Role-Based Access Control CS461/ECE422 Fall 2011.

Slides:



Advertisements
Similar presentations
RBAC Role-Based Access Control
Advertisements

ROWLBAC – Representing Role Based Access Control in OWL
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
A THREE TIER ARCHITECTURE FOR ROLE-BASED ACCESS CONTROL Ravi Sandhu and Hal Feinstein Seta Corporation McLean, VA Ongoing NIST-funded project Other Project.
© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
Role-Based Access Control
Access Control CS461/ECE422 Fall Reading Material Chapter 4 through section 4.5 Chapters 23 and 24 – For the access control aspects of Unix and.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
ROLE BASED ACCESS CONTROL
Proposal for Fast-Tracking NIST Role-Based Access Control Standard David Ferraiolo Rick Kuhn National Institute of Standards and Technology Gathersburg,
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Access Control RBAC Database Activity Monitoring.
Module 4: Implementing User, Group, and Computer Accounts
On Comparing the Expressing Power of Access Control Model Frameworks Workshop on Logical Foundations of an Adaptive Security Infrastructure (WOLFASI) A.
Security Leadership Essentials – Defense-in-Depth – © 2006 SANS Role-Based Access Control (RBAC) Approach for Defense-in-Depth Peter Leight and Richard.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Fall 2010/Lecture 301 CS 426 (Fall 2010) Role Based Access Control.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Role-Based Access Control Standard
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Presented By: Matthew Garrison. Basics of Role Based Access Control  Roles are determined based on job functions within a given organization  Users.
Li Xiong CS573 Data Privacy and Security Access Control.
Designing Active Directory for Security
CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models Bernard Stepien, University of Ottawa Hemanth Khambhammettu Kamel.
Role-Based Access Control Richard Newman (c) 2012 R. Newman.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Modeling Dynamic Role- based Access Constraints using UML Khaled Alghathbar George Mason University, USA and King Saud University, Riyadh, Saudi Arabia.
An Investigation on Testing RBAC Constraints Presented by Jiao Chen 04/29/2003.
Module 7 Active Directory and Account Management.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
NIST Standard for Role- Based Access Control Present by Wenyi Ni.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
Li Xiong CS573 Data Privacy and Security Access Control.
Software Security II Karl Lieberherr. What is Security Enforcing a policy that describes rules for accessing resources. Policy may be explicit or implicit.
FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Academic Year 2014 Spring Academic Year 2014 Spring.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Chapter Six Working with NDS Security. Chapter Objectives Describe NDS security and list the object and property rights Identify the NDS security needs.
Introduction to Active Directory
Computer Security: Principles and Practice
Access Control.
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Morteza Amini; 2nd Semester ; Database Security; Sharif Univ. of Tech. Role-Based Access Control Overview user_sessions (RH) Role Hierarchy session_roles.
CMGT 430 OUTLET Teaching Effectively/ FOR MORE CLASSES VISIT
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
Presented By: Smriti Bhatt
CSCE 522 Access Control.
Role-Based Access Control (RBAC)
Information Security CS 526
Overview of Active Directory Domain Services
Access Control Role-based models RBAC
Role-Based Access Control (RBAC)
Examining a Windows NT Infrastructure (2)
Role-Based Access Control Richard Newman (c) 2012 R. Newman
Role Based Access Control
NIST Standard for Role-Based Access Control
Presentation transcript:

Role-Based Access Control CS461/ECE422 Fall 2011

Reading Material Chapter 4, sections 4.5 and 4.6 [SFK00]

DAC vs RBAC DAC – Users, Groups  Permissions RBAC – Roles  Permissions – Users  Roles – Many-to-many relations Difference between groups and roles? – Groups: collection of users – Roles: collection of permissions and/or users, and possibly other roles [S96] job function within an organization [text]

Basic RBAC Illustrated Role 1 Role 2 Role 3 UsersRoles Permissions (Objects) Relations: User Assignment (UA) Permission Assignment (PA)

Access Matrix Representation (Users, Roles) (Roles, Objects) - Similar to DAC ACM - Roles can be Objects

RBAC Reference Models [SCFY96] RBAC 0 – Minimum functionality RBAC 1 – RBAC 0 + Role hierarchies RBAC 2 – RBAC 0 + Constraints RBAC 3 – RBAC 0 + RBAC 1 + RBAC 2

RBAC 0 – Base Users: individuals with access to the system Role: named job function within the org Permission: approval of a particular mode of access to objects Session: mapping between a user and a subset of roles

RBAC 1 – Role Hierarchies Reflect hierarchical structure of roles in org Mathematically, partial order (reflexive, transitive, anti-symmetric) Example of Role HierarchyLimiting the scope of inheritance: Role Hierarchy with private roles

RBAC 2 – Constraints Reflect higher-level organizational policy Mutually exclusive roles (U  R and R  P) Cardinality – maximum number with respect to role Prerequisite – can assign role only if already assigned prerequisite role – Remember, no hierarchies in RBAC 2

RBAC 3 – Consolidated Model

NIST RBAC Model [SFK00] RBAC System and Administrative Functional Specification Three categories of features/functions: – Administrative functions: create, delete, maintain RBAC elements and relations – Supporting system functions: session management, access control decisions – Review functions: query operations on RBAC elements and relations Four components: Core RBAC, Hierarchical RBAC, Static and Dynamic Separation of Duty (SSD, DSD)

Core RBAC Same as RBAC 0 (users, roles, permissions, sessions) – Object: any resource – Operation: executable image of a program – Permission: approval to perform an operation on object(s) Administrative functions: add/delete users and roles, create/delete user- to-role and permission-to-role assignments Supporting system functions: session  create, add/delete role, check permission Review functions: enable admin. to view entire model

Hierarchical RBAC Similar to RBAC 1 r 1 is a descendant of r 2 if: – r 1 includes all permissions from r 2 – All users assigned to r 1 are also assigned to r 2 General role hierarchies – Arbitrary partial order, multiple inheritance Limited role hierarchies – Tree structure, single descendant allowed Administrative functions: add/delete immediate inheritance relationship, create new role and add it as ascendant or descendant Review functions: enable admin. to view users/permissions directly or by inheritance.

Static Separation of Duty (SSD) Prevents conflict of interest Cardinality constraint on a set of roles – SSD := (role set, n) where no user is assigned to n or more roles from the role set Mutual exclusive roles as a special case: – SSD := ({r 1, r 2 }, 2) Administrative functions: create/delete role sets, add/delete role members Review functions: view properties of SSD sets

Dynamic Separation of Duty (DSD) Similar to SSD, but activated within sessions Typically for temporal conflicts of interest Definition – DSD := (role set, n) (n≥2) no user session may activate ≥n roles from role set Example: Author and PC member (conference) Administrative and review functions: similar to SSD

Unspecified by NIST RBAC Scalability Authentication Negative permissions Nature of permissions Discretionary role activation Role engineering Constraints RBAC administration Role revocation

NIST Model Revisited

Role Engineering (RE) Definition of roles can be difficult; essentially a requirements engineering process RE is required to implement an abstract model Basic process [C96] Role prediction [Z+11] – Use statistical models to analyze audit logs – Predict roles, detect anomalies – Refine roles (generalize or split) collect activities group into clusters group into clusters name clusters name clusters describe remove duplicates identify minimal set of permissions simulate activities role candidates

Case Study: RBAC for a Bank [SMJ01] Prior to 1990 used local access control files – manually administered for each user, application, and host  administrative overhead, error-prone Implemented RBAC scheme (Authorization) Applications no longer make AC decisions; query Authorization for a security profile instead Role := (official position, job function) – (different from NIST RBAC)

Architecture Authorization

Role Administration

Numbers 65 official positions, 368 job functions 50,659 employees 1300 roles (potentially 23,920) – Agrees with estimate – #roles is 3-4% of #users 42,000 security profiles distributed daily

Key Points Roles are collections of permissions, users, and possibly other roles (many-to-many) Role hierarchies simplify RBAC management and can be derived from org structure Constraints prevent conflict of interest RBAC implementations simplify access control but may require role engineering

References [SCFY96] Sandhu, R., et al. “Role-Based Access Control Models.” Computer, 1994.Role-Based Access Control Models [S96] Sandhu, R. Roles versus groups. In Proceedings of the first ACM Workshop on Role-based access control (RBAC '95)Roles versus groups. [SFK00] Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control: Toward a Unified Standard". 5th ACM Workshop Role-Based Access Control (RBAC ‘00)"The NIST Model for Role Based Access Control: Toward a Unified Standard" [C96] Coyne, E. Role engineering. In Proceedings of the first ACM Workshop on Role-based access control (RBAC '95)Role engineering [Z+11] Role Prediction using Electronic Medical Record System Audits Wen Zhang, Carl A. Gunter, David Liebovitz, Jian Tian, and Bradley Malin AMIA 2011 Annual Symposium, Washington, DC, October 2011Role Prediction using Electronic Medical Record System Audits [SMJ01] Andreas Schaad, Jonathan Moffett, and Jeremy Jacob The role- based access control system of a European bank: a case study and discussion. In Proceedings of the sixth ACM symposium on Access control models and technologies (SACMAT '01)The role- based access control system of a European bank: a case study and discussion