Access Control Information Security Dr Hans Georg Schaathun - - PowerPoint PPT Presentation

access control
SMART_READER_LITE
LIVE PREVIEW

Access Control Information Security Dr Hans Georg Schaathun - - PowerPoint PPT Presentation

Access Control Information Security Dr Hans Georg Schaathun University of Surrey Autumn 2011 Week 9 Dr Hans Georg Schaathun Access Control Autumn 2011 Week 9 1 / 1 The session Outline Dr Hans Georg Schaathun Access Control


slide-1
SLIDE 1

Access Control

Information Security Dr Hans Georg Schaathun

University of Surrey

Autumn 2011 – Week 9

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 1 / 1

slide-2
SLIDE 2

The session

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 2 / 1

slide-3
SLIDE 3

The session

Session objectives

Introduce fundamental terminology of access control Understand principles of privilege management and identity management

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 3 / 1

slide-4
SLIDE 4

Access control

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 4 / 1

slide-5
SLIDE 5

Access control Model

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 5 / 1

slide-6
SLIDE 6

Access control Model

The request

principal Source Do Operation

  • Request

Reference Monitor

  • Guard

Object

  • Resource

ACL Authentication Authorisation

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

slide-7
SLIDE 7

Access control Model

The request

principal Source Do Operation

  • Request

Reference Monitor

  • Guard

Object

  • Resource

ACL Authentication Authorisation

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

slide-8
SLIDE 8

Access control Model

The request

principal Source Do Operation

  • Request

Reference Monitor

  • Guard

Object

  • Resource

ACL Authentication

Who made the request R?

Authorisation

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

slide-9
SLIDE 9

Access control Model

The request

principal Source Do Operation

  • Request

Reference Monitor

  • Guard

Object

  • Resource

ACL Authentication

Who made the request R?

Authorisation

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

slide-10
SLIDE 10

Access control Model

The request

principal Source Do Operation

  • Request

Reference Monitor

  • Guard

Object

  • Resource

ACL Authentication

Who made the request R?

Authorisation

Who is trusted to access an object o? Who is trusted to have request R granted?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 6 / 1

slide-11
SLIDE 11

Access control Model

Subjects and objects

A subject is an active entitity within an IT system e.g. user, process An object is a resource that (some) subject may access or use. e.g. files, printers, memory A principal is an entity that can be granted access to objects or can make statements affecting access control decissions. distinction subject/principal is not always necessary a subject (process) may act on behalf of a subject (user)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 7 / 1

slide-12
SLIDE 12

Access control Model

What is an object?

A file — very traditional view (read/write/execute) A system — access or no access An operation — i.e. an action to take A room — access or no access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 8 / 1

slide-13
SLIDE 13

Access control Model

Authentication and Authorisation

Authentication

Determine identity.

Authorisation

Determine privileges.

This allows identity based access control. Could you do authorisation without authentication?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

slide-14
SLIDE 14

Access control Model

Authentication and Authorisation

Authentication

Determine identity.

Authorisation

Determine privileges.

This allows identity based access control. Could you do authorisation without authentication?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

slide-15
SLIDE 15

Access control Model

Authentication and Authorisation

Authentication

Determine identity.

Authorisation

Determine privileges.

This allows identity based access control. Could you do authorisation without authentication?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 9 / 1

slide-16
SLIDE 16

Access control Problem Definition

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 10 / 1

slide-17
SLIDE 17

Access control Problem Definition

Four subproblems

Identification and Authentication

establishing the identity of a subject

Identity management

managing identities and credentials essential data for authentication

Authorisation

granting privileges to an identified subject

Privilege Management

managing mapping of subject to privileges necessary data for authorisation

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 11 / 1

slide-18
SLIDE 18

Access control Problem Definition

Problem Domain

Access controll is a general problem ... Operating System File System Web Site Locked Doors Paper Archive Records Database Records Documents (PDF , etc.)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 12 / 1

slide-19
SLIDE 19

Privilege Management

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 13 / 1

slide-20
SLIDE 20

Privilege Management Access modes

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 14 / 1

slide-21
SLIDE 21

Privilege Management Access modes

Access modes

Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading?

Sometimes; it may be sufficient that the OS reads it.

write = read + append (Bell-LaPadula)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

slide-22
SLIDE 22

Privilege Management Access modes

Access modes

Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading?

Sometimes; it may be sufficient that the OS reads it.

write = read + append (Bell-LaPadula)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

slide-23
SLIDE 23

Privilege Management Access modes

Access modes

Observe i.e. read Limited by confidentiality Alter i.e. append Limited to ensure integrity Execute (running a program) Can you execute without reading?

Sometimes; it may be sufficient that the OS reads it.

write = read + append (Bell-LaPadula)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 15 / 1

slide-24
SLIDE 24

Privilege Management Access modes

Discretionary or Mandatory

Discretionary Access Control The owner of each resource determines access permissions. Mandatory Access Control A central authority defines a security policy defining access rights This is 4th Design Decision from Gollmann (Ch 2).

Centralised or local security control?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 16 / 1

slide-25
SLIDE 25

Privilege Management Access modes

Access Control Structures

Access Control Matrix: [As,o]

As,o is the permissions of Subject s to Object o. As,o ⊂ {alter, observe}

Subject-wise capabilities

For each Subject s, maintain a list of rights.

Access Control List: object-wise

For each Object o, maintain a list of access permissions. suitable for discretionary access control

Access data takes a lot of space. Coarser access control is more common.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

slide-26
SLIDE 26

Privilege Management Access modes

Access Control Structures

Access Control Matrix: [As,o]

As,o is the permissions of Subject s to Object o. As,o ⊂ {alter, observe}

Subject-wise capabilities

For each Subject s, maintain a list of rights.

Access Control List: object-wise

For each Object o, maintain a list of access permissions. suitable for discretionary access control

Access data takes a lot of space. Coarser access control is more common.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

slide-27
SLIDE 27

Privilege Management Access modes

Access Control Structures

Access Control Matrix: [As,o]

As,o is the permissions of Subject s to Object o. As,o ⊂ {alter, observe}

Subject-wise capabilities

For each Subject s, maintain a list of rights.

Access Control List: object-wise

For each Object o, maintain a list of access permissions. suitable for discretionary access control

Access data takes a lot of space. Coarser access control is more common.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

slide-28
SLIDE 28

Privilege Management Access modes

Access Control Structures

Access Control Matrix: [As,o]

As,o is the permissions of Subject s to Object o. As,o ⊂ {alter, observe}

Subject-wise capabilities

For each Subject s, maintain a list of rights.

Access Control List: object-wise

For each Object o, maintain a list of access permissions. suitable for discretionary access control

Access data takes a lot of space. Coarser access control is more common.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

slide-29
SLIDE 29

Privilege Management Access modes

Access Control Structures

Access Control Matrix: [As,o]

As,o is the permissions of Subject s to Object o. As,o ⊂ {alter, observe}

Subject-wise capabilities

For each Subject s, maintain a list of rights.

Access Control List: object-wise

For each Object o, maintain a list of access permissions. suitable for discretionary access control

Access data takes a lot of space. Coarser access control is more common.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 17 / 1

slide-30
SLIDE 30

Privilege Management Intermediate Controls

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 18 / 1

slide-31
SLIDE 31

Privilege Management Intermediate Controls

Group-based access control

Access can be organised in groups. lecturers wmgroup phdstudent roger

  • paul
  • george
  • vinod
  • chris
  • nina
  • daniel
  • File 1
  • Printer 1
  • File 2
  • File 3
  • File 4
  • PhD Printer
  • Save the effort of considering access for individual users.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 19 / 1

slide-32
SLIDE 32

Privilege Management Intermediate Controls

Policy Conflicts

Permission can be positive or negative

Access denied or Access permitted or

lecturers wmgroup roger

  • paul
  • george
  • vinod
  • chris
  • nina
  • File 1
  • Printer 1
  • File 2
  • File 3

How do you resolve conflicts?

roger has red and green path to File 1. george has red and green path to File 3.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 20 / 1

slide-33
SLIDE 33

Privilege Management Intermediate Controls

A general rule

Any security policy has to define precedence. How do you resolve conflicting policy rules? Example User rights takes precedence over group rights. Negative group rights takes precedence over positive group rights.

Or the other way around...

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 21 / 1

slide-34
SLIDE 34

Privilege Management Intermediate Controls

Abstract Data Types and Procedures

Datatype (or class) access restricted to certain methods

general programming practice prevents some errors allows access control distinguishes between public and private

Procedure is a method accessing a datatype. More fine-grained than alter and observe An ADT can only be accessed via well-defined procedures Use of each procedure can be restricted

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 22 / 1

slide-35
SLIDE 35

Privilege Management Intermediate Controls

Roles

A role is a collection of procedures A user can hold several roles Many user can hold the same role Roles typically map the organisation structure

Research Assistant on Watermarking Research Assistant on Artificial Intelligence Team leader on Watermarking Team leader on Artificial Intelligence

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 23 / 1

slide-36
SLIDE 36

Privilege Management Intermediate Controls

Role-Based Access Control (RBAC)

Hierarchical:

The team leader may appoint research assistants The lecturer may appoint (enroll) students

Hierarchical means semi-centralised

Policy can be made at every level. The central chief can make organisation-wide policies. Team leaders can define mandatory access control for small teams.

RBAC is common in database management systems

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 24 / 1

slide-37
SLIDE 37

Privilege Management Intermediate Controls

Security levels

Classic classification Linear ordering of security levels Sounds rather military... Top Secret ∩ Secret ∩ Confidential ∩ Unclassified

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 25 / 1

slide-38
SLIDE 38

Privilege Management Intermediate Controls

Protection Rings

Security level are used in hardware

called Protection Rings

E.g. for Intel 80x86

1

Operating system kernel

2

Operating system

3

Utilities

4

User processes

Protection rings had to be implemented to run Multics. Unix uses only ring 0 (root) and ring 3 (user).

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 26 / 1

slide-39
SLIDE 39

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-40
SLIDE 40

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-41
SLIDE 41

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-42
SLIDE 42

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

Subroutines in outer rings can be modified by procedures in outer rings. If such a modified subroutine were invoked in an inner ring, it would run with more privileges. The modifying procedure could then make code to be executed with privileges it should not have.

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-43
SLIDE 43

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

Subroutines in outer rings can be modified by procedures in outer rings. If such a modified subroutine were invoked in an inner ring, it would run with more privileges. The modifying procedure could then make code to be executed with privileges it should not have.

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-44
SLIDE 44

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

Subroutines in outer rings can be modified by procedures in outer rings. If such a modified subroutine were invoked in an inner ring, it would run with more privileges. The modifying procedure could then make code to be executed with privileges it should not have.

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-45
SLIDE 45

Privilege Management Intermediate Controls

Hardware Security Policy

The following Security Policy is implemented:

Procedures can only access objects in their own ring and outer rings. Procedures can invoke subroutines in their own ring only.

Question for you:

Why is a procedure not allowed to invoke subroutines in an outer ring?

Subroutines in outer rings can be modified by procedures in outer rings. If such a modified subroutine were invoked in an inner ring, it would run with more privileges. The modifying procedure could then make code to be executed with privileges it should not have.

  • Cf. Bell-LaPadula model

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 27 / 1

slide-46
SLIDE 46

Privilege Management Intermediate Controls

Discussion Exercise

[Gollmann 4.3] Discuss: What are the differences between groups and roles, if there are any differences at all?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 28 / 1

slide-47
SLIDE 47

Privilege Management Intermediate Controls

Multilevel Security

One set of classifications with a linear (hierarchical) ordering ≤H

public ≤H confidential ≤H secret

One set of categories

E.g. {EE, Comp, Math}

A Compartment is a set of categories

Subset ordering ⊂

A security level is a pair (category,classification)

(h1, c1) ≤ (h2, c2) ⇔ (h1 ≤H h2 ∧ c1 ⊂ c2)

Access is granted if (hobject, cobject) ≤ (hsubject, csubject)

We say that (hsubject, csubject) dominates (hobject, cobject)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 29 / 1

slide-48
SLIDE 48

Privilege Management Intermediate Controls

Need-to-know policy

Multilevel security can

restrict access to members of a project or department while maintaining mandatory access control

Computing staff with highest clearing (secret,{comp})

has no rights to objects from EE or Maths

(public, {comp}) ≤ (secret, {comp}) (1) (secret, {comp}) ≤ (secret, {comp, EE}) (2) (public, {EE}) ≤ (secret, {comp}) (3) Staff do not need to know about other departments No need ⇒ No access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 30 / 1

slide-49
SLIDE 49

Privilege Management Intermediate Controls

Need-to-know policy

Multilevel security can

restrict access to members of a project or department while maintaining mandatory access control

Computing staff with highest clearing (secret,{comp})

has no rights to objects from EE or Maths

(public, {comp}) ≤ (secret, {comp}) (1) (secret, {comp}) ≤ (secret, {comp, EE}) (2) (public, {EE}) ≤ (secret, {comp}) (3) Staff do not need to know about other departments No need ⇒ No access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 30 / 1

slide-50
SLIDE 50

Privilege Management Intermediate Controls

Need-to-know policy

Multilevel security can

restrict access to members of a project or department while maintaining mandatory access control

Computing staff with highest clearing (secret,{comp})

has no rights to objects from EE or Maths

(public, {comp}) ≤ (secret, {comp}) (1) (secret, {comp}) ≤ (secret, {comp, EE}) (2) (public, {EE}) ≤ (secret, {comp}) (3) Staff do not need to know about other departments No need ⇒ No access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 30 / 1

slide-51
SLIDE 51

Privilege Management Intermediate Controls

Need-to-know policy

Multilevel security can

restrict access to members of a project or department while maintaining mandatory access control

Computing staff with highest clearing (secret,{comp})

has no rights to objects from EE or Maths

(public, {comp}) ≤ (secret, {comp}) (1) (secret, {comp}) ≤ (secret, {comp, EE}) (2) (public, {EE}) ≤ (secret, {comp}) (3) Staff do not need to know about other departments No need ⇒ No access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 30 / 1

slide-52
SLIDE 52

Identity Management

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 31 / 1

slide-53
SLIDE 53

Identity Management

What is Identity Management?

Someone, somewhere needs to store

identity (personal information) credentials (to allow authentication)

e.g. picture, password, biometric data, etc.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 32 / 1

slide-54
SLIDE 54

Identity Management

The user problem

How can you manage all your credentials? One user name per service One password per service One smart card per service

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 33 / 1

slide-55
SLIDE 55

Identity Management

The user problem

How can you manage all your credentials? One user name per service One password per service One smart card per service

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 33 / 1

slide-56
SLIDE 56

Identity Management

The server problem

How do you establish identities the first time? How do you collect credentials? Boot-strap problem

initial identification and authentication to create account

Storage of identity information

Security problems and the lot

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 34 / 1

slide-57
SLIDE 57

Identity Management

Third-Party Identity Management

Identity Management external to Access Control Service Provider prompts an Identity Server

authorisation based on identification but identification is completely out-sourced

The Identity Server does

identification and authorisation issues a certificate of identity for the access control mechanism

For example: OpenID

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 35 / 1

slide-58
SLIDE 58

Identity Management

The Identity Server

Same credentials for many services Configurability

personal information managed on a per service basis

For example, commenting on http://www.bt.no

identitification required different identity providers accepted facebook, OpenID, etc.

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 36 / 1

slide-59
SLIDE 59

Identity Management

Client-Side Identity Information

Could the user store all his identity information and credentials? Smart-Cards or small hardware devices

storage for identity trusted device for the service provider

The device issues a certificate

public key cryptography

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 37 / 1

slide-60
SLIDE 60

Identity Management

Open access web sites

Why do you require identification for open access (free of charge) web sites?

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 38 / 1

slide-61
SLIDE 61

Identification and Authentication

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 39 / 1

slide-62
SLIDE 62

Identification and Authentication

Methods of identification

Something you know (password) Something you carry (smartcard) Something you are (fingerprint) Something you do (signature)

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 40 / 1

slide-63
SLIDE 63

Identification and Authentication Biometrics

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 41 / 1

slide-64
SLIDE 64

Identification and Authentication Biometrics

Criteria

Universal everybody has it Particular one-to-one mapping for individual Lasting not subject to change Important natural characteristic of individual Readable anyone can read it Storable we can store it Sufficient no need for other identifiers Precise significant difference between individuals Simple reliable identification – few errors Cheap cost-efficient for the task Convenient no nuisance to the user Acceptable to society and most individuals

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 42 / 1

slide-65
SLIDE 65

Identification and Authentication Biometrics

Storing biometric data

Storage of biometric data is a privacy concern Different options

complete data to reproduce the biometric object hashed storage, allowing validation and not reproduction smart-card storage — only the user has access

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 43 / 1

slide-66
SLIDE 66

Conclusion

Outline

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 44 / 1

slide-67
SLIDE 67

Conclusion

Conclusion

Two separate management problems

Privilege Management Identity Management

Must be handled separately Two operational problems

Identification and Authentication Authorisation

May or may not be handled separately

Dr Hans Georg Schaathun Access Control Autumn 2011 – Week 9 45 / 1