Chapter 2: Access Control Models and CVSS Vulnerability Scoring
Learning Objectives
Compare DAC, MAC, RBAC, ABAC, rule-based, and time-based access control models and choose the appropriate model for a given environment
Explain the AAA (Authentication, Authorization, Accounting) framework and describe how RADIUS and TACACS+ implement it in enterprise networks
Interpret CVSS v3.1 base, temporal, and environmental metric groups to calculate and contextualize vulnerability severity scores
Differentiate between risk, threat, vulnerability, and exploit in a security context and apply these distinctions to a vulnerability management lifecycle
Describe layered defense-in-depth strategies and distinguish rule-based detection from behavioral and statistical detection approaches
Section 1: Access Control Models
Pre-Quiz — Section 1: Access Control Models
1. Which access control model delegates access decisions to the resource owner rather than a central authority?
2. The Bell-LaPadula model enforces "no write down." What does this prevent?
3. An ABAC policy grants access only to physicians viewing patients on their own ward during business hours. What property makes this impossible with pure RBAC?
Discretionary Access Control (DAC)
Under DAC, the owner of a resource decides who else can access it. Linux file permissions (chmod 640) and Windows ACLs are classic implementations. The owner exercises personal discretion — grant, revoke, and delegate access at will.
Strength: Flexible and familiar. Weakness: Security depends entirely on the owner's judgment; a single mistake by an untrained user can expose sensitive data to the entire organisation.
Attribute
DAC
Who controls access?
Resource owner
Flexibility
High — owners can grant/revoke at will
Scalability
Poor — fragile in large orgs
Insider threat risk
High — a malicious owner can leak data
Typical environment
Small teams, personal workstations
Mandatory Access Control (MAC)
MAC removes access decisions from individual users. A central authority assigns security labels to both subjects (users, processes) and objects (files, ports). No user — not even the owner — can override labels. The Bell-LaPadula model governs classified systems with two core rules:
No read up (Simple Security Property): A Secret-cleared user cannot read a Top Secret document.
No write down (Star Property): A Top Secret-cleared user cannot write to a Secret document — preventing information leakage from high to low sensitivity.
Modern implementations include SELinux and AppArmor, which enforce type-enforcement labels on every process and file.
graph TD
TS["Top Secret (Clearance Level 4)"]
S["Secret (Clearance Level 3)"]
C["Confidential (Clearance Level 2)"]
U["Unclassified (Clearance Level 1)"]
TS -->|"No Write Down (Star Property)"| S
S -->|"No Write Down (Star Property)"| C
C -->|"No Write Down (Star Property)"| U
U -->|"No Read Up (Simple Security)"| C
C -->|"No Read Up (Simple Security)"| S
S -->|"No Read Up (Simple Security)"| TS
Role-Based Access Control (RBAC)
RBAC assigns permissions to roles, then assigns users to roles. A hospital defines physician, nurse, billing_clerk, and system_admin roles. A new hire inherits correct permissions by role assignment alone — no individual ACL management required.
RBAC naturally enforces least privilege: an accountant cannot restart database servers because no accounting role carries that permission. Auditing is simplified — inspect role definitions rather than thousands of individual ACLs.
Role
Customer Records
Financial Reports
Network Config
Server Admin
Sales Rep
Read
None
None
None
Finance Analyst
None
Read/Write
None
None
Network Engineer
None
None
Read/Write
None
IT Admin
None
None
Read/Write
Read/Write
CISO
Read
Read
Read
Read
Attribute-Based Access Control (ABAC)
ABAC evaluates access requests against rich attributes from the subject, object, action, and environment. A Policy Decision Point (PDP) evaluates policies in real time — enabling rules like "a physician may view a patient record from an internal workstation during business hours, but only for patients on their ward." No static role matrix can capture this context-sensitivity.
Enterprises commonly layer RBAC + ABAC: RBAC for stable job-function policies, ABAC for dynamic conditions like location, device health, and time-of-day.
Scenario
Recommended Model
Small team, personal files
DAC
Classified government system
MAC
Large corporate IT environment
RBAC
Zero-trust cloud platform
ABAC
Dynamic contractor workforce
RBAC + ABAC hybrid
Key Points — Access Control Models
DAC gives resource owners full discretion; flexible but vulnerable to insider threats and human error.
MAC centralises control via security labels; rigid, tamper-resistant, ideal for classified environments (Bell-LaPadula: no read up, no write down).
RBAC maps permissions to job-function roles, enforcing least privilege and simplifying auditing at enterprise scale.
ABAC evaluates real-time attributes (who, what, where, when) through a Policy Decision Point — the foundation of zero-trust architectures.
Most mature enterprises combine RBAC (stable role policies) with ABAC (dynamic contextual conditions) for layered precision.
Section 2: AAA and Advanced Access Controls
Pre-Quiz — Section 2: AAA and Advanced Access Controls
4. Which AAA component answers "What is the user allowed to do?"
5. TACACS+ is preferred over RADIUS for Cisco device administration primarily because:
Authentication, Authorization, and Accounting (AAA)
AAA is the three-part framework governing identity-based access in network infrastructure. Think of it as a nightclub:
Authentication ("Who are you?"): The bouncer checks your ID — credentials, certificates, tokens, or biometrics.
Authorization ("What are you allowed to do?"): The hostess checks your VIP wristband and directs you to the correct section.
Accounting ("What did you do?"): The cash register logs every action — session times, bytes transferred, commands executed.
Accounting is critical for compliance and forensics. When an auditor asks "who changed the BGP route table at 03:14 on Tuesday?", accounting logs provide the answer.
sequenceDiagram
participant U as User / Device
participant NAS as Network Access Server (Switch / VPN / AP)
participant AAA as AAA Server (RADIUS / TACACS+)
participant IdP as Identity Provider (Entra ID / Okta)
U->>NAS: 1. Connection request
NAS->>U: 2. Authentication challenge
U->>NAS: 3. Credentials (username + password / cert)
NAS->>AAA: 4. Access-Request (Authentication)
AAA->>IdP: 5. Proxy to IdP (optional MFA)
IdP-->>AAA: 6. Identity confirmed
AAA-->>NAS: 7. Access-Accept + user attributes
Note over NAS: Authorization enforced (VLAN, ACL, privilege level)
NAS-->>U: 8. Access granted
NAS->>AAA: 9. Accounting-Start (session begins)
Note over AAA: Logs: user, time, bytes, commands executed
NAS->>AAA: 10. Accounting-Stop (session ends)
Rule-Based and Time-Based Access Control
Rule-based access control conditions access on explicitly defined rules regardless of user identity. Cisco ACLs are the canonical example — permit tcp 10.0.0.0 0.0.0.255 any eq 443 applies independent of who sent the packet.
Time-based access control restricts access to defined time windows, reducing attack surface during off-hours:
time-range CONTRACTORS
periodic weekdays 08:00 to 17:00
!
ip access-list extended CONTRACTOR-VPN
permit ip any any time-range CONTRACTORS
RADIUS vs. TACACS+
Feature
RADIUS
TACACS+
Transport
UDP 1645/1646 or 1812/1813
TCP 49
Encryption
Password only
Full packet body
AAA separation
Combined (A+A)
Separated (A, A, A)
Granularity
Limited command auth
Per-command authorization
Standard
Open (RFC 2865)
Cisco proprietary
Best for
Network access (802.1X, VPN)
Device administration (CLI)
Modern deployments integrate RADIUS and TACACS+ with centralised Identity Providers (IdPs) such as Microsoft Entra ID or Okta. IdPs centralise identity, enforce MFA, and federate via SAML 2.0 or OIDC, giving device-level TACACS+ granularity plus enterprise-wide identity governance.
aaa new-model
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
Key Points — AAA and Advanced Access Controls
Authentication verifies identity; Authorization enforces policy; Accounting logs activity — all three are required for a complete AAA implementation.
RADIUS uses UDP and encrypts only the password — best for 802.1X port-based network access and VPN authentication.
TACACS+ uses TCP, encrypts the full packet, and separates AAA phases — best for granular per-command authorization on network devices.
Time-based ACLs reduce the attack window for credentials compromised outside business hours.
Modern AAA deployments proxy to cloud IdPs (Entra ID, Okta) for centralised MFA and identity governance.
Section 3: CVSS Scoring Framework
Pre-Quiz — Section 3: CVSS Scoring Framework
6. What does CVSS Base Score measure?
7. A vulnerability's CVSS Base Score is 9.1. An analyst applies Environmental metrics, setting Modified Attack Vector to Adjacent and Confidentiality Requirement to Low. What is the expected effect?
8. Log4Shell (CVE-2021-44228) received a CVSS Base Score of 10.0. Which metric, when set to "Changed," most significantly contributed to pushing the score to maximum?
CVSS v3.1 Overview
The Common Vulnerability Scoring System (CVSS) is an open framework published by FIRST for communicating vulnerability characteristics and severity. Version 3.1 produces a numeric score from 0 to 10. A critical distinction: CVSS measures severity, not risk. It evaluates intrinsic, worst-case technical impact independent of exploit likelihood or asset value.
Scores are organized into three metric groups applied in sequence:
Base Score → Temporal Score → Environmental Score
Base Metrics
Exploitability metrics measure how easily an attacker can reach and exploit the vulnerability:
Metric
Values
Meaning
Attack Vector (AV)
Network, Adjacent, Local, Physical
How remotely the attacker must be positioned
Attack Complexity (AC)
Low, High
Conditions beyond attacker control that must exist
Privileges Required (PR)
None, Low, High
Pre-existing access level needed
User Interaction (UI)
None, Required
Whether a victim must take an action
Impact metrics measure consequences on the CIA triad. Scope (S) is uniquely important: if exploitation affects components beyond the vulnerable component (Scope: Changed), a higher multiplier (7.52 vs 6.42) substantially inflates the score. Log4Shell's Scope: Changed is what pushed it to 10.0.
Temporal Metrics
Temporal metrics capture factors that change over time — primarily exploit availability and patch status:
Metric
Values
Effect
Exploit Code Maturity (E)
High, Functional, Proof-of-Concept, Unproven
Higher weaponisation → higher score
Remediation Level (RL)
Unavailable, Workaround, Temporary Fix, Official Fix
Environmental metrics allow an organisation to contextualise the score for their specific deployment:
Modified Base Metrics: Override individual base metrics to reflect actual deployment. If a Network-exploitable vulnerability is only reachable from an internal VLAN, set Modified AV = Adjacent.
Security Requirements (CR/IR/AR): Assign High/Medium/Low importance to CIA triad components for the affected asset. A payment server carries CR:High; a dev sandbox might carry all three as Low.
A Base Score of 9.1 on an internal staging server with no production data might drop to ~5.2 after Environmental adjustments — still worth patching, but no longer a P1 emergency.
Key Points — CVSS Scoring Framework
CVSS measures severity, not risk — it scores worst-case technical impact without regard to likelihood or asset value.
Base Score derives from 8 metrics across Exploitability (AV, AC, PR, UI) and Impact (C, I, A, Scope).
Scope: Changed (e.g., hypervisor escape, Log4Shell JVM escape) inflates the Base Score substantially by using a higher impact multiplier.
Temporal metrics evolve over time — a Metasploit module being published raises urgency; an Official Fix lowers it.
Environmental metrics allow orgs to contextualise scores — a Base 9.1 on an air-gapped dev server may warrant far less urgency than the same vuln on a customer-facing payment API.
Section 4: Risk, Threat, Vulnerability, and Exploit
Pre-Quiz — Section 4: Risk, Threat, Vulnerability, and Exploit
9. An unpatched buffer overflow in a production web server is best described as a:
10. In the vulnerability management lifecycle, what is the correct order of the first three steps?
Definitions and Relationships
Term
Definition
Example
Vulnerability
A weakness in a system, design, or process
Unpatched buffer overflow in a web server
Threat
A potential cause of unwanted impact — actor or event that could exploit a vulnerability
A ransomware group scanning for that overflow
Exploit
The technical mechanism by which a threat actor leverages a vulnerability
Metasploit module or a custom PoC payload
Risk
The potential for loss: threat likelihood × impact
P(exploitation) × business impact value
Analogy: A cracked lock (vulnerability) on your back door. A burglar (threat) in the neighbourhood. A crowbar technique (exploit). The probability × value inside (risk). Fix the lock (remediation), install an alarm (compensating control), or accept if nothing valuable is stored.
Risk Scoring and Reduction Strategies
The quantitative risk formula: Risk = Threat Likelihood × Vulnerability Severity × Asset Value
Strategy
Description
Example
Remediation
Eliminate the vulnerability
Apply the vendor patch
Mitigation
Reduce likelihood or impact
WAF rule to block the attack vector
Acceptance
Acknowledge and tolerate the risk
Low-criticality internal dev server
Transfer
Shift financial impact
Cyber insurance policy
Threat Actors
Category
Motivation
Capability
Examples
Nation-state
Espionage, disruption
Very high
APT28, APT41, Lazarus Group
Organised crime
Financial
High
Conti, FIN7, REvil
Hacktivist
Ideological
Medium
Anonymous, GhostSec
Insider threat
Grievance, profit
Variable
Disgruntled employee, contractor
Script kiddie
Notoriety
Low
Automated scanning toolkits
Vulnerability Management Lifecycle
Asset Discovery: Inventory all systems (network scanning, CMDB, cloud asset APIs)
Vulnerability Scanning: Authenticated scans (Nessus, Qualys, OpenVAS) identify CVEs present in the environment
Prioritization: Apply CVSS Environmental scores, asset criticality, and threat intelligence to rank findings
Verification: Re-scan to confirm remediation; run penetration tests for critical findings
Reporting: Communicate risk posture to leadership; feed metrics into GRC platforms
flowchart TD
A["1. Asset Discovery\nNetwork scan · CMDB · Cloud APIs"]
B["2. Vulnerability Scanning\nNessus · Qualys · OpenVAS\nAuthenticated scan → CVE list"]
C["3. Prioritization\nCVSS Environmental Score\n+ Asset Criticality\n+ Threat Intelligence"]
D{"4. Remediation Decision"}
E["Patch / Remediate\nApply vendor fix\nSLA: Critical 24h · High 7d"]
F["Mitigate\nWAF rule · Network segment\nCompensating control"]
G["Accept Risk\nDocument · Sign off\nReview at next cycle"]
H["5. Verification\nRe-scan · Pen test\nConfirm closure"]
I["6. Reporting\nRisk posture dashboard\nGRC platform · Leadership"]
A --> B --> C --> D
D -->|"High severity"| E
D -->|"Medium / constrained"| F
D -->|"Low / accepted"| G
E --> H
F --> H
G --> I
H --> I
I -->|"Continuous loop"| A
Key Points — Risk, Threat, Vulnerability, and Exploit
Treating every vulnerability as an active threat exhausts response capacity — combine CVSS with threat intelligence and asset criticality for prioritization.
The vulnerability management lifecycle is continuous: Discovery → Scan → Prioritize → Remediate → Verify → Report → repeat.
Nation-state actors have the highest capability and persistence; script kiddies have the lowest but the broadest reach due to automated toolkits.
Risk can be remediated, mitigated, accepted, or transferred — the appropriate response depends on asset criticality and organizational risk tolerance.
Section 5: Defense-in-Depth and Detection Approaches
Pre-Quiz — Section 5: Defense-in-Depth and Detection Approaches
11. A UEBA system flags a user downloading 10 GB at 02:00 when their baseline is under 100 MB/day. Which detection paradigm does this exemplify?
12. What is the 5-tuple in network flow analysis?
13. Signature-based detection (e.g., Snort rules) has a significant blind spot compared to behavioral detection. What is it?
Defense-in-Depth Strategy
Defense-in-depth (DiD) layers security controls so no single failure compromises the entire system — analogous to a medieval castle's concentric walls, moat, keep, and vault.
The 5-tuple — Source IP, Destination IP, Source Port, Destination Port, Protocol — is the fundamental unit of network flow identification. Stateful firewalls use the 5-tuple to track connection state; security analysts use it for exfiltration detection:
Volume anomalies: A workstation sending 500 MB outbound to an external IP over TCP/443 is suspicious even without payload inspection.
Destination anomalies: Cross-reference the destination IP against threat intelligence — known C2 IPs, Tor exit nodes, bullet-proof hosting.
Protocol anomalies: DNS queries over UDP/53 with unusually large responses (>512 bytes) may indicate DNS tunneling.
Host isolation: Search all logs for a compromised host's IP as source or destination to reconstruct lateral movement paths.
Alert trigger: Outbound flow volume > 1 GB to single external IP
5-tuple: (10.10.5.42, 185.220.101.5, 49152, 443, TCP)
Duration: 47 minutes
Bytes sent: 1.4 GB
Bytes received: 0.8 MB
Analysis:
- Source: Marketing workstation (low classification)
- Destination: 185.220.101.5 → Tor exit node (threat intel)
- Ratio: 1400:0.8 MB (upload-heavy = exfiltration profile)
- Preceded by large SMB access to \\fileserver\HR
Action: Isolate 10.10.5.42, block 185.220.101.5/32 at
perimeter firewall, preserve PCAP, escalate to CSIRT.
Key Points — Defense-in-Depth and Detection Approaches
Defense-in-depth spans seven layers (Perimeter, Network, Host, Application, Data, Identity, Physical) — a successful phishing bypass at the perimeter still faces endpoint and data-layer controls.
Signature detection (Snort, Suricata) is fast and low-FP for known threats but blind to zero-days and polymorphic malware.
Behavioral detection (UEBA) baselines normal activity and flags deviations — effective for novel attacks and insider threats, but requires a profiling period.
The 5-tuple (Src IP, Dst IP, Src Port, Dst Port, Protocol) is the fundamental unit of network flow — used by stateful firewalls for session tracking and by analysts for exfiltration and C2 detection.
Upload:download ratio analysis and destination IP threat intel enable exfiltration detection even when TLS prevents payload inspection.
Post-Quiz: Test Your Understanding
Post-Quiz — Section 1: Access Control Models
1. Which access control model delegates access decisions to the resource owner rather than a central authority?
2. The Bell-LaPadula model enforces "no write down." What does this prevent?
3. An ABAC policy grants access only to physicians viewing patients on their own ward during business hours. What property makes this impossible with pure RBAC?
Post-Quiz — Section 2: AAA and Advanced Access Controls
4. Which AAA component answers "What is the user allowed to do?"
5. TACACS+ is preferred over RADIUS for Cisco device administration primarily because:
Post-Quiz — Section 3: CVSS Scoring Framework
6. What does CVSS Base Score measure?
7. A vulnerability's CVSS Base Score is 9.1. An analyst applies Environmental metrics, setting Modified Attack Vector to Adjacent and Confidentiality Requirement to Low. What is the expected effect?
8. Log4Shell (CVE-2021-44228) received a CVSS Base Score of 10.0. Which metric, when set to "Changed," most significantly contributed to pushing the score to maximum?
Post-Quiz — Section 4: Risk, Threat, Vulnerability, and Exploit
9. An unpatched buffer overflow in a production web server is best described as a:
10. In the vulnerability management lifecycle, what is the correct order of the first three steps?
Post-Quiz — Section 5: Defense-in-Depth and Detection Approaches
11. A UEBA system flags a user downloading 10 GB at 02:00 when their baseline is under 100 MB/day. Which detection paradigm does this exemplify?
12. What is the 5-tuple in network flow analysis?
13. Signature-based detection (e.g., Snort rules) has a significant blind spot compared to behavioral detection. What is it?