Site icon TheCyberThrone

Certified in Cybersecurity Domain 3 Access Control Concepts Detailed Notes

Advertisements

Objective

This domain introduces foundational principles for managing and securing access to systems and data. The focus is on authorization, authentication, access models, and accountability. Understanding how to regulate access is critical in protecting confidentiality, integrity, and availability (CIA) of information systems.

What You’ll Learn in Domain 3

  1. Access Control Fundamentals
    • What access control is and why it’s essential.
    • Core principles: identification, authentication, authorization, and accountability (IAAA).
  2. Authentication Methods
    • Single-factor and multi-factor authentication (MFA).
    • Types: something you know (password), have (token), are (biometrics), do (behavior), or where you are (location-based).
  3. Access Control Models
    • Mandatory Access Control (MAC) – rigid, based on classification (e.g., military).
    • Discretionary Access Control (DAC) – flexible, owner decides access.
    • Role-Based Access Control (RBAC) – access tied to job roles.
    • Attribute-Based Access Control (ABAC) – dynamic, based on policies and attributes.
  4. Account Management
    • Creating, maintaining, and deactivating user accounts securely.
    • Enforcing least privilege and separation of duties.
  5. Access Control Tools & Techniques
    • Logical access controls: passwords, smart cards, biometric systems.
    • Physical access controls: locks, security guards, access badges.
  6. Remote Access
    • Secure methods for offsite access like VPNs, remote desktop, cloud authentication mechanisms.
  7. Monitoring and Auditing Access
    • Keeping records, logging events, analyzing user behavior to detect unauthorized access.

3.1 – Understand Physical Access Controls

Objective: To understand how physical security mechanisms protect information systems by preventing unauthorized physical access to facilities, devices, and data.

What Are Physical Access Controls?

Physical access controls are the security measures designed to restrict access to physical areas or equipment. They prevent unauthorized individuals from entering spaces where sensitive information, systems, or infrastructure is located. These controls are part of the broader defense-in-depth strategy and form the first layer of protection in any cybersecurity framework.

Components of Physical Access Controls

1. Physical Security Devices and Mechanisms

These are the hardware-based methods to prevent unauthorized entry:

2. Environmental Design (CPTED)

Crime Prevention Through Environmental Design is a proactive approach using architectural principles to deter physical threats.

Key CPTED strategies:

3. Monitoring and Surveillance Systems

4. Authorized vs. Unauthorized Personnel

Supporting Best Practices

Key Takeaways

3.2 – Understand Logical Access Controls

Objective: To understand how to control and manage access to systems, data, and digital resources using non-physical (logical) methods and principles.

Logical access controls ensure that only authorized individuals can access specific resources and perform only permitted actions, based on policies and organizational needs.

Key Logical Access Control Concepts

1. Principle of Least Privilege (PoLP)

Definition: Users and systems should only have the minimum level of access required to perform their duties—nothing more.

2. Segregation of Duties (SoD)

Definition: A single individual should not be responsible for completing all parts of a sensitive task or process.

3. Discretionary Access Control (DAC)

Definition: The data owner determines who has access and what type of access (read, write, execute).

Example: A user shares a folder and grants write access to a colleague.

4. Mandatory Access Control (MAC)

Definition: Access is based on predefined policies and classification labels; users cannot modify permissions.

Example: A user with Secret clearance cannot open a Top Secret file, even if they’re the file creator.

5. Role-Based Access Control (RBAC)

Definition: Access rights are assigned based on the user’s role or job function.

Example: Everyone in the “HR” role gets access to the HR system; no manual permission assignment needed.

Additional Considerations for Logical Access:

Key Takeaways

Exit mobile version