Time
10 hours 19 minutes
Difficulty
Intermediate
CEU/CPE
12

Video Transcription

00:05
So let's really quickly talk about technical controls
00:08
and some of the things that you might consider implementing
00:13
access control policies.
00:16
You understand the concept of separation of duties. So the idea that, you know, I should only have access to what I need to know to do my job. If I'm in engineering, do I really need access to accounting data?
00:29
If I'm not an administrator, do I really need administrative credentials on my
00:34
laptop or on my particular system? So separation of duties on lease privilege? You see these getting implemented on moderate and high level systems as a as a requirement,
00:47
you'll see
00:49
that. Sorry, at least four. Um, you know, high level systems administrative counts have to be separate.
00:56
You can't have one user account that functions both as administrator and a regular user account.
01:02
That's why if you're an administrator, usually have two accounts. One for administrative duties, one for user duties,
01:08
non repudiation. If you have to implement this, it's because you want to prove that John sent a communication to David and David received it.
01:19
David knows that John sent it. You can't, uh,
01:23
repudiate. You can't deny that fact so low and moderate systems. You don't have to do this, but for high risk systems, you're looking at things like digital signatures or logging or message receipts. You typically see this with P K I implementations. So you send a sign encrypted message.
01:42
I know that you sent it and you only sent it
01:45
for somebody to compromise your
01:47
certificate in your pin number
01:49
identification
01:51
the idea that you're able to distinguish between people logging into a system and this is very common on just about every other I t system that's out there.
02:01
You can you have accountability here on who logged in when they logged in, and you can assign people rights or privileges based on this authentication or sorry, this identification of people,
02:16
the flip side of that is authentication. So how do you know that I'm Chris? Well, either because I have a password or because of my thumbprint or because of my retina scan, or have a token or something.
02:30
So generally what you see here is if identification is user, i d authorization number will be a pet, or authorization will be a pin number.
02:39
We're a token or something like that.
02:44
There are multi factor authentication systems out there again. Something You know something? You have something you are
02:52
so multi factor means pick two or more. Pick two out of those three. And they have to be different types, so can't be too user names. That's not
03:00
multi factor authentication.
03:06
So for moderate level systems, this is kind of a separation that says you're going tohave. Privileged accounts will use multi factor authentication
03:16
general user accounts. Not a big deal.
03:20
Um, hi, wrist systems. Now you're talking about multi factor authentication for everybody privileged and non privileged accounts.
03:28
So high risk system. They really want to make sure that you are John and you are really logging into this system.
03:35
The way they do that is through the multi multi factor authentication
03:40
boundary protection
03:43
again. All this is saying is that you have you control the communication between the outside and the inside
03:51
of your network. You manage. The interface is such that you can look at that traffic and control. Who can do what
03:58
This is commonly implemented through proxy devices, gateways, firewalls, routers, encrypted tunnels like I P sec or something like that. But your implementation of the boundary protection control will be technical. It'll be one of these devices here
04:15
at the moderate risk. They say that you have to step up a little bit. You have to have a demilitarized zone or separation between public information. What should be public information and what should not be cannot reside on the same system. So this is why you see D M Z
04:32
very common now tohave demilitarized zone, where your Web servers and your public information is all hanging out here in no man's land, you know, compared to the inside of your network.
04:46
So
04:47
for again, for moderate risk, you're trying to limit the number of access points you have. You don't wanna have 20 different gateways out to the Internet because that means 20 different points that you have to monitor.
05:00
You need to have some type of traffic flow policy on that it denies. By exception. That's pretty standard nowadays on firewalls
05:12
for high risk systems. They step this up a little bit more in, say that boundary protection mechanisms must fail close. So if there's a failure or a breach or something like that, the system goes
05:25
and shuts off boundary so that they're no external connections are allowed.
05:30
You also have to use proxy servers now eso either with Web proxies, application proxies or something like that. The idea here is that you're using these systems to proxy your connections and you're hiding
05:43
systems on the internal network
05:46
firewalls. I don't think I need to belabor this. It's just an access control point. This is a technical implementation of a boundary protection requirement.
05:58
So keep in mind for all of these that as you're going through this, your particular control requirement may say boundary protection.
06:06
How do you implement that control
06:11
firewall?
06:12
Maybe,
06:13
Maybe, just ah, router with access control list on it. That's up to you.
06:17
But their specific GYNs in 800-53 which will tell you these are the requirements you need to meet. So you might need to do like Mac filtering or I p filtering based on whether you're a low, medium or high risk system
06:33
Cryptography. This is how confidentiality is implemented. You have to do this across all the baselines
06:42
insures that whatever information you're transmitting is not, ah, viewable by others. You have authentication and non repudiation. If you're using certain crystal cryptography methods,
06:55
how would you implement this in your systems?
06:59
If you came across a control that said security control cryptography
07:03
again, implementation is left up to you as a risk manager. How would you implement cryptography in your organization?
07:14
P k I A way. A lot of people do it
07:16
because with p k, Iike an encrypted e mails,
07:19
Um, I can sign email so people know I have I have authentication, usually those air tied to, like, a cat card or something. So now I've got my log on information in there as well.
07:31
That's how you validate my identity.
07:34
How else would you do it?
07:38
Think VPN
07:40
right? Virtual private network. So I've got a VPN tunnel from the outside i p sec tunnel.
07:45
Any of those sorts of things
07:47
you might decide that your requirements are stringent enough that you actually have to have a dedicated crypto device. Like, you know,
07:55
kg, 84 kids, seven or one of those bulk encrypt er's that transmit or it. Sorry. Bulk encrypt transmission, pass
08:01
or lines.
08:03
Maybe I don't know
08:07
which ones you pick is gonna be up to you. The requirement the control requirements says you have to have cryptography.
08:13
Okay,
08:15
how you implement it again as the responders kind of up to you is how you want to meet these particular requirements.
08:24
All wrist baseline love, certain risk. Certain levels of cryptography are required at
08:31
low baseline,
08:35
not saying that you have to go out and implement P k I for a low impact system. But there will be requirements in there for cryptography, like protecting information or like Social Security numbers at rest or something like that.
08:48
If you have, ah, low impact system, that process is that
08:56
honey pots?
09:00
So one of the last things we'll talk about here, you don't have to implement this at any level. But why would you want to implement this?
09:07
Because you want visibility into attacks that are coming your way. So this is a good example of a technical control that you're not required to dio. But some of the more robust security programs out there will implement. This is part of a risk management strategy. They'd much rather have the honeypot compromised by an attacker than alive system.

Up Next