Module 5 - Implementing Access Control, Authentication, and Account Management New
Module 5 - Implementing Access Control, Authentication, and Account Management New
ASSURANCE &
SECURITY 1
MODULE 5
IMPLEMENTING ACCESS CONTROL,
AUTHENTICATION,
AND ACCOUNT MANAGEMENT
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define the Access Control and its goals;
▪ Demonstrate the concepts of Directory Services;
▪ Enumerate the types of securing remote access
▪ Explain the concepts of account management security controls;
▪ Discuss Account Management Security Controls concepts;
▪ Give different Account Policy concepts;
ACCESS CONTROL AND
AUTHENTICATION SERVICES
ACCESS CONTROL
Authentication
Centralized
Administration
Directory query
LDAP Server
LDAP Client
Stores directory
data Directory query
LDAP Port 636 is used for secure LDAP (LDAPS).
LDAP Client
Realistically, there are probably more differences than similarities between the
two directory solutions. Microsoft’s AD is largely a directory for Windows® users,
devices, and applications. AD requires a Microsoft Domain Controller to be
present and when it is, users are able to single sign-on to Windows resources that
live within the domain structure.
LDAP Authentication
There are two options for LDAP authentication in LDAP v3 – simple and SASL
(Simple Authentication and Security Layer).
❑Anonymous authentication
❑Unauthenticated authentication
❑Name/Password authentication
Kerberos
Carrier
Protocol
Encapsulating
Packet
Original Packet
The three types of tunneling protocols used with a VPN server/RAS
server running on Windows Server 2008 R2 include:
Directory query
Challenge
Response
❑ Implement a VPN.
Pretty Good Privacy (PGP) is a freeware email encryption system that uses
symmetrical and asymmetrical encryption. When an email is sent, the document
is encrypted with the public key and a session key.
RADIUS - Remote Authentication Dial-In User Service
One-Time Passwords (OTP) are pretty much what their name says: a password that
can be only used one time.
HOTP
HMAC
One-Time
Password:
0325170
HMAC One-Time
Password:
0325170
Expires in:
60 seconds
SUBTOPIC 2
Account Policy enforcement comes into play because all users have the
right level of access and account type to meet their business function
does not mean an organization is as secure as it could be.
CREDENTIAL MANAGEMENT is an overall service that stores,
manages, and often audits logins of user credentials in a central
location, offered to both individuals and enterprise networks.
ACCOUNT LOCKOUT is another policy that automatically disables
an account when a certain threshold of incorrect passwords are
used to log in, requiring a user to recover access to their account
with a new password or by satisfying other requirements, such as
security questions.
Account Privileges
A PRIVILEGED ACCOUNT is a user account that has more privileges than ordinary
users.
Account Policy
❑Account creation
❑Resource management
❑Shared and multiple account access
❑User access reviews
❑Account prohibition
❑Password policies
Account Federation
Microsoft
Account
❑Reset account lockout counter after: This setting determines the period of
time, in minutes, that must elapse before the account lockout counter is
reset to 0 bad logon attempts.
Setting Time Between Password Changes
Minimum Password Age: The minimum password age setting controls how many
days a user must wait before they can reset their password. This can be set to a
value from 1 to 998 days.
Maximum Password Age: The maximum password age setting controls the
maximum period of time permitted before a user is forced to reset their
password.
❑ Implement the principle of least privilege for user and group account access.
❑ Verify that an account policy exists and includes all account policy guidelines.
❑ Verify that account request and approval procedures are in place and enforced.
❑ Verify that account modification procedures are in place and enforced.
❑ Verify that strong user name and password guidelines are documented.
Guidelines for Implementing Account Management Security Controls