<section title="23.3. Identity Management and Access Control"><subsection title="Objective"><paragraph
    title="23.3.1."


><![CDATA[<p class="NormS23C3">Identities used for public cloud services are managed, protected, and consistently used to form a secure basis for controlling access to resources.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.3.2."


><![CDATA[<p class="NormS23C3">This section is primarily concerned with the management of identities used to access or administer public cloud services.</p>]]></paragraph>
<paragraph
    title="23.3.3."


><![CDATA[<p class="NormS23C3">Identities that interact with cloud platform management portals and application programming interfaces (APIs) to create, view, modify, or delete resources are considered privileged users in the context of public cloud.</p>]]></paragraph>
<paragraph
    title="23.3.4."


><![CDATA[<p class="NormS23C3">Concepts used in this section related to identification management include:</p><ol style="list-style-type: lower-alpha;">
<li>Identity providers</li>
<li>Relying parties</li>
<li>Credentials,  and identity information used in authentication</li>
<li>Policy decision points and policy enforcement points</li>
</ol><p class="NormS23C3">These concepts are described in ISO/IEC IT Security and Privacy framework for identity management (ISO/IEC 24760-1:2019) and framework for access management (ISO/IEC 29146:2016).</p>]]></paragraph>
<paragraph
    title="23.3.5."


><![CDATA[<p class="NormS23C3">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
<li><a title="Access controls and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a></li>
<li><a title="System access and passwords" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">Section 16.2 – System access and passwords</a></li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged user access</a></li>
<li><a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">Section 16.4 – Privileged access management</a></li>
<li><a title="Multi-factor authentication" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">Section 16.7 – Multi-factor authentication</a></li>
</ul>]]></paragraph>
</block>
<block title="Overview"><paragraph
    title="23.3.6."


><![CDATA[<p class="NormS23C3">Public cloud services introduce new areas of risk associated with the management of identity and access, including:</p><ol style="list-style-type: lower-alpha;">
<li>Separation between identity providers and relying parties, with differing standards and capabilities for authentication, assignment of privileges, and access provisioning/deprovisioning.</li>
<li>Ubiquitous access to public cloud services, and in particular cloud administration services, from the internet.</li>
<li>The decoupling of the authentication and authorisation steps as part of access control (i.e., separation of the identity provider and the policy decision point/policy enforcement point).</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.7."


><![CDATA[<p class="NormS23C3">This section highlights controls agencies can use to manage these cloud identity and access management risks and move towards a Zero Trust approach to information security.</p>]]></paragraph>
</block>
<block title="Public cloud identity providers"><paragraph
    title="23.3.8."


><![CDATA[<p class="NormS23C3">There are three models of identity management commonly used with public cloud services:</p><ol>
<li>Cloud accounts based on identities and authentication from other services or systems using identity federation (such as SAML V2.0 or OpenID Connect).</li>
<li>Cloud identities synchronised from an existing identity system.</li>
<li>Cloud identities directly provisioned in local cloud service identity stores, either manually or through automation following a standard specification such as the System for Cross-domain Identity Management (SCIM).</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.9."


><![CDATA[<p class="NormS23C3">Due to the differing standards and capabilities offered by both identity providers and relying parties a combination of identity management models may be required to support the use of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.3.10."


><![CDATA[<p class="NormS23C3">Cloud-based identities may be issued and authenticated by different identity providers, each offering their own levels of assurance and receiving their own levels of trust from the identity consumer.</p>]]></paragraph>
<paragraph
    title="23.3.11."


><![CDATA[<p class="NormS23C3">Identity providers are privileged entities that must prove a chain of trust, for example by strong cryptographic signing of authentication responses, to prevent a malicious actor tampering with authentication traffic as it passes between the provider and the relying party.</p>]]></paragraph>
</block>
<block title="Public cloud access policy enforcement"><paragraph
    title="23.3.12."


><![CDATA[<p class="NormS23C3">Once an entity is authenticated, access control mechanisms determine what authorised actions are able to be performed and what resources can be interacted with.</p>]]></paragraph>
<paragraph
    title="23.3.13."


><![CDATA[<p class="NormS23C3">Many cloud based system follow Zero Trust principles for access control, with access control determined by a combination of the cloud service’s policy decision points and policy enforcement points.</p>]]></paragraph>
<paragraph
    title="23.3.14."


><![CDATA[<p class="NormS23C3">The separation between the authentication and authorisation steps introduces the opportunity for unauthorised access to occur, through:</p><ol style="list-style-type: lower-alpha;">
<li>Misconfigured mapping between attributes asserted by the authentication provider and their use by the authorisation system.</li>
<li>Impersonation of authorised users through mimicking the authentication service assertions to the authorisation system.</li>
<li>Delays between a user being removed from the authentication system and re-authentication occurring.</li>
</ol>]]></paragraph>
<paragraph
    title="23.3.15."


><![CDATA[<p class="NormS23C3">The use of cloud services provides the opportunity to move from purely role-based access control (RBAC) to incorporating more attributes (than just role definitions) as part of attribute-based access control decisions (ABAC).</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.3.16."


><![CDATA[<p class="NormS23C3">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;Identification management</td>
<td>&nbsp;GCDO</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.digital.govt.nz/standards-and-guidance/identification-management/" target="_blank">Identification management | NZ Digital government</a></td>
</tr>
<tr>
<td><strong>NIST SP-800-210 (2020)&nbsp;</strong></td>
<td>&nbsp;General access control guidance for cloud systems&nbsp;</td>
<td>&nbsp;NIST</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.nist.gov/publications/general-access-control-guidance-cloud-systems" target="_blank">General Access Control Guidance for Cloud Systems | NIST</a></td>
</tr>
<tr>
<td><strong>OpenID Connect&nbsp;</strong></td>
<td>&nbsp;Welcome to OpenID Connect</td>
<td>&nbsp;<span>OpenID</span></td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://openid.net/connect/" target="_blank">OpenID Connect | OpenID</a></td>
</tr>
<tr>
<td><strong>SAML V2.0</strong></td>
<td>&nbsp;SAML Wiki</td>
<td>&nbsp;OASIS Open</td>
<td>&nbsp;FrontPage - SAML Wiki (oasis-open.org)</td>
</tr>
<tr>
<td><strong>RFC 7642&nbsp;</strong></td>
<td>&nbsp;System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements</td>
<td>&nbsp;<span>IETF</span></td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/rfc7642/" target="_blank">RFC 7642 - System for Cross-domain Identity Management: Definitions, Overview, Concepts, and Requirements (ietf.org)</a></td>
</tr>
</tbody>
</table><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.3.17."


><![CDATA[<p class="NormS23C3">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Privileged account separation"><paragraph
    title="23.3.18.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2"><span>Separating administrative accounts between environments (for example cloud and on-premise) reduces the risk of a compromise in one laterally spreading to the other.</span></p>]]></paragraph>
<paragraph
    title="23.3.18.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7433"
><![CDATA[<p class="Normal-nonumbering"><span>Accounts used to perform privileged actions SHOULD NOT be synchronised between environments.</span></p>]]></paragraph>
</block>
<block title="Username and passwords"><paragraph
    title="23.3.19.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2">Credentials used to access public cloud services can be reused across cloud service providers, and are at risk of discovery or being easily guessed.&nbsp; Due to these services being directly accessible from the internet, authentication should not rely on a single factor for standard users, and must not for privileged users. Refer to <a title="Privileged access management" href="http://nzism.gcsb.govt.nz/ism-document#Section-15526">section 16.4 Privileged Access Management (PAM)</a>.</p>]]></paragraph>
<paragraph
    title="23.3.19.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7436"
><![CDATA[<p class="Normal-nonumbering"><span>Where administration interfaces or portals are accessible from the internet, privileged accounts MUST be configured to use multiple factors of authentication.</span></p>]]></paragraph>
<paragraph
    title="23.3.19.C.02."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7437"
><![CDATA[<p class="Normal-nonumbering"><span>Where cloud service interfaces or portals are accessible from the internet, user accounts SHOULD be configured to use multiple factors of authentication.</span></p>]]></paragraph>
</block>
<block title="Offboarding"><paragraph
    title="23.3.20.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2">Public cloud services often rely on a Zero Trust approach to security where policy decision and policy enforcement points are used to control access based on authentication and privilege assignments.  Timely removal of user access is essential to ensure unauthorised access to cloud services does not occur from former staff.</p>]]></paragraph>
<paragraph
    title="23.3.20.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7440"
><![CDATA[<p class="Normal-nonumbering"><span>Staff offboarding processes MUST be updated to include removing all access to public cloud based services, prior to implementation or adoption of public cloud services.</span></p>]]></paragraph>
</block>
<block title="Authentication"><paragraph
    title="23.3.21.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p class="NormS17C2"><span>Identity providers are privileged entities that must prove a chain of trust to prevent a malicious actor tampering with authentication traffic as it passes between the provider and the relying party.</span></p>]]></paragraph>
<paragraph
    title="23.3.21.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7443"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST ensure that relying parties continually verify the authenticity of their identity provider’s responses, through for example, cryptographic signing of authentication requests and responses.</span></p>]]></paragraph>
</block>
<block title="Relying parties"><paragraph
    title="23.3.22.R.01."

    tags="Assurance"


><![CDATA[<p>Cloud provider authentication services often provide additional information attributes to relying parties to inform authentication and access control decisions.  These attributes may include information such as the individual’s local time of day, the status of their device (including if it has been successfully used before), or their location.</p>]]></paragraph>
<paragraph
    title="23.3.22.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7446"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies SHOULD ensure that relying parties use all available information from the identity provider to inform access control decisions.</span></p>]]></paragraph>
</block>
</subsection>
</section>
