31
NIST Standard for Role-Based Access Control Present by Wenyi Ni

NIST Standard for Role-Based Access Control

  • Upload
    glyn

  • View
    90

  • Download
    0

Embed Size (px)

DESCRIPTION

NIST Standard for Role-Based Access Control. Present by Wenyi Ni. The root of RBAC. The use of groups in UNIX and other operating systems Privilege grouping in DBMS Separation of duty concepts RBAC embodies these notions in a single access control model. RBAC includes:. - PowerPoint PPT Presentation

Citation preview

Page 1: NIST Standard for Role-Based Access Control

NIST Standard for Role-Based Access Control

Present by Wenyi Ni

Page 2: NIST Standard for Role-Based Access Control

The root of RBAC The use of groups in UNIX and other

operating systems Privilege grouping in DBMS Separation of duty concepts

RBAC embodies these notions in a single access control model.

Page 3: NIST Standard for Role-Based Access Control

RBAC includes: Roles and role hierarchies Role activation Constraints on user/role membership

and role set activation

Page 4: NIST Standard for Role-Based Access Control

RBAC is organized into two part RBAC reference model RBAC Functional Specification

Page 5: NIST Standard for Role-Based Access Control

RBAC reference model Define a common vocabulary of

terms for in consistently specifying requirements and to set the scope of the RBAC features included in the standard

Page 6: NIST Standard for Role-Based Access Control

RBAC Functional Specification

Define requirements over administrative operations for the creation and maintenance of RBAC element sets and relations

Page 7: NIST Standard for Role-Based Access Control

NIST RBAC model is defined in terms of four model components

Core RBAC Hierarchical RBAC Static separation of duty relations Dynamic Separation of duty

relations

Page 8: NIST Standard for Role-Based Access Control

Core RBAC Define a minimum collection of

RBAC elements, element sets, relations in order to completely achieved a role-based access control system

It includes:1.user-role assignment2.permission-role assignment

Page 9: NIST Standard for Role-Based Access Control

Definitions in core RBAC User: defined as a human being. It

can be extended to include machine, network,intelligent autonomous agent

Role: a job function within the context of an organization with some associated semantics regarding the authority and responsibility

Page 10: NIST Standard for Role-Based Access Control

Definition (continued) Permission: an approval to perform

an operation on one or more RBAC protected objects

Operation: an executable image of a program

Session: a mapping between a user and an activated subset of roles that are assigned to the user

Page 11: NIST Standard for Role-Based Access Control

Core RBAC model element sets and relations

Page 12: NIST Standard for Role-Based Access Control

Hierarchal RBAC It adds relations for supporting role

hierarchies Senior roles acquire the permissions

of their juniors A role’s set of authorized users and

authorized permission Role hierarchy can be 1)tree 2)inverted tree 3)lattice

Page 13: NIST Standard for Role-Based Access Control

Role hierarchy Tree

Page 14: NIST Standard for Role-Based Access Control

Role hierarchy inverted tree

Page 15: NIST Standard for Role-Based Access Control

Role hierarchy lattice

Page 16: NIST Standard for Role-Based Access Control

Example: accounting roles

Page 17: NIST Standard for Role-Based Access Control

Separation of duty relations

It is used to enforce conflict of interest policies that organizations may employ to prevent users from exceeding a reasonable level of authority for their position

Page 18: NIST Standard for Role-Based Access Control

Static Separation of Duty Relations Enforce constraints on the

assignment of users to roles Place restrictions on sets of roles. If

a user is assigned to one role, the user is prohibited from being a member of a second role.

Page 19: NIST Standard for Role-Based Access Control

Because of the conflict of role ‘billing’ and ‘Cashier’ , Frank is prohibited to be assigned both of them

Page 20: NIST Standard for Role-Based Access Control

Dynamic Separation of Duty Relations Place constraints on the roles that

can be activated within or across a users sessions.

It supports each user has different levels of permission at different time.

It is often referred as timely revocation of trust

Page 21: NIST Standard for Role-Based Access Control

Categories of functions in RBAC Used to meet the requirements for

each of the components1.Administrative Functions2.Supporting System Functions3.Review Functions

Page 22: NIST Standard for Role-Based Access Control

Administrative Functions in core RBAC Create and maintain element

sets(users,roles,OPS,OBS)1.AddUser, DeleteUser2.AddRole, DeleteRole3.AssignUser, DeassignUser4.GrantPermission, revokePermission

Page 23: NIST Standard for Role-Based Access Control

Supporting System Function in Core RBAC Session management and make

access control decisions1.CreateSession2.AddActiveRole, DropActiveRole3.CheckAccess

Page 24: NIST Standard for Role-Based Access Control

Review Function in Core RBAC View the contents of user-to-role

and permission-to-role assignment.1.AssignedRoles2.RolePermissions3.UserPermissions4.SessionPermisssions5.RoleOperationsOnObjects6.UserOperationsOnObjects

Page 25: NIST Standard for Role-Based Access Control

Administrative Function in Hierarchical RBAC Create and maintain the partial

order relation among roles1.AddInheritance, DeleteInheritance2.AddAscendant, AddDescendant

Page 26: NIST Standard for Role-Based Access Control

Supporting System Functions in Hierarchical RBAC

Same function as for Core RBAC, some function need to be redefined because of the role hierarchy.

Such as: createSession, addActiveRole.

Page 27: NIST Standard for Role-Based Access Control

Review Functions in Hierarchical RBAC All review functions specified for

Core RBAC is valid here Add the review functions to inherited

roles.1.AuthorizedUsers2.AuthorizedRoles

Page 28: NIST Standard for Role-Based Access Control

Functions in SSDAdministrative:1CreatSSDSet,DeleteSSDSet2AddSSDRoleMember, DeleteSSDRolemember3.SetSSDRoleMember4.SetSSDCardinalitySupporting System: same as those for core RBACReview:1.SSDRoleSets2.SSDRoleSetRoles3.SSDRoleSetCardinality

Page 29: NIST Standard for Role-Based Access Control

Functions in DSDAdministrative1.CreateDSDSet, DeleteDSDSet2.AddDSDRoleMember,DeleteDSDRoleMember3.SetDSDCardinalitySuport System:1.CreateSession2.AddActiveRole3.DropActiveRole Review:1.DSDRoleSets2.DSDRoleSetRoles3.DSDRoleSetCardinality

Page 30: NIST Standard for Role-Based Access Control

Conclusion RBAC is used to simplify security

policy administration RBAC is an open-ended

technology,which ranges from very simple to fairly sophisticated.

RBAC continues to be an evolving technology.

Page 31: NIST Standard for Role-Based Access Control

End Reference:http://csrc.nist.gov/rbac/rbacSTD-ACM.

pdf