Past, Present and Future

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity, Authority and Trust in an Uncertain World
Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Access Control Prof. Ravi Sandhu Executive Director and Endowed Chair
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Role-Based Access Control (RBAC)
Mandatory Access Control (MAC)
Institute for Cyber Security
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control (ABAC)
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Mandatory Access Control (MAC)
Institute for Cyber Security
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Attribute-Based Access Control: Insights and Challenges
NIST-ANSI RBAC Model Prof. Ravi Sandhu.
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Engineering Authority and Trust in Cyberspace: George Mason University
Assured Information Sharing
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

Past, Present and Future Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu

Security Objectives INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu

Security Objectives USAGE purpose INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu

Security Objectives USAGE purpose USAGE INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu

Butler Lampson Paraphrased (I think) Computer scientists could never have designed the web because they would have tried to make it work. But the Web does “work.” What does it mean for the Web to “work”? Security geeks could never have designed the ATM network because they would have tried to make it secure. But the ATM network is “secure. What does it mean for the ATM network to be “secure”? © Ravi Sandhu

Foundational Security Assumptions Information needs to be protected In motion At rest In use Absolute security is impossible and unnecessary Trying to approximate absolute security is a bad strategy “Good enough” security is feasible and meaningful Better than “good enough” is bad Security is meaningless without application context Cannot know we have “good enough” without this context Models and abstractions are all important Without a conceptual framework it is hard to separate “what needs to be done” from “how we do it” We are not very good at doing any of this © Ravi Sandhu

PEI Models: 3 Layers/5 Layers This lecture is focused on the policy models layer Idealized Enforceable (Approximate) Codeable At the policy layer security models are essentially access control models © Ravi Sandhu 7

THE PAST © Ravi Sandhu

Access Control Models Discretionary Access Control (DAC) Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Same as Lattice-Based Access Control (LBAC) Access based on security labels Labels propagate to copies Role-Based Access Control (RBAC) Access based on roles Can be configured to do DAC or MAC Generalizes to Attribute-Based Access Control (ABAC) Numerous other models but only 3 successes © Ravi Sandhu 9

DAC: ACCESS MATRIX MODEL Objects (and Subjects) F G r w own S u b j e c t s U r r w own V rights © Ravi Sandhu 10

DAC: TROJAN HORSE EXAMPLE ACL File F A:r A:w File G B:r A:w B cannot read file F © Ravi Sandhu 11

DAC: TROJAN HORSE EXAMPLE ACL executes File F A:r A:w read Program Goodies Trojan Horse File G B:r A:w write B can read contents of file F copied to file G © Ravi Sandhu 12

LBAC: LATTICE STRUCTURES Top Secret Secret Confidential Unclassified dominance  can-flow © Ravi Sandhu 13

LBAC: LATTICE STRUCTURES TS, {A,B} Hierarchical Classes with Compartments {B} TS, {A} TS, TS, {} S, {A,B} S, {A} S, {B} S, {} © Ravi Sandhu 14

LBAC: BELL LAPADULA (BLP) SIMPLE-SECURITY Subject S can read object O only if label(S) dominates label(O) STAR-PROPERTY (LIBERAL) Subject S can write object O only if label(O) dominates label(S) STAR-PROPERTY (STRICT) label(O) equals label(S) © Ravi Sandhu 15

Information is leaked unknown to the high user LBAC: COVERT CHANNELS High Trojan Horse Infected Subject High User Information is leaked unknown to the high user COVERT CHANNEL Low Trojan Horse Infected Subject Low User © Ravi Sandhu 16

RBAC: Role-Based Access Control Access is determined by roles A user’s roles are assigned by security administrators A role’s permissions are assigned by security administrators First emerged: mid 1970s First models: mid 1990s Is RBAC MAC or DAC or neither? RBAC can be configured to do MAC RBAC can be configured to do DAC RBAC is policy neutral RBAC is neither MAC nor DAC! © Ravi Sandhu 17

... RBAC: RBAC96 Model ROLE HIERARCHIES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS ROLES PERMISSIONS ... SESSIONS CONSTRAINTS This is a somewhat busy slide It shows a bird’s eye view of RBAC There are many details that need to be debated and filled in Some of these will be discussed in the subsequent panel For our purpose the bird’s eye view will suffice © Ravi Sandhu 18

RBAC: The RBAC Story Standard Adopted Proposed Standard RBAC96 paper © Ravi Sandhu 19

THE PRESENT © Ravi Sandhu

UCON: Usage Control Scope Security Objectives Security Architectures © Ravi Sandhu 21

UCON: Usage Control Model unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes UCON is ABAC on steroids © Ravi Sandhu 22

THE FUTURE © Ravi Sandhu

Application-Centric Security Models Our Basic Premise There can be no security model without application context So how does one customize an application-centric security model? Meaningfully combine the essential insights of DAC, LBAC, RBAC, ABAC, UCON, etcetera Directly address the application-specific trade-offs Within the security objectives of confidentiality, integrity and availability Across security, performance, cost and usability objectives Separate the real-world concerns of practical distributed systems and ensuing staleness and approximations (enforcement layer) from policy concerns in a idealized environment (policy layer) © Ravi Sandhu 24

Dissemination-Centric Sharing Extensive research in the last two decades ORCON, DRM, ERM, XrML, ODRL, etc. Copy/usage control has received major attention Manageability problem largely unaddressed Alice Bob Charlie Eve Susie Attribute + Policy Cloud Object Dissemination Chain with Sticky Policies on Objects Attribute Cloud © Ravi Sandhu 25

Group-Centric Sharing (g-SIS) Brings users & objects together in a group Focuses on manageability using groups Co-exists with dissemination-centric Two metaphors Secure Meeting Room (E.g. Program committee) Subscription Model (E.g. Secure multicast) Operational aspects Group characteristics E.g. Are there any core properties? Group operation semantics E.g. What is authorized by join, add, etc.? Read-only Vs Read-Write Administrative aspects E.g. Who authorizes join, add, etc.? May be application dependant Multiple groups Inter-group relationship Group Authz (u,o,r)? join leave add remove Users Objects © Ravi Sandhu 26

CONCLUSION © Ravi Sandhu

Discretionary Access Control (DAC) Mandatory Access Control (MAC) Conclusion THE PAST Discretionary Access Control (DAC) Mandatory Access Control (MAC) Equivalently Lattice-Based Access Control (LBAC) Role-Based Access Control (RBAC) THE PRESENT Usage Control (UCON) Attribute-Based Access Control (ABAC) on steroids THE FUTURE Application-Centric Access Control Models Technology-Centric Access Control Models Models are all important A Policy Language is not a substitute for a good model Lots of interesting/impactful research to be done at P, E and I layers © Ravi Sandhu 28