Thor's+Study+Guide+ +CC+Domain+3
Thor's+Study+Guide+ +CC+Domain+3
Thor's+Study+Guide+ +CC+Domain+3
Introduction to Domain 3
➢ Domain 3: What we will be covering.
Physical Controls:
▪ Locks, fences, guards, dogs, gates, bollards, ...
Technical Controls:
▪ Hardware/software/firmware – Firewalls, routers, encryption, ...
Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-
virus.
▪ Corrective:
Controls that Correct an attack – Anti-virus, patches, IPS.
▪ Recovery:
Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
▪ Deterrent:
Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.
2|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
3|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
⬥ Older cameras are analog and use video tapes for storage (often VHS);
quality is often bad, unclear.
⬥ Modern cameras are digital and use CCD (Charged Couple Discharge);
also use a DVR (Digital Video Recorder).
⬥ Organizations may have retention requirements either from policies or
legislation that require a certain retention of their video (this could be
bank ATM, data center or entry point footage).
⬥ Cameras can be either static or non-static (automatic or manual).
🢭 We have all seen the spy or heist movies where they avoid them
by knowing the patterns and timers.
🢭 This risk can be mitigated with a randomizer or pseudo
randomizer, we want to ensure full coverage.
• Locks (Preventative):
⬥ Key locks:
🢭 Requires a physical key to unlock;
keys can be shared/copied.
🢭 Key Bitting Code (How far the key is
bitten down for that section.) – Can
be copied and replicated without the
key from either the numbers or a
photo of it.
🢭 Pin Tumbler Lock (or Yale lock) – A
lock mechanism that uses pins of
varying lengths to prevent
the lock from opening without the correct key.
🢭 Lock Picking - with a lock pick set or bumping, opening a lock
without the key.
🢭 Any key lock can be picked or bumped, how long it
takes depends on the quality of the lock.
🢭 Lock pick sets lift the pins in the tumbler, opening the
lock.
🢭 Lock Bumping - Using a shaved-down key that matches the lock,
the attacker “bumps“ the key handle with a hammer or
screwdriver which makes the pins jump, then the attacker
quickly turns the key.
🢭 Master Keys open any lock in a given area or security zone.
4|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
🢭 Both who has them and where they are kept should be
very closely guarded at all times.
🢭 Core Key is used to remove a lock core in
"interchangeable core locks."
🢭 An interchangeable core, or IC, is a
compact keying mechanism in a
specific figure-eight shape.
🢭 Relies upon a specialized "control" key
for insertion and extraction of the core.
🢭 Should be kept secure and access
should be very restricted.
⬥ Combination Locks:
🢭 Not very secure and have limited accountability even
with unique codes.
🢭 Should be used for low security areas.
🢭 Can be Dial type (think safe), Button or Keypad.
🢭 Very susceptible to brute force, shoulder surfing and are often
configured with weak security (I know of a good deal of places
where the code is the street number).
🢭 Over time, the buttons used for the code will have more wear
and tear.
🢭 For 4-number PIN where 4 keys are used, the possible
combinations are no longer 10,000, but 256: if 3 keys, then 81
options.
5|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
6|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
7|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
8|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
• Access Control Types (Many can be multiple types – On the exam look at question
content to see which type it is).
▪ Preventative:
⬥ Prevents action from happening – Least privilege, drug tests, IPS,
firewalls, encryption.
▪ Detective:
⬥ Controls that Detect during or after an attack – IDS, CCTV, alarms, anti-
virus.
▪ Corrective:
⬥ Controls that Correct an attack – Anti-virus, patches, IPS.
▪ Recovery:
⬥ Controls that help us Recover after an attack – DR Environment,
backups, HA Environments.
▪ Deterrent:
⬥ Controls that Deter an attack – Fences, security guards, dogs, lights,
Beware of the dog signs.
▪ Compensating:
Controls that Compensate – other controls that are impossible or too
costly to implement.
9|Page
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
10 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
Federated Identity:
▪ How we link a person's electronic identity and attributes across multiple distinct
identity management systems.
▪ FIDM (Federated Identity Management):
Having a common set of policies, practices, and protocols in place to
manage the identity and trust into IT users and devices across
organizations.
SSO: A subset of federated identity management. Users use a single
sign-on for multiple systems.
11 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
Authorization:
▪ We use Access Control models to determine what a subject is allowed to access.
▪ What and how we implement depends on the organization and what
our security goals are, type can often be chosen dependent on which
leg of the CIA Triad is the most important one to us.
▪ If it is Confidentiality, we would most likely go with Mandatory
Access Control.
▪ If it is Availability, we would most likely go with Discretionary
Access Control.
▪ If it is Integrity, we would most likely go with Role Based Access Control
or Attribute Based Access Control.
There technically is also RUBAC (Rule Based Access Control), it is mostly used on
firewalls with IF/THEN statements but can be used in conjunction with the other models
to provide defense in depth.
DAC (Discretionary Access Control) - Often used when Availability is most important:
▪ Access to an object is assigned at the discretion of the object owner.
▪ The owner can add, remove rights, commonly used by most OS's’.
▪ Uses DACL’s (Discretionary ACL), based on user identity.
MAC (Mandatory Access Control) - Often used when Confidentiality is most important:
▪ Access to an object is determined by labels and clearance, this is often used in
the military or in organizations where confidentiality is very important.
▪ Labels: Objects have Labels assigned to them; the subject's clearance must
dominate the object's label.
The label is used to allow Subjects with the right clearance access them.
Labels are often more granular than just “Top Secret”, they can be “Top
Secret – Nuclear”.
12 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
RBAC (Role-Based Access Control) - Often used when Integrity is most important:
▪ Policy neutral access control mechanism
defined around roles and privileges.
▪ A role is assigned permissions, and subjects
in that role are added to the group, if they
move to another position they are moved to
the permissions group for that position.
▪ It makes administration of 1,000's of users
and 10,000's of permissions much easier to
manage.
▪ The most commonly used form of access
control.
▪ If implemented right it can also enforce
separation of duties and prevent
authorization/privilege creep .
▪ We move employees transferring within the organization from one role to
another and we do not just add the new role to the old one.
13 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
Administrative Security:
▪ Job Rotation:
For the exam think of it to detect errors and frauds. It is easier to detect
fraud and there is less chance of collusion between individuals if they
rotate jobs.
It also helps with employee’s burnout and it helps employees
understand the entire business.
This can be to cost prohibitive for the exam/real life, make sure on the
exam the cost justifies the benefit.
▪ Mandatory Vacations:
Done to ensure one person is not always performing the same task,
someone else has to cover and it can keep fraud from happening or help
us detect it.
Their accounts are locked, and an audit is performed on the accounts.
If the employee has been conducting fraud and covering it up, the audit
will discover it.
The best way to do this is to not give too much advance notice of
vacations.
14 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
15 | P a g e
https://thorteaches.com/
Thor’s Study Guide – CC® Domain 3
Technical Controls:
▪ Hardware/software/firmware –
Firewalls, routers, encryption, ...
16 | P a g e
https://thorteaches.com/