Publicité

Access Control and Maintenance.pptx

Kinetic Potential
23 Mar 2023
Publicité

Contenu connexe

Publicité

Access Control and Maintenance.pptx

  1. Cybersecurity Families and Controls Part 1 – Access Control AND Part 2 – Maintenance 1
  2. Access Control
  3. According to Microsoft, Access Control is defined as: “…an essential element of security that determines who is allowed to access certain data, apps, and resources—and in what circumstances. Access control policies protect digital spaces. Access control lets the right people in and keeps the wrong people out. Access control policies rely heavily on techniques like authentication and authorization, which allow organizations to explicitly verify both that users are who they say they are and that these users are granted the appropriate level of access based on context such as device, location, role, and much more. Access control keeps confidential information—such as customer data and intellectual property—from being stolen by bad actors or other unauthorized users. It also reduces the risk of data exfiltration by employees and keeps web-based threats at bay. Rather than manage permissions manually, most security-driven organizations lean on identity and access management solutions to implement access control policies. What is Meant by the Term Access Control?
  4. Access Control is one of the most critical control families because it ensures all of your IT systems have adequate protection surrounding access to that information system. Unauthorized system access always precedes cyber incidents so making a solid security posture regarding access controls a must. The Access Control family itself is geared toward ensuring a system’s technical security implementations meet a minimum best practice standard for operation and certifies your network has access and account management practices in place to manage access provisioning and user account controls appropriately. Sufficiently meeting each of the controls listed in the Access Control family shows any auditor or inspector that your network identifies and authorizes legitimate users of the system while protecting against unauthorized access and system compromise. Access control is important because it minimizes company risk, but it can also be a big part of regulatory compliance. Meeting your company’s compliance needs is a significant factor in choosing an access control system. Why is Access Control Important?
  5. Here is a full listing of controls inside of the “Access Control” control family: AC-1 ACCESS CONTROL POLICY AND PROCEDURES AC-2 ACCOUNT MANAGEMENT AC-3 ACCESS ENFORCEMENT AC-4 INFORMATION FLOW ENFORCEMENT AC-5 SEPARATION OF DUTIES AC-6 LEAST PRIVILEGE AC-7 UNSUCCESSFUL LOGON ATTEMPTS AC-8 SYSTEM USE NOTIFICATION What Controls are Part of the Access Control Family? 1 of 3
  6. Here is a full listing of controls inside of the “Access Control” control family: AC-9 PREVIOUS LOGON (ACCESS) NOTIFICATION AC-10 CONCURRENT SESSION CONTROL AC-11 SESSION LOCK AC-12 SESSION TERMINATION AC-14 PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION AC-16 SECURITY ATTRIBUTES AC-17 REMOTE ACCESS AC-18 WIRELESS ACCESS What Controls are Part of the Access Control Family? 2 of 3
  7. Here is a full listing of controls inside of the “Access Control” control family: AC-19 ACCESS CONTROL FOR MOBILE DEVICES AC-20 USE OF EXTERNAL INFORMATION SYSTEMS AC-21 INFORMATION SHARING AC-22 PUBLICLY ACCESSIBLE CONTENT AC-23 DATA MINING PROTECTION AC-24 ACCESS CONTROL DECISIONS AC-25 REFERENCE MONITOR NOTE: In NIST SP 800-53 Rev. 5, AC13-SUPERVISION AND REVIEW, and AC15-AUTOMATED MARKING were incorporated into other controls. What Controls are Part of the Access Control Family? 3 of 3
  8. Role-Based Access Control (RBAC) Role-based access control attributes permissions to a user based on their roles/duties/business responsibilities. As the most common access control system, RBAC determines access based on your role in the company—ensuring lower-level employees aren’t gaining access to high-level information unnecessarily. Mandatory Access Control (MAC) Mandatory access control is the most secure type of access control. Only owners and custodians have access to the systems. All the access control settings are preset by the system administrator and can’t be changed or removed without his or her permission. What are the Most Common Types of Access Control Systems?
  9. Discretionary Access Control (DAC) With a discretionary access control, the data owner of the company can decide how many people have access to a specific location. Each access control point has a list of authorized users. Every time a keycard is swiped, a PIN is punched, or a fingerprint is scanned, the system checks the credential against the list and either allows or denies access based on the previously set allowances. Rule-Based Access Control (RBAC) Not to be confused with the other “RBAC,” rule-based access control is commonly used as an add-on to the other types of access control. In addition to whatever type of access control you choose, rule-based access control can change the permissions based on a specific set of rules created by the administrator. What are the Most Common Types of Access Control Systems?
  10. Choosing the type of access control system that is most suitable for your organization, there are a number of factors involved. Some of those factors include the nature of your business, security procedures within the organization, and the number of users on the system. Places of business with small or basic applications will probably find Discretionary Access Control to be less complicated and better utilized. If, however, you have highly confidential or sensitive information on your business platform, a Managed Access or Role-Based Access Control system are two options you may want to consider. How to Choose the Correct Access Control System for Your Business?
  11. Develop an Access Control Policy - It’s prudent to begin by developing access control policies to manage everyone using business facilities and systems. Start by collecting data on human behavior at work and the facilities they frequently access. It will form a baseline to launch the access control program. Establish Layered Defenses - The underlying technology in access control devices can easily be cracked and expose your organization. It is a best business practice to add more security layers to handle breach attempts in access control systems. Integrate Access Control Into Internal Management Systems - Businesses that use different technologies to support their operations are prone to internal and external breaches. To mitigate these threats, another best practice to implement is to integrate access control to consolidate systems functions and monitor real-time activities within your network. Tip and Best Practices to Support Your Access Control Implementation 1 of 3
  12. Centralize Access Control Management - Centralization of access control allows you to design a security layout for your Enterprise. It’s one way to pinpoint potential risks and create countermeasures to mitigate your exposure. Also, it works as a data collection point for your business, which can be helpful for decision-making purposes. Training And Development - Technology is forever evolving and users must keep up with the frequent changes. So as a best practice you should periodically conduct training and development for your staff to enhance security in your business processes. Frequently Audit And Upgrade Access Control Software - It’s crucial to audit your access control management and continuously improve the infrastructure. You might spot gaps in your systems that make you vulnerable to attacks. You should retire obsolete access control technology and replace it with a new and improved one. Tip and Best Practices to Support Your Access Control Implementation 2 of 3
  13. Protect Passwords - Your organization should have management tiers with designated authority to access business information. Authorized personnel should use or have unique credentials and passwords to access your systems and must protect them at all costs. Block and/or Delete Invalid and Dormant Accounts - Labor turnover and changes in roles happen all the time in business. Retaining such user accounts is risky and may lead to security breaches in your network. Blocking or deleting unused accounts within your IT backup systems is crucial. In summary, Access Control (AC) is one way to insulate your business from potential breaches or electronic attacks. It is a multi-functional tool to manage people and monitor activities within your organization. Installing AC systems requires an analytical review of your business operations and the exposure risks you face in the digital age. AC systems help you develop measures such as user policies incorporating best practices to access control. Tip and Best Practices to Support Your Access Control Implementation 3 of 3
  14. Information Technology Maintenance
  15. Like all electronic devices (from a car to a dishwasher), in order to function properly, computers need maintenance. And based on its importance and complexity, computer equipment maintenance requires special attention. When approaching the different types of IT maintenance, two aspects must be considered: 1) The term “maintenance” includes both hardware and software of the computer. Both are very important and will decisively influence the operation of the system. 2) Various types of maintenance can work simultaneously. In the case of corrective maintenance, it will act if the predictive maintenance or preventive maintenance are not able to anticipate the problem. What is Meant by the Term IT Maintenance?
  16. Early Detection of Issues - Maintenance checks and regular upkeep helps detect issues early and pinpoint the potential threats to the IT network, computers, and servers. When it comes to computer systems, even the smallest system issues could leave the door open for breaches and bigger potential faults. Regular maintenance can point out these small IT system problems and eradicate them before they get out of control. Viruses and Malware Prevention - There are numerous types of malware out there just waiting to infect systems and cause security and confidentiality issues, data leakage and system crashes. Preventing cyberattacks is tricky because each attack and malware is different. Therefore, it is extremely important to protect the corporate network instead of waiting around to deal with consequences. Faster Loading Times - System maintenance is a great way to speed up all your IT systems and computers and improve processing times. IT maintenance services can identify issues to help optimize system performance so your devices load faster. This includes fragmenting computer files, removing malicious code, updating outdated software, patching security gaps, etc. Why is Maintenance Important? 1 of 2
  17. Maximize Software Efficiency - Includes installment of software updates to their latest version and installment of new patches, whenever such are available. Cyber criminals are always targeting system and software weaknesses. A good IT maintenance program provides updates for each software package during regular maintenance. This practice helps your software programs run at their best. Prevent Data Loss - No matter if you work with lots of files, personal info, or/and sensitive information, no organization is safe from data loss. Data loss is typically caused by a system reboot, malware, viruses, or hacker attacks. Regular computer maintenance lowers the risks by ensuring all network systems are checked and all firewalls, antivirus software, and computer applications are working as expected. Documenting IT Concerns - Keeping track of past, potential and ongoing issues is very important. Effective IT maintenance programs mandate the documentation of even minor system malfunctions, server outages, and potential threats to the computer system. Documenting preventive maintenance and analyzing network architecture is a game-changer. Having every technical aspect of your business monitored is a superb way to keep work computers and technology at their optimal condition. Why is Maintenance Important? 2 of 2
  18. Hardware Maintenance
  19. Preventive Maintenance - Is a very frequent type of maintenance carried out in order to prevent possible failures and improve the functioning of a system. Preventive Maintenance can also extend the useful life of the different components of your IT system, and decreases the number and length of system downtimes. It can reduce the number of repairs and detect weak points in the system that might affect its operation. Predictive Maintenance - Is a type of maintenance that is carried out using diagnostic tools, in order to anticipate possible failures and to try to avoid them before they occur. One of the most effective ways in which predictive maintenance is carried out is through the monitoring of computer systems using tools such as monitoring software. This practice helps to control all different types of variables, such as the temperature of the CPU or battery levels. What are the Different Types of Maintenance? 1 of 2
  20. Corrective Maintenance - Is a practice that must be applied when the predictive and preventive maintenance have not worked properly or when these have not been able to avoid the failure. When a computer or system fails (for example due to a hardware failure) you want it to be operational again and as quickly and efficiently as possible, the process to do this will include repairing or replacing the device. One of the considerations to be made regarding corrective maintenance is to not only solve the failure, but also determine what was the cause of it in order to find the possible repercussions that may have affected other parts of the system. You also want to try to prevent it from happening again in the future. Evolutionary Maintenance – Is a type of maintenance not meant to correct or prevent possible failures, but to research and evolve your computing resources to the latest technologies that are available. Technology is always evolving, and that means that the tools available and the needs of users also change constantly. Evolutionary maintenance helps ensure computer systems do not become obsolete or updated in order to offer users the best technology options within your organization. What are the Different Types of Maintenance? 2 of 2
  21. Software Maintenance
  22. Software Maintenance - is the process of changing, modifying, and updating software to keep up with customer needs. Software maintenance is done after the product has launched for several reasons including improving the software overall, correcting issues or bugs, to boost performance, and more. It is a natural part of SDLC (software development life cycle). Software developers don’t have the luxury of launching a product and letting it run, they constantly need to be on the lookout to both correct and improve their software to remain competitive and relevant. Using the right software maintenance techniques and strategies is a critical part of keeping any software running for a long period of time and keeping customers and users happy. What is Software Maintenance?
  23. Software maintenance is needed for several reasons: 1) Correction of ‘Bugs’ - The most important reason to conduct software maintenance is to correct errors or 'bugs'. It is very important that the software works without problems. This process contains the search for errors in the code and their correction. 2) Improving Opportunities for a Changing Environment - This is important for improving the current functions and for making the system compatible for changing the environment. It extends the capabilities of programs, work patterns, hardware upgrades, compilers, and all other aspects that affect the workflow of the system. Why is Software Maintenance Important? 1 of 2
  24. 3) Remove Obsolete Functions - Functionalities that are no longer used in the software actually reduce the efficiency of the system. Therefore, the removal of obsolete functions is necessary. Unused user interface and coding elements are removed and replaced with new functions using the latest tools and technologies. This change makes the system adaptive to changing circumstances. 4) Performance Improvement - Improving system performance in order to meet new requirements. Data and encoding constraints as well as reengineering are part of software maintenance. This minimizes the chances of the software being vulnerable. Why is Software Maintenance Important? 2 of 2
  25. Corrective Maintenance - Is the typical, classic form of maintenance (for software and anything else for that matter). Corrective software maintenance is necessary when something goes wrong in a piece of software including faults and errors. If a company can recognize and take care of faults before users discover them, this is an added advantage that will make your company seem more reputable and reliable. Preventive Maintenance - Is looking into the future so that your software can keep working as desired for as long as possible. This includes making necessary changes, upgrades, adaptations and more. Preventative software maintenance may address small issues which at the given time may lack significance but may turn into larger problems in the future. These are called latent faults which need to be detected and corrected to make sure that they won’t turn into effective faults. What are the Different Types of Software Maintenance? 1 of 2
  26. Perfective Maintenance - Once the software is released to the public, new issues and ideas come to the surface. Users may see the need for new features or requirements that they would like to see in the software to make it the best tool available for their needs. Perfective software maintenance aims to adjust software by adding new features as necessary and removing features that are irrelevant or not effective in the given software. This process keeps software relevant as the market, and user needs, change. Adaptive Maintenance – Involves the changing technologies as well as policies and rules regarding your software. These include operating system changes, cloud storage, hardware, etc. When these changes are performed, your software must adapt in order to properly meet new requirements and continue to run well. What are the Different Types of Software Maintenance? 2 of 2
  27. Questions and Answers
Publicité