthorized access.
Clear Policies and Guidelines: Establish clear IAM policies and guidelines that align with
organizational values. Ensure that these policies are accessible and well-communicated to all
employees.
Role-Based Access Control (RBAC): Implement RBAC to align access privileges with job
roles. This helps reduce the temptation for individuals to abuse their access rights.
Behavioral Analytics: Use behavioral analytics tools to detect unusual access patterns that may
indicate insider threats or policy violations.
Organizational Culture: Foster a culture of ethics and security within the organization.
Leadership should set a positive example, and ethical behavior should be recognized and
rewarded.
Incident Response: Have a well-defined incident response plan in place to address any breaches
or policy violations promptly and ethically.
Continuous Monitoring: Continuously monitor access activities and regularly review and update
IAM policies and practices to adapt to changes in organizational behavior and technology.