Page 1060 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1060

Summary


               This chapter covered many concepts related to access control models.
               Permissions refer to the access granted for an object and determine
               what a user (subject) can do with the object. A right primarily refers to

               the ability to take an action on an object. Privileges include both rights
               and permissions. Implicit deny ensures that access to an object is
               denied unless access has been explicitly granted to a subject.

               An access control matrix is an object-focused table that includes
               objects, subjects, and the privileges assigned to subjects. Each row
               within the table represents an ACL for a single object. ACLs are object
               focused and identify access granted to subjects for any specific object.

               Capability tables are subject focused and identify the objects that
               subjects can access.

               A constrained interface restricts what users can do or see based on
               their privileges. Content-dependent controls restrict access based on
               the content within an object. Context-dependent controls require
               specific activity before granting users access.


               The principle of least privilege ensures that subjects are granted only
               the privileges they need to perform their work tasks and job functions.
               Separation of duties helps prevent fraud by ensuring that sensitive
               functions are split into tasks performed by two or more employees.

               A written security policy defines the security requirements for an
               organization, and security controls implement and enforce the security
               policy. A defense-in-depth strategy implements security controls on

               multiple levels to protect assets.

               With discretionary access controls, all objects have an owner, and the
               owner has full control over the object. Administrators centrally
               manage nondiscretionary controls. Role-based access controls use
               roles or groups that often match the hierarchy of an organization.
               Administrators place users into roles and assign privileges to the roles
               based on jobs or tasks. Rule-based access controls use global rules that

               apply to all subjects equally. Mandatory access controls require all
               objects to have labels, and access is based on subjects having a
   1055   1056   1057   1058   1059   1060   1061   1062   1063   1064   1065