Which of the following is a technical control?

Computer security is often divided into three distinct master categories, commonly referred to as controls:

  • Physical

  • Technical

  • Administrative

These three broad categories define the main objectives of proper security implementation. Within these controls are sub-categories that further detail the controls and how to implement them.

Physical control is the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of physical controls are:

  • Closed-circuit surveillance cameras

  • Motion or thermal alarm systems

  • Security guards

  • Picture IDs

  • Locked and dead-bolted steel doors

  • Biometrics (includes fingerprint, voice, face, iris, handwriting, and other automated methods used to recognize individuals)

Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as:

  • Encryption

  • Smart cards

  • Network authentication

  • Access control lists (ACLs)

  • File integrity auditing software

Administrative controls define the human factors of security. It involves all levels of personnel within an organization and determines which users have access to what resources and information by such means as:

Implement Identification and Authentication mechanisms, including provisions for uniquely identifying and authenticating entities (i.e. users or information system processes acting on behalf of users)

  • Require access to an information system be gained through the presentation of an individual identifier (e.g., a unique token or user login identification [ID]) and authenticator(s)

  • Explicitly identify any user actions that can be performed prior to reliable identification (e.g., reading a publicly available Web site)

  • Ensure the basis of identification and authentication is on one of the three principles of Identification and Authentication

  • What one knows (e.g., passwords)

  • Who one is (e.g., fingerprint, retinal pattern)

  • What one possesses (e.g., token, cryptography key).

  • Ensure that passwords are not shared, displayed online, made visible at session initiation or divulged publicly

  • Ensure that passwords are a minimum of eight characters

  • Ensure that passwords are non-words, mixing letters and numbers

  • At least one uppercase letter, one lower case letter, and one number are required, and no words found in a dictionary will be allowed

  • Ensure passwords are not sports names, family names, employee name, or user Ids

  • Ensure passwords automatically expire every 90 days, with the security software prompting each user for a new password daily beginning 14 days prior to the expiration date

  • The password expiration is a risk based management decision and directorates are encouraged to require a shorter time period for password expiration for more sensitive information systems

  • Ensure passwords are not reused until at least six other passwords have been used

  • Tokens can be used in addition to a password or biometric

  • Four types of tokens are acceptable: hard tokens, soft tokens, one-time password devices, and password tokens

  • Hard Token

  • Ensure that a password is used to activate an authentication key

  • Ensure that authentication keys are not exportable

  • Ensure that any hard token that is used is compliant to NIST SP 800-63

  • Soft Tokens

  • Ensure that the activation data will be a password known only to the user

  • Ensure that the cryptographic module is compliant to NIST SP 800-63

  • Ensure that the unencrypted copy of the authentication key shall be erased after each authentication

  • One-Time Password Device Token

  • The device may or may not have some kind of integral entry pad, an integral biometric (e.g., fingerprint) reader or a direct computer interface (e.g., USB port)

  • Ensure that the passwords are generated by using an approved block cipher or hash algorithm to combine a symmetric key stored on a personal hardware device with a nonce to generate a one-time password. The nonce may be a date and time, a counter generated on the device, or a challenge from the verifier (if the device has an entry capability); direct electronic input from the device to a computer is also allowed

  • Ensure that the one-time password have a limited lifetime, on the order of minutes, although the shorter the better

  • Password Token

  • This type of token is a secret that a claimant memorizes and uses to authenticate his or her identity. Passwords are typically character strings; however systems using a number of images that the subscriber memorizes and must identify when presented along with other similar images are also acceptable

    • Establish access control rules to be implemented for each system to ensure only designated individuals, under specified conditions (e.g., time of day, port of entry, type of authentication, etc.) can:

    • Access the information system (e.g., log-on, establish connection)

    • Activate specific system commands

    • Execute specific programs and procedures

    • Create, view, or modify specific objects (e.g., programs, information, system parameters)

    • Ensure that for information systems employing password-based authentication, passwords are:

    • One-way encrypted for storage

    • Transmitted on the network in a secure manner (e.g., encrypted)

    • Not displayed when entered

    • Controlled by the associated user

    • Ensure authentication is required for access to administrative systems from the Internet with the use of passwords as the minimum standard for authentication

    • Establish procedures for obtaining appropriate access controls for all systems within the directorate, which require the following

    • Users to provide a list of applications, databases, or external systems required to fulfil their individual or role-based duties

    • Verification that the individual needs access to perform duties from the system owner, supervisor, or other appropriate authority

    • A method to ensure separation of duty protocols are enforced in granting access

    • Ensure that all directorate and contractor personnel who are requesting access to systems follow these procedures

      What are the technical controls?

      Definition(s): The security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system.

      What are technical access controls?

      Technical access controls include any software-based mechanism for controlling access, such as passwords, encryption, ACLs, firewalls, intrusion prevention systems (IPSs), and others. Identity and access management (IAM) solutions are also a technical control.

      What is a technical control structure?

      A control structure is a codebase portion that supports decisions based on analysis of variables. These functional components are eminently useful in computer science and computer programming.

      What are the 4 types of security controls?

      One of the easiest and most straightforward models for classifying controls is by type: physical, technical, or administrative, and by function: preventative, detective, and corrective.