Thor's Study Guide - CISSP Domain 5
Thor's Study Guide - CISSP Domain 5
Introduction to Domain 5
In this domain we cover:
• Physical and logical assets control.
▪ The logical and physical controls we implement.
• Identification and authentication of people and devices.
▪ How we identify and authenticate our authorized users.
• Identity as a service (e.g., cloud identities).
• Third-party identity services (e.g., on-premise).
• Access control attacks.
▪ Common attacks, and how we mitigate them with defense in depth.
• Identity and access provisioning lifecycle (e.g., provisioning review).
• Critical Aspects of Access Control and Security Management
This chapter focuses on how we identify our assets, the platforms we use for them, how we provide
authorized access and prevent unauthorized access to the assets and the asset and identity lifecycle.
Domain5 makes up 13% of the exam questions.
Access Control
• Our Access Control is determined by our policies, procedures, and standards.
• This outlines how we grant access whom to what:
▪ We use least privilege, need to know, and we give our staff and systems exactly
the access they need and no more.
• Access control spans all the layers of our defense in depth model, different permissions
are granted to different subjects depending on their need to access the systems or data
and that adheres to the procedures for that area.
• We covered some of this when we talked
about physical security, how we use fences,
locks, turnstiles, bollards, ...
• How do we Identify, Authenticate, Authorize
our subjects, and how we keep them
Accountable (IAAA).
• We never use group logins or accounts; they
have no accountability.
2|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
3|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
▪ Passwords:
⬧ It is always easier to guess or steal passwords than it is to break the
encryption.
⬧ We have password policies to ensure they are as secure as possible.
▫ They should contain minimum length, upper/lower case letters,
numbers and symbols, they should not contain full words or
other easy to guess phrases.
▫ They have an expiration date, password reuse policy and
minimum use before users can change it again.
▫ Common and less secure passwords often contain:
→ The name of a pet, child, family member, significant
other, anniversary dates, birthdays, birthplace, favorite
holiday, something related to a favorite sports team, or
the word "password".
→ Winter2017 is not a good password, even if it does fulfil
the password requirements.
⬧ Key Stretching – Adding 1-2 seconds to password verification.
▫ If an attacker is brute forcing a password and needs millions of
tries it will become an unfeasible attack.
⬧ Keylogging (Keystroke Logging):
▫ A keylogger is added to the user's
computer and it records every keystroke
the user enters.
▫ Hardware, attached to the USB port
where the keyboard is plugged in.
→ Can either call home or needs to
be removed to retrieve the
information
▫ Software, a program installed on the computer.
→ The computer is often compromised by a trojan, where
the payload is the keylogger or a backdoor.
→ The keylogger calls home or uploads the keystrokes to a
server at regular intervals.
⬧ Brute Force Attacks (Limit number of wrong logins):
▫ Uses the entire key space (every possible key), with enough
time any ciphertext can be decrypted.
▫ Effective against all key based ciphers except the one-time pad,
it would eventually decrypt it, but it would also generate so
many false positives the data would be useless.
⬧ Dictionary Attacks (Limit number of wrong logins, do not allow
dictionary words in passwords):
▫ Based on a pre-arranged listing, often dictionary words
4|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
5|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
6|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
7|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
8|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
9|Page
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• Authorization:
▪ We use Access Control models to determine what a subject is allowed to access.
▪ What and how we implement depends on the
organization and what our security goals are, type can
often be chosen dependent on which leg of the CIA
Triad is the most important one to us.
▪ If it is Confidentiality, we would most likely go with
Mandatory Access Control.
▪ If it is Availability, we would most likely go
with Discretionary Access Control.
▪ If it is Integrity, we would most likely go
with Role Based Access Control or
Attribute Based Access Control.
▪ There technically is also RUBAC (Rule Based
Access Control), it is mostly used on firewalls with
10 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
IF/THEN statements but can be used in conjunction with the other models to
provide defense in depth.
• DAC (Discretionary Access Control) - Often used when Availability is most important:
▪ Access to an object is assigned at the discretion of the object owner.
▪ The owner can add, remove rights, commonly used by most OS's’.
▪ Uses DACL’s (Discretionary ACL), based on user identity.
• MAC (Mandatory Access Control) - Often used when Confidentiality is most important:
▪ Access to an object is determined by labels and clearance, this is often used in
the military or in organizations where confidentiality is very important.
▪ Labels: Objects have Labels assigned to them; the subject's clearance must
dominate the object's label.
⬧ The label is used to allow Subjects with the right clearance access them.
⬧ Labels are often more granular than just “Top Secret”, they can be “Top
Secret – Nuclear”.
▪ Clearance: Subjects have Clearance assigned to them.
⬧ Based on a formal decision on a subject's current and future
trustworthiness.
⬧ The higher the clearance the more in depth the background checks
should be.
• RBAC (Role-Based Access Control) - Often used when Integrity is most important:
▪ Policy neutral access control mechanism defined around roles and privileges.
▪ A role is assigned permissions, and subjects in that role are added to the group,
if they move to another position they are moved to the permissions group for
that position.
▪ It makes administration of 1,000's of users and 10,000's of permissions much
easier to manage.
▪ The most commonly used form of access control.
▪ If implemented right it can also enforce separation of duties and prevent
authorization/privilege creep.
⬧ We move employees transferring within the organization from one role
to another and we do not just add the new role to the old one.
11 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
12 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
13 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
⬧ You are in Payroll you get the payroll staff access and permissions, if you
move to HR, you lose your payroll access and get HR access assigned.
▪ Normal systems are much larger, but you get the idea from this drawing how
they would connect.
▪ In a perfect world, access control systems should be physically and logically
segmented from the rest of our IP Network, in reality it is most often segmented
logically with VLANs, but in many cases not even that.
14 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
15 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• Service Accounts:
▪ Specialized accounts used by applications or services to access resources and
perform automated tasks.
▪ Often have elevated privileges compared to regular user accounts, making them
appealing targets for attackers.
• Managing and Securing Service Accounts:
▪ Inventory and classify all service accounts.
▪ Limit the number of service accounts where possible.
▪ Use strong, unique passwords and rotate them regularly.
▪ Limit privileges assigned to service accounts to only what is necessary for their
specific function.
▪ Closely monitor and log all activity from service accounts, looking for unusual or
suspicious behavior.
▪ Regularly review and audit service accounts to ensure they are still needed,
properly configured, and have appropriate access.
• Policies and Procedures:
▪ Establish strong policies and procedures that govern access to assets.
▪ Clearly define who is allowed to access which resources under specific
conditions.
▪ Regularly review and update policies to ensure they remain relevant and
effective.
• User Education and Awareness:
▪ Train users making and using service accounts on the importance of protecting
sensitive resources.
▪ Clarify roles and responsibilities when it comes to access control.
▪ Help users understand the reasons behind security policies and procedures to
encourage compliance.
16 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• Federated Identity:
▪ How we link a person's electronic identity and attributes across multiple distinct
identity management systems.
▪ FIDM (Federated Identity Management):
⬧ Having a common set of policies, practices and protocols in place to
manage the identity and trust into IT users and devices across
organizations.
⬧ SSO is a subset of federated identity management, it only uses
authentication and technical interoperability.
▪ Technologies used for federated identity include SAML, OAuth, OpenID, Security
Tokens, Microsoft Azure Cloud Services, Windows Identity Foundation...
⬧ SAML (Security Assertion Markup Language):
▫ An XML-based, open-standard data format for exchanging
authentication and authorization data between parties.
▫ The single most important requirement that SAML addresses is
web browser SSO.
17 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
▪ Super Sign-on:
⬧ One login can allow you to access many
systems and sites.
⬧ Social media logins are common super
sign-ons, if an account is compromised an
attacker can often access multiple other
sites or systems, the social media account is linked all the other
systems.
18 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• Kerberos:
1. Send TGT request sending only plaintext user ID.
2. Sends session key encrypted
with user's secret key + TGT
encrypted with TGS secret key.
3. TGT + Service request
encrypted with the client/TGS
session key.
4. Client to server ticket encrypted with
server's secret key + client/session key encrypted
with the client/TGS session key.
5. Client/session key encrypted with the client/TGS
session key + new authenticator encrypted with the
client/server session key.
6. Timestamp authentication Client/Server Session Key.
19 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
20 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• AD (Active Directory):
▪ Directory service that Microsoft developed for Windows domain networks.
▪ Included in most Windows Server OS as a set of processes and services.
▪ Originally it was only in charge of centralized domain management, as of
Windows Server 2008, AD became an umbrella term for a broad range of
directory-based identity-related services.
▪ A server running Active Directory Domain Services (AD DS) is a domain
controller,
▪ The DC authenticates and authorizes all subjects in a domain, networks can
have one or more domains.
▪ Uses LDAP (Lightweight Directory Access Protocol) versions 2 and 3, Microsoft's
version of Kerberos, and DNS.
▪ Each domain can have a separate authentication process, users, network
components and data objects.
▪ Uses groups to control access by users to data objects, often used as a RBAC
where roles are assigned to groups, where the group has access rights.
▪ Can use Trust domains which allow users in one domain to access resources in
another.
⬧ One-way Trust: One domain allows access to users on another domain,
but the other domain does not allow access to users on the first
domain.
⬧ Two-way Trust: Two domains allow access to users on both domains.
21 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
⬧ Trusted Domain: The domain that is trusted; whose users have access
to the trusting domain.
⬧ Transitive Trust: A trust that can extend beyond two domains to other
trusted domains in the forest.
⬧ Intransitive (non-transitive) Trust: A one way trust that does not
extend beyond two domains.
22 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CISSP® Domain 5
• Identity and access provisioning lifecycle management is crucial for ensuring that user
access remains appropriate and up-to-date throughout the user's relationship with the
organization.
▪ Federated identity management (FIDM) and single sign-on (SSO) technologies
can streamline user access across multiple systems and organizations.
• Various authentication protocols, such as Kerberos, RADIUS, TACACS+, and Active
Directory, provide secure methods for authenticating users and controlling access to
network resources.
▪ Each protocol has its own strengths and weaknesses, and the choice of protocol
depends on the organization's specific needs and infrastructure.
23 | P a g e
https://thorteaches.com/