36
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Embed Size (px)

Citation preview

Page 1: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Auditing Logical Access in a Network Environment

Presented By, Eric Booker and Mark Ren

New York State Comptroller’s Office

Network Security Unit

Page 2: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Auditing Logical Access in a Network

Environment

In this presentation we will discuss:

• The fundamental concepts of Logical Access Control and protection of data

• Special considerations for auditing Logical Access in a distributed environment

Page 3: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Auditing Logical Access in a Network Environment

The fundamental concepts of Logical

Access Control and protection of data…

Page 4: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Technical Architecture

Policies and Procedures

Confidentiality,Integrity and Availability

The Fundamental Concepts of Logical Access

Page 5: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Confidentiality

• Confidentiality refers to limiting information access and disclosure to authorized users who have a business need for accessing specific data and preventing access by or disclosure to unauthorized ones.

• Confidentiality is related to the broader concept of data privacy -- limiting access to individuals' personal information.  Federal statutes such as FERPA and HIPAA, set the legal terms of privacy.

Page 6: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

• Integrity refers to the trustworthiness of information resources. 

• It includes the concept of "data integrity" -- namely, that data has not been changed inappropriately, whether by accident or deliberately.  It also includes "origin" or "source integrity" -- that is, that the data actually came from the person or entity you think it did, rather than an imposter.

Integrity

Page 7: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Availability

Availability may be affected by purely technical issues (e.g., a malfunctioning network device or communications device), natural phenomena (e.g., wind or water), or human causes (accidental or deliberate).

Page 8: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Information Owners

Individuals who represent Information Ownersfor the data and tools they use. Information Owners are responsible for determining whoshould have access to protected resources within their jurisdiction based on users’ jobresponsibilities, and what those accessprivileges should be (read, update, etc.).

Page 9: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Information Owners

Information Owners should be identified for all entity information assets and assigned responsibility for the maintenance of appropriate security measures such as assigning and maintaining asset classification and controls, managing user access to their resources, etc.

Page 10: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Data Classification

Information, like other assets, must be properly managed from its creation, through authorized use, to proper disposal. As with other assets, not all information has the same use or value, and therefore information requires different levels of protection. All information should be classified and managed based on its confidentiality, integrity and availability characteristics.

Page 11: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Data Classification

• Information must be classified and protected based on its importance to business activities, risks, and security best practices.

• The Information Owner will classify and secure information within their jurisdiction based on the information’s value, sensitivity to disclosure, consequences of loss or compromise, and ease of recovery.

Page 12: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Access Control

Owners should make all decisions regarding controls, access privileges of users, and daily decisions regarding information management.

Page 13: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Logical Access Control

Computer-based access controls are called Logical Access Controls. Logical Access Controls provide a technical means of controlling what information persons can use, the programs they can run, and the modifications they can make.

Page 14: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Policies and Procedures

Polices are the building blocks of network Logical Access Controls because they describe and document the controls over what level and type of protection is appropriate for individual data resources and who needs access to these resources.

Page 15: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

User Account Lifecycle

Once resource owners have classified data according to its need for protective controls, entities should develop procedures to identify all functions of user management. This should include the generation, modification, and deletion of user accounts for access to the data.

Page 16: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Password Management

Procedures and standards for managing passwords should be implemented to ensure all authorized individuals accessing entity resources follow proven password management practices. These password rules must be mandated by automated system controls whenever possible.

Page 17: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Network Access Control

An Organization needs to develop and implement procedures to protect its trusted internal network. Network controls should be developed and implemented to ensure that an authorized user can access only those network resources and services to perform their assigned job responsibilities.

Page 18: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Technical Architecture

Page 20: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

The main purpose of Active Directory is to provide central authentication and authorization services for Windows based computers. Active Directory also allows administrators to assign policies, deploy software, and apply critical updates to an entire organization.

Page 21: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Active Directory allows for:

• Policy-based administration using Group Policies

• Scalability (domain tree forest)• Replication of information (load

balancing etc.)• Security administration (authentication,

DACLs)• Interoperability

Page 22: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

• Objects (and classes in the schema)• Object Publishing• Domains (trees, forests, trust, OUs)• Delegation and Group Policy concepts

Page 23: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Objects are the entities that make up a network. An object is a distinct, named set of attributes that represents something concrete, such as a user, a printer, or an application. When an Active Directory object is created, it generates values for some of the object's attributes.

Page 24: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Each attribute object can be used in several different schema class objects. These schema objects exist to allow the schema to be extended or modified when necessary.

Page 25: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

The schema keeps track of:

– Classes – Class attributes – Class relationships such as subclasses

(Child classes that inherit attributes from the super class) and super classes (Parent classes).

– Object relationships such as what objects are contained by other objects or what objects contain other objects.

Page 26: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Domains:

–The framework that holds the objects is viewed at a number of levels. At the top of the structure is the Forest - the collection of every object, its attributes and rules (attribute syntax) in the AD.

Page 27: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Domains:

– The forest holds one or more transitive, trust-linked Trees. A tree holds one or more Domain and domain trees, again linked in a transitive trust hierarchy. Domains are identified by their DNS name structure, the namespace. A domain has a single DNS name.

Page 28: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Organizational Units:

– The objects held within a domain can be grouped into containers called Organizational Units (OUs).

Give a domain a hierarchy Ease its administration

Page 29: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Organizational Units:

–The OU is the common level at which to apply group policies, which are AD objects themselves called Group Policy Objects (GPOs), although policies can also be applied to domains or sites .

Page 30: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Organizational Units:

–The OU is the level at which administrative powers are commonly delegated, but granular delegation can be performed on individual objects or attributes as well.

Page 31: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Business Example:

– A Typical structure of a organizationHuman ResourcesPayrollFinance

Page 32: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Active Directory

Business Example:

– As an employee assigned to Human Resources my access should be limited to HR applications and folders

– Likewise HR Data should not be accessible to other business units

Page 33: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Special considerations for auditing logical access in a distributed environment

Auditors should:

– Review organizations policies & procedures

– Compare to known and accepted industry standards

– Test whether users’ data access is tied to their job responsibilities

– Attempt predetermined “hacks” to test for network vulnerabilities that allow for inappropriate data access

Page 34: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Special considerations for auditing logical access in a distributed environment

Demonstration

Page 35: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Links of Interest

http://www.irongeek.com/http://nvd.nist.gov/http://sectools.org/http://johnny.ihackstuff.com/http://www.dirk-loss.de/onlinetoolshttp://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

Page 36: Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit

Questions