CH04 CompSec3e
CH04 CompSec3e
CH04 CompSec3e
Access Control
Access Control Principles
RFC 4949 defines computer security as:
Security administrator
Access
Authentication
control
function
function
User
System resources
Auditing
Read Own
User C Read Read
Write Write
(a) Access matrix
File4 B C
Own (c) Capability lists for files of part (a)
R R
W
•
Read Own
User C Read Read
Write Write
(a) Access matrix
File4 B C
Own (c) Capability lists for files of part (a)
R R
W
•
* - copy flagset
Memory
Segments
addressing
& pages
hardware
Terminal
& device Terminal
manager & devices
Instruction
decoding Instructions
hardware
grant a to Sn, X (Sk, grant, a , Sn, X)
Sk
delete b from Sp, Y (Sm, delete, b, Sp, Y) Access
Sm matrix
monitor
Access
write matrix read
Access
Control
System
Commands
Protection Domains
• Set of objects together with access rights to those objects
• More flexibility when associating capabilities with
protection domains
• In terms of the access matrix, a row defines a protection
domain
• User can spawn processes with a subset of the access
rights of the user
• Association between a process and a domain can be static
or dynamic
• In user mode certain areas of memory are protected from
use and certain instructions may not be executed
• In kernel mode privileged instructions may be executed
and protected areas of memory may be accessed
UNIX File Access Control
UNIX files are administered using inodes (index
nodes)
• Control structures with key information needed for a particular file
• Several file names may be associated with a single inode
• An active inode is associated with exactly one file
• File attributes, permissions and control information are sorted in the
inode
• On the disk there is an inode table, or inode list, that contains the
inodes of all the files in the file system
• When a file is opened its inode is brought into main memory and
stored in a memory resident inode table
ot her : : - - -
number (user ID) (a) Traditional UNIX approach (minimal access control list)
mask: : rw -
12 protection bits
ot her : :---
(b) Extended access control list
FreeBSD
• Setfacl command assigns a list of UNIX user IDs and groups
• Any number of users and groups can be associated with a file
• Read, write, execute protection bits
• A file does not need to have an ACL
• Includes an additional protection bit that indicates whether the file has an extended ACL
When a process requests access to a file system object two steps are
performed:
• Step 1 selects the most appropriate ACL
• Step 2 checks if the matching entry contains sufficient permissions
rw- r- - ---
user : : r w -
gr oup: : r - -
ot her : : - - -
Role1
Role2
Role3
U1
U2
U3
U4
U5
U6
Um
OBJ ECTS
R1 R2 Rn F1 F1 P1 P2 D1 D2
RBAC1 RBAC2
Rolehierarchies Constraints
RBAC0
Basemodel
(RH) Role
Hierarchy Oper-
ations
user_sessions session_roles
Objects
Sessions
Engineer 1 Engineer 2
Engineering Dept
Main obstacle to
its adoption in Web services
real systems has have been
Can define been concern pioneering
There is
authorizations about the technologies
considerable
that express Strength is its performance through the
interest in
conditions on flexibility and impact of introduction of
applying the
properties of expressive power evaluating the eXtensible
model to cloud
both the resource predicates on Access Control
services
and the subject both resource Markup
and user Language
properties for (XAMCL)
each access
ABAC Model: Attributes
Subject Object Environment
attributes attributes attributes
• A subject is an • An object (or • Describe the
active entity that resource) is a operational,
causes information passive information technical, and even
to flow among system-related situational
objects or changes entity containing or environment or
the system state receiving context in which
information the information
• Attributes define access occurs
the identity and • Objects have • These attributes
characteristics of attributes that can have so far been
the subject be leverages to largely ignored in
make access most access
control decisions control policies
ABAC
Relies upon the
Distinguishable because evaluation of attributes
of the subject, attributes
it controls access to
of the object, and a
objects by evaluating
formal relationship or
rules against the
access control rule
attributes of entities,
defining the allowable
operations, and the
operations for subject-
environment relevant to
object attribute
a request
combinations in a given
environment
Allows an unlimited
Systems are capable of
number of attributes to
enforcing DAC, RBAC,
be combined to satisfy
and MAC concepts
any access control rule
Access Control
Policy
Environmental
Conditions
2a
2d
Rules
1
Enforce
Decision
3
Object
Access Control
2b Mechanism
Subject
2c
Clearance
Name Owner
Type
Affiliation
Etc.
Etc. Classification
Subject Attributes
ObjectAttributes
Strength of
Credential Protection
Access Control Access Control
Subject Authentication Object
Decision Enforcement
Background
Sponsorship Enrollment Investigation On-boarding
Credential
Issuance Production AuthoritativeAttribute Sources
Provisioning/Deprovisioning
External
Agency
Citizen
Access Management
Identity Federation
A credential is produced
• Depending on the credential type, production may involve
encryption, the use of a digital signature, the production of a
smart card or other functions
• Concerned with defining rules for a resource that requires access control
• Rules would include credential requirements and what user attributes,
resource attributes, and environmental conditions are required for access of
a given resource for a given function
Privilege management
Policy management
Users
Trust Framework
Providers
AttributeProviders
Identity
Service AttributeExchange
Network Relying
Providers
Parties
Assessors Dispute
& Auditors Resolvers
Users
U s
e rs
A ttr i
b u te Providers
Ide n t ity
S erv ic e Attrib ut e Ex chang e
N et wo rk Relyin g
Pr ov id ers
Par ties
Users
Users
Trust Framework
Providers
AttributeProviders
Identity
Service AttributeExchange
Network Relying
Providers
Parties
Assessors Dispute
& Auditors Resolvers
Users
Roles
User
IDs Functions
1 1-4 N M Access
Application
Right
Assigns
Positions
Authorization Administration
N M
Role Application