Is any hardware, software or administrative policy or procedure that control access to assets.

The goal is to only allow access to authorized subjects.

Subject

Active Entity, that tries to access assets. Examples: Users, programs, processes, services, etc.

Object

Passive Entity, that provides information to active subjects. Examples: Databases, services, printers, programs, files, etc.

The management between these two is known as Access Control.

Primary Types of Access Control

Preventive

Stop unwanted unauthorized activity from occurring.

Detective

Attempts to discover or detect if any unauthorized activity has happened. Can’t stop access from happening, only detect it afterwards.

Corrective

It modifies the environment to return to normal after an unwanted or unauthorized activity occurred. It attempts to correct the issue that lead to the unauthorized activity.

image.png

Examples

Preventive:

Fences, locks, alarm system (that locks everything), auditing, encryption, security policies, CCTV, penetration testing, etc.

Detective:

Security guards, motion detectors, audit trails, violation reports, supervision and review of users

Corrective:

Rebooting a system, antivirus that quarantines and removes a virus, backup and restore plans

More unnecessary jargon about access control

image.png

Deterrent

Deterrent is very close to preventive, but it depends on the would-be violator to decide not to take the unwanted or unauthorized action.