CH04 CompSec4e
CH04 CompSec4e
Access Control
Security
Requirements
( SP 800-171)
Access
Control
System
Commands
(Table is on page
116 in the
textbook)
Protection Domains
• Set of objects together with access rights to those objects
• More flexibility when associating capabilities with protection
domains
• In terms of the access matrix, a row defines a protection domain
• User can spawn processes with a subset of the access rights of the
user
• Association between a process and a domain can be static or dynamic
• In user mode certain areas of memory are protected from use and
certain instructions may not be executed
• In kernel mode privileged instructions may be executed and
protected areas of memory may be accessed
UNIX File Access Control
UNIX files are administered using inodes (index
nodes)
FreeBSD
When a process requests access to a file system object two steps are
performed:
Mutually exclusive
Cardinality Prerequisite roles
roles
Environm
Subject Object
ent
attributes attributes
attributes
A credential is produced
•Depending on the credential type, production may involve encryption, the use of a digital signature, the production of a smart card or other functions
Resource management
• Concerned with defining rules for a resource that requires access control
• Rules would include credential requirements and what user attributes, resource attributes, and
environmental conditions are required for access of a given resource for a given function
Privilege management
• Concerned with establishing and maintaining the entitlement or privilege attributes that comprise an individual’s access profile
• These attributes represent features of an individual that can be used as the basis for determining access decisions to both physical and logical
resources
• Privileges are considered attributes that can be linked to a digital identity
Policy management
ICF OITF
•Information Card Foundation •Open Identity Trust Framework
is a standardized, open
is a nonprofit community of
specification of a trust framework
companies and individuals for identity and attribute
working together to evolve the exchange, developed jointly by
Information Card ecosystem OIDF and ICF
Table 4.5
Functions and Roles for Banking Example
Table 4.5
Functions and Roles for Banking Example
Summary
• Access control principles • Attribute-based access
o Access control context control
o Access control policies o Attributes
o ABAC logical architecture
• Subjects, objects, and access o ABAC policies
rights • Identity, credential,
• Discretionary access control and access
o Access control model
o Protection domains
management
o Identity management
• UNIX file access control o Credential management
o Traditional UNIX file access control o Access management
o Identity federation
o Access control lists in UNIX