image# Logical Security Controls

Control Classification

Physical Security Controls

Work in the built environment to control access to sites. Examples include fences, doors, and locks

Procedural Security Controls

Applied and enforced by people. Examples include incident response processes, management oversight, and security awareness training programs.

Logical Security Controls

Applied and enforced by digital or cyber systems and software. Examples include user authentication, antivirus software, and firewalls.

Logical controls have a trifecta system referred to as AAA (triple “A”)

  • Authentication everything on the system can be identified by a specific account and that account belongs to one specific system or user. The account should only be accessible by the system or user whom has valid credentials.
  • Authorization resources on the system can be accesses or denied based on the account roles or permissions. The resources may be things like being able to read a file, or write to a file. Or access a remote server on a specific network.
  • Accounting is auditing a system and appropriately tracking all the changes done to a system and by whom it has occurred.

Access Control List (ACL)

Terms

  • subjects can be a system, application, or service running and attempting to access a resource. Each subject has something called a Subject Identifier (SID) which is unique to the account.
  • access control entry provides a way to identify a subnet and the permissions for a resource.
  • permissions are a list of security roles or names which can be keyed to identify whether a subject has different types of access or no access to a resource.

Implicit Deny

Implicit deny means that unless there there is a specific rule targeting the account, security group, or the permission a subject has, the access to a resource is explicitly denied to the subject.

Least Privilege

Subjects should be provided with the minimum required permissions to perform their responsibilities.