Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.

Slides:



Advertisements
Similar presentations
Protection Goals of Protection Domain of Protection Access Matrix
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 6 User Protections in OS. csci5233 computer security & integrity (Chap. 6) 2 Outline User-level protections 1.Memory protection 2.Control of access.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Bilkent University Department of Computer Engineering
Reasons for Protection n Prevent users from accessing information they shouldn’t have access to. n Ensure that each program component uses system resources.
19: Protection1 PROTECTION Protection is the mechanism for controlling access to computer resources. Security concerns the physical integrity of the system.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 14: Protection.
SE571 Security in Computing
Lecture 7 Access Control
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Protection.
Page 19/4/2015 CSE 30341: Operating Systems Principles Raid storage  Raid – 0: Striping  Good I/O performance if spread across disks (equivalent to n.
Protection.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 AE4B33OSS Chapter 14: Protection Goals of Protection Principles of Protection Domain.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Cosc 4740 Chapter 13: Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique.
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Discretionary Access Control Models Adith Srinivasan.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Goals of Protection Operating system consists of a collection.
Computer Security: Principles and Practice
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
CSS430 Protection1 Textbook Ch14 These slides were compiled from the OSC textbook slides (Silberschatz, Galvin, and Gagne) and the instructor’s class materials.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CSE Operating System Principles Protection.
ACCESS MATRIX IMPLEMENTATION AND COMPARISON By: Rushabh Dharwadkar Roll no: TE COMP.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
Saurav Karmakar. Chapter 14: Protection  Goals of Protection  Principles of Protection  Domain of Protection  Access Matrix  Implementation of Access.
Access Control Model SAM-5.
PROTECTION.
Protection and Security
Operating Systems Protection Alok Kumar Jagadev.
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Chapter 14: Protection.
Chapter 14: Protection Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Chapter 14: Protection.
Chapter 14: Protection.
Operating Systems Security
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
SECURITY IN THE LINUX OPERATING SYSTEM
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Presentation transcript:

Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls

Outline Access Control Definitions Implementing Access Control

Access control definitions AC: Limiting who can access what AC Subjects: human users or programs AC Objects: files, tables, programs, memory objects, hardware devices, strings, data fields, network connections, etc. Access modes: controllable actions Access policies: higher-level security policy that drives the AC

Effective policy implementation Check every access Enforce least privilege Verify acceptable usage Subject should have access to the smallest amount of objects Check activities Limited privilege: don’t let users do something catastrophic

Tracking Access logs Granularity Audit logs System files How much is too much? Access log: records of accesses that can be used if system fails, misuse of objects, external compromise, timestamps are important (temporal and spatial data) Granularity: fitness or specificity of access control, every bit, file, dir, etc. Access log for mac: https://discussions.apple.com/thread/3722797

Outline Access Control Definitions Implementing Access Control

Implementation of ACs Reference monitor AC Directory AC matrix AC list (ACL) AC is often performed in the OS

Reference monitor AC that is always invoked, tamperproof, and verifiable Validates every access attempt Immune from tampering Assuredly correct How do we prove all these points? RM is a notion not a tool, it can be part of an application monitoring mechanism

AC Directory Each file has a unique owner who possesses control access rights One list of access controls per user Not very well scalable: one entry for each file for each user even if they do not plan to use the file How do we change access for file Bibliog for all users? How about rights propagation? Does it affect access revocation? Needs to search through all directories Pseudonyms for files: different names for files, difficult to change with AC, can lead to different permissions for the same file! Security hole! S knows F with the name Q but A knows it by name F, when A wants to revoke rights from F, it may not accomplish it since the name for S has changed. Multiple permissions that are not consistent.

Access Control Matrix Row = subject Column = object RWX: rights O: stands for own Sparse matrix – is that a waste of space?

Access Control Lists One ACL/object A directory created for each subject, Privilege list or directory: a row of the access matrix User, group, others == compartment == untrusted object, confined (u, g, w) = (user, group, world) Specific access right gets precedence over wildcard Domain: collection of objects to which a process has access When a process calls a sub-procedure and passes certain objects the OS forms a stack of all the capabilities of the procedure. Capabilities must be stored in memory, inaccessible to normal users

Linux & ACLs U,G, W = world Specific access right would take precedence over wildcard right Where/how can you find ACLs? Why are they better than ACDs?

Other AC types Procedure-Oriented: what procedures can do to the object Role-based: based on a person or group responsibilities Domain: collection of objects to which a process has access When a process calls a sub-procedure and passes certain objects the OS forms a stack of all the capabilities of the procedure. Capabilities must be stored in memory, inaccessible to normal users Procedure: forms a capsule around the object permitting only certain, specified accesses. Information hiding

Sources Linux File Permissions and Ownership Explained with Examples: https://linuxhandbook.com/linux-file-permissions/