Learn Access Control (CISSP) with Interactive Flashcards

Master key concepts in Access Control through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Identification and Authentication

Identification and authentication are concepts that work together to ensure that users on a system or network are who they claim to be. Identification refers to the process of collecting unique information about a user, such as a username or an ID number. Authentication, on the other hand, is the process of verifying the identity of the user by comparing the collected identification data against stored information like passwords, biometric data, or security tokens. Together, these concepts enable a system to confirm the legitimacy of users, help maintain the desired level of security, and prevent unauthorized access to sensitive information and resources.

Authorization and Access

Authorization and access are mechanisms that determine the permissions granted to users after they have been successfully authenticated. Authorization refers to the assignment of specific rights, privileges, or permissions to a user based on predefined rules, roles, context, or other criteria. Access, in turn, controls users' ability to interact with resources on a system or network based on their assigned permissions. Access control mechanisms include mandatory access controls (MAC), discretionary access controls (DAC), and role-based access controls (RBAC) to manage access to resources and protect information confidentiality, integrity, and availability.

Accountability and Auditing

Accountability and auditing are essential concepts in access control that ensure users' actions and activities are monitored and recorded to maintain system security and compliance. Accountability refers to the responsibility users have for their actions and their impact on a system or network's security. Auditing is the process of collecting, analyzing, and reporting on activity logs that record user actions and events on a system or network. Together, these concepts provide a means to track user behavior, identify potential security incidents, and ensure that users are held accountable for their actions, protecting information assets from unauthorized access, misuse, or accidental damage.

Physical Access Controls

Physical access controls protect information assets by restricting physical access to computing resources, networks, and facilities. These controls include barriers, locks, access cards, biometric devices, surveillance systems, and security personnel that work together to deter unauthorized access, prevent theft or tampering, and ensure the safety and integrity of information assets. Physical access controls are a critical component of a comprehensive security program as they help maintain the confidentiality, integrity, and availability of information by preventing unauthorized individuals from causing harm, either directly or indirectly, to sensitive resources and data.

Discretionary Access Control

Discretionary Access Control (DAC) is a security model where the owner or creator of an object, such as a file or folder, specifies access permissions for other users or groups. Typically managed using Access Control Lists (ACLs), DAC allows the owner to grant or deny access to resources based on users' individual, group, or role membership. It can be quite flexible, as users can modify access rights for different levels of security depending on their needs. However, it is also sensitive to human error; a user might not fully understand the possible security implications of their permission assignments, which could lead to unauthorized access. Implementing DAC is less restrictive than other access control models, such as Mandatory Access Control (MAC), but can be more vulnerable to inappropriate user control and insider threats.

Mandatory Access Control

Mandatory Access Control (MAC) is a security model that enforces access control by classification levels and labels. In MAC, an administrator or security policy assigns a sensitivity label to each object (such as a file, folder, or application) and a clearance level to each user. Users can only access objects that have sensitivity labels within their clearance level. This way, security administrators can ensure that only authorized users have access to certain information. MAC is more rigid than Discretionary Access Control (DAC) because users cannot modify the access control attributes of resources. This helps prevent unauthorized access, leakage, or sharing of sensitive information. Examples of MAC include Bell-LaPadula (confidentiality-focused) and Biba (integrity-focused) models.

Role-Based Access Control

Role-Based Access Control (RBAC) is a security model that assigns permissions to users based on their defined roles within an organization. The roles typically represent the job functions or responsibilities a user holds, and the permissions are based on the principle of least privilege, whereby users are only granted the minimum necessary access to perform their duties. RBAC provides a centralized and scalable method for managing permissions, reducing administrative effort, and improving security by ensuring users only have access to what they need. Additionally, RBAC can be combined with other access control mechanisms such as Discretionary Access Control (DAC) and Mandatory Access Control (MAC) to create hybrid models tailored to security requirements.

Attribute-Based Access Control

Attribute-Based Access Control (ABAC) is a security model that uses dynamic and flexible policies to determine access permissions. In ABAC, access control decisions are made based on attributes of the user, object, and the environment, as well as predefined rules expressed in a policy. Attributes can be a wide range of characteristics, such as user location, time of day, job role, or security clearance. ABAC provides a fine-grained level of access control with a high degree of flexibility, allowing security administrators to create complex access control policies tailored to their organization's needs. However, ABAC may require more resources than other access control models due to its complex policy evaluation process.

Separation of Duties

Separation of Duties (SoD) is a security principle that divides a critical or sensitive task among multiple individuals to prevent fraud or unauthorized activities. SoD reduces the risk of a single individual having too much control, access, or influence within a system or process, which could lead to them initiating or concealing malicious activities. This principle is often used in financial systems, human resources, and other areas where unauthorized actions could have severe consequences or result in fraud. SoD can be enforced through a variety of methods, including dual controls, where two or more individuals must approve a transaction, or through the implementation of Role-Based Access Control (RBAC) which assigns access permissions based on an individual's role.

Least Privilege

Least privilege is a security principle that enforces the concept of providing the minimum level of access necessary to an individual to perform their job functions. The primary objective of applying the least privilege principle is to maintain strict control over access to sensitive information, systems, or resources, preventing unauthorized actions or misuse. By limiting the scope of permissions, organizations can reduce the risk of accidental or intentional data breaches, unauthorized modification of data, or unintended consequences on critical systems. Key implementation strategies include regular reviews of user access rights, following the principle when assigning permissions and closely monitoring the overall access/activity of personnel.

Time-Based Access Control

Time-based access control is an access control method in which permissions are granted to access resources or systems based on specified time frames or schedules. The purpose of implementing time-based access control is to limit access to sensitive information or systems during less secure times or as an additional security measure for high-risk users. Time-based controls can help minimize potential risks and reduce the exposure of sensitive data to unauthorized individuals, as well as aid in preventing unauthorized access during off-hours or from unsupported locations. Common examples of time-based access control include restricting access to specific hours of the day or only during business hours and implementing access restrictions based on the user's location.

Context-Based Access Control

Context-based access control, also known as dynamic access control, is an access control method where decisions to grant or deny access are made based on the context of the access request. The context may include factors such as the user's role, location, device type, network connection, and time of day, among others. Context-based access control provides a granular, dynamic, and adaptive approach to managing access rights, enhancing security by continuously analyzing relevant factors and adjusting permissions in real-time. This helps to ensure that only authorized individuals with the appropriate contextual conditions are granted access to sensitive resources without affecting legitimate user access and preventing unauthorized access attempts.

Password Policy

A password policy is a set of rules and guidelines established by an organization to ensure the proper creation, use, and management of secure passwords. It aims to reduce the risk of unauthorized access, data breaches, and other security threats arising from the use of weak or compromised passwords. A comprehensive password policy typically covers aspects such as password complexity, length, expiration, reuse restrictions, and storage requirements. Additionally, it may address procedures for password recoveries and resets, guidance on multi-factor authentication, and recommendations for secure password management practices. Having a well-defined password policy is a foundational element of a robust access control strategy, as it promotes the use of strong passwords and helps protect sensitive data and systems from unauthorized access.

Access Control List

An access control list (ACL) is a data structure that stores a set of predefined access permissions for a particular resource, such as a file, directory, or network device. ACLs are commonly used to specify which users or groups of users are allowed or denied access to specific resources, as well as the types of operations they can perform on those resources. Access control lists provide a granular level of control over resource access, allowing administrators to define and manage access rights based on their organization's security requirements and policies. ACLs are a common component of various access control models, such as discretionary, mandatory, and role-based access controls, and play a crucial role in securing an organization's sensitive data and systems.

Go Premium

CISSP Preparation Package (2024)

  • 5693 Superior-grade CISSP practice questions.
  • Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
  • Unlock Effortless CISSP preparation: 5 full exams.
  • 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
  • Bonus: If you upgrade now you get upgraded access to all courses
  • Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!
More Access Control questions
questions (total)