Marianne Winslett / POLICY 2007
1
Policy-driven Distributed Authorization:
Status and Prospects (sanitized version)
Marianne Winslett University of Illinois
Policy-driven Distributed University of Illinois Marianne Winslett - - PDF document
1 Marianne Winslett / POLICY 2007 Policy-driven Distributed University of Illinois Marianne Winslett Status and Prospects Authorization: (sanitized version) 2 A tale of two trends Marianne Winslett / POLICY 2007 3 Organizational
Marianne Winslett / POLICY 2007
1
Marianne Winslett University of Illinois
Marianne Winslett / POLICY 2007
2
Marianne Winslett / POLICY 2007
3
Marianne Winslett / POLICY 2007
4
Marianne Winslett / POLICY 2007
5
Organization Organization Supplies Supplies It It Who Who Who Who Supplies Supplies It It Partner Partner Partner Partner Partner Partner Partner Partner
Marianne Winslett / POLICY 2007
6
Walmart Walmart Supplier Supplier Supplier Supplier Supplier Supplier Supplier Supplier Supplier Supplier 2nd level Supplier 2nd level Supplier 2nd level Supplier 2nd level Supplier 2nd level Supplier 2nd level Supplier
Marianne Winslett / POLICY 2007
7
EOC EOC Police Police Fire Fire Public Transit Public Transit Red Cross Red Cross Medical Medical Illinois Railroad Illinois Railroad School District School District Chemical Owner Chemical Owner
Marianne Winslett / POLICY 2007
8
Organization Organization Japanese Division Japanese Division Accounting Accounting HR HR Product Line 1 Product Line 1 Product Line 2 Product Line 2 Product Line 3 Product Line 3 European Division European Division Accounting Accounting HR HR Product Line 4 Product Line 4 Product Line 5 Product Line 5 Product Line 6 Product Line 6 US Division US Division Accounting Accounting HR HR Product Line 7 Product Line 7 Product Line 8 Product Line 8 Product Line 9 Product Line 9
Marianne Winslett / POLICY 2007
9
Organization
Marianne Winslett / POLICY 2007
10
Marianne Winslett / POLICY 2007
11
Marianne Winslett / POLICY 2007
12
Emp3
Strong authentication (X.509) Centralize role definitions, base on attributes Get access control out of apps (some day)
SAP CRM ERP SAP Access Policy Access Policy Access Policy Access Policy Emp1 Emp4 Emp2 Emp
Marianne Winslett / POLICY 2007
13
Based off centralized LDAP + X.509 Avoids inconsistency due to distribution Easier to maintain, compared to ACLs
HR HR HR HR HR HR Walmart Walmart Walmart’s supplier Walmart’s supplier Walmart’s supplier’s supplier Walmart’s supplier’s supplier Less insider threat
Marianne Winslett / POLICY 2007
14
Marianne Winslett / POLICY 2007
15
Automated exploitation of policy errors
Marianne Winslett / POLICY 2007
16
Cent ralized aut horizat ion services can be at t acked
Marianne Winslett / POLICY 2007
17
Understanding policies
Industrial policy languages were not int ended for rigorous analysis or user- friendliness
Analysis tools
Marianne Winslett / POLICY 2007
18
Marianne Winslett / POLICY 2007
19
Authorization Server receives Alice’s LAN access request Alice discloses her employee ID, proves ownership
level credential, proves ownership
to certain portions of LAN
Beijing Office Network Authorization Server’s TrustBuilder Security Agent Alice’s TrustBuilder Security Agent
site access for WidgetCorp employees
Alice discloses her policy for disclosing her WidgetCorp employee ID Patch 4
C I s c oPatch 4
C I s c oPatch 4
C I s c oP a t c h 4
C I s cMarianne Winslett / POLICY 2007
20
“ Ohhhhhhh . . . Look at t hat , Schust er . . . Dogs are so cut e when t hey t ry t o comprehend quant um mechanics”
Marianne Winslett / POLICY 2007
21
Marianne Winslett / POLICY 2007
22
The success of at t ribut e-based policies for securit y and privacy, and ult imat ely t he open and compliant syst ems t hey enable, relies on t he abilit y of humans to comprehend and manage these policies.
Marianne Winslett / POLICY 2007
23
Real-world case studies of policy management activities, to learn how users think about these activities User interfaces to help people understand and modify large, complex sets of policies
Marianne Winslett / POLICY 2007
24
Software for cross-organizational access to customer relationship management applications Allegis does not allow its clients to update their policies themselves Only policy specialists can be trusted to understand and update the policies correctly Even they may struggle to specify, modify, and comprehend complex policies--- note CRM focus
Marianne Winslett / POLICY 2007
25
Declarative policy languages are not a panacea
Consider hundreds of pages of (declarative) SQL SELECT a1.Name, a1.Sales, SUM(a2.Sales)/(SELECT SUM(Sales) FROM Total_Sales) Pct_To_Total FROM Total_Sales a1, Total_Sales a2 WHERE a1.Sales <= a2.sales or (a1.Sales=a2.Sales and a1.Name = a2.Name) GROUP BY a1.Name, a1.Sales ORDER BY a1.Sales DESC, a1.Name DESC; … And any bugs may be found and exploited automatically
Marianne Winslett / POLICY 2007
26
How can a decision-maker with limited technical expert ise quickly underst and a part icular policy t hat suddenly becomes crucial? What if the company’ s policy admin quits or is sick? How can a new hire quickly underst and policies? Ordinary users: Why was t his decision made? How can I get it reversed? What if I …
Marianne Winslett / POLICY 2007
27
Proofs are fundamental in TN But almost no one can understand a proof Need heuristics to turn proofs into explanations, both for ordinary users and administrators An explanation of why you didn’ t get access, or how to get access, or what these policies say, doesn’ t start from a proof
Marianne Winslett / POLICY 2007
28
Roles Policies Resources Credentials Users
Subject Request Resource
Patient Doctor Nurse Administrator Conceal Demographic conceal control
...
Entity
Release Prescription X-ray Lab report The patient, Adam, wants to conceal prescriptions after May 2006* and lab reports after June 2006** from Dr. Gurtner [his previous physician]. Adam
Explanation
Conceal-request(Jay, [(X-Ray, 5/2003, 7/2003)], Dr_Gupta, 5/2003) Conceal-request(Ragib, [(Demographic)], Dr_Snir, 8/2000) Conceal-request(Adam, [(Lab_Report, 6/2006), (Prescriptions, 5/2006)], Dr_Gurtner, NOW) Conceal-request(Megan, [(Prescriptions, 1/2005)], Dr_Nelson, 12/2004)
File Window Actions Edit
**
Patient Doctor Nurse Administrator Gurtner
*
Source Code
Context sensitive menus could be used to set temporal and other related constraints, indicated with small icons Adjustable borders allow the source code and explanation windows to be selectively positioned or closed
Visual View
Figure . Early design schematic for a visual interface for managing security policies.
Marianne Winslett / POLICY 2007
29
Marianne Winslett / POLICY 2007
30
We need to develop tools for analyzing large sets
Safety Availability What-if? Why?
both for policy administrators and ordinary users even in heterogeneous systems. Challenges #1 & #2 should keep us busy for the next decade!
Marianne Winslett / POLICY 2007
31
Cassandra health care policies Shibboleth installations--- but only one-shot unilateral trust, with a closed set of
We need more feedback from the real world to ensure that we are addressing the most important problems in policy-based authorization!
Marianne Winslett / POLICY 2007
32
Cent ralized aut horizat ion servers are attractive target TN is heavyweight DDoS is so easy
Marianne Winslett / POLICY 2007
33
Multiple rounds of exchange (Nested) third-party interactions
Complex decision making processes Expensive crypto This is a liability. Solutions will require a multi-faceted approach.
Marianne Winslett / POLICY 2007
34
How should we build the policy engine?
Cert ainly not a Dat alog t heorem prover! How can we integrate it with strategic decisions? How can we make t he policy engine reusable in
How can we make a TN implementation flexible?
Marianne Winslett / POLICY 2007
35
Audit Service Obligation Service Strategy Module Query Interface Compliance Checker Credential Verifier
C I s cAlice’s Policies External Query Processor
P O
Bob’s Disclosures Alice’s Disclosures
O
Alice’s Obligations
User-Supplied Plug-ins
inst rument at ion
rewriting
External Network
User Defined Email Issue Certificate Log Visualization User Defined
Message serialization Caching Policy satisfaction checking
Marianne Winslett / POLICY 2007
36
Theorem Prover Minimize/maximize “value” of next disclosure
Marianne Winslett / POLICY 2007
37
Service availabilit y
e.g., closeness to ideal completeness
Privacy preservat ion
e.g., control leaks or minimize “ value” of disclosed
credentials
Computational overheads Storage requirements
Marianne Winslett / POLICY 2007
38
Less than 4 seconds to find hundreds of satisfying sets, pick the one with minimal weight (new work) Ships with Trustbuilder2!
Marianne Winslett / POLICY 2007
39
Delegation and replication can improve availability, performance of decentralized ABAC
Worker 1 Worker 2 Worker 4 Worker m
…
Auth. Server 1 Auth. Server 2 Auth. Server n
…
Client Client Client Client Client Client
Load Balancer (e.g., Wackamole§)
… …
Interactive negotiation protocol Transcript generation Transcript broadcast Transcript verification Access token generation (threshold cryptography)
§ Y. Amir, R. Caudy, A. Munjal, T. Schlossnagle, C. Tutu, “N-Way Fail-Over Infrastructure for Reliable Servers
and Routers,” IEEE International Conference on Dependable Systems and Networks (DSN ‘03), June 2003.
Marianne Winslett / POLICY 2007
40
Audit Service Obligation Service Strategy Module Query Interface Compliance Checker Credential Verifier
C I s cAlice’s Policies External Query Processor
O
Alice’s Obligations User Defined Email Issue Certificate Log Visualization User Defined
Policy satisfaction checking
Marianne Winslett / POLICY 2007
41
proof construction?
without global identities?
Marianne Winslett / POLICY 2007
42
I have no idea.
Marianne Winslett / POLICY 2007
43
Logics Policy languages Strategies and proof tactics
Trust negotiation
Bonatti and Samarati (CCS 2000) Yu, Winslet t , and Seamons (TISSEC 2003) Li and Mit chell (DISCEX 2003) Becker and Sewell (POLICY 2004) Bert ino, Ferrari, Squincciarini (IEEE TKDE 2004) Li, Li, and Winsborough (CCS 2005) And many others…
Distributed proof construction
Bauer, Gariss, and Reiter (Oakland 2005) Winslett, Zhang, and Bonatti (CCS 2005) Minami and Kot z (JPMC 2005, Pervasive 2006)
Marianne Winslett / POLICY 2007
44
P0 P1 ?grant(adam, projector) P2 ?role(adam, presenter) P3 ?loc(adam, 2124) P4 P5 ?own(adam, cell42) ?loc(cell42, 2124) true true true true true
Querier
Marianne Winslett / POLICY 2007
45
E.g., Reputation, audit, collusion detection Attribute certificates need not be bound to a particular identity
Observation: Each entity is described uniquely by
the collection of credentials that she possesses
Marianne Winslett / POLICY 2007
46
This is the same person…
CA1 CA2 CB1 CB2 CA3 CA4 CB3 CA1 CA4 CA2
CA1 CA4 CB1 CA1 CA2 CB1
Marianne Winslett / POLICY 2007
47
C1 C3 C4 C2 Cn
. . .
h(C1) h(C3) h(C4) h(C2) h(Cn)
. . .
A description, d, …
hash
… maps to … … a virtual fingerprint, f
Marianne Winslett / POLICY 2007
48
DB Rating collection and update Query rQ Selection Aggregation rQ
Collect ion, updat e, and select ion independent of aggregation
Improved reputation functions can be incorporated Existing reputation models can now be used in ABAC systems
Marianne Winslett / POLICY 2007
49
GeoTech DB? Ops group? Purchase > $10k?
GeoTech Bob
BBB credential Access granted! Purchase > $10k credential
APeC Ops
Ops group credential. BBB?
APeC Ops APeC Finance
Inconsistent State!
Marianne Winslett / POLICY 2007
50
View Real World
APeC Finance APeC Finance APeC Ops APeC Ops
P
Similar consistency problems arise in other domains
Marianne Winslett / POLICY 2007
51
Incremental
Credent ials validat ed as t hey are received
Internal
Credent ials valid simult aneously at some time
during protocol
Endpoint
Credent ials valid simult aneously at decision
point
Interval
Credent ials valid from t ime received unt il
decision point
Restrictiveness
Marianne Winslett / POLICY 2007
52
st art end
Parties have no incentive to cooperate in the traditional transactional manner, but new implementation approaches can be used
Marianne Winslett / POLICY 2007
53
strategic decisions with the rest of the system)