Physical access control
Access control is the granting or denying approval to use a specific resource. Physical access control consists of mantraps, walls, and door locks that limit physical access to resources, whereas technical access is concerned with allowing or limiting access to data resources. The National Institute of Standards and Technology (NIST) tells us that access control is concerned with determining the allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system.
Compromised privileged credentials, both human and machine, account for the majority of successful cybersecurity attacks. Enterprise credential management and privileged access management are the cornerstones of a company's cybersecurity defensive posture.
Research and write a 250- to 500-word analysis addressing the following:
Explain what enterprise credential management and privileged access management are, and provide at least one example of each.
Discuss why they are important to a company's cybersecurity defense posture and describe how the two are connected.
Develop a specific plan for the implementation of access controls in your company.
Sample Solution
Enterprise Credential Management (ECM)
Enterprise credential management (ECM) is the process of managing and securing the credentials used by users and systems to access enterprise resources. ECM encompasses a variety of activities, including:
- Credential creation and issuance
- Credential lifecycle management
- Credential revocation and deactivation
- Credential monitoring and auditing
Full Answer Section
Example of ECM A company uses a password management system to generate and store strong passwords for all employees. The password management system enforces password complexity requirements and requires employees to change their passwords regularly. The company also uses a single sign-on (SSO) solution to allow employees to access multiple applications with a single set of credentials. Privileged Access Management (PAM) Privileged access management (PAM) is the process of managing and controlling access to privileged accounts. Privileged accounts are accounts that have elevated permissions that allow them to perform sensitive tasks, such as modifying system settings or accessing sensitive data. PAM encompasses a variety of activities, including:- Identifying and classifying privileged accounts
- Granting and revoking privileged access
- Monitoring and auditing privileged access
- Identify and classify assets. The first step is to identify all of the assets that need to be protected. This includes both physical and logical assets. Once the assets have been identified, they need to be classified based on their sensitivity.
- Identify users and systems. The next step is to identify all of the users and systems that need to access the assets. This includes both internal and external users.
- Define access policies. Once the assets and users have been identified, access policies need to be defined. These policies should specify who has access to what assets, and under what conditions.
- Implement access controls. Once the access policies have been defined, they need to be implemented. This may involve implementing technical controls, such as firewalls and intrusion detection systems, or it may involve implementing administrative controls, such as separation of duties and background checks.
- Monitor and audit access. Once the access controls have been implemented, they need to be monitored and audited on a regular basis. This will help to ensure that the controls are effective and that they are being followed.