Transforming Access Control Policies and Standards into Procedures and Guidelines

Access controls limit who can be in a specific area and what they can do once they get into an area. This area can be physical, such as a building, or logical, like a file structure. Limiting access on a personal or enterprise network will assist in securing what “lives” on that network, such as documents and personal information. Access controls are a cornerstone to a secure and vital network.

An important part of any access control system is creating clear guidelines and instructions for using it. In this section, you will learn how to use policies and standards as the foundation for creating access control system guidelines and procedures. The following are items to help you get started:

  • Begin the formal process with a plan. State your goals, what you need to reach them, and how you’ll achieve them.
  • Determine which policies and standards you will reference. You don’t have to reinvent the wheel when other documents and resources already exist that can help you create your own guidelines and procedures.
  • Determine how you can make the documentation process and system implementation easy for everyone. Once a task and process becomes difficult, people may reject the entire concept.
  • Come up with effective ways to spread the message and ensure that everyone understands the policies, standards, guidelines, and procedures.

Transform Policy Definitions into Implementation Tasks

Everything starts with a policy. A policy specifies the requirements or rules that need to be followed. It sets the direction for the organization. An example of a policy is an acceptable use policy stating how employees may use employer-owned computer resources, including the network and systems. A standard specifies how to support the policy. The standards can be industry standards or organization-specific, or a combination of both. Guidelines provide recommendations on how the requirements are to be met. Procedures define how the policies, standards, and guidelines will be implemented. An example of this process is:

  • Policy—The organization must ensure that all employer-owned computer systems are secure.
  • Standard—The organization may implement ISO 27002.
  • Guideline—The organization recommends that passwords should be a minimum of eight characters and a maximum of 16.
  • Procedure—The organization should follow the steps in the Password Creation procedure to support the policy and standard.
Approaches

There are various approaches an organization can take when implementing access controls. You should consider each approach when creating procedures. Two of these approaches are the phased approach and prioritization.

NOTE

A phased approach may be used when an organization has specific controls in place that ensure all steps that are related to each other are resolved together. In other words, changing one control does not affect another control. If an organization has the time to address all problems, a phased approach may be used.

NOTE

A prioritization approach is used when an organization has limited resources and wants to resolve the important processes first.

A phased approach starts at the beginning and works through to the end, but only on one section of a project at a time. For example, a systems administrator performs an assessment of the infrastructure, determines the goals, and sets the procedures based on the goals. He or she must then implement the procedure. After all systems have been configured, they must be tested and the results evaluated. Let’s say a user named Kevin breached the security of a network folder. A systems administrator may review all the steps that led up to the breach. Was Kevin correctly granted access to the network? Was Kevin correctly allowed access to a particular folder? Did the access controls on the folder function properly or was there a failure? If there was a failure, why did it occur? Are changes to the access control system required?

A prioritization approach means the administrator deals with procedures and network changes on a case-by-case basis. If an attack has occurred on the network, the administrator may make appropriate changes to adjust for that immediate weakness in the system. For example, if a user breaches network security and accesses a folder without authorization, a prioritization approach would require a systems administrator to resolve the access control failure. Very little testing may be done after the remediation occurs. Prioritization may be used when an organization feels that ranking the tasks from most important to least important will provide an efficient system for resolving the tasks.

Implementation

Once you decide which approach to take, you can begin turning policy statements into implementation tasks and procedures. Various questions that need to be addressed are:

  • What is the mission of the implementation? What is the organization trying to achieve? In this case, you are taking a plan of action and putting the controls around it to ensure the policy is implemented.
  • What are the factors needed to ensure the policy is met? An organization must consider multiple factors when implementing a policy. Some examples of factors are access controls, secure communications to networks outside of the corporate network, and authentication measures.
  • Which tools will you need to address the access controls, secure communications, and authentication? What standards will be followed? Which access control models, such as discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC), will be used? What secure protocols, such as Secure Shell (SSH) or Transport Layer Security (TLS), will be implemented? What authentication methods, such as user ID and password or multifactor authentication, will be implemented?
  • How will the methods be implemented? Will they be put in place all at once or in a phased approach? Which risks are associated with the timing of the implementation?
  • How will these access, secure communications, and authentication measures be tested? How often will they be tested? What will the organization do with the results?
  • How often will the policies be reviewed? How will you document the policies and implementation tasks?

Transforming policies into implementation procedures ensures that all business units are aware of the policies and security needs of the organization. The implementation procedures formalize the structure and policies of the corporation and allow the organizations within the company to be measured against them. These implementation tasks help ensure a safer organization by having a common mission and implementation method that all employees will follow.

Follow Standards Where Applicable

Standards are an important baseline for incorporating security and specifically access controls within an organization. This section examines some of the organizations that set security and technology standards and which standards are important for creating access control implementation procedures.

FYI

The NIST National Vulnerability Database (NVD) is a United States repository maintained by the government providing information on standard-based vulnerability management data. The NVD uses the Security Content Automation Protocol (SCAP). Organizations that use the NVD are provided with vulnerability management, security management, and compliance information on software and hardware products and their implementations.

IEEE

IEEE was created in 1963. This not-for-profit professional organization has created over 1,100 information technology standards. Some of these standards include IEEE 802.1X, which addresses authentication for Layer 2 (bridges and switches) devices when communicating on a network. The standard 802.1AC defines Media Access Control (MAC), and 802.1AE discusses MAC security. The IEEE Standards Association (IEEE-SA) is the standards contributor to IEEE. The IEEE-SA promotes “the engineering process by creating, developing, integrating, sharing, and applying knowledge about electro- and information technologies and sciences.”

National Institute of Standards and Technology (NIST)

NIST was founded in 1901 as a nonregulatory federal agency under the U.S. Department of Commerce. NIST’s mission is “to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life.” When it comes to information technology, NIST was given direction by the Computer Security Act of 1987, the Cyber Security Research and Development Act of 2002, and the Federal Information Security Management Act (FISMA) of 2002. Under these three acts is the development of cryptographic standards and procedures, guidelines, and best practices for federal IT security. This IT security includes Federal Information Processing Standards (FIPS) and NIST Special Publications.

NOTE

NIST Special Publication 800-53 Revision 3 provides guidelines for selecting and specifying security controls for information systems.

Federal Information Security Management Act (FISMA)

The Federal Information Security Modernization Act (FISMA) sets forth security requirements for all federal government agencies. It requires each federal agency to “develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided and managed by another agency, contractor, or another source.” NIST sets the FISMA standards for federal IT systems.

NOTE

You might see the “M” in FISMA used to mean “Management” or “Modernization.” The original Federal Information Security Management Act was passed in 2002 to set federal cybersecurity requirements. Congress later updated the law in 2014 and kept the acronym the same when they passed the Federal Information Security Modernization Act.

According to FISMA, an information security policy should consist of:

  • Periodic risk assessments
  • Policies and procedures based on the risk assessments
  • Subordinate plans for providing adequate information security
  • Security awareness training
  • Periodic testing and evaluation of the effectiveness of information security policies
  • Process for planning, implementing, evaluating, and documenting remedial actions
  • Procedure for detecting, reporting, and responding to security incidents
  • Plans and procedures to ensure continuity of operations

As previously discussed, you must understand risk to appropriately identify or create security policies for your organization. You should use your knowledge of that risk to implement a framework of controls. FISMA has built a risk management framework that you can apply to new and current systems to manage your risk:

  • Step 1: Categorize the information system.
  • Step 2: Select a baseline of security controls.
  • Step 3: Implement the security controls and document how the controls are deployed.
  • Step 4: Assess the security controls.
  • Step 5: Authorize information system operations based on a determination of risk.
  • Step 6: Monitor and assess selected security controls.
ISO

ISO is the largest developer and publisher of international standards. ISO is not associated with any government entity but works with the public and private sectors. Approximately 18,000 standards have been established through ISO, including:

  • ISO 9001, “Quality Management Systems”
  • ISO 31000, “Risk Management—Principles and Guidelines”
  • ISO/IEC 27001, “Information Technology—Security Techniques—Information Security Management System Implementation Guidance”
  • ISO/IEC 27006, “Information Technology—Security Techniques—Requirements for Bodies Providing Auditing and Certification of Information Security Management Systems”

ISO develops standards based on recommendations from industries and those that may be affected by the standard. The recommendation is passed on to an ISO member and the technical committee that would create the standard. If the technical committee feels that the standard is needed and is a global requirement, the committee discusses the relevance and will work together to develop the standard.

In 2008, IEEE and ISO joined forces to create the Partner Standards Development Organization (PSDO). This organization combines the resources from both governing bodies to “focus on the subjects of information technology, intelligent transport systems, and health informatics.”

NOTE

An ISO/IEC prefix indicates joint work between ISO and the International Electrotechnical Committee (IEC). Its mission is to provide information about standards and standardization.

Internet Engineering Task Force (IETF)

The Internet Engineering Task Force (IETF) was formed in 1986. IETF is an international organization that focuses on the Internet and Internet protocols. This includes the Transmission Control Protocol/Internet Protocol (TCP/IP) suite, which includes the Application Layer, Transport Layer, Internet Layer, and Data Link Layer (described in RFC 1122). The IETF develops Requests for Comments (RFCs). An RFC addresses the methods and behaviors of Internet systems including routers, switches, and computer systems. Each RFC has its own set of numbers assigned to it. These numbers are never changed. If an RFC needs to be rewritten or have additions, a revised document is written and released. RFCs can be superseded by other RFCs, making the original or previous RFC obsolete. Examples of some RFCs are:

  • RFC 1457, which addresses the security-level framework for the Internet
  • RFC 1938, which addresses one-time password messages
  • RFC 2716, which touches on Transport Layer (Layer 3) security
  • RFC 4301, which focuses on the security architecture for Internet Protocol (IP)
PCI Security Standards Council

The PCI Security Standards Council (PCI SSC) was developed in 2006 for developing, managing, educating, and providing awareness for the payment card industry (PCI) security standards. These standards include the Data Security Standard (DSS), payment application data security standard, and PIN-entry device requirements. The companies that founded the PCI Security Standards Council are American Express, MasterCard, Visa, Discover, and JCB International.

Payment Card Industry Data Security Standard (PCI DSS) is a security standard for security management, policies and procedures, network architecture, software design, and other protective measures. This standard helps organizations protect customer payment card account data. PCI DSS specifies six primary requirements that merchants need to meet to process credit and debit card transactions:

  • Building and maintaining a secure network
  • Protecting cardholder data
  • Maintaining a vulnerability management program
  • Implementing strong access control measures
  • Regularly monitoring and testing networks
  • Maintaining an information security policy

The PCI DSS is updated every 3 years, using a defined life cycle approach that seeks input from merchants, service providers, banks, and other industry stakeholders. The current version of PCI DSS at the time this book went to press was version 3.2.1, published in May 2018. The PCI SSC frequently publishes updates to the standard, so be sure to check their website at http://pcisecuritystandards.org for the most recent version.

Center for Internet Security

The Center for Internet Security (CIS) in a nonprofit independent community of professionals that provides best practice standards for the secure configuration of network devices such as Apple iPhone, Check Point Firewall software, and Cisco devices, just to name a few. The professionals associated with CIS establish:

  • Benchmarks detailing best practice security configurations for IT systems
  • Benchmark audit tools that enable IT and security professionals to assess their IT systems for compliance with benchmark and security best practices
  • Metrics that can be used across organizations to collect and analyze data on security processes and performance outcomes

CIS promotes consensus-based standards that organizations can use and implement to increase the security, privacy, and integrity of the business and other functions and transactions that occur on the Internet.

Create Simple and Easy-to-Follow Procedures

Although standards have been established by credible organizations in the United States and internationally, you need to incorporate them into your procedures in a way that’s easy for users to follow. Policies, too, need to be incorporated and expanded upon with details that specify how to perform tasks and when.

Converting a policy into an implementation task requires multiple steps. You must first identify a policy that addresses your needs. Some examples of policies are a password policy and a system configuration policy. You then compare your current system with the system described in the policy. You must perform a gap analysis to understand which steps will need to be implemented.

FYI

When managing procedures, establish who may change procedures and under what conditions. Is the person who created procedures the person who needs to change them? Will the person who needs to change them understand how and why the original policies and procedures were put in place? The developers of an organization’s security policies often move on to other programs or other companies. If their thoughts and beliefs behind the design, implementation, and testing of policies and procedures are not well noted or are incomprehensible to new administrators, the policies and procedures become a security risk themselves.

Let’s walk through a policy–standard–procedures–guidelines example for an organization. This example will show you how theory is put into practice:

  1. Policy—The organization wants to implement a more defined password policy for its access control policies. Not only does this include individual computer systems, such as desktops and laptops, but servers that are maintained throughout the organization as well.
  2. Standard—The organization has determined that it wants to implement the standards and recommendations that NIST has established—for example, NIST Special Publication (SP) 800-53. This document provides the recommended security controls for federal information systems. Although this organization is not a federal entity, it feels that the standards and recommendations that NIST has established meet its stringent needs.

    The organization will also use the standards and recommendations established by NIST in NIST SP 800-118, “Guide to Enterprise Password Management.” This document recommends the following constraints for password usage and creation:
    • Storage:
      • Encrypt files that maintain passwords.
      • Use operating system access control features to restrict access to files that contain passwords.
      • Store the cryptographic hashes of the passwords instead of storing the actual password.
    • Transmission:
      • Encrypt communications when transmitting passwords.
      • Transmit cryptographic password hashes versus a plaintext password.
      • Use secure protocols when transmitting passwords (Secure Shell or HTTPS).
      • Use network segregation and switched networks for internal networks in order to reduce the possibility of an attacker identifying the password.
      • Use a secure password-based authentication protocol (Kerberos).
    • User knowledge and behavior:
      • Be aware of nontechnical tactics for password capturing such as shoulder surfing. Although a password may be hidden by asterisks, an attacker may still be able to gain certain characters in the password that can be used to determine the full password.
      • Be aware of technical tactics for password capturing such as keystroke logging. Protect the systems to ensure malware is not loaded onto the computer systems. Users should also not enter their password into public computer systems, such as those at airports or hotels, which are high risk, or the password may be compromised.
      • Be aware of social engineering. An attacker might ask a user specific questions to gather additional data that will be used to determine the password or to reset a password. Phishing e-mails are an example of social engineering that is used to gather password data.
      • Be aware of malicious insiders who may use the passwords or provide passwords to others to gather data or files for the organization, even though they or others are not allowed access to them.
  3. Procedures—These are the steps that an administrator takes to implement controls. In this example, part of the procedure for implementing passwords is to identify all the systems that require passwords. Once they are identified, it is necessary to apply the procedures to make sure the passwords meet the password policy and standards. Documenting the specific procedures based on protection of passwords, strength of passwords, and reuse of passwords will help ensure the goals are met.
  4. Guidelines—These are suggestions and best practices based on standards. Regarding a password policy, for example, suppose the organization has decided to base its guidelines on the best practices established by NIST. If employees follow the guidelines, the organization will be in compliance with the standards.

These steps are put in place to ensure a secure organization and computer systems.

Define Guidelines That Departments and Business Units Can Follow

Guidelines are optional actions or controls that are based on policies, standards, and procedures. Guidelines are also recommendations and best practices that are provided by standard bodies such as NIST, ISO, and CIS. Creating guidelines that employees follow can be difficult or easy. How this is determined is based on the steps that were taken beforehand. Previously, you learned about procedures and that they need to be simple and easy to follow. If this philosophy is not adopted, the subsequent steps for implementing security will be much more challenging. When the security teams within an organization focus on security, they must realize that this needs to be accepted by both technical and nontechnical parties. This is where broad-based security training can benefit everyone. Administrators and employees need to understand the value and importance of what they are being asked to do.

Guidelines that may be established based on the password policy example, NIST standards, and password procedures are:

  • Encrypt all passwords.
  • Ensure secure communications are used for each entry.
  • Educate employees on shoulder surfing, malware, and social engineering, and how these tactics are used to retrieve passwords.
  • Lock out users after five failed logon attempts.
  • Require all passwords to be a minimum of 8 characters and a maximum of 16 characters.
  • Require all passwords to include a minimum of one capital letter, one number, and two special characters.
  • Ensure that passwords are changed every 90 days.
  • Configure the system to store up to five previous passwords so that they cannot be reused.
  • Use an enterprise-wide password database system.

Guidelines within the organization assist in educating administrators. Guidelines identify what is expected of various groups to ensure compliance with policies and standards. Security is a day-to-day mandate and requires everyone to participate in the actions, policies, and guidelines. All employees should receive training to fully understand the value of security to the organization.

NOTE

An enterprise-wide password database system, also called a single sign-on system, allows individual users to encrypt their user ID and password. These tools allow users to store their user IDs and passwords for multiple systems and applications. The data is encrypted and can be unlocked only by a user’s password. Instead of having to remember several passwords, the user will need to remember only one.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.154.41