• Tidak ada hasil yang ditemukan

Sistem Access Control Metodologi

N/A
N/A
Protected

Academic year: 2018

Membagikan "Sistem Access Control Metodologi"

Copied!
97
0
0

Teks penuh

(1)
(2)

Defenisi Access Controls

β€’

Access control

is the collection of

mechanisms that permits managers of

a system to exercise a directing or

restraining influence over the behavior,

use, and content of a system. It

use, and content of a system. It

(3)

Lingkup Materi Access Controls

β€’

Konsep Access control

β€’

Metodologi Access control

β€’

Implementation within centralized and

decentralized environments across the

enterprise’s computer systems.

β€’

Access control techniques, detective

(4)

Overview Access Control

 Access Controls: The security features that control how users and systems communicate and interact with one another.

 Access: The flow of information between subject and object

 Subject: An active entity that requests access

 Subject: An active entity that requests access to an object or the data in an object

(5)

Terminologi dalam Akses Kontrol

Accountable person who desires access

User or process

acting for person Potential actions that may be applied

Resource subject to access control

Secure Computing: Threats and Safeguards, 1997, Rita C. Summers

Computer Security, 1996, John Carroll

Subject Subject Rights Object

User

Identifier User Identifier Access Control List Data Identifier

Computer Communications Security, 1994,

Warwick Ford

X/Open Distributed Security Framework, 1994, The Open Group

CORBA Security Services Specification 1.0, 1996,

Identifier Identifier Control List

User Access Target

Permissions Initiator

User Initiator ACL Target

Target ACL Initiator

(6)

Prinsip Keamanan



The three main security principles

also pertain to access control:

β€’

Availability

β€’

Integrity

β€’

Integrity

(7)

Prinsip Keamanan :

Mengukur Nilai informasi – Segitiga CIA

The value of information comes from the

characteristics it possesses

(8)

Prinsip Keamanan : Model

ISO untuk Otorisasi

Access Control

Enforcement Function Resource

Principal

Identity,

Access Request Access

(9)

Prinsip Keamanan : Konsep

Manajemen Privilege

Who are

you? Prove it! your stuff...Here’s

Identification Authentication Authorization

 Identification:The presentation of

(10)

Identifikasi, Otentikasi, dan Otorisasi



Identification, Authentication, and

Authorization are distinct functions.

1. Identification 2. Authentication 3. Authorization 3. Authorization



Identity Management:

A broad term to

include the use of different products to

identify, authenticate, and authorize

(11)

Identifikasi



Identification

β€’ Method of establishing the subject’s (user, program, process) identity.

Β» Use of user name or other public information.

information.

Β» Know identification component requirements.

(12)

Otentikasi



Authentication

β€’ Method of proving the identity.

Β» Something a person is, has, or does.

Β» Use of biometrics, passwords, passphrase, token, or other private information.

token, or other private information.



Strong Authentication is important

 Authentication: proven assertion of identity

β€’ Userid and password

(13)

Otentikasi



Passwords

β€’ User name + password most common identification, authentication scheme.

β€’ Weak security mechanism, must implement strong password protections

(14)

Otentikasi



Techniques to attack passwords

β€’ Electronic monitoring

β€’ Access the password file β€’ Brute Force Attacks

β€’ Dictionary Attacks β€’ Dictionary Attacks β€’ Social Engineering



Know difference between a password

(15)

Otentikasi



Passphrase

β€’ Is a sequence of characters that is longer than a password.

β€’ Takes the place of a password.

β€’ Can be more secure than a password β€’ Can be more secure than a password

(16)

Otentikasi



One Time Passwords (aka Dynamic

Passwords)

β€’ Used for authentication purposes and are only good once.

(17)

Otentikasi

 Two types of Token

Devices (aka Password Generator)

β€’ Synchronous

Β» Time/event Based

Β» Using one-time password or hashed values

or hashed values

Β» Authentication server knows expected value from the token

Β» Counter Synchronization

(18)

Token: Two Factor Authentication



First factor:

what user

knows



Second factor:

what user

Otentikasi



Second factor:

what user

has

(19)

Token: Two Factor Authentication

(20)

Otentikasi

Smart Cards and Memory Cards

β€’ Memory Cards: Holds but cannot process information.

β€’ Smart Cards: Holds and can process information.

Β» Contact

(21)

Otentikasi



Attacks on Smart Cards

β€’ Fault Generation β€’ Microprobing

β€’ Side Channel Attacks (nonintrusive attacks)

Β» Differential Power Analysis Β» Differential Power Analysis Β» Electromagnetic Analysis Β» Timing

(22)

Otentikasi

Hashing & Encryption

β€’ Hash or encrypting a password to ensure that passwords are not sent in clear text (means extra security)



Windows environment, know syskey



Windows environment, know syskey

modes.

(23)

Password Hashes

 LM hash is weak, no longer used in Win 7

 NT hash is stronger, but not salted

(24)

Otentikasi



Cryptographic Keys

β€’ Use of private keys or digital signatures to prove identity



Private Key



Digital Signature

(25)

Otentikasi

 Biometrics

β€’ Verifies an identity by analyzing a unique person attribute or behavior (e.g., what a person β€œis”).

 Most expensive way to prove identity, also has difficulties with user acceptance.

has difficulties with user acceptance.

(26)

Otentikasi



Most common biometric systems:

β€’ Fingerprint β€’ Palm Scan

β€’ Hand Geometry β€’ Iris Scan

β€’ Iris Scan

β€’ Signature Dynamics β€’ Keyboard Dynamics β€’ Voice Print

β€’ Facial Scan

(27)

Otentikasi



Biometric systems can be hard to

compare.



Type I Error: False rejection rate.



Type II Error: False acceptance rate.

β€’ This is an important error to avoid.

(28)

Otorisasi



Authorization

β€’

Determines that the proven identity has

some set of characteristics associated

with it that gives it the right to access

the requested resources.

(29)

Otorisasi



Access Criteria can be thought of as:

β€’

Roles

β€’

Groups

β€’

Location

β€’

Location

β€’

Time

(30)

Otorisasi



Authorization concepts to keep in

mind:

β€’

Authorization Creep

β€’

Default to Zero

β€’

Default to Zero

(31)

Otorisasi



Problems in controlling access to

assets:

β€’

Different levels of users with different

levels of access

levels of access

β€’

Resources may be classified differently

β€’

Diverse identity data

(32)

Otorisasi



Solutions that enterprise wide and single

sign on solutions supply:

β€’ User provisioning

β€’ Password synchronization and reset β€’ Self service

β€’ Self service

β€’ Centralized auditing and reporting

(33)

Otorisasi



Single Sign On Capabilities

β€’ Allow user credentials to be entered one time and the user is then able to access all

resources in primary and secondary network domains



SSO technologies include:



SSO technologies include:

β€’ Kerberos β€’ Sesame

(34)

 Authentication

β€’ Use a unique identifier–

Β» Example: user ID, Account number, PIN

β€’ 3 main datum used for authentication

Β» Something requester know

– Passwords – Pass-phrases

Β» Something the requester is

Step dalam Mengakses Sistem

Β» Something the requester is

– Biometrics

– Physical characteristics

Β» Something the requester has

– Tokens (one-time passwords, time synchronized token) – Smart Cards

– USB Tokens

(35)

Model Access Control



Access Control Models

Three Main Types

1. Discretionary

2. Mandatory

2. Mandatory

(36)

Model Access Control



Discretionary Access Control (DAC)

β€’ A system that uses discretionary access

control allows the owner of the resource to specify which subjects can access which

resources. resources.

(37)

Model Access Control



Mandatory Access Control (MAC)

β€’ Access control is based on a security labeling system. Users have security clearances and resources have security labels that contain data classifications. labels that contain data classifications.

β€’ This model is used in environments where information classification and

(38)

Model Access Control



Non-Discretionary (Role Based)

Access Control Models

β€’ Role Based Access Control (RBAC) uses a centrally administered set of controls to determine how subjects and objects

determine how subjects and objects interact.

(39)

Teknologi Access Control

 There are a number of different access controls and technologies available to support the different models.

β€’ Rule Based Access Control

β€’ Constrained User Interfaces

β€’ Constrained User Interfaces

β€’ Access Control Matrix

β€’ Content Dependent Access Control

(40)

Teknologi Access Control



Rule Based Access Control

β€’ Uses specific rules that indicate what can and cannot happen between a subject and an object.

an object.

β€’ Not necessarily identity based.

β€’ Traditionally, rule based access control has been used in MAC systems as an

(41)

Teknologi Access Control

 Constrained User Interfaces

β€’ Restrict user’s access abilities by not allowing them certain types of access, or the ability to request certain functions or information

 Three major types

 Three major types

β€’ Menus and Shells

β€’ Database Views

(42)

Teknologi Access Control

 Access Control Matrix

β€’ Is a table of subjects and objects indicating what actions individual subjects can take upon

individual objects.

 Two types

 Two types

β€’ Capability Table (bound to a subject)

(43)

Access Control Matrix

READ WRITE READ WRITE READ READ READ Bob Alice

A B C D

Resources

Principals

Bob’s

Access Control System

Bob carries around Identity AZN System checks Principal identity

Teknologi Access Control

READ WRITE READ WRITE READ WRITE READ READ READ

READ WRITE READ READ Alpha n Alpha 1 Eve … Bob’s Capability List

A collection of principals with the same rights forms a Group

Principal identity

Capability Based System

Bob carries around Capability List AZN System checks

(44)

Teknologi Access Control

 Content Dependent Access Control:

Access to an object is determined by the content within the object.

 Context Based Access Control: Makes

 Context Based Access Control: Makes access decision based on the context of a

(45)
(46)

Administrasi Access Control

 First an organization must choose the access control model (DAC, MAC, RBAC).

 Then the organization must select and implement different access control technologies.

 Access Control Administration comes in two basic forms:

forms:

β€’ Centralized

(47)

Administrasi Access Control

 Centralized Access Control Administration:

β€’ One entity is responsible for overseeing access to all corporate resources.

β€’ Provides a consistent and uniform method of controlling access rights.

controlling access rights.

Β» Protocols: Agreed upon ways of communication Β» Attribute Value Pairs: Defined fields that accept

certain values.

(48)

Administrasi Access Control

 Decentralized Access Control Administration:

β€’ Gives control of access to the people who are closer to the resources

β€’ Has no methods for consistent control, lacks proper consistency.

(49)

Metode Access Control

 Access controls can be implemented at

various layers of an organization, network, and individual systems

 Three broad categories:

β€’ Administrative (aka Management)

β€’ Administrative (aka Management)

β€’ Physical (aka Operational)

(50)



Administrative

β€’ Examples: separation of duties, dual control, etc



Physical

Metode Access Control



Physical

β€’ Examples: fences, alarms, badges, CCTV, etc



Technical

(51)

Metode Access Control



Administrative Controls

β€’ Policy and Procedure β€’ Personnel Controls

Β» Separation of Duties Β» Rotation of Duties Β» Rotation of Duties Β» Mandatory Vacation

β€’ Supervisory Structure

(52)

Metode Access Control

 Physical Controls

β€’ Network Segregation

β€’ Perimeter Security

β€’ Computer Controls

β€’ Work Area Separation

β€’ Work Area Separation

β€’ Data Backups

β€’ Cabling

(53)

Metode Access Control

 Technical (Logical) Controls

β€’ System Access

β€’ Network Architecture

β€’ Network Access

β€’ Encryption and protocols

(54)

Tipe-tipe Access Control

 Each control works at a different level of granularity, but can also perform several functions

 Access Control Functionalities

β€’ Prevent

β€’ Detect

β€’ Detect

β€’ Correct

β€’ Deter

β€’ Recover

(55)

 Preventive Access controls

β€’ Avoid having unwanted actions/events by blocking the ability to do them.

 Detective

β€’ Identify unwanted actions or events after they occur.

 Corrective

β€’ Remedy circumstances that enabled the unwanted activity. β€’ Return to state prior to the unwanted activity.

Tipe-tipe Access Control

β€’ Return to state prior to the unwanted activity.

 Directive

β€’ Dictated by higher authority in laws or regulations or those specified in organization policy

 Deterrent

(56)

Preventive Controls



Block or control specific events

β€’ Firewalls

β€’ Anti-virus software

Tipe-tipe Access Control

β€’ Anti-virus software β€’ Encryption

β€’ Key card systems

(57)

 Deterrent Controls

β€’ Highly visible

β€’ Prevent offenses by influencing choices of would-be intruders

Tipe-tipe Access Control

 Detective Controls

(58)

 Corrective Controls

β€’ Post-event controls to prevent recurrence

β€’ β€œCorrective” refers to when it is implemented

β€’ Examples (if implemented after an incident)

Β» Spam filter

Tipe-tipe Access Control

Β» Anti-virus on e-mail server Β» WPA Wi-Fi encryption

 Recovery Control

(59)

Compensating Controls

 Control that is introduced that

compensates for the absence or failure of a control

 β€œCompensating” refers to why it is

Tipe-tipe Access Control

 β€œCompensating” refers to why it is implemented

 Examples

β€’ Daily monitoring of anti-virus console

(60)

Hubungan Metode dan Tipe Access Control

Controls Administrative Technical Physical

Directive Policy Warning Banner β€˜Do Not Enter’

Deterrent Demotion Violation

Reports β€˜Beware of Dog’ Preventive User Registration Passwords, Tokens Fences, Bollards

Registration Tokens Bollards

Detective Report Reviews Audit Logs, IDS Sensors, CCTV

Corrective Employee Termination Connection Management Fire Extinguisher

Recovery DRP Backups Reconstruct,

(61)

Akuntabilitas



Accountability is tracked by recording

user, system, and application activities.



Audit information must be reviewed

β€’ Event Oriented Audit Review

β€’ Real Time and Near Real Time Review β€’ Real Time and Near Real Time Review β€’ Audit Reduction Tools

(62)

Akuntabilitas

 Other accountability concepts…

 Keystroke Monitoring

β€’ Can review and record keystroke entries by a user during an active session.

β€’ A hacker can also do this

β€’ May have privacy implications for an organization

(63)

Penerapan Access Control



Know the access control tasks that need

to be accomplished regularly to ensure

satisfactory security. Best practices

include:

β€’ Deny access to anonymous accounts β€’ Enforce strict access criteria

(64)

Penerapan Access Control

 Unauthorized Disclosure of Information

β€’ Object Reuse

β€’ Data Hiding

 Emanation Security (Security to block electrical signals from

electronic equipment.)

β€’ Tempest : a project started by the DoD and then turned into a standard that outlines how to develop

into a standard that outlines how to develop

countermeasures that control spurious electrical signals that are emitted by electronic equipment

(65)

Testing Access Controls



Access controls are the primary

defense that protect assets



Types of tests:

β€’

Penetration tests

β€’

Penetration tests

(66)

Penetration Testing



Automatic scans to discover

vulnerabilities

Testing Access Controls



Example tools: Nessus, Nikto,

SAINT, Superscan, Retina, ISS,

Microsoft Baseline Security

(67)

Application Vulnerability Testing



Discover vulnerabilities in an application



Automated tools and manual tools

Testing Access Controls



Example vulnerabilities

(68)

Audit Log Analysis



Regular examination of audit and

event logs



Detect unwanted events

Testing Access Controls



Detect unwanted events

(69)

Monitoring Access Control



Intrusion Detection

β€’ Three Common Components

Β» Sensors Β» Analyzers

Β» Administrator Interfaces Β» Administrator Interfaces

β€’ Common Types

(70)

Monitoring Access Control

 Two Main Types of Intrusion Detection Systems

β€’ Network Based (NIDS)

β€’ Host Based (HIDS)

 HIDS and NIDS can be:

β€’ Signature Based

β€’ Signature Based

β€’ Statistical Anomaly Based

(71)

Monitoring Access Control



Intrusion Prevention Systems

β€’ The next big thing

β€’ Is a preventative and proactive

technology, IDS is a detective technology. β€’ Two types: Network Based (NIPS) and

(72)

Monitoring Access Control

 Honeypots

β€’ An attractive offering that hopes to lure attackers away from critical systems

 Network sniffers

β€’ A general term for programs or devices that are

(73)

Tantangan untuk Access Control

 A few threats to access control

β€’ Insiders

Β» Countermeasures include good policies and procedures, separation of duties, job rotation

β€’ Dictionary Attacks

Β» Countermeasures include strong password policies, strong authentication, intrusion detection and

strong authentication, intrusion detection and prevention

β€’ Brute Force Attacks

(74)

Serangan pada Access Control

 Intruders will try to defeat, bypass, or trick access controls in order to reach their target

 Attack objectives

β€’ Guess credentials

β€’ Malfunction of access controls

β€’ Malfunction of access controls

β€’ Bypass access controls

β€’ Replay known good logins

(75)

Buffer Overflow

 Cause malfunction in a way that permits illicit access

 Send more data than application was

Serangan pada Access Control

 Send more data than application was designed to handle properly

(76)

Script Injection



Insertion of scripting language

characters into application input fields

β€’ Execute script on server side

Serangan pada Access Control

β€’ Execute script on server side

β€’ Execute script on client side – trick user or browser

(77)

Data Remanence



Literally: data that remains after it has

been β€œdeleted”



Examples

Serangan pada Access Control



Examples

β€’ Deleted hard drive files β€’ Erased files

(78)

Denial of Service (DoS)



Actions that cause target system to

fail, thereby

denying service

to

legitimate users

Serangan pada Access Control

legitimate users

β€’ Distributed Denial of Service (DDoS)

(79)

Eavesdropping



Interception of data transmissions



Countermeasures: encryption, stronger

encryption

Serangan pada Access Control

(80)

Spoofing and Masquerading



Specially crafted network packets that

contain forged address of origin



Countermeasures: router / firewall

Serangan pada Access Control



Countermeasures: router / firewall

(81)

Social Engineering



Tricking people into giving out

sensitive information by making them

think they are

helping

someone

Serangan pada Access Control

think they are

helping

someone

(82)

Phishing



Incoming, fraudulent e-mail

messages designed to give the

appearance of origin from a

Serangan pada Access Control

appearance of origin from a

legitimate institution

(83)

Pharming



Redirection of traffic to a forged

website

Serangan pada Access Control

website



Countermeasures: user awareness

(84)

Malicious Code



Viruses, worms, Trojan horses,

spyware, key logger

Harvest data or cause system

Serangan pada Access Control



Harvest data or cause system

malfunction



Countermeasures: virus,

(85)

Model Arsitektur Keamanan untuk AC

β€’

Can help organizations quickly

make improvements through

adaptation

β€’

Can focus on:

β€’

Can focus on:

– computer hardware and software

– policies and practices

(86)

Bell-LaPadula Confidentiality Model

β€’

A state machine model that helps

ensure the confidentiality of an

information system

Model Arsitektur Keamanan untuk AC

information system

(87)

Biba Integrity Model

β€’ Provides access controls to ensure that objects or subjects cannot have less

integrity as a result of read/write operations

Model Arsitektur Keamanan untuk AC

operations

β€’ Ensures no information from a subject can be passed on to an object in a higher

(88)

Clark-Wilson Integrity Model

β€’

Built upon principles of change control

rather than integrity levels

β€’

Its change control principles

Model Arsitektur Keamanan untuk AC

β€’

Its change control principles

– No changes by unauthorized subjects

– No unauthorized changes by authorized subjects

(89)

Graham-Denning Access Control Model

β€’ Composed of three parts

– A set of objects

– A set of subjects (a process and a domain)

Model Arsitektur Keamanan untuk AC

– A set of subjects (a process and a domain) – A set of rights

β€’ Primitive protection rights

(90)

Harrison-Ruzzo-Ullman Model

β€’ Defines a method to allow changes to

access rights and the addition and removal of subjects and objects

– Since systems change over time, their protective

Model Arsitektur Keamanan untuk AC

– Since systems change over time, their protective states need to change

β€’ Built on an access control matrix

(91)

Brewer-Nash Model

(aka Chinese Wall)

β€’ Designed to prevent a conflict of interest between two parties

Model Arsitektur Keamanan untuk AC

β€’ Requires users to select one of two

(92)

The ISO 27000 Series

β€’ Information Technology – Code of Practice for Information Security Management

– One of the most widely referenced and discussed security

models

Model Arsitektur Keamanan untuk AC

models

– Originally published as British Standard 7799 and then later

as ISO/IEC 17799

– Since been renamed ISO/IEC 27002

(93)

The ISO 27000 Series

Model Arsitektur Keamanan untuk AC

(94)

Control Objectives for Information

and Related Technology (COBIT)

β€’

Control Objectives for Information and

Related Technology (COBIT)

Model Arsitektur Keamanan untuk AC

– Provides advice about the implementation of sound controls and control objectives for InfoSec

(95)

COSO

β€’ U.S. private-sector initiative

– Major Objective: identify factors that cause fraudulent financial reporting and to make

Model Arsitektur Keamanan untuk AC

fraudulent financial reporting and to make recommendations to reduce its incidence

– Has established a common definition of internal controls, standards and criteria

(96)

COSO

(Lanjutan)

β€’ Built on five interrelated components:

– Control environment – Risk assessment

Model Arsitektur Keamanan untuk AC

– Risk assessment – Control activities

(97)

Referensi

Dokumen terkait