31
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

Embed Size (px)

Citation preview

Page 1: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

ACCESS CONTROL: THE NEGLECTED FRONTIER

Ravi Sandhu

George Mason University

Page 2: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

2© Ravi Sandhu

SECURITY OBJECTIVES

INTEGRITYless studied

AVAILABILITYleast studied

CONFIDENTIALITYmost studied

USAGEnewest

Page 3: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

3© Ravi Sandhu

SECURITY TECHNOLOGIES

Access Control Cryptography Audit and Intrusion Detection Authentication Assurance Risk Analysis .......................

Page 4: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

4© Ravi Sandhu

CRYPTOGRAPHY LIMITATIONS

Cryptography cannot protect confidentiality and integrity of data, keys, software

in end systems Prevent or detect use of covert

channels

Page 5: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

5© Ravi Sandhu

AUDIT AND INTRUSION DETECTION LIMITATIONS

Intrusion detection cannot by itself protect audit data and audit collection

and analysis software prevent security breaches protect against covert channels

Page 6: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

6© Ravi Sandhu

ACCESS CONTROL LIMITATIONS

Access control cannot by itself protect data in transit or storage on an

insecure medium safeguard against misuse by authorized

users protect against covert channels

Page 7: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

7© Ravi Sandhu

AUTHENTICATION LIMITATIONS

By itself authentication does very little but what it does is critical

pre-requisite for effective cryptography access control intrusion detection

Page 8: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

8© Ravi Sandhu

A MIX OF MUTUALLY SUPPORTIVE TECHNOLOGIES

AUTHENTICATION

INTRUSIONDETECTION

CRYPTOGRAPHYACCESS

CONTROL

ASSURANCERISK

ANALYSIS

SECURITY ENGINEERING& MANAGEMENT

Page 9: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

9© Ravi Sandhu

CLASSICAL ACCESS CONTROL DOCTRINE

Lattice-based mandatory access control (MAC) strong too strong not strong enough

Owner-based discretionary access control (DAC) too weak too confused

Page 10: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

10© Ravi Sandhu

ISSUES IN LATTICE-BASED MAC

MAC enforces one-directional information flow in a lattice of security labels

can be used for aspects of confidentiality integrity aggregation (Chinese Walls)

Page 11: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

11© Ravi Sandhu

PROBLEMS WITH LATTICE-BASED MAC

does not protect against covert channels and inference not strong enough

inappropriate too strong

Page 12: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

12© Ravi Sandhu

ISSUES IN OWNER-BASED DAC

negative “rights” inheritance of rights

interaction between positive and negative rights

grant flag delegation of identity temporal and conditional

authorization

Page 13: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

13© Ravi Sandhu

PROBLEMS WITH OWNER-BASED DAC

does not control information flow too weak

inappropriate in many situations too weak too confused

Page 14: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

14© Ravi Sandhu

BEYOND OWNER-BASED DAC

separation between ability to use a right to grant a right

non-discretionary elements user who can use a right should not be

able to grant it and vice versa

Page 15: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

15© Ravi Sandhu

NON-DISCRETIONARY (BEYOND LATTICE-BASED MAC)

control of administrative scope rights that can be granted to whom rights can be granted

rights that cannot be simultaneously granted to same user

rights that cannot be granted to too many users

Page 16: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

16© Ravi Sandhu

WHAT IS THE POLICY IN NON-DISCRETIONARY ACCESS CONTROL?

Non-discretionary access control is a means to articulate policy

does not incorporate policy but does support security principles least privilege abstract operations separation of duties

Page 17: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

17© Ravi Sandhu

ISSUES IN NON-DISCRETIONARY ACCESS CONTROL

models for non-discretionary propagation of access rights

role-based access control (RBAC) task-based authorization (TBA)

Page 18: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

18© Ravi Sandhu

HRU, 1976 TAKE-GRANT, 1976-82 SPM/ESPM, 1985-92 TAM/ATAM, 1992 onwards

NON-DISCRETIONARY PROPAGATION MODELS

Page 19: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

19© Ravi Sandhu

NON-DISCRETIONARY PROPAGATION MODELS

type-based non-discretionary controls

rights that authorize propagation can be separate or closely related to right being propagated

testing for absence of rights is essential for dynamic separation policies

Page 20: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

20© Ravi Sandhu

ROLE-BASED ACCESS CONTROL: RBAC0

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

Page 21: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

21© Ravi Sandhu

ROLE-BASED ACCESS CONTROL: RBAC1

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

Page 22: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

22© Ravi Sandhu

HIERARCHICAL ROLES

Health-Care Provider

Physician

Primary-CarePhysician

SpecialistPhysician

Page 23: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

23© Ravi Sandhu

HIERARCHICAL ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

Page 24: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

24© Ravi Sandhu

ROLE-BASED ACCESS CONTROL: RBAC3

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 25: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

25© Ravi Sandhu

RBAC MANAGEMENT

ROLES

USERS

PERMISSIONS

...

ADMINROLES

ADMINPERMISSIONS

CAN-MANAGE

Page 26: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

26© Ravi Sandhu

RBAC MANAGEMENT

S

T1 T2

S3

T4 T5

P3

P

ADMINISTRATIVEROLE HIERARCHY

CSO

SO1 SO2 SO3

ROLE HIERARCHY

Page 27: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

27© Ravi Sandhu

ROLES AND LATTICES

RBAC can enforce classical lattice-based MAC

H

L

HR

LR

LW

HW

LATTICE ROLES

Page 28: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

28© Ravi Sandhu

ROLES AND LATTICES

RBAC can accommodate variations of classical lattice-based MACH

L

HR

LR

LW HW

LATTICE ROLES

Page 29: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

29© Ravi Sandhu

TASK-BASED AUTHORIZATION (TBA)

beyond subjects and objects authorization is in context of some

task transient use-once permissions

instead of long-lived use-many-times permissions

Page 30: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

30© Ravi Sandhu

TRANSACTION CONTROL EXPRESSIONS (TCEs)

TCEs are an example of TBA prepare clerk;

approve supervisor;

issue clerk;

Page 31: ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University

31© Ravi Sandhu

CONCLUSION

access control is important there are many open issues