Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
Welcome to cyber is video Siris on the company s security plus 5 +01 certification and exam.
00:07
I'm your instructor, Ron Warner.
00:11
This video is on section 4.4.
00:15
This is the last section of domain for an identity and access management, and it requires you to differentiate common account management practices.
00:24
One of the most fundamental aspects of network security is account management.
00:29
All authorized users must have accounts with the appropriate access level and permissions to allow those users to access. The resource is they need to on the network.
00:39
At the same time, Attackers are always seeking to compromise an account so they can also access the network. Resource is
00:46
in this section will cover general concepts of accountant access management,
00:51
the different types of accounts you'll find on any computer system and how to set end and four standard account policies.
01:00
There are standard account management concepts you need to understand for both the security plus exam and as a security professional
01:07
thes apply to any technology industry organization, et cetera.
01:12
The first concept is on boarding an off boarding when an employee joins an organization and when they leave the organization,
01:21
it's the process you'll work through often with human resource is and management on boarding is that process of creating an identity profile and the necessary information required to describe that identity onboard and can also include registering the user's assets, such as a computer, mobile assets, maybe even B Y o d.
01:41
Then pro visioning.
01:42
They're permissions to different applications. Files folders within the corporate network off boarding as that opposite part. How do you handle when an employee leaves the organization? You need to remove any access as quickly as possible.
01:57
User identities that are no longer require access to the environment should be disabled or deactivated,
02:04
eventually deleted from the environment. Based on your organizational policy, the second concept is requiring a standard naming convention. For example, might be first, initial and incomplete. Last name John Doe would be J dough.
02:20
The challenge with that is that it's easily decibel. So if I'm able to gain an act loyally list of your organization, I'll know their identity,
02:29
which is half of the user i d. Password combination.
02:32
Many companies then use a generic type of a user. I'd say a letter followed by a random set of numbers won't necessarily one of you sequential numbers, because if I'm user you 1234 then the next person would be you. 1235 again could be easily guessed. Make it somewhat random.
02:53
You may also want to separate out administrator accounts
02:57
so an administrative user will have a separate user i D. But also based on a standard naming convention,
03:06
the concept of least privileges when we've covered multiple times in this video. Siri's.
03:12
It's an access control practice in which a Logan is provided only the minimum access to the resource is required to perform its tasks. So as an employee, I'm only given access to a certain subset of assets
03:25
only those that I need to do my job to remember. The phrase less is more when considering the security principle.
03:34
When it comes to setting restrictions for user I. D. S. One way is time based.
03:39
You only allow employees to log in between 8 a.m. and 5 p.m. For example, if you know that's the only time they'll be
03:47
needing to access the corporate network or if you have Children, maybe you restrict access from 10 p.m. To 6 a.m.
03:57
You can also use location based policies
04:00
I'm always signing in from the corporate office in one particular city. For my user. I d should never sign in from a different location.
04:09
And if it does, it should throw an error.
04:12
Maybe they'll send an alert or will just deny access altogether.
04:15
Users from general concepts To keep in mind with user account management,
04:21
hear additional general access control concepts you need to keep in mind.
04:28
One is tied back to what we talked about in the earlier video on role based access control were group based access where if you're a member of a particular group, you have access to a set of resource. Is
04:42
he mighta tends to be all or nothing. If you're in that group you have access to. All of the resource is within that group. It's hard to create that subset
04:50
periodically. You need to perform some type of an account maintenance where you evaluate the accounts within your infrastructure to remove those that are no longer needed. Are valid.
05:02
Also included that with this is a privilege audit review the different privileges associated with accounts being sure they have that least privilege this is tied to the idea of that re certification. Were managers re certify each of his or her employees that the access is appropriate and access that is
05:21
in abundance should be removed?
05:25
This reduces that risk of permissions. Creep,
05:28
permissions. Crepe happens in many organizations. It's where an employee who's been there for a long period of time had many different jobs or roles within. The company now has access to every act every resource, every asset, every folder file.
05:44
Their permission just grows and grows because no one ever says, Hey, I wantto lose permissions
05:49
so periodically you should recertify and remove any access, any privileges that are no longer needed.
05:58
You should also consider that usage auditing where you're watching what people are doing through the your centralized log management system or security incident. An event management s I E. M.
06:10
All of these air necessary steps to make sure access is controlled appropriately based on your organization's policies.
06:18
Now that you understand general account management concepts, let's talk about account types you'll find on computer systems. The first step in creating secure accounts is to be certain you have different account types for different users and the different uses for those accounts first, is that general user account These air human accounts
06:38
tied back to a human being within your organization.
06:42
Next is guest accounts. These are temporary accounts that are used for very limited piece of time, not tied to a specific individual.
06:53
Sometimes WiFi access will be using a guest type of an account. Thes should be disabled by default, with minimal privileges and time limits. Shared account in generic accounts. Sometimes you have the need to share common logging.
07:08
One user i d for an application shared amongst maybe five or six employees.
07:13
The downside. No repudiation, no tracking. Who used it When someone uses that shared I D. You don't know which individual, So an example could be a conference room account or kiosk computer with shared
07:28
and generic account. You want to restrict their access time limits as much as possible.
07:33
Last thing to consider is changing the names of all the default system accounts. I'll show you how this is done within Windows infrastructure before example, Guest account is standard on a Windows operating system, so change the name of that account. That way, people won't know the identity even if it is disabled.
07:54
There are two other types of accounts you need to be aware off.
07:58
One being service accounts. They're used by computer systems or applications. A database application at a Web server needs to access. In order to take information from the Web server and put it into the database
08:11
that's considered a service account or an application account, you should restrict human use as much as possible.
08:18
What I've done with these accounts, it will set a very long password, say 25 characters that could never be guessed by human. Easy for a machine to remember. You want to also restrict those access, rights, permissions and authorizations so the Web server can Onley use this account to access the backend database server.
08:37
No other resource is could be accessed with that resource account. Name
08:43
the other type of account to be aware of our administrator account or privileged accounts in Windows. It's commonly known as the Administrator account in Lenox. It's the route account. If you have users with a requirement for administrative privileges, they should have their own user i d. For general purpose years
09:01
and then on, Lee used their administrator account when it's needed to perform administrative functions. Common examples. You'll see on operating systems to help restrict Administrator uses Windows You a C user account control. Lennox Pseudo s u D O.
09:20
Is used to run as
09:22
an administrative user. Very powerful way to keep least privilege in place on all of your computer systems, as previously mentioned. Always restrict authorization as much as possible.
09:35
Onley allow users to do the minimum they need to do their job, particularly with those enhanced privileges associated with administrator or root,
09:46
and then increase the logging. Watch what is done with those accounts
09:50
because with UM, you can cause a lot of damage.
09:52
So be ready to react if there's an issue associated with an administrator or root account.
10:01
In these last two slides, I discussed a few common types of accounts.
10:07
Now let's talk about account policy, management and enforcement.
10:13
As the number of systems and users grows in an organization account, policy enforcement becomes critical.
10:20
Therefore, set account policies that defined strong security for your systems
10:26
account policies are a subset of the policies, configurable and a group policy.
10:31
I'll start by walking through some general concepts and then provide specific examples for each.
10:37
All credentials whether simple log on passwords or complex encryption keys should carry a built in lifetime that ensures their termination
10:46
even if they were lost, were for gotten. You don't have an account that stays active forever. For example,
10:52
auditing procedures need to reveal long term inactive accounts and machine accounts that should be re routinely expired and re established to protect against long term attacks. Limit exploitation if they're compromised during normal period of use.
11:11
Active directory domains. Use group policy objects or GPO's to store a wide variety of configuration information, including password policy settings, auditing settings. Those many other configuration items show this in a moment.
11:28
Password policy settings for active directory would be set within the domain.
11:33
Password must meet a complexity requirement policy within the Windows operating system. Determine whether the passwords meet certain criteria for a strong password.
11:43
For example, password should not include the user's name, so whether their actual name or their user, i D or any other attributes that could be associated with that user
11:54
must contain three of these four categories. Uppercase characters, lower case characters, special character, special symbols or numbers should have a specific length and time limit that they are allowed to persist.
12:11
Passwords may also be set, and accounts may be set to expire, requiring them to be changed periodically.
12:18
Also, keep in mind how do you recover passwords that have been lost?
12:24
Do you go through a help desk or do you have a side channel?
12:28
The recovery could be a back door into your system. You need to make sure it's just a strong as the main entry through the password,
12:37
Then your process for disabling and locking accounts
12:41
are they automatically locked, say, after a set number of times of miss typing, a password
12:48
setting automatically disable. You can also set the time period to automatically re enable
12:54
Let's look at some of these settings within a typical Windows domain.
13:00
A standard Windows client or server such as Window seven, Windows 10 or Server 2012 2016
13:07
comes enabled with password policies on your screen. You see what it looks like within the local security policy. This would be local to a computer, but it's very similar to how it works within the group Policy Objects or GPO's.
13:24
You see here enforced password history. How many passwords you need to. The computer must remember typical setting would be 10
13:33
maximum password age. How long until the user needs to reset the password?
13:39
This prevents someone who's able to gain access to the account through a password from being able to have access for a long period of time. Because once you change the password that access goes away.
13:52
Minimum password age. You don't want users to change back to a pre known password. For example, my password is
14:00
password, for example,
14:01
even if you're remembering the history Aiken from don't have a minimum password agent I can quickly cycle through. So a typical minimum password eight would be one day
14:13
password length. How long you want the password to be
14:16
and typical tends to be a character's, although longer, of course, is better. It's a required to meet complexity requirements. As I mentioned those three out of those four categories.
14:28
Also within Microsoft local or group policies,
14:33
they will count lockout duration. How long will the account be locked out? Say if I miss type the password.
14:41
What's the threshold? How many invalid attempt so say five attempts. So on the sixth attempt, the count is locked out for that time period.
14:48
And then how quickly do you reset the counter? So I just fat finger my password.
14:54
Maybe you have it reset back to zero after 15 minutes, and all of these should be set by your organizational policy.
15:05
Auditing capabilities are also inherent within Windows operating systems, and you see some of those settings on your screen.
15:13
You can set
15:15
each of these based on whether there is a success or failure.
15:20
I recommend reviewing each of these because you may encounter them in your life. It's a security professional and provides a good overview how this works for your security plus exam.
15:31
The last item I want to discuss on Windows account policies are all of the other settings
15:39
you see here on your screen, just in example of a few.
15:43
For example, you can rename the administrator account because I know on any Windows system there's most likely a user I d. By the name of Administrator.
15:52
That gives me again half of the combination of a user I D and password. So consider changing that to some other value. Some other name
16:00
guest similar
16:03
renamed the Guest Account. You can also and should also disable the guest account.
16:08
Numerous other settings recommend you review become familiar with them as they provide a good basis for understanding this section.
16:18
As you see here, Lennox has very similar type of settings, so if you learn how to do it within Windows, you comply that same philosophy and concept
16:29
within a Lennox system
16:30
for security. Plus, you don't need to know the specifics for an operating system. But as you see, the ideas are all very similar. So if you can learn it for one, say Lennox, you can interpret it for Windows environment, or vice versa.
16:48
This concludes the lecture portion of Section 4.4.
16:52
Given a scenario differentiate common Account management practices.
16:56
Let's practice on a few sample quiz questions.
17:00
Question one.
17:02
Juan is a database administrator for his organization.
17:06
He's setting up a new man sequel server system and needs to establish an account for it.
17:11
Which of the following would be the best type of account for this year's?
17:17
The answer is a A service account
17:19
attaching to the sequel or database server
17:23
not to be used by a human
17:26
question, too.
17:29
What is the name of the annual auditing process whereby you determine, if given account, continue to require a set of privileges.
17:37
The answer is C
17:40
re certification
17:41
annual. We re certify or justify
17:45
the access and permissions to any account.
17:48
This concludes the video for section 4.4.
17:52
Please refer to your study material for more information on this section.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor