Lecture ‐ Access Control Asset Security - Dleifnesor/SEC-250 GitHub Wiki
Asset Identification
The process of identifying and cataloging important IT and software assets within an organization
Components:
IT assets: Hardware, software, networks, data.
Criticality: Classifying assets based on their importance to business operations.
Asset management: Tools and techniques for tracking and securing assets.
These include IoT devices, and peripherals
Threat Analysis
The process of identifying potential security threats to assets
Components:
Threat Types: Internal, External, Third party
Threat monitoring and modeling: STRIDE, DREAD, and PASTA methodologies for assessing threats.
Risk Management: Evaluating and prioritizing threats based on likelihood and impact.
Access Control Policies Discretionary Access Control (DAC) Controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do Role-Based Access Control (RBAC) Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles Mandatory Access Control (MAC) Controls access based on comparing security labels with security clearances Attribute-Based Access Control (ABAC) Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions