Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.

Slides:



Advertisements
Similar presentations
Access Control Chapter 3 Part 3 Pages 209 to 227.
Advertisements

Functional component terminology - thoughts C. Tilton.
Access Control Methodologies
Security+ Guide to Network Security Fundamentals, Fourth Edition
Access Control Intro, DAC and MAC System Security.
Lecture 7 Access Control
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Active Directory: Final Solution to Enterprise System Integration
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
1 File Management in Representative Operating Systems.
Access Control Dr.Talal Alkharobi.
Chapter 12 File Management Systems
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
User Domain Policies.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Understanding Active Directory
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Li Xiong CS573 Data Privacy and Security Access Control.
Chapter 10: Authentication Guide to Computer Network Security.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Secure Electronic Transaction (SET)
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 4 “Access Control”.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
Li Xiong CS573 Data Privacy and Security Access Control.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Academic Year 2014 Spring Academic Year 2014 Spring.
Introduction to Access Control and Trust Management Daniel Trivellato.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Chapter 4 – Access Control.
Identity and Access Management
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Lecture 7 Access Control
Chapter 14: System Protection
Authentication.
THE STEPS TO MANAGE THE GRID
CompTIA Security+ Study Guide (SY0-401)
Chapter 4 Access Control
OS Access Control Mauricio Sifontes.
Chapter 14: Protection.
Appropriate Access InCommon Identity Assurance Profiles
Principles and Practice
PLANNING A SECURE BASELINE INSTALLATION
Access Control What’s New?
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Chapter 4 Access Control

Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a computer system, particularly those that assure access control service.”

Access Control Policies Access Control Policies Role-based access control (RBAC) o Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles Attribute-based access control (ABAC) o Controls access based on attributes of the user, the resource to be accessed, and current environmental conditions Discretionary access control (DAC) o Controls access based on the identity of the requestor and on access rules (authorizations) stating what requestors are (or are not) allowed to do Mandatory access control (MAC) o Controls access based on comparing security labels with security clearances

UNIX File Access Control Control structures with key information needed for a particular file Several file names may be associated with a single inode An active inode is associated with exactly one file File attributes, permissions and control information are sorted in the inode On the disk there is an inode table, or inode list, that contains the inodes of all the files in the file system When a file is opened its inode is brought into main memory and stored in a memory resident inode table UNIX files are administered using inodes (index nodes) May contain files and/or other directories Contains file names plus pointers to associated inodes Directories are structured in a hierarchical tree

UNIX File Access Control Unique user identification number (user ID) Member of a primary group identified by a group ID Belongs to a specific group 12 protection bits Specify read, write, and execute permission for the owner of the file, members of the group and all other users The owner ID, group ID, and protection bits are part of the file’s inode

Traditional UNIX File Access Control “Set user ID”(SetUID) “Set user ID”(SetUID) “Set group ID”(SetGID) “Set group ID”(SetGID) System temporarily uses rights of the file owner/group in addition to the real user’s rights when making access control decisions System temporarily uses rights of the file owner/group in addition to the real user’s rights when making access control decisions Enables privileged programs to access files/resources not generally accessible Enables privileged programs to access files/resources not generally accessible Sticky bit Sticky bit When applied to a directory it specifies that only the owner of any file in the directory can rename, move, or delete that file When applied to a directory it specifies that only the owner of any file in the directory can rename, move, or delete that file Superuser Superuser Is exempt from usual access control restrictions Is exempt from usual access control restrictions Has system-wide access Has system-wide access

Access Control Lists (ACLs) in UNIX Access Control Lists (ACLs) in UNIX Modern UNIX systems support ACLs FreeBSD, OpenBSD, Linux, Solaris FreeBSD Setfacl command assigns a list of UNIX user IDs and groups Any number of users and groups can be associated with a file Read, write, execute protection bits A file does not need to have an ACL Includes an additional protection bit that indicates whether the file has an extended ACL When a process requests access to a file system object two steps are performed: Step 1 selects the most appropriate ACL Step 2 checks if the matching entry contains sufficient permissions

Identity Management Concerned with assigning attributes to a digital identity and connecting that digital identity to an individual or NPE Goal is to establish a trustworthy digital identity that is independent of a specific application or context Most common approach to access control for applications and programs is to create a digital representation of an identity for the specific use of the application or program Maintenance and protection of the identity itself is treated as secondary to the mission associated with the application Final element is lifecycle management which includes: Mechanisms, policies, and procedures for protecting personal identity information Controlling access to identity data Techniques for sharing authoritative identity data with applications that need it Revocation of an enterprise identity

Credential Management The management of the life cycle of the credential Examples of credentials are smart cards, private/public cryptographic keys, and digital certificates Encompasses five logical components: An authorized individual sponsors an individual or entity for a credential to establish the need for the credential The sponsored individual enrolls for the credential Process typically consists of identity proofing and the capture of biographic and biometric data This step may also involve incorporating authoritative attribute data, maintained by the identity management component A credential is produced Depending on the credential type, production may involve encryption, the use of a digital signature, the production of a smart card or other functions The credential is issued to the individual or NPE A credential must be maintained over its life cycle Might include revocation, reissuance/replacement, reenrollment, expiration, personal identification number (PIN) reset, suspension, or reinstatement

Access Management Deals with the management and control of the ways entities are granted access to resources Covers both logical and physical access May be internal to a system or an external element Purpose is to ensure that the proper identity verification is made when an individual attempts to access a security sensitive building, computer systems, or data Three support elements are needed for an enterprise- wide access control facility: Resource management Privilege management Policy management

Three support elements are needed for an enterprise-wide access control facility: Concerned with defining rules for a resource that requires access control Rules would include credential requirements and what user attributes, resource attributes, and environmental conditions are required for access of a given resource for a given function Resource management Concerned with establishing and maintaining the entitlement or privilege attributes that comprise an individual’s access profile These attributes represent features of an individual that can be used as the basis for determining access decisions to both physical and logical resources Privileges are considered attributes that can be linked to a digital identity Privilege management Governs what is allowable and unallowable in an access transaction Policy management

Identity Federation Term used to describe the technology, standards, policies, and processes that allow an organization to trust digital identities, identity attributes, and credentials created and issued by another organization Addresses two questions: o How do you trust identities of individuals from external organizations who need access to your systems o How do you vouch for identities of individuals in your organization when they need to collaborate with external organizations

Open Identity Trust Framework OpenID An open standard that allows users to be authenticated by certain cooperating sites using a third party service OIDF OpenID Foundation is an international nonprofit organization of individuals and companies committed to enabling, promoting, and protecting OpenID technologies ICF Information Card Foundation is a nonprofit community of companies and individuals working together to evolve the Information Card ecosystem OITF Open Identity Trust Framework is a standardized, open specification of a trust framework for identity and attribute exchange, developed jointly by OIDF and ICF OIX Open Identity Exchange Corporation is an independent, neutral, international provider of certification trust frameworks conforming to the OITF model AXN Attribute Exchange Network is an online Internet-scale gateway for identity service providers and relying parties to efficiently access user asserted, permissioned, and verified online identity attributes in high volumes at affordable costs

Table 4.4 Functions and Roles for Banking Example

Table 4.4 Functions and Roles for Banking Example

Summary Attribute-based access control o Attributes o ABAC logical architecture o ABAC policies Identity, credential, and access management o Identity management o Credential management o Access management o Identity federation Trust frameworks o Traditional identity exchange approach o Open identity trust framework Bank RBAC system Access control principles o Access control context o Access control policies Subjects, objects, and access rights Discretionary access control o Access control model o Protection domains UNIX file access control o Traditional UNIX file access control o Access control lists in UNIX Role-based access control o RBAC reference models