Access Control
Access Control
Access Control
Source: Based on [SAND94].
“a process by which use of system resources is regulated according to a security policy and is permitted
only by authorized entities (users, programs, processes, or other systems) according to that policy”
Access Control Context
The context of access control, in addition to access control, involves the following entities and functions:
• Authentication: Verification that the credentials of a user or other system entity are valid.
• Authorization: The granting of a right or permission to a system entity to access a system resource.
This function determines who is trusted for a given purpose.
• Audit: An independent review and examination of system records and activities in order to test for
adequacy of system controls, to ensure compliance with established policy and operational procedures, to
detect breaches in security, and to recommend any indicated changes in control, policy and procedures.
An auditing function monitors and keeps a record of user accesses to system resources.
All operating systems have at least a rudimentary, and in many cases a quite robust, access control
component. Add-on security packages can supplement the native access control capabilities of the
OS. Particular applications or utilities, such as a database management system, also incorporate
access control functions. External devices, such as firewalls, can also provide access control services.
The Basic Elements of Access Control
Subjects, Objects, and Access Rights
Access
Subject Object
right
Authorization Table
for Files in Authorization
Database
Access Control Policies
An access control policy dictates what types of access are
permitted, under what circumstances, and by whom. Access
control policies are generally grouped into the following
categories:
• DAC enable the owner of a resource to specify which user can access
specific resources. It’s based on the discretion of the owner.
• Often provided using an access matrix
o One dimension consists of identified subjects that may attempt data access
to the resources
o The other dimension lists the objects that may be accessed
• Each entry in the matrix indicates
the access rights of a particular
subject for a particular object
UNIX
File Access Control/ Access Matrix
Specify read, write, and execute permission for the owner of the file,
members of the group and all other users
Mandatory Access Control (MAC)
- Typically, job functions with greater responsibility have greater authority to access resources.
- A subordinate job function may have a subset of the access rights of the superior job function.
- Role hierarchies make use of the concept of inheritance to enable one role to implicitly include
access rights associated with a subordinate role.
Next, Figure 4.9 is an example of a diagram of a role hierarchy. By convention, subordinate roles are
lower in the diagram.
- A line between two roles implies that the upper role includes all of the access rights of the lower
role, as well as other access rights not available to the lower role.
- One role can inherit access rights from multiple subordinate roles. For example, in Figure 4.9, the
Project Lead role includes all of the access rights of the Production Engineer role and of the Quality
Engineer role.
- More than one role can inherit from the same subordinate role. For example, both the Production
Engineer role and the Quality Engineer role include all of the access rights of the Engineer role.
- Additional access rights are also assigned to the Production Engineer Role and a different set of
additional access rights are assigned to the Quality Engineer role. Thus, these two roles have
overlapping access rights, namely the access rights they share with the Engineer role.
Example of Role Hierarchy
Constraints - RBAC
• Provide a means of adapting RBAC to the specifics of administrative and
security policies of an organization
• A defined relationship among roles or a condition related to roles
• Types:
• A user can only be assigned • Setting a maximum number of • Dictates that a user can only
to one role in the set (either users with respect to roles be assigned to a particular
during a session or statically) • A maximum the number of role if it is already assigned
roles that a user is assigned to to some other specified role
• Any permission (access • a maximum number of roles
right) can be granted to only that can be granted a particular
one role in the set permission
Case Study: RBAC System for a Bank
Attribute-Based Access Control
(ABAC)
Control (ABAC)
Allows an unlimited
Systems are capable of
number of attributes to
enforcing DAC, RBAC,
be combined to satisfy
and MAC concepts
any access control rule
ABAC Model: Attributes
Object Subject Environment
Attributes Attributes Attributes
• An object (or resource) is a • A subject is an active entity • Describe the operational, technical, and even
situational environment or context in which
passive information system- that causes information to the information access occurs
related entity containing or flow among objects or
receiving information changes the system state
• such as current date and time, the
• Objects have attributes that • Attributes define the identity current virus/hacker activities, and the
network’s security level are not
can be leverages to make and characteristics of the associated with a particular subject nor a
access control decisions subject resource, but may nonetheless be
relevant in applying an access control
• Include: subject policy.
• A Microsoft Word
document, for example, identifier, name, • These attributes have so far been largely
may have attributes organization, job title, ignored in most access control policies
such as title, subject, and so on. A subject’s
date, and author. role can also be viewed
as an attribute.
ABAC Attributes Examples
ABAC
Scenario
ABAC Policies
A policy is a set of rules and relationships that govern allowable behavior
within an organization, based on the privileges of subjects and how
resources or objects are to be protected under which environment
conditions