Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 An Attribute Based Framework for Risk-Adaptive Access Control Models Ravi Sandhu Executive Director and Endowed Professor August 2011

Similar presentations


Presentation on theme: "1 An Attribute Based Framework for Risk-Adaptive Access Control Models Ravi Sandhu Executive Director and Endowed Professor August 2011"— Presentation transcript:

1 1 An Attribute Based Framework for Risk-Adaptive Access Control Models Ravi Sandhu Executive Director and Endowed Professor August 2011 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Joint work with Savith Kandala and Venkata Bhamidipati © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

2 Access to resources are automatically (or semi-automatically) granted based on: Purpose for the access request, Security risk, and Situational Factors Motivating Example: Displaying a classified document… © Ravi Sandhu 2 World-Leading Research with Real-World Impact! RAdAC Concepts

3 Benefits of Abstract Models Core Characteristics of R AdAC Components of RAdAC Model Mapping RAdAC to UCON Extending UCON Principles to RAdAC and Modified UCON Model © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Outline

4 Proposed at the Policy Layer Do not lay out enforcement and implementation details Successful practice – DAC, MAC and RBAC Provides a formal and structural foundation © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Benefits of Abstract Models

5 Reference – Robert McGraw, NIST Privilege Management Workshop, 2009 Operational Need Security Risk Situational Factors Heuristics Adaptable Access Control Policies © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Core Characteristics of RAdAC

6 © Ravi Sandhu 6 World-Leading Research with Real-World Impact! RAdAC Model

7 © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Operational Need / Purpose

8 Purpose (Operational Need) The reason for the users access request Can manifest as: A users membership in a role An authority is attesting to a users need to access the object Examples: Health Care – Emergency treatment Energy – Impending power emergency Banking – Consent to access acct info. © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Operational Need / Purpose

9 © Ravi Sandhu 9 World-Leading Research with Real-World Impact! Security Risk

10 Users Devices Objects Operations Connections Attribute Providers and Level of Assurance Security risk evaluation be based on risk associated with each of these components, as well as a composite risk. © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Security Risk

11 © Ravi Sandhu 11 World-Leading Research with Real-World Impact! Situational Factors

12 Environmental or system oriented decision factors Global Situational Factors Example : National terrorist threat level, Enterprise under cyber attack Local Situational Factors Example: location, current local time for accessible time period (e.g., business hours), current location for accessible location checking (e.g., area code, connection origination point) © Ravi Sandhu 12 World-Leading Research with Real-World Impact! Situational Factors

13 © Ravi Sandhu 13 World-Leading Research with Real-World Impact! Access History

14 Provides two functions updates the object access history repository with the attributes in the access request and the access control decision provides input for future access decisions Heuristics can be used to Fine-tune access control policies Improve future access decisions Inputs the access decisions © Ravi Sandhu 14 World-Leading Research with Real-World Impact! Access History

15 © Ravi Sandhu 15 World-Leading Research with Real-World Impact! Adaptable Access Control Policies

16 Adaptable access control policies can be defined based on all the components Overrides Automatic Semi-Automatic Manual © Ravi Sandhu 16 World-Leading Research with Real-World Impact! Adaptable Access Control Policies

17 © Ravi Sandhu 17 World-Leading Research with Real-World Impact! UCON Model

18 Key missing features Subject definition Access History Risk Evaluation Extending UCON Principles to RAdAC © Ravi Sandhu 18 World-Leading Research with Real-World Impact! Mapping RAdAC to UCON

19 © Ravi Sandhu 19 World-Leading Research with Real-World Impact! Modified UCON Model

20 Purely focused on the abstract models The modified UCON model with the decomposed subject definition and the added functions of access history and risk evaluation is most suitable for modeling and implementing the RAdAC concept. Future Work: Enforcement and implementation Defining architecture, protocols and mechanisms for the proposed RAdAC model © Ravi Sandhu 20 World-Leading Research with Real-World Impact! Conclusion and Future Work


Download ppt "1 An Attribute Based Framework for Risk-Adaptive Access Control Models Ravi Sandhu Executive Director and Endowed Professor August 2011"

Similar presentations


Ads by Google