You will focus on security controls that protect organizational assets. You’ll explore how privacy impacts asset security and understand the role that encryption plays in maintaining the privacy of digital assets. You’ll also explore how authentication and authorization systems help verify a user’s identity.
Learning Objectives
- Identify effective data handling processes.
- Identify how security controls mitigate risk.
- Discuss the role encryption and hashing play in securing assets.
- Describe how to effectively use authentication as a security control.
- Describe effective authorization practices that verify user access.
- Safeguard information
- Video: Welcome to module 2
- Video: Security controls
- Reading: Principle of least privilege
- Reading: The data lifecycle
- Reading: Information privacy: Regulations and compliance
- Video: Heather: The importance of protecting PII
- Practice Quiz: Activity: Determine appropriate data handling practices
- Reading: Activity Exemplar: Determine appropriate data handling practices
- Practice Quiz: Test your knowledge: Safeguard information
- Encryption methods
- Fundamentals of Cryptography in Cybersecurity
- Non-Repudiation and Hashing in Cybersecurity
- Authentication, authorization, and accounting
- Video: Access controls and authentication systems
- Reading: The rise of SSO and MFA
- Video: The mechanisms of authorization
- Video: Why we audit user activity
- Video: Tim: Finding purpose in protecting assets
- Reading: Identity and access management
- Practice Quiz: Activity: Improve authentication, authorization, and accounting for a small business
- Reading: Activity Exemplar: Improve authentication and authorization for a small business
- Practice Quiz: Test your knowledge: Authentication, authorization, and accounting
- Review: Protect organization assets
Safeguard information
Video: Welcome to module 2
The author is proud of the reader’s progress and encourages them to continue their journey into the world of security.
Key takeaways:
- Previously, the focus was on assets, risks, and security plans.
- This section will delve into security controls used to proactively keep assets safe.
- Topics covered include privacy, data handling, encryption, hashing, and standard access controls.
- The author is enthusiastic about continuing the learning journey with the reader.
I was fascinated by a world-wide malware event
that happened in 2017. I started watching videos
and preparing to take certification tests,
just like you. I felt overwhelmed at first, but my curiosity and passion has driven me to continue
learning in this field. I always remind
myself that no one is born knowing everything and everyone is on a
learning journey. Even now, I still
remember what it was like to start out
in this profession. So, believe me when I tell
you that you’re making great progress, and I am
proud of your effort! Now, before looking
ahead to where we’re headed on our journey into
the world of security, let’s take a moment to look
back on where we’ve been. Previously, we focused mostly on the concept of assets
and risks in security. We covered topics like
the importance of managing assets and
keeping them safe. We discussed how the
digital world presents new challenges and opportunities in the field of security. We also spent some time
exploring security plans. With this solid foundation, we’re ready to keep expanding
our security mindset. In this section, we’ll cover
the security controls that are used to proactively
keep assets safe. I used the word proactively
there on purpose. As you’ll soon discover, these controls are the
protections that we put in place to stop problems
before they happen. We’re going to begin by taking an in-depth look at privacy. Here, you’ll learn about the
effective data handling processes that keep
information safe. Next, you’ll explore the role of encryption and hashing in
safeguarding information. Finally, you’ll learn about the standard access
controls that companies use to authorize
and authenticate users. Alright, are you ready to keep
moving ahead? I know I am!
Video: Security controls
Main Points:
- Organizations are under pressure to protect information from theft and exposure.
- Security controls are safeguards designed to reduce security risks and protect assets before, during, and after an event.
- Three types of security controls: technical, operational, and managerial.
- Information privacy focuses on protecting unauthorized access and distribution of data and emphasizes the right to choose how personal information is shared.
- Security controls regulate information privacy by granting access based on user and situation (principle of least privilege).
- Two key roles in information privacy:
- Data owner: Decides who can access, edit, use, or destroy their information.
- Data custodian: Responsible for the safe handling, transport, and storage of information.
- Data classification and handling are important considerations for implementing security controls.
Additional Points:
- The author uses the example of booking a flight to illustrate the concept of data privacy and access control.
- Organizations usually have a security policy outlining the necessary controls for achieving their security goals.
Overall:
This text emphasizes the importance of information privacy and how security controls are implemented to protect it, adhering to the principle of least privilege and differentiating between data owners and custodians.
Introduction:
In the ever-evolving landscape of cybersecurity, securing sensitive information and mitigating threats is crucial for individuals and organizations alike. Security controls serve as the armor that protects against unauthorized access, data breaches, and cyberattacks. Understanding and implementing these controls effectively is essential for maintaining a robust cybersecurity posture.
What are Security Controls?
Security controls are safeguards designed to prevent, detect, and respond to cybersecurity incidents. They encompass a wide range of techniques, tools, and processes that address various security risks and vulnerabilities. These controls can be categorized into three primary types:
1. Preventive Controls:
- Technical: Firewalls, intrusion detection/prevention systems (IDS/IPS), encryption, data loss prevention (DLP), secure coding practices.
- Operational: Security awareness training, incident response plans, access control procedures, vulnerability assessments and penetration testing.
- Managerial: Security policies, standards, and guidelines, risk management frameworks, security awareness programs.
2. Detective Controls:
- Logging and monitoring: Monitoring system logs and activity for suspicious behavior.
- Vulnerability scanning: Regular scans to identify and address vulnerabilities in systems and applications.
- Security audits: Periodic assessments to identify and mitigate security risks and compliance issues.
3. Corrective Controls:
- Incident response: Processes for identifying, containing, eradicating, and recovering from security incidents.
- Data backup and recovery: Maintaining backups of critical data for restoration in case of a breach.
- Patch management: Timely application of security patches to address vulnerabilities.
Implementing Security Controls:
Effectively implementing security controls requires a comprehensive approach that considers the specific needs and risks of the organization. Here are key steps to follow:
1. Identify Assets and Risks:
- Identify and categorize critical assets that require protection.
- Analyze potential threats, vulnerabilities, and risks associated with these assets.
2. Select and Implement Controls:
- Based on identified risks, choose appropriate preventive, detective, and corrective controls.
- Implement these controls using technical solutions, operational procedures, and management policies.
3. Continuously Monitor and Review:
- Regularly monitor the effectiveness of implemented controls.
- Conduct periodic assessments to identify and address any gaps or weaknesses.
- Update and adapt controls as needed to address evolving threats and risks.
Benefits of Security Controls:
- Reduced risk of cyberattacks: By implementing robust controls, organizations can significantly reduce the risk of data breaches and cyberattacks.
- Increased compliance: Security controls help organizations comply with industry regulations and data privacy laws.
- Improved data security: Controls ensure the confidentiality, integrity, and availability of sensitive information.
- Enhanced operational resilience: Effective security controls allow organizations to recover quickly from security incidents.
- Reduced financial losses: By preventing breaches and mitigating damage, controls save organizations money and resources.
Conclusion:
Security controls are vital components of a comprehensive cybersecurity strategy. By understanding their purpose, types, and implementation process, organizations can strengthen their defenses against cyber threats and protect their valuable assets. Remember, security is an ongoing process, and continuous monitoring and improvement are crucial for maintaining a resilient cybersecurity posture.
These days, information is in so
many places at once. As a result, organizations are under
a lot of pressure to implement effective security controls that protects everyone’s
information from being stolen or exposed. Security controls are safeguards designed
to reduce specific security risks. They include a wide range of tools that
protect assets before, during, and after an event. Security controls can be
organized into three types: technical, operational, and managerial. Technical control types include the many
technologies used to protect assets. This includes encryption,
authentication systems, and others. Operational controls relate to maintaining
the day-to-day security environment. Generally, people perform these
controls like awareness training and incident response. Managerial controls are centered
around how the other two reduce risk. Examples of management controls include
policies, standards, and procedures. Typically, organization’s security policy
outlines the controls needed to achieve their goals. Information privacy plays
a key role in these decisions. Information privacy is the protection
of unauthorized access and distribution of data. Information privacy is
about the right to choose. People and organizations alike deserve
the right to decide when, how, and to what extent private
information about them is shared. Security controls are the technologies
used to regulate information privacy. For example, imagine using
a travel app to book a flight. You might browse through a list of
flights and find one at a good price. To reserve a seat, you enter some personal
information, like your name, email, and credit card number for payment. The transaction goes through successfully,
and you booked your flight. Now, you reasonably expect
the airline company to access this information you enter when signing
up to complete the reservation. However, should everyone at the company
have access to your information? A person working in the marketing
department shouldn’t need access to your credit card information. It makes sense to share that information
with a customer support agent. Except, they should only need to access
it while helping with your reservation. To maintain privacy, security controls are intended to limit
access based on the user and situation. This is known as the principle
of least privilege. Security controls should be designed with
the principle of least privilege in mind. When they are, they rely on
differentiating between data owners and data custodians. A data owner is a person who decides
who can access, edit, use, or destroy their information. The idea is very straightforward except
in cases where there are multiple owners. For example, the intellectual
property of an organization can have multiple data owners. A data custodian is anyone or
anything that’s responsible for the safe handling,
transport, and storage of information. Did you notice that I mentioned, “anything?” That’s because, aside from people,
organizations and their systems are also custodians
of people’s information. There are other considerations besides
these when implementing security controls. Remember that data is an asset. Like any other asset, information privacy
requires proper classification and handling. As we progress in this section, we’ll continue exploring other security
controls that make this possible.
What are the three types of security controls? Select three answers.
Technical, Managerial, Operational
The three types of security controls are technical, operational, and managerial. Each type of security control plays a key role in effective information privacy.
Reading: Principle of least privilege
Reading
Security controls are essential to keeping sensitive data private and safe. One of the most common controls is the principle of least privilege, also referred to as PoLP or least privilege. The principle of least privilege is a security concept in which a user is only granted the minimum level of access and authorization required to complete a task or function.
Least privilege is a fundamental security control that supports the confidentiality, integrity, and availability (CIA) triad of information. In this reading, you’ll learn how the principle of least privilege reduces risk, how it’s commonly implemented, and why it should be routinely audited.
Limiting access reduces risk
Every business needs to plan for the risk of data theft, misuse, or abuse. Implementing the principle of least privilege can greatly reduce the risk of costly incidents like data breaches by:
- Limiting access to sensitive information
- Reducing the chances of accidental data modification, tampering, or loss
- Supporting system monitoring and administration
Least privilege greatly reduces the likelihood of a successful attack by connecting specific resources to specific users and placing limits on what they can do. It’s an important security control that should be applied to any asset. Clearly defining who or what your users are is usually the first step of implementing least privilege effectively.
Note: Least privilege is closely related to another fundamental security principle, the separation of duties—a security concept that divides tasks and responsibilities among different users to prevent giving a single user complete control over critical business functions. You’ll learn more about separation of duties in a different reading about identity and access management.
Determining access and authorization
To implement least privilege, access and authorization must be determined first. There are two questions to ask to do so:
- Who is the user?
- How much access do they need to a specific resource?
Determining who the user is usually straightforward. A user can refer to a person, like a customer, an employee, or a vendor. It can also refer to a device or software that’s connected to your business network. In general, every user should have their own account. Accounts are typically stored and managed within an organization’s directory service.
These are the most common types of user accounts:
- Guest accounts are provided to external users who need to access an internal network, like customers, clients, contractors, or business partners.
- User accounts are assigned to staff based on their job duties.
- Service accounts are granted to applications or software that needs to interact with other software on the network.
- Privileged accounts have elevated permissions or administrative access.
It’s best practice to determine a baseline access level for each account type before implementing least privilege. However, the appropriate access level can change from one moment to the next. For example, a customer support representative should only have access to your information while they are helping you. Your data should then become inaccessible when the support agent starts working with another customer and they are no longer actively assisting you. Least privilege can only reduce risk if user accounts are routinely and consistently monitored.
Pro tip: Passwords play an important role when implementing the principle of least privilege. Even if user accounts are assigned appropriately, an insecure password can compromise your systems.
Auditing account privileges
Setting up the right user accounts and assigning them the appropriate privileges is a helpful first step. Periodically auditing those accounts is a key part of keeping your company’s systems secure.
There are three common approaches to auditing user accounts:
- Usage audits
- Privilege audits
- Account change audits
As a security professional, you might be involved with any of these processes.
Usage audits
When conducting a usage audit, the security team will review which resources each account is accessing and what the user is doing with the resource. Usage audits can help determine whether users are acting in accordance with an organization’s security policies. They can also help identify whether a user has permissions that can be revoked because they are no longer being used.
Privilege audits
Users tend to accumulate more access privileges than they need over time, an issue known as privilege creep. This might occur if an employee receives a promotion or switches teams and their job duties change. Privilege audits assess whether a user’s role is in alignment with the resources they have access to.
Account change audits
Account directory services keep records and logs associated with each user. Changes to an account are usually saved and can be used to audit the directory for suspicious activity, like multiple attempts to change an account password. Performing account change audits helps to ensure that all account changes are made by authorized users.
Note: Most directory services can be configured to alert system administrators of suspicious activity.
Key takeaways
The principle of least privilege is a security control that can reduce the risk of unauthorized access to sensitive information and resources. Setting up and configuring user accounts with the right levels of access and authorization is an important step toward implementing least privilege. Auditing user accounts and revoking unnecessary access rights is an important practice that helps to maintain the confidentiality, integrity, and availability of information.
Reading: The data lifecycle
Reading
Organizations of all sizes handle a large amount of data that must be kept private. You learned that data can be vulnerable whether it is at rest, in use, or in transit. Regardless of the state it is in, information should be kept private by limiting access and authorization.
In security, data vulnerabilities are often mapped in a model known as the data lifecycle. Each stage of the data lifecycle plays an important role in the security controls that are put in place to maintain the CIA triad of information. In this reading, you will learn about the data lifecycle, the plans that determine how data is protected, and the specific types of data that require extra attention.
The data lifecycle
The data lifecycle is an important model that security teams consider when protecting information. It influences how they set policies that align with business objectives. It also plays an important role in the technologies security teams use to make information accessible.
In general, the data lifecycle has five stages. Each describe how data flows through an organization from the moment it is created until it is no longer useful:
- Collect
- Store
- Use
- Archive
- Destroy
Protecting information at each stage of this process describes the need to keep it accessible and recoverable should something go wrong.
Data governance
Businesses handle massive amounts of data every day. New information is constantly being collected from internal and external sources. A structured approach to managing all of this data is the best way to keep it private and secure.
Data governance is a set of processes that define how an organization manages information. Governance often includes policies that specify how to keep data private, accurate, available, and secure throughout its lifecycle.
Effective data governance is a collaborative activity that relies on people. Data governance policies commonly categorize individuals into a specific role:
- Data owner: the person that decides who can access, edit, use, or destroy their information.
- Data custodian: anyone or anything that’s responsible for the safe handling, transport, and storage of information.
- Data steward: the person or group that maintains and implements data governance policies set by an organization.
Businesses store, move, and transform data using a wide range of IT systems. Data governance policies often assign accountability to data owners, custodians, and stewards.
Note: As a data custodian, you will primarily be responsible for maintaining security and privacy rules for your organization.
Protecting data at every stage
Most security plans include a specific policy that outlines how information will be managed across an organization. This is known as a data governance policy. These documents clearly define procedures that should be followed to participate in keeping data safe. They place limits on who or what can access data. Security professionals are important participants in data governance. As a data custodian, you will be responsible for ensuring that data isn’t damaged, stolen, or misused.
Legally protected information
Data is more than just a bunch of 1s and 0s being processed by a computer. Data can represent someone’s personal thoughts, actions, and choices. It can represent a purchase, a sensitive medical decision, and everything in between. For this reason, data owners should be the ones deciding whether or not to share their data. As a security professional, protecting a person’s data privacy decisions must always be respected.
Securing data can be challenging. In large part, that’s because data owners generate more data than they can manage. As a result, data custodians and stewards sometimes lack direct, explicit instructions on how they should handle specific types of data. Governments and other regulatory agencies have bridged this gap by creating rules that specify the types of information that organizations must protect by default:
- PII is any information used to infer an individual’s identity. Personally identifiable information, or PII, refers to information that can be used to contact or locate someone.
- PHI stands for protected health information. In the U.S., it is regulated by the Health Insurance Portability and Accountability Act (HIPAA), which defines PHI as “information that relates to the past, present, or future physical or mental health or condition of an individual.” In the EU, PHI has a similar definition but it is regulated by the General Data Protection Regulation (GDPR).
- SPII is a specific type of PII that falls under stricter handling guidelines. The S stands for sensitive, meaning this is a type of personally identifiable information that should only be accessed on a need-to-know basis, such as a bank account number or login credentials.
Overall, it’s important to protect all types of personal information from unauthorized use and disclosure.
Key takeaways
Keeping information private has never been so important. Many organizations have data governance policies that outline how they plan to protect sensitive information. As a data custodian, you will play a key role in keeping information accessible and safe throughout its lifecycle. There are various types of information and controls that you’ll encounter in the field. As you continue through this course, you’ll learn more about major security controls that keep data private.
Reading: Information privacy: Regulations and compliance
Reading
Security and privacy have a close relationship. As you may recall, people have the right to control how their personal data is collected and used. Organizations also have a responsibility to protect the information they are collecting from being compromised or misused. As a security professional, you will be highly involved in these efforts.
Previously, you learned how regulations and compliance reduce security risk. To review, refer to the reading about how security controls, frameworks, and compliance regulations are used together to manage security and minimize risk. In this reading, you will learn how information privacy regulations affect data handling practices. You’ll also learn about some of the most influential security regulations in the world.
Information security vs. information privacy
Security and privacy are two terms that often get used interchangeably outside of this field. Although the two concepts are connected, they represent specific functions:
- Information privacy refers to the protection of unauthorized access and distribution of data.
- Information security (InfoSec) refers to the practice of keeping data in all states away from unauthorized users.
The key difference: Privacy is about providing people with control over their personal information and how it’s shared. Security is about protecting people’s choices and keeping their information safe from potential threats.
For example, a retail company might want to collect specific kinds of personal information about its customers for marketing purposes, like their age, gender, and location. How this private information will be used should be disclosed to customers before it’s collected. In addition, customers should be given an option to opt-out if they decide not to share their data.
Once the company obtains consent to collect personal information, it might implement specific security controls in place to protect that private data from unauthorized access, use, or disclosure. The company should also have security controls in place to respect the privacy of all stakeholders and anyone who chose to opt-out.
Note: Privacy and security are both essential for maintaining customer trust and brand reputation.
Why privacy matters in security
Data privacy and protection are topics that started gaining a lot of attention in the late 1990s. At that time, tech companies suddenly went from processing people’s data to storing and using it for business purposes. For example, if a user searched for a product online, companies began storing and sharing access to information about that user’s search history with other companies. Businesses were then able to deliver personalized shopping experiences to the user for free.
Eventually this practice led to a global conversation about whether these organizations had the right to collect and share someone’s private data. Additionally, the issue of data security became a greater concern; the more organizations collected data, the more vulnerable it was to being abused, misused, or stolen.
Many organizations became more concerned about the issues of data privacy. Businesses became more transparent about how they were collecting, storing, and using information. They also began implementing more security measures to protect people’s data privacy. However, without clear rules in place, protections were inconsistently applied.
Note: The more data is collected, stored, and used, the more vulnerable it is to breaches and threats.
Notable privacy regulations
Businesses are required to abide by certain laws to operate. As you might recall, regulations are rules set by a government or another authority to control the way something is done. Privacy regulations in particular exist to protect a user from having their information collected, used, or shared without their consent. Regulations may also describe the security measures that need to be in place to keep private information away from threats.
Three of the most influential industry regulations that every security professional should know about are:
- General Data Protection Regulation (GDPR)
- Payment Card Industry Data Security Standard (PCI DSS)
- Health Insurance Portability and Accountability Act (HIPAA)
GDPR
GDPR is a set of rules and regulations developed by the European Union (EU) that puts data owners in total control of their personal information. Under GDPR, types of personal information include a person’s name, address, phone number, financial information, and medical information.
The GDPR applies to any business that handles the data of EU citizens or residents, regardless of where that business operates. For example, a US based company that handles the data of EU visitors to their website is subject to the GDPRs provisions.
PCI DSS
PCI DSS is a set of security standards formed by major organizations in the financial industry. This regulation aims to secure credit and debit card transactions against data theft and fraud.
HIPAA
HIPAA is a U.S. law that requires the protection of sensitive patient health information. HIPAA prohibits the disclosure of a person’s medical information without their knowledge and consent.
Note: These regulations influence data handling at many organizations around the world even though they were developed by specific nations.
Several other security and privacy compliance laws exist. Which ones your organization needs to follow will depend on the industry and the area of authority. Regardless of the circumstances, regulatory compliance is important to every business.
Security assessments and audits
Businesses should comply with important regulations in their industry. Doing so validates that they have met a minimum level of security while also demonstrating their dedication to maintaining data privacy.
Meeting compliance standards is usually a continual, two-part process of security audits and assessments:
- A security audit is a review of an organization’s security controls, policies, and procedures against a set of expectations.
- A security assessment is a check to determine how resilient current security implementations are against threats.
For example, if a regulation states that multi-factor authentication (MFA) must be enabled for all administrator accounts, an audit might be conducted to check those user accounts for compliance. After the audit, the internal team might perform a security assessment that determines many users are using weak passwords. Based on their assessment, the team could decide to enable MFA on all user accounts to improve their overall security posture.
Note: Compliance with legal regulations, such as GDPR, can be determined during audits.
As a security analyst, you are likely to be involved with security audits and assessments in the field. Businesses usually perform security audits less frequently, approximately once per year. Security audits may be performed both internally and externally by different third-party groups.
In contrast, security assessments are usually performed more frequently, about every three-to-six months. Security assessments are typically performed by internal employees, often as preparation for a security audit. Both evaluations are incredibly important ways to ensure that your systems are effectively protecting everyone’s privacy.
Key takeaways
A growing number of businesses are making it a priority to protect and govern the use of sensitive data to maintain customer trust. Security professionals should think about data and the need for privacy in these terms. Organizations commonly use security assessments and audits to evaluate gaps in their security plans. While it is possible to overlook or delay addressing the results of an assessment, doing so can have serious business consequences, such as fines or data breaches.
Video: Heather: The importance of protecting PII
Key Points:
- PII is ubiquitous online, ranging from common knowledge (names) to sensitive information (bank accounts, medical records).
- PII protection is crucial as online activities like schooling, voting, and car registration become increasingly digital.
- Building security into systems by default is essential.
- Recommendations:
- Encrypt data at rest and in transit using TLS/SSL.
- Implement strict access controls, especially for sensitive data.
- Maintain access logs with justification and audits.
- Treat PII breaches with empathy and prioritize user trust.
- Goal: Keep billions of people safe online every day.
Overall Message:
Heather emphasizes the importance of PII protection in today’s digital world and offers practical tips for companies and individuals to ensure data security and build user trust.
Hello, my name is
Heather and I’m the Vice President of Security
Engineering at Google. PII is everywhere. It’s a fundamental part of how we are all working
online all the time. If you are using
online resources, you are probably putting your
PII out there somewhere. There’s some of your PII
that lots of people know, such as your name. And then there’s sensitive data that you don’t want very
many people to know, such as your bank account number or your private medical
health information. And so we make these distinctions often because this kind of information needs to be
handled differently. Everything that we do now, from school to voting, to registering our car
happens online. And because of that, it’s so
important that we have safety built-in by default into all of our systems. Here’s some tips. You should always encrypt
the data as much as you can when it’s being
stored at rest. And secondly, when it’s
transitting over the Internet, we always want to encrypt
it using TLS or SSL. Third, within your company, you should think very clearly about who has access
to that data. It should be almost no one
if it’s very sensitive. And in the rare cases where somebody does need
to access that data, there should be a
record of that access, who accessed it, and a
justification as to why. And you should have a
program to look at the audit records
for that data. The most important thing
to remember is if you have a situation where PII
has been compromised, remember that’s someone’s
personal information and your response wants to be
grounded in that reality. They need to be able to
trust the infrastructure, the systems, the
websites, the devices. They need to be able to trust the experience they’re having. For me, that’s the
mission: To help keep billions of people
safe online every day.
Practice Quiz: Activity: Determine appropriate data handling practices
Reading: Activity Exemplar: Determine appropriate data handling practices
Reading
Completed Exemplar
To review the exemplar for this course item, click the link and select Use Template.
Link to exemplar: Data leak worksheet
Assessment of Exemplar
Compare the exemplar to your completed activity. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that your activity reflects your analysis of appropriate data handling practices.
Next, review the details of the completed data leak worksheet:
Issues
Many people neglected to keep the confidential information private. The manager should have done a better job keeping track of the internal folder by limiting access to the representative and themselves. The customer also could have done a better job of communicating their plans to share the marketing information before posting it to social media.
Review
NIST SP 800-53 is a resource that’s designed to help organizations address data privacy risks. The document defines security controls, describes implementation strategies, and suggests individual control enhancements. AC-6 is a section about access controls that relate to the principle of least privilege.
Recommendation(s)
Based on the suggestion of NIST SP 800-53: AC-6, the data leak might have been avoided with the following controls:
- Automatically revoke access to information after a period of time.
- Regularly audit user privileges.
Justification
Automating security tasks whenever possible is a good way to reduce the chances of human error. In this case, creating a policy that sets expiration dates for access links might have avoided the leak. Requiring managers to regularly audit who can access their files is another way that information could be kept private.
Practice Quiz: Test your knowledge: Safeguard information
What are categories of security controls? Select all that apply.
Technical, Operational, Managerial
Categories of security controls include technical, operational, and managerial. Technical controls include the technologies used to protect assets. Operational controls relate to maintaining the day-to-day security environment. And managerial controls are centered around how technical and operational controls reduce risk.
Fill in the blank: A data _____ decides who can access, edit, use, or destroy their information.
owner
A data owner decides who can access, edit, use, or destroy their information.
A writer for a technology company is drafting an article about new software features that are being released. According to the principle of least privilege, what should the writer have access to while drafting the article? Select all that apply.
- The software they are reviewing
- Software developers who are knowledgeable about the product
The writer should have access to the software they are reviewing and the software developers who can help them understand what information is appropriate to share with readers.
Which privacy regulations influence how organizations approach data security? Select three answers.
- Health Insurance Portability and Accountability Act (HIPAA)
- Payment Card Industry Data Security Standard (PCI DSS)
- General Data Protection Regulation (GDPR)
GDPR, PCI DSS, and HIPAA are notable privacy regulations that influence how organizations approach their information security.
Encryption methods
Video: Fundamentals of cryptography
Main Points:
- PII (Personally Identifiable Information) needs protection online.
- Cryptography is a key security control for securing PII.
- It involves a two-step process:
- Encryption: Transforming data into unreadable ciphertext.
- Decryption: Converting ciphertext back into readable plaintext.
- Caesar’s cipher is a simple but outdated example of an encryption algorithm.
- It shifts letters in the alphabet using a fixed number of spaces.
- Caesar’s cipher has limitations:
- Vulnerable to brute force attacks due to a small alphabet.
- Relies on a single key, making it insecure if compromised.
- Modern cryptography uses more complex algorithms for better security.
Key Takeaways:
- Understanding the basics of cryptography is crucial for protecting PII online.
- Secure encryption requires complex algorithms and proper key management.
- Modern cryptography offers stronger protection than simple methods like Caesar’s cipher.
Fundamentals of Cryptography in Cybersecurity
Introduction:
Cryptography, the art and science of secure communication, plays a vital role in cybersecurity. This tutorial delves into the fundamental principles and practices of cryptography, empowering you to understand how information is protected in the digital world.
1. Core Concepts:
- Plaintext: The original, readable form of information.
- Ciphertext: The encrypted, unreadable form of information.
- Encryption: The process of converting plaintext to ciphertext using a cipher.
- Decryption: The process of converting ciphertext back to plaintext using a key.
- Cipher: The algorithm used for encryption and decryption.
- Key: The secret information used to encrypt and decrypt data.
2. Types of Cryptography:
- Symmetric-key cryptography: Uses a single key for both encryption and decryption.
- Examples: AES, DES, Blowfish.
- Asymmetric-key cryptography: Uses a pair of keys: a public key and a private key.
- Public key: Used for encryption.
- Private key: Used for decryption.
- Examples: RSA, Elliptic Curve Cryptography (ECC).
3. Cryptographic Functions:
- Hashing: Converts data into a unique fixed-size string, regardless of the original data size.
- Used for:
- Verifying data integrity.
- Password storage.
- Digital signatures.
- Examples: SHA-256, MD5.
- Used for:
- Digital signatures: Provides cryptographic proof of the sender’s identity and message integrity.
- Uses both public and private keys.
- Ensures authenticity, non-repudiation, and data integrity.
4. Applications of Cryptography in Cybersecurity:
- Secure communication: Protects data confidentiality in transit between systems.
- Data storage: Encrypts sensitive data at rest to prevent unauthorized access.
- Authentication: Verifies users’ identities during login attempts.
- Digital signatures: Authenticates documents and guarantees their integrity.
- Network security: Secures communication channels like VPNs and SSL/TLS.
5. Essential Cryptography Tools:
- OpenSSL: Open-source library for various cryptographic functions.
- GnuPG: Open-source tool for encryption, decryption, and digital signatures.
- PGP: Widely used tool for email encryption and digital signatures.
6. Best Practices for Secure Cryptography:
- Use strong ciphers and keys: Choose algorithms and key lengths that are resistant to known attacks.
- Keep keys secure: Store keys securely and avoid sharing them with unauthorized individuals.
- Update cryptography regularly: Stay informed about vulnerabilities and update algorithms and tools as needed.
- Follow best practices: Implement security best practices like secure coding and data management.
7. Conclusion:
Understanding the fundamentals of cryptography empowers you to protect your information and communication in the digital landscape. By learning about different types of cryptography, cryptographic functions, and best practices, you can contribute to a more secure online environment.
Additional Resources:
- National Institute of Standards and Technology (NIST): https://www.nist.gov/cryptography
- SANS Institute Reading Room: http://bok.ahima.org/doc?oid=25313
- Cryptography Engineering Course (Stanford University): https://www.coursera.org/learn/crypto
Fill in the blank: _____ is the process of transforming information into a form that unintended readers cannot understand.
Cryptography
Cryptography is the process of transforming information into a form that unintended readers cannot understand. In cryptography, a cipher is used to hide, or encrypt, information.
The internet is an open, public system
with a lot of data flowing through it. Even though we all send and
store information online, there’s some information that
we choose to keep private. In security, this type of data is known
as personally identifiable information. Personally identifiable information, or
PII, is any information that can be used
to infer an individual’s identity. This can include things like
someone’s name, medical and financial information, photos,
emails, or fingerprints. Maintaining the privacy of
PII online is difficult. It takes the right security
controls to do so. One of the main security
controls used to protect information online is cryptography. Cryptography is the process of
transforming information into a form that unintended readers can’t understand. Data of any kind is kept secret
using a two-step process: encryption to hide the information,
and decryption to unhide it. Imagine sending an email to a friend. The process starts by taking
data in its original and readable form, known as plaintext. Encryption takes that information and scrambles it into an unreadable
form, known as ciphertext. We then use decryption to unscramble
the ciphertext back into plaintext form, making it readable again. Hiding and unhiding private information
is a practice that’s been around for a long time. Way before computers! One of the earliest cryptographic
methods is known as Caesar’s cipher. This method is named after
a Roman general, Julius Caesar, who ruled the Roman empire near
the end of the first century BC. He used it to keep messages between
him and his military generals private. Caesar’s cipher is a pretty simple algorithm
that works by shifting letters in the Roman alphabet forward
by a fixed number of spaces. An algorithm is a set of
rules that solve a problem. Specifically in cryptography, a cipher is
an algorithm that encrypts information. For example, a message encoded with
Caesar’s cipher using a shift of 3 would encode an A as a D, a B as an E,
a C as an F, and so on. In this example, you could send
a friend a message that said, “hello” using a shift of 3, and
it would read “khoor.” Now, you might be wondering how would
you know the shift a message encrypted with Caesar’s cipher is using.
The answer to that is, you need the key! A cryptographic key is a mechanism
that decrypts ciphertext. In our example, the key would tell you
that my message is encrypted by 3 shifts. With that information, you
can unlock the hidden message! Every form of encryption
relies on both a cipher and key to secure the exchange of information. Caesar’s cipher is not widely used today
because of a couple of major flaws. One concerns the cipher itself.
The other relates to the key. This particular cipher relies entirely on
the characters of the Roman alphabet to hide information. For example, consider a message written
using the English alphabet, which is only 26 characters. Even without the key, it’s pretty simple
to crack a message secured with Caesar’s cipher by shifting
letters 26 different ways. In information security, this tactic
is known as brute force attack, a trial-and-error process of
discovering private information. The other major flaw of Caesar’s cipher
is that it relies on a single key. If that key was lost or stolen, there’s nothing stopping someone
from accessing private information. Properly keeping track of cryptographic
keys is an important part of security. To start, it’s important to ensure that
these keys are not stored in public places, and to share them separately
from the information they will decrypt. Caesar’s cipher is just one of many
algorithms used to protect people’s privacy. Due to its limitations, we rely on more complex algorithms
to secure information online. Our next focus is exploring
how modern algorithms work to keep information private.
Video: Public key infrastructure
Main Points:
- PKI is a framework for secure online communication.
- It uses a two-step process:
- Step 1: Exchanging Encrypted Information:
- Uses both asymmetric (public/private keys) and symmetric (single secret key) encryption.
- Asymmetric encryption prioritizes security, while symmetric prioritizes speed.
- Both methods rely on secure key sharing and trust.
- Step 2: Establishing Trust with Digital Certificates:
- Digital certificates verify the identity of public key holders.
- Obtained from trusted certificate authorities (CAs).
- Act like digital ID badges for online access control.
- Step 1: Exchanging Encrypted Information:
Key Takeaways:
- PKI combines encryption and digital certificates for secure information exchange.
- Asymmetric and symmetric encryption offer different benefits and trade-offs.
- Digital certificates address the trust issue inherent in online key sharing.
- PKI is a critical security control for various online activities.
Additional Notes:
- Mobile chat apps exemplify the use of both asymmetric and symmetric encryption.
- PKI relies on a robust system of CAs and their digital signatures.
- Understanding PKI principles is crucial for secure online interactions.
In the ever-evolving digital landscape, secure communication is paramount. Public Key Infrastructure (PKI) plays a vital role in safeguarding online interactions, making it crucial for individuals and organizations alike to understand its principles and applications.
What is PKI?
PKI is a comprehensive framework that facilitates secure communication by establishing trust and ensuring data confidentiality, integrity, and authentication. It relies on two key components:
1. Cryptography: PKI utilizes both asymmetric cryptography (public and private key pairs) and symmetric cryptography (single secret key) to encrypt and decrypt information. Asymmetric encryption prioritizes security for sensitive data, while symmetric encryption focuses on speed for efficient communication.
2. Digital Certificates: These digital documents act as online identity badges, verifying the ownership of a public key and ensuring its authenticity. Issued by trusted third parties known as Certificate Authorities (CAs), these certificates enable secure communication by establishing trust between parties.
How does PKI work?
- Key Generation: Each party involved in communication generates a key pair: a public key and a private key. The public key is shared with anyone who needs to send them encrypted information, while the private key remains confidential and is used to decrypt received messages.
- Digital Certificate Issuance: Entities seeking a digital certificate submit relevant information to a CA for verification. The CA then creates a certificate containing the entity’s verified information and signs it with its own private key. This digital signature guarantees the certificate’s authenticity and trustworthiness.
- Secure Communication: When communicating, entities exchange their public keys. Senders use the recipient’s public key to encrypt messages, ensuring only the recipient can decrypt them with their private key. This process guarantees confidentiality and data integrity.
- Authentication: Digital certificates play a crucial role in verifying the identity of communicating parties. When interacting with a website or server, the user’s browser verifies the website’s digital certificate issued by a trusted CA. This ensures the user is interacting with the legitimate entity and not a fraudulent website.
Benefits of PKI:
- Enhanced Security: PKI protects data confidentiality and integrity by encrypting information in transit and at rest.
- Improved Authentication: Digital certificates verify the identity of individuals and entities, preventing man-in-the-middle attacks and phishing scams.
- Simplified Secure Communication: PKI automatically establishes trust, enabling secure communication without manual key exchange.
- Increased Trust and Confidence: PKI fosters trust in online transactions and interactions, promoting secure e-commerce and digital communication.
Applications of PKI:
- Secure websites & online transactions (e.g., HTTPS)
- Email encryption (e.g., PGP)
- Digital signatures for documents and contracts
- Secure remote access (e.g., VPNs)
- Mobile app security
- Cloud computing
Best Practices for Secure PKI Implementation:
- Use strong cryptographic algorithms and key lengths.
- Implement robust key management practices.
- Choose trusted certificate authorities with a good reputation.
- Regularly update PKI components and software.
- Educate users about PKI principles and best practices.
Conclusion:
PKI plays a fundamental role in securing the digital world by establishing trust and enabling secure communication. Understanding its principles and applications is crucial for individuals and organizations to protect themselves online. By implementing PKI effectively, we can create a safer and more secure online environment for everyone.
Additional Resources:
- National Institute of Standards and Technology (NIST): https://csrc.nist.gov/glossary/term/public_key_infrastructure
- SANS Institute: https://www.sans.org/white-papers/735/
- Cloudflare PKI Guide: https://research.cloudflare.com/projects/internet-infrastructure/pki/
Public key infrastructure (PKI) is a two-step process that includes the exchange of encrypted information. What other step is involved in the PKI process?
The establishment of trust using digital certificates
The PKI process involves the exchange of encrypted information and the establishment of trust using digital certificates. In PKI, data can be encrypted using asymmetric encryption, symmetric encryption, or both. Then, a digital certificate binds the data’s public key to the verified identity of a website, individual, organization, device, or server.
Computers use a lot of encryption algorithms to send and store information online. They’re all helpful
when it comes to hiding private information, but only as long as their
keys are protected. Can you imagine having to keep track of the encryption
keys protecting all of your personal information
online? Neither can I, and we don’t have to, thanks
to something known as public key infrastructure. Public key
infrastructure, or PKI, is an encryption framework that secures the exchange of
information online. It’s a broad system
that makes accessing information fast,
easy, and secure. So, how does it all work? PKI is a two-step process. It all starts with the exchange
of encrypted information. This involves either
asymmetric encryption, symmetric encryption, or both. Asymmetric encryption
involves the use of a public and private key pair for encryption and
decryption of data. Let’s imagine this as a box that can be opened with two keys. One key, the public key, can only be used to access the slot and add
items to the box. Since the public key can’t
be used to remove items, it can be copied and
shared with people all around the
world to add items. On the other hand, the
second key, the private key, opens the box fully, so that the items inside can be removed. Only the owner of the box has access to the private
key that unlocks it. Using a public key allows the people and servers
you’re communicating with to see and send you encrypted information
that only you can decrypt with
your private key. This two-key system makes asymmetric encryption
a secure way to exchange information online; however, it also slows
down the process. Symmetric encryption,
on the other hand, is a faster and simpler
approach to key management. Symmetric encryption
involves the use of a single secret key to
exchange information. Let’s imagine the
locked box again. Instead of two keys, symmetric encryption
uses the same key. The owner can use it to
open the box, add items, and close it again. When they
want to share access, they can give the secret key to anyone else to do the same. Exchanging a single secret key may make web
communications faster, but it also makes
it less secure. PKI uses both asymmetric
and symmetric encryption, sometimes in conjunction
with one another. It all depends on whether speed or security is the priority. For example, mobile
chat applications use asymmetric encryption to establish a connection
between people at the start of a conversation when security is the priority. Afterwards, when the speed of communications back-and-forth
is the priority, symmetric encryption takes over. While both have their own
strengths and weaknesses, they share a common
vulnerability, establishing trust between
the sender and receiver. Both processes rely
on sharing keys that can be misused, lost, or stolen. This isn’t a problem when we exchange information
in person because we can use our senses to
tell the difference between those we trust and
those we don’t trust. Computers, on the other hand, aren’t naturally equipped
to make this distinction. That’s where the second
step of PKI applies. PKI addresses the vulnerability of key sharing by establishing trust using a system of digital certificates between
computers and networks. A digital certificate
is a file that verifies the identity
of a public key holder. Most online information is exchanged using
digital certificates. Users, companies, and networks hold one
and exchange them when communicating
information online as a way of signaling trust. Let’s look at an example of how digital certificates
are created. Let’s say an online
business is about to launch their website, and they want to obtain a digital certificate. When they register
their domain, the hosting company sends
certain information over to a trusted certificate
authority, or CA. The information provided is
usually basic things like the company name and the country where its headquarters
are located. A public key for the
site is also provided. The certificate
authority then uses this data to verify the
company’s identity. When it’s confirmed, the CA encrypts the data with
its own private key. Finally, they create
a digital certificate that contains the
encrypted company data. It also contains CA’s
digital signature to prove that it’s authentic. Digital certificates are a
lot like a digital ID badge that’s used online
to restrict or grant access to information. This is how PKI solves
the trust issue. Combined with asymmetric and symmetric encryption, this two-step approach
to exchanging secure information between
trusted sources is what makes PKI such a
useful security control.
Reading: Symmetric and asymmetric encryption
Reading
Previously, you learned these terms:
- Encryption: the process of converting data from a readable format to an encoded format
- Public key infrastructure (PKI): an encryption framework that secures the exchange of online information
- Cipher: an algorithm that encrypts information
All digital information deserves to be kept private, safe, and secure. Encryption is one key to doing that! It is useful for transforming information into a form that unintended recipients cannot understand. In this reading, you’ll compare symmetric and asymmetric encryption and learn about some well-known algorithms for each.
Types of encryption
There are two main types of encryption:
- Symmetric encryption is the use of a single secret key to exchange information. Because it uses one key for encryption and decryption, the sender and receiver must know the secret key to lock or unlock the cipher.
- Asymmetric encryption is the use of a public and private key pair for encryption and decryption of data. It uses two separate keys: a public key and a private key. The public key is used to encrypt data, and the private key decrypts it. The private key is only given to users with authorized access.
The importance of key length
Ciphers are vulnerable to brute force attacks, which use a trial and error process to discover private information. This tactic is the digital equivalent of trying every number in a combination lock trying to find the right one. In modern encryption, longer key lengths are considered to be more secure. Longer key lengths mean more possibilities that an attacker needs to try to unlock a cipher.
One drawback to having long encryption keys is slower processing times. Although short key lengths are generally less secure, they’re much faster to compute. Providing fast data communication online while keeping information safe is a delicate balancing act.
Approved algorithms
Many web applications use a combination of symmetric and asymmetric encryption. This is how they balance user experience with safeguarding information. As an analyst, you should be aware of the most widely-used algorithms.
Symmetric algorithms
- Triple DES (3DES) is known as a block cipher because of the way it converts plaintext into ciphertext in “blocks.” Its origins trace back to the Data Encryption Standard (DES), which was developed in the early 1970s. DES was one of the earliest symmetric encryption algorithms that generated 64-bit keys. A bit is the smallest unit of data measurement on a computer. As you might imagine, Triple DES generates keys that are 192 bits, or three times as long. Despite the longer keys, many organizations are moving away from using Triple DES due to limitations on the amount of data that can be encrypted. However, Triple DES is likely to remain in use for backwards compatibility purposes.
- Advanced Encryption Standard (AES) is one of the most secure symmetric algorithms today. AES generates keys that are 128, 192, or 256 bits. Cryptographic keys of this size are considered to be safe from brute force attacks. It’s estimated that brute forcing an AES 128-bit key could take a modern computer billions of years!
Asymmetric algorithms
- Rivest Shamir Adleman (RSA) is named after its three creators who developed it while at the Massachusetts Institute of Technology (MIT). RSA is one of the first asymmetric encryption algorithms that produces a public and private key pair. Asymmetric algorithms like RSA produce even longer key lengths. In part, this is due to the fact that these functions are creating two keys. RSA key sizes are 1,024, 2,048, or 4,096 bits. RSA is mainly used to protect highly sensitive data.
- Digital Signature Algorithm (DSA) is a standard asymmetric algorithm that was introduced by NIST in the early 1990s. DSA also generates key lengths of 2,048 bits. This algorithm is widely used today as a complement to RSA in public key infrastructure.
Generating keys
These algorithms must be implemented when an organization chooses one to protect their data. One way this is done is using OpenSSL, which is an open-source command line tool that can be used to generate public and private keys. OpenSSL is commonly used by computers to verify digital certificates that are exchanged as part of public key infrastructure.
Note: OpenSSL is just one option. There are various others available that can generate keys with any of these common algorithms.
In early 2014, OpenSSL disclosed a vulnerability, known as the Heartbleed bug, that exposed sensitive data in the memory of websites and applications. Although unpatched versions of OpenSSL are still available, the Heartbleed bug was patched later that year (2014). Many businesses today use the secure versions of OpenSSL to generate public and private keys, demonstrating the importance of using up-to-date software.
Obscurity is not security
In the world of cryptography, a cipher must be proven to be unbreakable before claiming that it is secure. According to Kerchoff’s principle, cryptography should be designed in such a way that all the details of an algorithm—except for the private key—should be knowable without sacrificing its security. For example, you can access all the details about how AES encryption works online and yet it is still unbreakable.
Occasionally, organizations implement their own, custom encryption algorithms. There have been instances where those secret cryptographic systems have been quickly cracked after being made public.
Pro tip: A cryptographic system should not be considered secure if it requires secrecy around how it works.
Encryption is everywhere
Companies use both symmetric and asymmetric encryption. They often work as a team, balancing security with user experience.
For example, websites tend to use asymmetric encryption to secure small blocks of data that are important. Usernames and passwords are often secured with asymmetric encryption while processing login requests. Once a user gains access, the rest of their web session often switches to using symmetric encryption for its speed.
Using data encryption like this is increasingly required by law. Regulations like the Federal Information Processing Standards (FIPS 140-3) and the General Data Protection Regulation (GDPR) outline how data should be collected, used, and handled. Achieving compliance with either regulation is critical to demonstrating to business partners and governments that customer data is handled responsibly.
Key takeaways
Knowing the basics of encryption is important for all security professionals. Symmetric encryption relies on a single secret key to protect data. On the other hand, asymmetric uses a public and private key pair. Their encryption algorithms create different key sizes. Both types of encryption are used to meet compliance regulations and protect data online.
Video: Non-repudiation and hashing
Main Points:
- Hash functions are algorithms that generate unique codes (hash values) from data.
- Unlike encryption algorithms, they are one-way and cannot be decrypted.
- Hash values are used to verify the integrity and authenticity of data:
- Detect changes in files and applications.
- Identify malicious files by comparing their hash values to known malware databases.
- Examples of hash functions: MD5, SHA-256.
Key Takeaways:
- Hash functions are crucial tools for data integrity and non-repudiation.
- They help identify potential data breaches or unauthorized modifications.
- Security analysts use them to verify files and detect malicious activity.
Additional Notes:
- Hashing does not encrypt data, but rather creates a unique “fingerprint” for identification.
- Comparing hash values is a simple and efficient way to verify data integrity.
- Online tools like VirusTotal can help analyze suspicious files using hash values.
Further Learning:
- Learn about different types of hash functions and their strengths/weaknesses.
- Explore tools for generating and verifying hash values on different platforms.
- Understand the role of hash functions in various cybersecurity applications.
Non-Repudiation and Hashing in Cybersecurity
Non-repudiation and hashing are two important concepts in cybersecurity that work together to ensure the integrity and authenticity of information.
1. What is Non-Repudiation?
Non-repudiation is the principle that someone cannot deny having performed an action or sent a message. Imagine signing a contract; your signature serves as proof that you agreed to the terms of the contract. Similarly, in the digital world, non-repudiation mechanisms are used to provide proof of actions and prevent individuals from denying their involvement.
2. What is Hashing?
Hashing is a cryptographic process that converts data into a unique fixed-size string of characters known as a hash value or digest. This process is one-way, meaning that it is computationally impossible to recreate the original data from the hash value. Hashing functions are specifically designed to be sensitive to any changes in the input data, even the smallest alteration will result in a completely different hash value.
3. How are Non-Repudiation and Hashing Related?
Hashing plays a vital role in achieving non-repudiation in various ways:
- Data Integrity: Hash values act as digital fingerprints that can be used to verify the integrity of data. If a file or message has been altered in any way, its hash value will no longer match the original, indicating tampering.
- Digital Signatures: Digital signatures are created by combining a hash value of the data with the signer’s private key. This signature serves as proof that the signer has seen and approved the data, preventing them from later denying their involvement.
- Audit Logs: Hashing is often used to ensure the integrity of audit logs, which record security-related events within a system. By hashing each log entry, it becomes impossible to alter the log without being detected.
4. Applications of Non-Repudiation and Hashing:
- Digital signatures for contracts and documents
- Secure email communication
- Software integrity verification
- Data center security
- Blockchain technology
5. Benefits of Using Non-Repudiation and Hashing:
- Increased trust and accountability
- Reduced risk of fraud and errors
- Improved data security and compliance
- Enhanced forensic capabilities
6. Best Practices for Non-Repudiation and Hashing:
- Use strong hashing algorithms
- Implement secure key management practices
- Validate digital signatures before accepting data
- Regularly update and audit systems
7. Conclusion:
Non-repudiation and hashing are powerful tools that can significantly enhance the security and integrity of information in the digital world. By understanding these concepts and implementing them effectively, individuals and organizations can reduce the risk of cyber threats and create a more secure online environment.
Additional Resources:
- National Institute of Standards and Technology (NIST): https://csrc.nist.gov/projects/hash-functions
- SANS Institute: https://www.cryptomathic.com/products/authentication-signing/digital-signatures-faqs/what-is-non-repudiation
- Cloudflare PKI Guide: https://research.cloudflare.com/projects/internet-infrastructure/pki/
Security professionals are always thinking about vulnerabilities. It’s how
we stay ahead of threats. We’ve spent some time together exploring
a couple forms of encryption. The two types we’ve discussed
produce keys that are shared when communicating information. Encryption keys are vulnerable
to being lost or stolen, which can lead to sensitive
information at risk. Let’s explore another security control
that helps companies address this weakness. A hash function is an algorithm that
produces a code that can’t be decrypted. Unlike asymmetric and
symmetric algorithms, hash functions are one-way processes
that do not generate decryption keys. Instead, these algorithms produce a unique
identifier known as a hash value, or digest. Here’s an example to demonstrate this. Imagine a company has an internal
application that is used by employees and is stored in a shared drive. After passing through a hashing function,
the program receives its hash value. For example purposes, we created this relatively short hash
value with the MD5 hashing function. Generally, standard hash functions that
produce longer hashes are preferred for being more secure. Next, let’s imagine an attacker
replaces the program with a modified version that
performs malicious actions. The malicious program may
work like the original. However, if so much as one line of
code is different from the original, it will produce a different hash value. By comparing the hash values, we can
validate that the programs are different. Attackers use tricks like this often
because they’re easily overlooked. Fortunately, hash values help us identify
when something like this is happening. In security, hashes
are primarily used as a way to determine the integrity of files and
applications. Data integrity relates to the accuracy and
consistency of information. This is known as non-repudiation, the concept that authenticity
of information can’t be denied. Hash functions are important security
controls that make proven data integrity possible. Analysts use them frequently. One way to do this is by finding
the hash value of files or applications and comparing them
against known malicious files. For example, we can use the Linux command
line to generate the hash value for any file on your computer. We just launch a shell and type the name
of the hashing algorithm we want to use. In this case, we’re using
a common one known as sha256. Next, we need to enter the file
name of any file we want to hash. Let’s hash the contents of newfile.txt. Now, we’ll press Enter. The terminal generates this
unique hash value for the file. These tools can be compared with
the hash values of known online viruses. One such database is VirusTotal. This is a popular tool among security
practitioners that’s useful for analyzing suspicious files, domains,
IPs, and URLs. As we’ve explored, even the slightest
change in input results in a totally different hash value. Hash functions are intentionally designed
this way to assist with matters of non-repudiation. They equip computers with a quick and
easy way to compare input and output values and validate data integrity. Pretty cool, right?
Fill in the blank: Hash values are primarily used to determine the _____ of files and applications.
integrity
Hash values are primarily used as a way to determine the integrity of files and applications. Hashes also keep information confidential because they can’t be decrypted.
Reading: The evolution of hash functions
Reading
Hash functions are important controls that are part of every company’s security strategy. Hashing is widely used for authentication and non-repudiation, the concept that the authenticity of information can’t be denied.
Previously, you learned that hash functions are algorithms that produce a code that can’t be decrypted. Hash functions convert information into a unique value that can then be used to determine its integrity. In this reading, you’ll learn about the origins of hash functions and how they’ve changed over time.
Origins of hashing
Hash functions have been around since the early days of computing. They were originally created as a way to quickly search for data. Since the beginning, these algorithms have been designed to represent data of any size as small, fixed-size values, or digests. Using a hash table, which is a data structure that’s used to store and reference hash values, these small values became a more secure and efficient way for computers to reference data.
One of the earliest hash functions is Message Digest 5, more commonly known as MD5. Professor Ronald Rivest of the Massachusetts Institute of Technology (MIT) developed MD5 in the early 1990s as a way to verify that a file sent over a network matched its source file.
Whether it’s used to convert a single email or the source code of an application, MD5 works by converting data into a 128-bit value. You might recall that a bit is the smallest unit of data measurement on a computer. Bits can either be a 0 or 1. In a computer, bits represent user input in a way that computers can interpret. In a hash table, this appears as a string of 32 characters. Altering anything in the source file generates an entirely new hash value.
Generally, the longer the hash value, the more secure it is. It wasn’t long after MD5’s creation that security practitioners discovered 128-bit digests resulted in a major vulnerability.
Here is an example of how plaintext gets turned into hash values:
Hash collisions
One of the flaws in MD5 happens to be a characteristic of all hash functions. Hash algorithms map any input, regardless of its length, into a fixed-size value of letters and numbers. What’s the problem with that? Although there are an infinite amount of possible inputs, there’s only a finite set of available outputs!
MD5 values are limited to 32 characters in length. Due to the limited output size, the algorithm is considered to be vulnerable to hash collision, an instance when different inputs produce the same hash value. Because hashes are used for authentication, a hash collision is similar to copying someone’s identity. Attackers can carry out collision attacks to fraudulently impersonate authentic data.
Next-generation hashing
To avoid the risk of hash collisions, functions that generated longer values were needed. MD5’s shortcomings gave way to a new group of functions known as the Secure Hashing Algorithms, or SHAs.
The National Institute of Standards and Technology (NIST) approves each of these algorithms. Numbers besides each SHA function indicate the size of its hash value in bits. Except for SHA-1, which produces a 160-bit digest, these algorithms are considered to be collision-resistant. However, that doesn’t make them invulnerable to other exploits.
Five functions make up the SHA family of algorithms:
- SHA-1
- SHA-224
- SHA-256
- SHA-384
- SHA-512
Secure password storage
Passwords are typically stored in a database where they are mapped to a username. The server receives a request for authentication that contains the credentials supplied by the user. It then looks up the username in the database and compares it with the password that was provided and verifies that it matches before granting them access.
This is a safe system unless an attacker gains access to the user database. If passwords are stored in plaintext, then an attacker can steal that information and use it to access company resources. Hashing adds an additional layer of security. Because hash values can’t be reversed, an attacker would not be able to steal someone’s login credentials if they managed to gain access to the database.
Rainbow tables
A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictionaries of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.
Adding some “salt”
Functions with larger digests are less vulnerable to collision and rainbow table attacks. But as you’re learning, no security control is perfect.
Salting is an additional safeguard that’s used to strengthen hash functions. A salt is a random string of characters that’s added to data before it’s hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.
For example, a database containing passwords might have several hashed entries for the password “password.” If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for “password” in the database.
For this reason, salting has become increasingly common when storing passwords and other types of sensitive data. The length and uniqueness of a salt is important. Similar to hash values, the longer and more complex a salt is, the harder it is to crack.
Key takeaways
Security professionals often use hashing as a tool to validate the integrity of program files, documents, and other types of data. Another way it’s used is to reduce the chances of a data breach. As you’ve learned, not all hashing functions provide the same level of protection. Rainbow table attacks are more likely to work against algorithms that generate shorter keys, like MD5. Many small- and medium-sized businesses still rely on MD5 to secure sensitive data. Knowing about alternative algorithms and salting better prepares you to make impactful security recommendations.
Practice Quiz: Test your knowledge: Encryption methods
Which of the following elements are required when using encryption? Select all that apply.
Cipher, Key
A cipher and a key are required when using encryption. This enables secure information exchange.
Which technologies are used in public key infrastructure (PKI) to securely exchange information online? Select two answers.
Encryption algorithms, Digital certificates
PKI uses encryption algorithms and digital certificates to securely exchange information online. Asymmetric and symmetric algorithms are used first to quickly and securely encrypt data. Digital certificates are used second as a way of signaling trust between the sender and receiver when exchanging encrypted data online.
Fill in the blank: _____ encryption produces a public and private key pair.
Asymmetric
Asymmetric encryption produces a public and private key pair that are used to encrypt and decrypt information. The public key is shared with others while the data owner manages the private key.
An attacker gains access to a database where user passwords are secured with the SHA-256 hashing algorithm. Can the attacker decrypt the user passwords?
No. Hash algorithms do not produce decryption keys.
The attacker cannot decrypt the user passwords because they are stored as a hash value that is irreversible. Only symmetric and asymmetric encryption algorithms produce decryption keys.
What term describes being unable to deny that information is authentic?
Non-repudiation
Non-repudiation means that the authenticity of information cannot be denied. It also confirms that the sender of data is who they claim to be.
Authentication, authorization, and accounting
Video: Access controls and authentication systems
Main Points:
- Access controls manage who can access information and maintain data confidentiality, integrity, and availability.
- Access controls comprise three functions: authentication, authorization, and accounting.
- Authentication verifies user identity through knowledge (password), ownership (OTP), or characteristic (biometrics).
- User credentials must match information on file for access to be granted.
- Single sign-on (SSO) combines multiple logins for faster access but can be vulnerable.
- Multi-factor authentication (MFA) requires multiple factors for stronger security.
- SSO and MFA are often used together for convenient and secure access.
- Next topic: authorization.
Key Takeaways:
- Access controls are essential for data security.
- Authentication verifies user identity before granting access.
- SSO and MFA are two key authentication technologies.
- Combining SSO and MFA enhances security while maintaining convenience.
Additional Notes:
- Incorrectly granting or denying access can have negative consequences.
- Biometrics are becoming increasingly common for authentication.
- The next section will explore authorization in detail.
Access controls and authentication systems are fundamental pillars of cybersecurity. They ensure that only authorized users can access sensitive information and resources, thereby protecting data confidentiality, integrity, and availability. This tutorial will provide a comprehensive overview of these critical security concepts.
What are Access Controls?
Access controls are security mechanisms that manage who can access specific resources and information within a system. They determine whether a user is authorized to perform certain actions, such as reading, writing, or deleting data. Access control systems can be implemented at various levels, including:
- Network level: Firewalls and access control lists (ACLs) restrict access to specific network resources.
- System level: Operating systems and applications enforce access controls based on user permissions and roles.
- Data level: Databases and other repositories implement access controls to protect sensitive data.
Types of Access Controls:
There are several types of access controls, each with its own strengths and weaknesses:
- Discretionary Access Control (DAC): Users are granted access to resources based on their individual permissions or roles.
- Mandatory Access Control (MAC): Access is granted based on a central authority’s predefined rules and cannot be modified by individual users.
- Role-Based Access Control (RBAC): Users are assigned roles with predefined permissions, simplifying access management.
- Attribute-Based Access Control (ABAC): Access decisions are based on a set of dynamic attributes, such as user identity, location, time, and device.
What is Authentication?
Authentication is the process of verifying a user’s identity before granting access to a system or resource. It ensures that only authorized users can access sensitive information and prevents unauthorized access attempts.
Authentication Factors:
There are three primary factors used for authentication:
- Knowledge: Something the user knows, such as a password or PIN.
- Possession: Something the user has, such as a security token or smartphone.
- Inherence: Something the user is, such as a fingerprint or facial scan.
Strong Authentication:
Strong authentication systems use multiple authentication factors to improve security. This makes it more difficult for attackers to impersonate legitimate users. Common examples of strong authentication include:
- Multi-factor authentication (MFA): Requires users to provide at least two different factors for authentication.
- Biometric authentication: Uses unique physical or behavioral characteristics, such as fingerprints, iris scans, or voice patterns, for identification.
Single Sign-On (SSO):
Single sign-on (SSO) allows users to access multiple applications and resources with one set of credentials. This improves convenience for users and reduces the risk of password fatigue. However, it is important to note that SSO systems can be a single point of failure if compromised.
Best Practices for Access Control and Authentication:
Here are some best practices for implementing secure access control and authentication systems:
- Use strong passwords and enforce regular password changes.
- Implement multi-factor authentication (MFA) where possible.
- Grant users access only to the information and resources they need to perform their job duties.
- Monitor and audit access logs to detect suspicious activity.
- Keep your software up to date to patch vulnerabilities.
- Educate users about cybersecurity best practices.
Conclusion:
Access controls and authentication systems are essential components of any cybersecurity strategy. By implementing strong access controls and authentication mechanisms, organizations can protect their sensitive information and resources from unauthorized access. By understanding the different types of access controls and authentication factors, and by following best practices, organizations can create a more secure environment for their users and data.
Additional Resources:
- National Institute of Standards and Technology (NIST): https://www.nist.gov/cybersecurity
- SANS Institute: https://www.sans.org/
- Open Web Application Security Project (OWASP): https://owasp.org/
Further Learning:
- Explore specific tools and technologies for implementing access controls and authentication, such as Active Directory, Azure Active Directory, and Okta.
- Learn about advanced authentication methods, such as behavioral biometrics and risk-based authentication.
- Stay up-to-date with the latest cybersecurity threats and vulnerabilities related to access controls and authentication.
Protecting data is a fundamental
feature of security controls. When it comes to keeping information
safe and secure, hashing and encryption are powerful, yet limited tools. Managing who or what has access to information is
also key to safeguarding information. The next series of controls that we’ll
be exploring are access controls, the security controls that
manage access, authorization, and accountability of information. When done well, access controls
maintain data confidentiality, integrity, and availability. They also get users
the information they need quickly. These systems are commonly broken down
into three separate, yet related functions known as the authentication,
authorization, and accounting framework. Each control has its own protocol and
systems that make them work. In this video, let’s get comfortable with
the basics of the first one on the list, authentication. Authentication systems are access
controls that serve a very basic purpose. They ask anything attempting
to access information this simple question: who are you? Organizations go about collecting
answers to these questions differently, depending on the objectives
of their security policy. Some are more thorough than others,
but in general, responses to this question can be based
on three factors of authentication. The first is knowledge. Authentication by
knowledge refers to something the user knows, like a password or the answer to a security question
they provided previously. Another factor is ownership,
referring to something the user possesses. A commonly used type of authentication
by ownership is a one-time passcode, or OTP. You’ve probably experienced
these at one time or another. They’re a random number
sequence that an application or website will send you via text or
email and ask you to provide. Last is characteristic. Authentication
by this factor is something the user is. Biometrics, like fingerprint scans on your
smartphone, are example of this type of authentication. While not used everywhere, this form of
authentication is becoming more common because it’s much tougher for
criminals to impersonate someone if they have to mimic a fingerprint or
facial scan as opposed to a password. The information provided during
authentication needs to match the information on file for
these access controls to work. When the credentials don’t match,
authentication fails and access is denied. When they match, access is granted. Incorrectly denying access
can be frustrating to anyone. To make access systems more convenient, many organizations these
days rely on single sign-on. Single sign-on, or SSO, is a technology that combines
several different logins into one. Can you imagine having to reintroduce
yourself every time you meet up with a friend? That’s exactly the sort
of problem SSO solves. Instead of requiring users to authenticate
over and over again, SSO establishes their identity once, allowing them to
gain access to company resources faster. While SSO systems are helpful when it
comes to speeding up the authentication process, they present a significant
vulnerability when used alone. Denying access to authorized
users can be frustrating, but you know what’s even worse? Incorrectly
granting access to the wrong user. SSO technology is great, but not if
it relies on just a single factor of authentication. Adding more authentication
factors strengthen these systems. Multi-factor authentication, or
MFA, is a security measure, which requires a user to verify their identity in two or
more ways to access a system or network. MFA combines two or more independent
credentials, like knowledge and ownership, to prove that someone
is who they claim to be. SSO and MFA are often used in
conjunction with one another to layer the defense capabilities
of authentication systems. When both are used, organizations
can ensure convenient access that is also secure. Now that we covered authentication, we’re ready to explore the second
part of the framework. Next, we’ll learn about authorization!
What are the three factors of authentication? Select three answers.
Knowledge
The three factors of authentication are: characteristic, ownership, and knowledge. Knowledge is used to verify a user’s identity using something the user knows, like a password.
Ownership
The three factors of authentication are: characteristic, ownership, and knowledge. Ownership is used to verify a user’s identity using something the user possesses, like a one-time passcode.
Characteristic
The three factors of authentication are: characteristic, ownership, and knowledge. A characteristic is used to verify a user’s identity using something the user is, such as their fingerprint or other biometrics.
Reading: The rise of SSO and MFA
Reading
Most companies help keep their data safely locked up behind authentication systems. Usernames and passwords are the keys that unlock information for most organizations. But are those credentials enough? Information security often focuses on managing a user’s access of, and authorization to, information.
Previously, you learned about the three factors of authentication: knowledge, ownership, and characteristic. Single sign-on (SSO) and multi-factor authentication (MFA) are two technologies that have become popular for implementing these authentication factors. In this reading, you’ll learn how these technologies work and why companies are adopting them.
A better approach to authentication
Single sign-on (SSO) is a technology that combines several different logins into one. More companies are turning to SSO as a solution to their authentication needs for three reasons:
- SSO improves the user experience by eliminating the number of usernames and passwords people have to remember.
- Companies can lower costs by streamlining how they manage connected services.
- SSO improves overall security by reducing the number of access points attackers can target.
This technology became available in the mid-1990s as a way to combat password fatigue, which refers to people’s tendency to reuse passwords across services. Remembering many different passwords can be a challenge, but using the same password repeatedly is a major security risk. SSO solves this dilemma by shifting the burden of authentication away from the user.
How SSO works
SSO works by automating how trust is established between a user and a service provider. Rather than placing the responsibility on an employee or customer, SSO solutions use trusted third-parties to prove that a user is who they claim to be. This is done through the exchange of encrypted access tokens between the identity provider and the service provider.
Similar to other kinds of digital information, these access tokens are exchanged using specific protocols. SSO implementations commonly rely on two different authentication protocols: LDAP and SAML. LDAP, which stands for Lightweight Directory Access Protocol, is mostly used to transmit information on-premises; SAML, which stands for Security Assertion Markup Language, is mostly used to transmit information off-premises, like in the cloud.
Note: LDAP and SAML protocols are often used together.
Here’s an example of how SSO can connect a user to multiple applications with one access token:
Limitations of SSO
Usernames and passwords alone are not always the most secure way of protecting sensitive information. SSO provides useful benefits, but there’s still the risk associated with using one form of authentication. For example, a lost or stolen password could expose information across multiple services. Thankfully, there’s a solution to this problem.
MFA to the rescue
Multi-factor authentication (MFA) requires a user to verify their identity in two or more ways to access a system or network. In a sense, MFA is similar to using an ATM to withdraw money from your bank account. First, you insert a debit card into the machine as one form of identification. Then, you enter your PIN number as a second form of identification. Combined, both steps, or factors, are used to verify your identity before authorizing you to access the account.
Strengthening authentication
MFA builds on the benefits of SSO. It works by having users prove that they are who they claim to be. The user must provide two factors (2FA) or three factors (3FA) to authenticate their identification. The MFA process asks users to provide these proofs, such as:
- Something a user knows: most commonly a username and password
- Something a user has: normally received from a service provider, like a one-time passcode (OTP) sent via SMS
- Something a user is: refers to physical characteristics of a user, like their fingerprints or facial scans
Requiring multiple forms of identification is an effective security measure, especially in cloud environments. It can be difficult for businesses in the cloud to ensure that the users remotely accessing their systems are not threat actors. MFA can reduce the risk of authenticating the wrong users by requiring forms of identification that are difficult to imitate or brute force.
Key takeaways
Implementing both SSO and MFA security controls improves security without sacrificing the user experience. Relying on passwords alone is a serious vulnerability. Implementing SSO means fewer points of entry, but that’s not enough. Combining SSO and MFA can be an effective way to protect information, so that users have a streamlined experience while unauthorized people are kept away from important information.
Video: The mechanisms of authorization
Main Points:
- Authorization determines what a user is allowed to do after being authenticated.
- It follows the principle of least privilege and separation of duties.
- Least privilege grants access only as needed, while separation of duties prevents misuse.
- HTTP basic auth and OAuth are common network access controls.
- Basic auth sends usernames and passwords openly, while OAuth uses secure API tokens.
- Both methods consider least privilege and separation of duties.
- Next part: accounting for access control and monitoring activity.
Key Takeaways:
- Authorization is crucial for secure access control.
- Least privilege and separation of duties minimize risk.
- Different protocols like HTTP basic auth and OAuth implement authorization.
- API tokens provide additional security in OAuth.
- Monitoring access control is essential for identifying potential issues.
Additional Notes:
- HTTPS offers more security than HTTP basic auth.
- OAuth is a widely used and secure authorization protocol.
- Monitoring access logs helps detect suspicious activity.
- The next section will explore accounting in access control.
In the realm of cybersecurity, access control plays a critical role in safeguarding sensitive data and systems. While authentication verifies user identity, authorization determines their access privileges, defining what they can and cannot do within a system. This tutorial delves into the mechanisms of authorization, exploring its key principles, implementation methods, and best practices for secure access control.
Understanding the Essence of Authorization:
Authorization systems act as gatekeepers, ensuring only authorized individuals have access to specific resources and functionalities. They determine:
- What resources can be accessed: This includes files, applications, databases, and other sensitive information.
- What actions can be performed: This encompasses reading, writing, modifying, deleting, and other operations.
- Under what conditions access is granted: This involves factors like time of day, location, and purpose of access.
Fundamental Principles of Authorization:
Two fundamental principles guide authorization decisions:
- Principle of Least Privilege: Grant users the minimum level of access necessary to perform their assigned tasks. This minimizes the potential impact of unauthorized actions and simplifies access management.
- Separation of Duties: Divide responsibilities so no single individual has complete control over critical functions. This reduces the risk of internal fraud, errors, and misuse of authority.
Common Mechanisms for Implementing Authorization:
- Role-Based Access Control (RBAC): Users are assigned roles with predefined permissions, simplifying access management and ensuring compliance with least privilege.
- Attribute-Based Access Control (ABAC): Access decisions are based on dynamic attributes, such as user identity, location, time, device, and sensitivity of the resource.
- Mandatory Access Control (MAC): Enforces centrally defined access rules, restricting user control and providing a high level of security.
- Discretionary Access Control (DAC): Users have greater control over their own resources and can grant access to others.
Network Access Control Mechanisms:
- HTTP Basic Auth: Sends usernames and passwords openly, making it vulnerable to eavesdropping.
- HTTPS: Encrypts communication between client and server, protecting sensitive information.
- OAuth: Uses secure API tokens for authorization, eliminating the need for password sharing.
Best Practices for Secure Authorization:
- Implement the principle of least privilege and separation of duties.
- Use strong authentication methods like multi-factor authentication.
- Regularly review and update user permissions.
- Monitor and audit access logs to detect suspicious activity.
- Implement role-based access control (RBAC) or attribute-based access control (ABAC).
- Use secure network protocols like HTTPS and OAuth.
- Keep software and systems up-to-date to patch vulnerabilities.
- Educate users about cybersecurity best practices.
Conclusion:
Authorization plays a vital role in ensuring secure access control and protecting sensitive data. By understanding the fundamental principles, implementing appropriate mechanisms, and adhering to best practices, organizations can create a robust and secure environment for their users and systems. Remember, authorization is an ongoing process, requiring continuous monitoring, review, and adaptation to evolving security threats and business needs.
Further Learning:
- Explore specific authorization tools and technologies like Active Directory, Azure Active Directory, and Okta.
- Learn about advanced authorization models like identity and access management (IAM) and zero-trust security.
- Stay up-to-date with the latest cybersecurity threats and vulnerabilities related to authorization.
By deepening your understanding of authorization mechanisms, you can become a valuable asset in safeguarding your organization’s data and systems.
Access is as much
about authorization as it is about authentication. One of the most
important functions of access controls is how they assign responsibility for
certain systems and processes. Next up in our exploration of access control systems are the mechanisms of authorization. These protocols actually
work closely together with authentication
technologies. While one validates who the user is, the other determines what
they’re allowed to do. Let’s take a look at the
next part of the authentication, authorization, and
accounting framework that protects
private information. Earlier, we learned about the principle of
least privilege. Authorization is linked
to the idea that access to information only
lasts as long as needed. Authorization systems are also heavily influenced by this idea in addition to another
important security principle, the separation of duties. Separation of duties is the principle that users
should not be given levels of authorization
that will allow them to misuse a system. Separating duties
reduces the risk of system failures and inappropriate
behavior from users. For example, a person responsible for providing
customer service shouldn’t also be
authorized to rate their own performance.
In this position, they could easily neglect
their duties while continuing to give themselves high marks with no oversight. Similarly, if one person was authorized to develop and
test a security system, they are much more likely to be unaware of its weaknesses. Both the principle of least
privilege and the concept of separating duties apply
to more than just people. They apply to all systems
including networks, databases, processes, and any other aspect of
an organization. Ultimately,
authorization depends on a system or user’s role. When it comes to securing
data over a network, there are a couple
of frequently used access controls that you
should be familiar with: HTTP basic auth and OAuth. Have you ever wondered what the HTTP in web
addresses stood for. It stands for hypertext
transfer protocol, which is how communications
are established over network. HTTP uses what is
known as basic auth, the technology used to establish a user’s request to
access a server. Basic auth works by sending an identifier every time a user communicates
with a web page. Some websites still use basic
auth to tell whether or not someone is authorized to access information on that site. However, their protocol is considered to be
vulnerable to attacks because it transmits
usernames and password openly
over the network. Most websites today
use HTTPS instead, which stands for hypertext
transfer protocol secure. This protocol doesn’t expose
sensitive information, like access credentials, when communicating over the network. Another secure
authentication technology used today is OAuth. OAuth is an open-standard
authorization protocol that shares designated
access between applications. For example, you can
tell Google that it’s okay for another website
to access your profile to create an account. Instead of requesting
and sending sensitive usernames and
passwords over the network, OAuth uses API tokens to verify access between you and
a service provider. An API token is a small block of encrypted code that contains
information about a user. These tokens contain
things like your identity, site permissions, and more. OAuth sends and receives
access requests using API tokens by passing them from a server to a user’s device. Let’s explore what’s going
on behind the scenes. When you authorize
a site to create an account using
your Google profile, all of Google’s usual login
protocols are still active. If you have multi-factor
authentication enabled on your account,
and you should, you’ll still have the security
benefits that it provides. API tokens minimize
risks in a major way. These API tokens serve as an additional layer of
encryption that helps to keep your Google
password safe in the event of a breach
on another platform. Basic auth and OAuth are just a couple of examples
of authorization tools that are designed with
the principles of least privilege and
separation of duty in mind. There are many other
controls that help limit the risk of unauthorized
access to information. In addition to
controlling access, it’s also important to monitor it. In our next video, we’ll focus on the third and final part
of the authentication, authorization, and
accounting framework.
Authorization controls are linked to two security principles. One is the principle of least privilege. What is the other?
Separation of duties
Authorization controls are linked to the separation of duties and the principle of least privilege. Separation of duties is the principle that users should not be given levels of authorization that would allow them to misuse a system.
Video: Why we audit user activity
Main Points:
- Accounting monitors access logs to track user activity and resource usage.
- Access logs include information like user identity, timestamps, and accessed resources.
- Security analysts use access logs to identify trends, detect security incidents, and investigate suspicious activity.
- Each user session triggers creation of a session ID and exchange of session cookies.
- Session IDs identify users and cookies maintain session validity.
- Session hijacking involves stealing session IDs to impersonate legitimate users.
- Monitoring access logs helps identify potential security breaches and unauthorized access.
- Accounting provides valuable insights for improving information security.
Key Takeaways:
- Access logs are crucial for security analysis and incident response.
- Session IDs and cookies manage user sessions and prevent unauthorized access.
- Session hijacking is a serious threat that exploits stolen session IDs.
- Monitoring access logs helps detect and prevent security incidents.
- Accounting plays a vital role in maintaining information security.
Additional Notes:
- Access logs are used to investigate security events and identify attackers.
- Session cookies improve web session security and efficiency.
- Session hijacking can lead to data breaches and financial losses.
- Strong authentication and monitoring access logs help mitigate security risks.
Conclusion:
Accounting is an essential component of access control systems, providing valuable insights into user activity and resource usage. By monitoring access logs and understanding session management mechanisms, organizations can improve information security and protect against cyber threats.
In the ever-evolving landscape of cybersecurity, auditing user activity plays a critical role in safeguarding sensitive information and maintaining system integrity. By examining user actions and system events, organizations can gain valuable insights into potential threats, detect anomalies, and enforce accountability. This tutorial delves into the reasons why auditing user activity is crucial for robust cybersecurity.
Benefits of Auditing User Activity:
- Identifying Security Threats: Auditing user activity helps detect suspicious behavior, such as unauthorized access attempts, unusual resource usage, and data exfiltration attempts. Early identification of these threats allows for immediate response, minimizing potential damage.
- Investigating Security Incidents: When a security incident occurs, auditing logs provide a comprehensive record of user activity, aiding in incident investigation and root cause analysis. This information helps identify the origin of the attack, the affected systems, and the scope of the damage.
- Ensuring Compliance: Many regulations, such as HIPAA and PCI DSS, require organizations to audit user activity to demonstrate compliance with data security standards. Auditing logs provide evidence of compliance and can prevent costly fines and penalties.
- Enhancing Accountability: By tracking user activity, organizations can identify individuals responsible for specific actions within a system. This promotes accountability and helps deter unauthorized activity and data misuse.
- Identifying Trends and Patterns: Analyzing user activity logs over time can reveal patterns and trends, such as peak usage periods, frequently accessed resources, and user behavior anomalies. This information helps optimize resource allocation, improve system performance, and identify potential security vulnerabilities.
Key Components of User Activity Auditing:
- Data Collection: Identifying the types of user activity to be audited, such as logins, file access, and system modifications.
- Log Management: Implementing a system for collecting, storing, and analyzing audit logs securely and efficiently.
- Alerting and Reporting: Establishing automated alerts for suspicious activity and generating reports for further analysis and trend identification.
- Retention and Archiving: Defining data retention policies and ensuring secure archiving of audit logs for regulatory compliance and forensic investigation.
Best Practices for Effective User Activity Auditing:
- Clearly define audit policies and procedures.
- Limit access to sensitive data and audit privileged users more rigorously.
- Use strong authentication and authorization controls.
- Regularly review and update audit logs.
- Invest in user activity monitoring and analysis tools.
- Educate users about the importance of security and user behavior expectations.
Conclusion:
Auditing user activity is an indispensable practice for any organization committed to robust cybersecurity. By understanding the benefits, key components, and best practices, organizations can leverage user activity auditing to proactively identify and mitigate security threats, ensure compliance, and maintain system integrity. Remember, effective user activity auditing is a continuous process, requiring ongoing review, adaptation, and investment in security tools and technologies.
Further Learning:
- Explore specific user activity monitoring and analysis tools available.
- Learn about advanced security analytics techniques for detecting anomalies and threats.
- Stay up-to-date with emerging cybersecurity threats and trends.
- Implement a comprehensive security awareness program for your employees.
By prioritizing and continuously improving your user activity auditing practices, you can significantly strengthen your cybersecurity posture and protect your valuable data.
Have you ever wondered if
your employer is keeping a record of when you log into
company systems? Well, they are, if they’re implementing the third and final function
of the authentication, authorization, and
accounting framework. Accounting is the practice of monitoring the access
logs of a system. These logs contain
information like who accessed the system, and
when they accessed it, and what resources they used. Security analysts use
access logs a lot. The data they contain
is a helpful way to identify trends, like
failed login attempts. They’re also used to uncover hackers who have
gained access to a system, and for detecting an incident,
like a data breach. In this field, access
logs are essential. Oftentimes, analyzing them is the first procedure
you’ll follow when investigating
a security event. So, how do access logs compile
all this useful information? Let’s examine this more closely. Anytime a user
accesses a system, they initiate what’s
called a session. A session is a sequence
of network HTTP basic auth requests and responses associated
with the same user, like when you visit a website. Access logs are essentially
records of sessions that capture the moment a user enters a system until the
moment they leave it. Two actions are triggered
when the session begins. The first is the creation
of a session ID. A session ID is a unique
token that identifies a user and their device
while accessing the system. Session IDs are attached
to the user until they either close their browser
or the session times out. The second action that takes place at the start
of a session is an exchange of session cookies between a server
and a user’s device. A session cookie is a
token that websites use to validate a session
and determine how long that session should last. When cookies are exchanged between your computer
and a server, your session ID is
read to determine what information the
website should show you. Cookies make web sessions
safer and more efficient. The exchange of tokens means that no sensitive information, like usernames and
passwords, are shared. Session cookies
prevent attackers from obtaining sensitive data. However, there’s other
damage that they can do. With a stolen cookie, an attacker can impersonate a user using their
session token. This kind of attack is known
as session hijacking. Session hijacking
is an event when attackers obtain a legitimate
user’s session ID. During these kinds of attacks, cyber criminals
impersonate the user, causing all sorts of harm. Money or private
data can be stolen. If, for example, hijackers obtain
a single sign-on credential from stolen cookies, they can even gain access to additional systems that
otherwise seem secure. This is one reason
why accounting and monitoring session
logs is so important. Unusual activity on access
logs can be an indication that information has been
improperly accessed or stolen. At the end of the day,
accounting is how we gain valuable insight that
makes information safer.
Video: Tim: Finding purpose in protecting assets
Main Points:
- Cybersecurity professionals protect critical company assets and user information.
- The stakes are high, as sensitive data like financial information and personal secrets are at risk.
- Cybersecurity offers a direct line to protecting the company’s most valuable assets.
- This provides a sense of purpose, motivation, and satisfaction in one’s career.
- Cybersecurity is a rewarding career due to its critical nature and high demand.
- There is a shortage of talented cybersecurity professionals, leading to a viable long-term career path.
Key Takeaways:
- Cybersecurity protects sensitive information and vital company assets.
- The field offers a rewarding career with purpose, motivation, and high demand.
- A shortage of skilled professionals makes cybersecurity a viable long-term career choice.
Additional Notes:
- The speaker works on the Detection and Response team at Google, which works like a security team for Google and its users.
- Cybersecurity professionals are responsible for protecting user data like documents, pictures, financial information, and other sensitive information.
- Cybersecurity is a critical function for many companies and is in high demand due to a shortage of skilled professionals.
Conclusion:
Cybersecurity is a rewarding career path due to its critical nature, high demand, and the opportunity to directly protect valuable assets and user information. If you are looking for a viable and fulfilling career, cybersecurity is a strong option to consider.
[MUSIC] My name is Tim and I work on
the Detection and Response team at Google. You can think of us as the smoke detectors
and the fire departments at Google. So what our job is, is to detect
harmful activity that may affect Google and its users. The stakes here are very, very high. So imagine what you have on Google,
whether it’s docs, it’s pictures, your financial information,
some of your secrets. Some things that you don’t
want anybody to know. Those are the things
that we’re protecting. Cybersecurity professionals are there to protect the most
valuable assets of the company. You’ll be there to protect that, and that direct line from what you’re doing to
what the company feels is most important, most valuable, and protecting that, I think
provides a lot of purpose for folks. And provides a lot of motivation and
provides the basis and the foundation for a very,
very satisfying career. Cybersecurity is a profoundly
rewarding career. It is a function that is critical at many,
many companies and it is a career that is in high demand, and there is an absolute shortage
of talented labor out there. So from that aspect, if you’re looking for a path to a viable, long
term, rewarding career, this is as straight a path
to that as you can imagine.
Reading: Identity and access management
Reading
Security is more than simply combining processes and technologies to protect assets. Instead, security is about ensuring that these processes and technologies are creating a secure environment that supports a defense strategy. A key to doing this is implementing two fundamental security principles that limit access to organizational resources:
- The principle of least privilege in which a user is only granted the minimum level of access and authorization required to complete a task or function.
- Separation of duties, which is the principle that users should not be given levels of authorization that would allow them to misuse a system.
Both principles typically support each other. For example, according to least privilege, a person who needs permission to approve purchases from the IT department shouldn’t have the permission to approve purchases from every department. Likewise, according to separation of duties, the person who can approve purchases from the IT department should be different from the person who can input new purchases.
In other words, least privilege limits the access that an individual receives, while separation of duties divides responsibilities among multiple people to prevent any one person from having too much control.
Note: Separation of duties is sometimes referred to as segregation of duties.
Previously, you learned about the authentication, authorization, and accounting (AAA) framework. Many businesses used this model to implement these two security principles and manage user access. In this reading, you’ll learn about the other major framework for managing user access, identity and access management (IAM). You will learn about the similarities between AAA and IAM and how they’re commonly implemented.
Identity and access management (IAM)
As organizations become more reliant on technology, regulatory agencies have put more pressure on them to demonstrate that they’re doing everything they can to prevent threats. Identity and access management (IAM) is a collection of processes and technologies that helps organizations manage digital identities in their environment. Both AAA and IAM systems are designed to authenticate users, determine their access privileges, and track their activities within a system.
Either model used by your organization is more than a single, clearly defined system. They each consist of a collection of security controls that ensure the right user is granted access to the right resources at the right time and for the right reasons. Each of those four factors is determined by your organization’s policies and processes.
Note: A user can either be a person, a device, or software.
Authenticating users
To ensure the right user is attempting to access a resource requires some form of proof that the user is who they claim to be. In a video on authentication controls, you learned that there are a few factors that can be used to authenticate a user:
- Knowledge, or something the user knows
- Ownership, or something the user possesses
- Characteristic, or something the user is
Authentication is mainly verified with login credentials. Single sign-on (SSO), a technology that combines several different logins into one, and multi-factor authentication (MFA), a security measure that requires a user to verify their identity in two or more ways to access a system or network, are other tools that organizations use to authenticate individuals and systems.
Pro tip: Another way to remember this authentication model is: something you know, something you have, and something you are.
User provisioning
Back-end systems need to be able to verify whether the information provided by a user is accurate. To accomplish this, users must be properly provisioned. User provisioning is the process of creating and maintaining a user’s digital identity. For example, a college might create a new user account when a new instructor is hired. The new account will be configured to provide access to instructor-only resources while they are teaching. Security analysts are routinely involved with provisioning users and their access privileges.
Pro tip: Another role analysts have in IAM is to deprovision users. This is an important practice that removes a user’s access rights when they should no longer have them.
Granting authorization
If the right user has been authenticated, the network should ensure the right resources are made available. There are three common frameworks that organizations use to handle this step of IAM:
- Mandatory access control (MAC)
- Discretionary access control (DAC)
- Role-based access control (RBAC)
Mandatory Access Control (MAC)
MAC is the strictest of the three frameworks. Authorization in this model is based on a strict need-to-know basis. Access to information must be granted manually by a central authority or system administrator. For example, MAC is commonly applied in law enforcement, military, and other government agencies where users must request access through a chain of command. MAC is also known as non-discretionary control because access isn’t given at the discretion of the data owner.
Discretionary Access Control (DAC)
DAC is typically applied when a data owner decides appropriate levels of access. One example of DAC is when the owner of a Google Drive folder shares editor, viewer, or commentor access with someone else.
Role-Based Access Control (RBAC)
RBAC is used when authorization is determined by a user’s role within an organization. For example, a user in the marketing department may have access to user analytics but not network administration.
Access control technologies
Users often experience authentication and authorization as a single, seamless experience. In large part, that’s due to access control technologies that are configured to work together. These tools offer the speed and automation needed by administrators to monitor and modify access rights. They also decrease errors and potential risks.
An organization’s IT department sometimes develops and maintains customized access control technologies on their own. A typical IAM or AAA system consists of a user directory, a set of tools for managing data in that directory, an authorization system, and an auditing system. Some organizations create custom systems to tailor them to their security needs. However, building an in-house solution comes at a steep cost of time and other resources.
Instead, many organizations opt to license third-party solutions that offer a suite of tools that enable them to quickly secure their information systems. Keep in mind, security is about more than combining a bunch of tools. It’s always important to configure these technologies so they can help to provide a secure environment.
Key takeaways
Controlling access requires a collection of systems and tools. IAM and AAA are common frameworks for implementing least privilege and separation of duties. As a security analyst, you might be responsible for user provisioning and collaborating with other IAM or AAA teams. Having familiarity with these models is valuable for helping organizations achieve their security objectives. They each ensure that the right user is granted access to the right resources at the right time and for the right reasons.
Resources for more information
The identity and access management industry is growing at a rapid pace. As with other domains in security, it’s important to stay informed.
- IDPro© is a professional organization dedicated to sharing essential IAM industry knowledge.
Practice Quiz: Activity: Improve authentication, authorization, and accounting for a small business
Reading: Activity Exemplar: Improve authentication and authorization for a small business
Reading
Completed Exemplar
To review the exemplar for this course item, click the link below and select Use Template.
Link to exemplar: Access control worksheet exemplar
Assessment of Exemplar
Compare the exemplar to your completed asset inventory. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that your review of the security incident considers effective access controls that can be implemented and how a lack of controls can put information at risk.
Let’s review the details of the completed access control worksheet:
Note(s) about the user:
- The event took place on 10/03/23.
- The user is Legal/Administrator.
- The IP address of the computer used to login is 152.207.255.255.
Event logs can often help you identify the who, what, and why of a security incident.
Access control issue(s):
- Robert Taylor, Jr. is a contractor with admin access.
- His contract ended in 2019, but his account accessed payroll systems in 2023.
Oftentimes, incidents like this occur because systems are misconfigured or misused. That is the case with how this business is sharing information among its employees.
Recommendations:
- User accounts should expire after 30 days.
- Contractors should have limited access to business resources.
- Enable multi-factor authentication (MFA).
It appears as though a former employee is potentially the threat actor. However, it’s possible that they were not the person responsible for this security incident.
It is common for people to reuse login credentials across many services. And if those credentials are compromised on one platform then an attacker can use them to gain access to others. In this case, implementing access controls, like password policies, limited file permissions, and MFA can protect the business from incidents like this.
Key Takeaways
This activity highlights how easy it can be to lose track of users, which can leave a business open to unnecessary risk if effective access controls are not in place. The activity also demonstrates the risk of operating a business with open, shared access to resources. Setting boundaries around who can access information and what they are allowed to do should be the starting point of any security plan.
Practice Quiz: Test your knowledge: Authentication, authorization, and accounting
What factors do authentication systems use to verify a user’s identity? Select three answers.
Ownership, Characteristic, Knowledge
Knowledge, ownership, and characteristic are the three factors used by authentication systems to verify a user’s identity.
How do businesses benefit from implementing single sign-on (SSO) technology? Select two answers.
By simplifying their user management, By providing a better user experience
Providing a better user experience and simplifying their user management are ways that businesses benefit from implementing SSO.
A retail company has one employee that’s in charge of purchasing goods, another employee that’s in charge of approving new purchases, and a third employee that’s in charge of paying invoices. What security principle is the retail company implementing?
Separation of duties
The retail company is implementing the separation of duties principle. Separation of duties is the security principle that users should not be given levels of authorization that would allow them to misuse a system.
What are the categories of access controls? Select three answers.
Authentication, Accounting, Authorization
The three categories of access controls are authentication, authorization, and accounting.
What credential does OAuth use to authenticate users?
An application programming interface (API) token
OAuth uses an API token to authenticate users. An API token is a digital credential that is shared between a platform and a service provider to verify a user’s identity.
Review: Protect organization assets
Video: Wrap- up
In this section, the focus was on the major theme of security, specifically protecting assets with an emphasis on privacy. The importance of controlling access to information was highlighted, and various measures such as the principle of least privilege, encryption, and hashing were explored for securing data. The section also delved into standard access controls, emphasizing the authentication and authorization of users to maintain the CIA triad of information. The AAA framework was introduced for identity and access management systems. The message commended progress through the first half of the course, encouraging the application of background and experiences in the field. The upcoming part of the course will shift focus to a more proactive approach to security by examining it from the perspective of attackers.
Our focus in this section was on a major
theme of security: protecting assets. A large part of this relates to privacy. We should all enjoy the right to
decide who can access our information. As we learned, there are several controls
in place that help secure assets. We began the section by exploring
effective data handling processes that are founded on the principle
of least privilege. We then explored the role of encryption
and hashing and safeguarding information. We explored how symmetric and
asymmetric encryption works and how hashes further
safeguard data from harm. We then turned our attention to standard
access controls. Properly authenticating and authorizing users is what maintaining
the CIA triad of information is all about! We used the AAA framework of security
to take a detailed tour of identity and access management systems and the access
controls that validate whether or not someone is who they claim to be. Well done making it through
the first half of the course! You’re making great progress so
far, and I hope you keep it up. Remember, your background and
experiences are valuable in this field. This combined with the concepts
we’re covering will make you a valuable contributor
to any security team. Up until this point, we’ve been exploring
the defensive side of security, but security isn’t all about planning ahead
and waiting for something to happen. In the next part of our journey, we’re going to continue developing
a security mindset by taking a more proactive look at security from
the perspective of attackers. I’ll meet you there!
Reading: Glossary terms from week 2
Terms and definitions from Course 5, Week 2
Access controls: Security controls that manage access, authorization, and accountability of information
Algorithm: A set of rules used to solve a problem
Application programming interface (API) token: A small block of encrypted code that contains information about a user
Asymmetric encryption: The use of a public and private key pair for encryption and decryption of data
Basic auth: The technology used to establish a user’s request to access a server
Bit: The smallest unit of data measurement on a computer
Brute force attack: The trial and error process of discovering private information
Cipher: An algorithm that encrypts information
Cryptographic key: A mechanism that decrypts ciphertext
Cryptography: The process of transforming information into a form that unintended readers can’t understand
Data custodian: Anyone or anything that’s responsible for the safe handling, transport, and storage of information
Data owner: The person that decides who can access, edit, use, or destroy their information
Digital certificate: A file that verifies the identity of a public key holder
Encryption: The process of converting data from a readable format to an encoded format
Hash collision: An instance when different inputs produce the same hash value
Hash function: An algorithm that produces a code that can’t be decrypted
Hash table: A data structure that’s used to store and reference hash values
Identity and access management (IAM): A collection of processes and technologies that helps organizations manage digital identities in their environment
Information privacy: The protection of unauthorized access and distribution of data
Multi-factor authentication (MFA): A security measure that requires a user to verify their identity in two or more ways to access a system or network
Non-repudiation: The concept that the authenticity of information can’t be denied
OAuth: An open-standard authorization protocol that shares designated access between applications
Payment Card Industry Data Security Standards (PCI DSS): A set of security standards formed by major organizations in the financial industry
Personally identifiable information (PII): Any information used to infer an individual’s identity
Principle of least privilege: The concept of granting only the minimal access and authorization required to complete a task or function
Protected health information (PHI): Information that relates to the past, present, or future physical or mental health or condition of an individual
Public key infrastructure (PKI): An encryption framework that secures the exchange of online information
Rainbow table: A file of pre-generated hash values and their associated plaintext
Salting: An additional safeguard that’s used to strengthen hash functions
Security assessment: A check to determine how resilient current security implementations against threats
Security audit: A review of an organization’s security controls, policies, and procedures against a set of expectations
Security controls: Safeguards designed to reduce specific security risks
Separation of duties: The principle that users should not be given levels of authorization that would allow them to misuse a system
Session: A sequence of network HTTP basic auth requests and responses associated with the same user
Session cookie: A token that websites use to validate a session and determine how long that session should last
Session hijacking: An event when attackers obtain a legitimate user’s session ID
Session ID: A unique token that identifies a user and their device while accessing a system
Single Sign-On (SSO): A technology that combines several different logins into one
Symmetric encryption: The use of a single secret key to exchange information
User provisioning: The process of creating and maintaining a user’s digital identity
Quiz: Module 2 challenge
Which of the following examples are categories of security controls? Select three answers.
Managerial, Technical, Operational
A paid subscriber of a news website has access to exclusive content. As a data owner, what should the subscriber be authorized to do with their account? Select three answers.
Stop their subscription, Update their payment details, Review their username and password
Which type of encryption is generally slower because the algorithms generate a pair of encryption keys?
Asymmetric
How is hashing primarily used by security professionals?
To determine data integrity
Which security controls are used in public key infrastructure (PKI)? Select three answers.
Symmetric encryption, Digital certificates, Asymmetric encryption
Fill in the blank: Knowledge, ownership, and characteristic are three factors of _____ systems.
authentication
What is a disadvantage of using single sign-on (SSO) technology for user authentication?
Stolen credentials can give attackers access to multiple resources.
A shipping company imports and exports materials around the world. Their business operations include purchasing goods from suppliers, receiving shipments, and distributing goods to retailers. How should the shipping company protect their assets under the principle of separation of duties? Select two answers.
Have one employee file purchase orders, Have one employee approve purchase orders
What types of user information does an API token contain? Select two answers.
A user’s identity, A user’s site permissions
What is the practice of monitoring the access logs of a system?
Accounting