Access Control
Authorization, least privilege, and access enforcement.
- ABAC/acronym/abac
An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy defined) correlation can be made between the attributes of that object and of the requesting subject.
- AC/acronym/ac
The process of granting or denying specific requests to 1) obtain and use information and related information processing services and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
- Access Control/term/access-control
Access control is the set of mechanisms and policies used to restrict access to resources and enforce authorization decisions.
- access control list/term/access-control-list
A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resources.
- Access Control Matrix/term/access-control-matrix
A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object.
- access control mechanism/term/access-control-mechanism
Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.
- Access Control Model/term/access-control-model
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
- Access Control Policy/term/access-control-policy
an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.
- Access control system/term/access-control-system
A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with pre established policies and rules.
- Access Management/term/access-management
Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization.
- accreditation/term/accreditation
The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed upon set of security controls.
- ACL/acronym/acl
A list of entities, together with their access rights, that are authorized to have access to a resource.
- ACM/acronym/acm
Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.
- ACP/acronym/acp
High level requirements that specify how access is managed and who may access information under what circumstances.
- adj-RIB-Out/term/adj-rib-out
Routes that the BGP router will advertise, based on its local policy, to its peers.
- Authentication/term/authentication
Authentication is the process of verifying the identity of a user, device, or system before granting access.
- Authorization/term/authorization
Authorization is the process of determining what an authenticated principal is permitted to do.
- Cloud Groups/term/cloud-groups
Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group.
- Confidentiality/term/confidentiality
Confidentiality is the property that information is not disclosed to unauthorized parties.
- Group Policy Discovery/term/group-policy-discovery
Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer settings in Active Directory (AD). Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predictable network path .(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016)
- Least Privilege/term/least-privilege
Least privilege means granting only the minimum access necessary to perform an authorized task.
- Lifecycle-Triggered Deletion/term/lifecycle-triggered-deletion
Adversaries may modify the lifecycle policies of a cloud storage bucket to destroy all objects stored within.
- Linux and Mac File and Directory Permissions Modification/term/linux-and-mac-file-and-directory-permissions-modification
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).
- LSA Secrets/term/lsa-secrets
Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at <code HKEY LOCAL MACHINE\SECURITY\Policy\Secrets</code . LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets)
- Malvertising/term/malvertising
Adversaries may purchase online advertisements that can be abused to distribute malware to victims. Ads can be purchased to plant as well as favorably position artifacts in specific locations online, such as prominently placed within search engine results. These ads may make it more difficult for users to distinguish between actual search results and advertisements.(Citation: spamhaus malvertising) Purchased ads may also target specific audiences using the advertising network’s capabilities, potentially further taking advantage of the trust inherently given to search engines and popular websites.
- MFA/acronym/mfa
MFA stands for Multi factor Authentication, an authentication method using multiple factors.
- Multi-factor Authentication/term/multi-factor-authentication
Multi factor authentication (MFA) uses two or more independent factors to verify identity.
- Permission Groups Discovery/term/permission-groups-discovery
Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions.
- Securityd Memory/term/securityd-memory
An adversary with root access may gather credentials by reading ’s memory. is a service/daemon responsible for implementing security protocols such as encryption and authorization.(Citation: Apple Dev SecurityD) A privileged adversary may be able to scan through 's memory to find the correct sequence of keys to decrypt the user’s logon keychain. This may provide the adversary with various plaintext passwords, such as those for users, WiFi, mail, browsers, certificates, secure notes, etc.(Citation: OS X Keychain)(Citation: OSX Keydnap malware)
- Services Registry Permissions Weakness/term/services-registry-permissions-weakness
Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the permissions for Registry keys related to services can allow adversaries to redirect the originally specified executable to one they control, launching their own code when a service starts. Windows stores local service configuration information in the Registry under <code HKLM\SYSTEM\CurrentControlSet\Services</code . The information stored under a service's Registry keys can be manipulated to modify a service's execution parameters through tools such as the service controller, sc.exe, PowerShell, or Reg. Access to Registry keys is controlled through access control lists and user permissions. (Citation: Registry Key Security)(Citation: malware hides service)
- Single Sign-on/term/single-sign-on
Single sign on (SSO) allows a user to authenticate once and access multiple services without re authenticating.
- SSO/acronym/sso
SSO stands for Single Sign on, enabling access to multiple services with one authentication event.
- Sudo and Sudo Caching/term/sudo-and-sudo-caching
Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries may do this to execute commands as other users or spawn processes with higher privileges.