Information Security Policy and Access Control Guidelines

it 6823 lm 4 information security policy access n.w
1 / 19
Embed
Share

Explore the intricacies of information security policy and access control mechanisms, including defining security policies, risk management, Bell-LaPadula Model, types of access control, and more. Discover the importance of creating an overall approach to information security and the purposes of an Information Security Policy (ISP) in safeguarding data integrity, confidentiality, and availability.

  • Information Security
  • Access Control
  • Risk Management
  • Data Classification
  • ISP

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. IT 6823 LM 4 Information Security Policy & Access Control Dr. Lei Li

  2. NIST Framework Core Image source: https://www.nist.gov/document/cybersecurityframeworkv1- 1presentationpptx IT 6823 LM4 Security Policy & Access Control 2

  3. Learning Outcomes Define information security policy Explain the risk management process Explain the main components of information security policy framework Describe the basics of Bell-LaPadula Model Discuss different types of access control Explain ACL and be proficient in changing permission in major OS IT 6823 LM4 Security Policy & Access Control 3

  4. Information Security Policy Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information Important part of security program IT 6823 LM4 Security Policy & Access Control 4

  5. ISP Framework Image source: https://www.exabeam.com/information-security/information-security-policy/ IT 6823 LM4 Security Policy & Access Control 5

  6. Purposes of ISP Create an overall approach to information security. Detect and preempt information security breaches such as misuse of networks, data, applications, and computer systems. Maintain the reputation of the organization and uphold ethical and legal responsibilities. Respect customer rights, including how to react to inquiries and complaints about non-compliance. IT 6823 LM4 Security Policy & Access Control 6

  7. ISP Audience & Objectives Whom the information security policy applies Objectives Confidentiality Integrity Availability IT 6823 LM4 Security Policy & Access Control 7

  8. Data classification Top secret Secret Confidential Public IT 6823 LM4 Security Policy & Access Control 8

  9. Other Elements Authority and access control policy Data support and operations Security awareness and behavior Responsibilities, rights, and duties of personnel IT 6823 LM4 Security Policy & Access Control 9

  10. ISP Examples Acceptable use policy Access control policy Incident response policy Email/communication policy More examples: https://www.csoonline.com/article/3263738/9- policies-and-procedures-you-need-to-know-about-if-youre- starting-a-new-security-program.html IT 6823 LM4 Security Policy & Access Control 10

  11. Access Control Discretionary Access Control (DAC) Mandatory access control (MAC) Role-Based Access Control (RBAC) Rule-Based Access Control IT 6823 LM4 Security Policy & Access Control 11

  12. Bell-LaPadula Model One of principal foundations for authentication Focus on confidentiality Access Matrix s = subject o = object and a = access rights associated with the subject. IT 6823 LM4 Security Policy & Access Control 12

  13. Access Privileges Read-Only Append Execute Read-Write IT 6823 LM4 Security Policy & Access Control 13

  14. Restrictions Reading down Write up Image source: https%3A%2F%2Fwww.cs.utexas.edu%2F~byoung%2Fcs361%2Fslides2-policy-4up.pdf IT 6823 LM4 Security Policy & Access Control 14

  15. Access Control List A list of permissions associated with an object Filesystem ACLs Active Directory ACLs Networking ACLs IT 6823 LM4 Security Policy & Access Control 15

  16. Example of ACL Table Image source: https://www.dokuwiki.org/acl IT 6823 LM4 Security Policy & Access Control 16

  17. Change File Permission in Windows 10 IT 6823 LM4 Security Policy & Access Control 17

  18. Change File Permission in Windows 10 Command line utility Icacls Set, backup and restore ACL Example: $> icacls "E:\Study2018" /t /grant:F IT 6823 LM4 Security Policy & Access Control 18

  19. File Permission Numeric Table -Unix Chmod IT 6823 LM4 Security Policy & Access Control 19

Related


More Related Content