access control
play

Access Control Information Security Dr Hans Georg Schaathun - PowerPoint PPT Presentation

Access Control Information Security Dr Hans Georg Schaathun University of Surrey Autumn 2011 Week 9 Dr Hans Georg Schaathun Access Control Autumn 2011 Week 9 1 / 1 The session Outline Dr Hans Georg Schaathun Access Control


  1. Access Control Information Security Dr Hans Georg Schaathun University of Surrey Autumn 2011 – Week 9 Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 1 / 1

  2. The session Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 2 / 1

  3. The session Session objectives Introduce fundamental terminology of access control Understand principles of privilege management and identity management Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 3 / 1

  4. Access control Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 4 / 1

  5. Access control Model Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 5 / 1

  6. � � � Access control Model The request Reference principal Do Operation Object Monitor ACL Request Source Guard Resource Authentication Authorisation Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

  7. � � � Access control Model The request Reference principal Do Operation Object Monitor ACL Request Source Guard Resource Authentication Authorisation Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

  8. � � � Access control Model The request Reference principal Do Operation Object Monitor ACL Request Source Guard Resource Authentication Who made the request R ? Authorisation Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

  9. � � � Access control Model The request Reference principal Do Operation Object Monitor ACL Request Source Guard Resource Authentication Who made the request R ? Authorisation Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

  10. � � � Access control Model The request Reference principal Do Operation Object Monitor ACL Request Source Guard Resource Authentication Who made the request R ? Authorisation Who is trusted to access an object o ? Who is trusted to have request R granted? Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

  11. Access control Model Subjects and objects A subject is an active entitity within an IT system e.g. user, process An object is a resource that (some) subject may access or use. e.g. files, printers, memory A principal is an entity that can be granted access to objects or can make statements affecting access control decissions. distinction subject/principal is not always necessary a subject (process) may act on behalf of a subject (user) Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 7 / 1

  12. Access control Model What is an object? A file — very traditional view (read/write/execute) A system — access or no access An operation — i.e. an action to take A room — access or no access Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 8 / 1

  13. Access control Model Authentication and Authorisation Authentication Determine identity. Authorisation Determine privileges. This allows identity based access control. Could you do authorisation without authentication? Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

  14. Access control Model Authentication and Authorisation Authentication Determine identity. Authorisation Determine privileges. This allows identity based access control. Could you do authorisation without authentication? Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

  15. Access control Model Authentication and Authorisation Authentication Determine identity. Authorisation Determine privileges. This allows identity based access control. Could you do authorisation without authentication? Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

  16. Access control Problem Definition Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 10 / 1

  17. Access control Problem Definition Four subproblems Identification and Authentication establishing the identity of a subject Identity management managing identities and credentials essential data for authentication Authorisation granting privileges to an identified subject Privilege Management managing mapping of subject to privileges necessary data for authorisation Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 11 / 1

  18. Access control Problem Definition Problem Domain Access controll is a general problem ... Operating System File System Web Site Locked Doors Paper Archive Records Database Records Documents (PDF , etc.) Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 12 / 1

  19. Privilege Management Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 13 / 1

  20. Privilege Management Access modes Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 14 / 1

  21. Privilege Management Access modes Access modes Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading? Sometimes; it may be sufficient that the OS reads it. write = read + append (Bell-LaPadula) Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

  22. Privilege Management Access modes Access modes Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading? Sometimes; it may be sufficient that the OS reads it. write = read + append (Bell-LaPadula) Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

  23. Privilege Management Access modes Access modes Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading? Sometimes; it may be sufficient that the OS reads it. write = read + append (Bell-LaPadula) Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

  24. Privilege Management Access modes Discretionary or Mandatory Discretionary Access Control The owner of each resource determines access permissions. Mandatory Access Control A central authority defines a security policy defining access rights This is 4th Design Decision from Gollmann (Ch 2). Centralised or local security control? Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 16 / 1

  25. Privilege Management Access modes Access Control Structures Access Control Matrix: [ A s , o ] A s , o is the permissions of Subject s to Object o . A s , o ⊂ { alter , observe } Subject-wise capabilities For each Subject s , maintain a list of rights. Access Control List: object-wise For each Object o , maintain a list of access permissions. suitable for discretionary access control Access data takes a lot of space. Coarser access control is more common. Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

  26. Privilege Management Access modes Access Control Structures Access Control Matrix: [ A s , o ] A s , o is the permissions of Subject s to Object o . A s , o ⊂ { alter , observe } Subject-wise capabilities For each Subject s , maintain a list of rights. Access Control List: object-wise For each Object o , maintain a list of access permissions. suitable for discretionary access control Access data takes a lot of space. Coarser access control is more common. Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

  27. Privilege Management Access modes Access Control Structures Access Control Matrix: [ A s , o ] A s , o is the permissions of Subject s to Object o . A s , o ⊂ { alter , observe } Subject-wise capabilities For each Subject s , maintain a list of rights. Access Control List: object-wise For each Object o , maintain a list of access permissions. suitable for discretionary access control Access data takes a lot of space. Coarser access control is more common. Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

  28. Privilege Management Access modes Access Control Structures Access Control Matrix: [ A s , o ] A s , o is the permissions of Subject s to Object o . A s , o ⊂ { alter , observe } Subject-wise capabilities For each Subject s , maintain a list of rights. Access Control List: object-wise For each Object o , maintain a list of access permissions. suitable for discretionary access control Access data takes a lot of space. Coarser access control is more common. Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

  29. Privilege Management Access modes Access Control Structures Access Control Matrix: [ A s , o ] A s , o is the permissions of Subject s to Object o . A s , o ⊂ { alter , observe } Subject-wise capabilities For each Subject s , maintain a list of rights. Access Control List: object-wise For each Object o , maintain a list of access permissions. suitable for discretionary access control Access data takes a lot of space. Coarser access control is more common. Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

  30. Privilege Management Intermediate Controls Outline Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 18 / 1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend