overview
play

Overview Basic Principles Access Control Methodologies Controls - PowerPoint PPT Presentation

Overview Basic Principles Access Control Methodologies Controls Access Control Designs Access Control Administration Accountability Chapter 2 Access Control Models Identification and Authentication Methods Lecturer:


  1. Overview � Basic Principles Access Control Methodologies � Controls � Access Control Designs � Access Control Administration � Accountability Chapter 2 � Access Control Models � Identification and Authentication Methods Lecturer: Pei-yih Ting � Single Sign-On Systems � File and Data Ownership � Attacks 1 2 Access Control Basics (cont ’ d) Basics of Access Control � Access control is a collection of methods and � Subject components � The entity that requests access to a resource � Supports confidentiality (protects information from � Active unauthorized disclosure) � Object � Supports integrity (protects information from unauthorized modification) � The resource a subject attempts to access � Goal: to allow only authorized subjects to access � Passive permitted objects How do we partition subjects / objects for efficient management? 3 4

  2. Access Control Basics (cont ’ d) Controls � Least secure philosophy (permissive policy) � Mechanisms put into place to allow or disallow object access � Any object access not prohibited is granted by default. � Any potential barrier to unauthorized access � Ineffective maintenance leads to authorization creep � Locks, guards, passwords … � Least privilege philosophy (prohibitive policy) � Controls organized into different categories � A subject is granted permissions needed to accomplish � Common categories required tasks and nothing more � Administrative (enforce security rules through policies, ex. procedures, usage monitoring, security training) � Logical/Technical (implement object access restrictions, ex. identification / authentication / segregated network) � Physical (limit physical access to hardware) 5 6 Access Control Techniques Access Control Designs � Choose techniques that fit the organization ’ s � Access control designs define rules for users needs accessing files or devices � Considerations include � Level of security required � Environmental impact of security measures � Three common access control designs � User convenience � Mandatory access control (MAC) � Techniques differ in � Discretionary access control (DAC) � The way objects and subjects are identified � Non-discretionary access control � How decisions are made to approve or deny access 7 8

  3. Mandatory Access Control MAC (cont ’ d) � A unified (mandatory) way to assign a security � Common military data classifications label to each subject and object in a system. � Unclassified � Matches label of subject to label of object to � Sensitive but Unclassified (SBU) determine when access should be granted � Confidential � A common implementation is rule-based access � Secret control � Top Secret � Often requires a subject to have a need to know in � Common commercial data classifications addition to proper security clearance � Public � Need to know indicates that a subject requires access � Sensitive to object to complete a particular task � Private � Example rule: � Confidential subject ’ s security clearance > object ’ s security label 9 10 Discretionary Access Control Non-discretionary Access Control � Access to an object is defined by the object owner. � Uses a subject ’ s role or a task assigned to subject to grant or deny object access � Uses identity of subject to decide when to grant an � Also called role-based or task-based access control access request � Works well in environments with high turnover of � Most common design in commercial operating subjects since access is not tied directly to subject systems � Lattice-based control is a variation of non- � Generally less secure than mandatory control discretionary control � Generally easier to implement and more flexible � Relationship between subject and object has a set of � Includes access boundaries that define rules and conditions for � Identity-based access control: ex. UNIX file permission access � Access control lists (ACLs): ex. WINNT allows group of objects / subjects to be controlled together 11 12

  4. Access Control Administration Access Control Administration (cont ’ d) � Can be implemented as centralized, decentralized, � Decentralized access control administration or hybrid � Object access is controlled locally rather than centrally � Centralized access control administration � More difficult administration � All requests go through a central authority � Objects may need to be secured at multiple locations � Administration is relatively simple � More stable and robust � Single point of failure, sometimes performance bottlenecks � Not a single point of failure � Common packages include Remote Authentication Dial-In � Usually implemented using security domains User Service (RADIUS), Challenge Handshake Authentication Protocol (CHAP), Terminal Access A security domain is a sphere of trust , including Controller Access Control System (TACACS) a collection of subjects and objects with defined access rules or permissions 13 14 Accountability Access Control Models � System auditing used by administrators to � Provide conceptual view of security policies monitor � Map goals and directives to specific system � Who is using the system events � What users are doing � Provide a formal definition and specification of � Logs can trace events back to originating users required security controls � Process of auditing can have a negative effect on system performance � Usually many different models and � Must limit data collected in logs combinations of models are used in a secure � Clipping levels set thresholds for when to start system collecting data 15 16

  5. State Machine Model (cont ’ d) State Machine Model � A collection of defined states and transitions � Modifications change objects from one state to Transitions State another B � A state represents the characteristics of an object State at a point in time A � Transitions represent the modifications that can be made to objects to change from one state to State another C Subject B request access � Ex. Opened Closed Figure 2.1 Simple state machine A particular Object A 17 18 Bell-LaPadula Model Biba Model 1. Top Secret � After Bell-LaPadula 2. Secret � 1970s by US military � Focuses on integrity controls 3. Confidential � Focus on confidentiality 4. Sensitive but Unclassified � A state machine model that uses integrity labels � A state machine model that 5. Unclassified � Each object or subject is given an integrity level uses security labels � Two basic properties to evaluate access requests � Each object is given a security level and each � Simple integrity property: no read down subject is given a security clearance � *-property: no write up � Two basic properties to evaluate access requests � Popular with businesses because its main focus is � Simple security rule: no read up to ensure that unauthorized subjects cannot � *-property: no write down change objects 19 20

  6. Clark-Wilson Model Non-interference Model � Developed after the Biba model � Not a state machine model � Often an addition to other models � Restricts all accesses to a small number of tightly � Ensures that changes at one security level do controlled access programs not bleed over into other levels � Integrity verification procedure (IVP): verifies the � Maintains both data integrity and integrity of a data item confidentiality � Transformation procedure (TP): makes authorized changes to a data item � After subject is properly authenticated and cleared to access the object, all modifications are first validated by the IVP, and then the modification takes place by the TP. � Works well in commercial applications 21 22 Identification and Identification and Authentication Methods (cont ’ d) Authentication Methods � Security practices often require input from � Two-factor authentication uses two phases multiple categories of authentication techniques � Identification : a subject claims to be a specific entity by presenting identifying credentials � What you know: � Authentication : verifies that the subject really is who � Password, passphrase, PIN, lock combination she claims to be � What you have: � Usually there will be an authorization phase � Smartcard, token device followed by successful authentication where � What you are: Biometrics system evaluates the specific rights or � fingerprint, palm print, hand geometry, retina / iris permissions for the subject pattern, voice pattern, signature, keyboard dynamics 23 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend