Li Xiong CS573 Data Privacy and Security Access Control.

Slides:



Advertisements
Similar presentations
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
Advertisements

Role-Based Access Control
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Access Control Chapter 3 Part 3 Pages 209 to 227.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
Access Control RBAC Database Activity Monitoring.
Access Control Methodologies
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Access Control Intro, DAC and MAC System Security.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Access Control Dr.Talal Alkharobi.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
ISA 562 Information Security Theory and Practice Role-based Access Control.
Role-Based Access Control Standard
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Protection and Security An overview of basic principles CS5204 – Operating Systems1.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 4 “Access Control”.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Chapter 5 Network Security
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
Li Xiong CS573 Data Privacy and Security Access Control.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Academic Year 2014 Spring Academic Year 2014 Spring.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Database Security Chapter Terms Security – all the processes and mechanisms by which computer-based equipment, information and services are.
Role-Based Access Control
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
SEC835 Identity and Access Management Overview. Tasks of IAM Specify the rules of electronic identity Maintain identity Validate identity Define access.
Morteza Amini; 2nd Semester ; Database Security; Sharif Univ. of Tech. Role-Based Access Control Overview user_sessions (RH) Role Hierarchy session_roles.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
Database System Implementation CSE 507
Identity and Access Management
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 14: System Protection
Access Control Role-based models RBAC
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Chapter 14: Protection.
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
OS Access Control Mauricio Sifontes.
Access Control.
ISA 562 Information Security Theory and Practice
Database Security Chapter 30
Presentation transcript:

Li Xiong CS573 Data Privacy and Security Access Control

What is Access Control? Security Engineering by Ross Anderson, 2001 Its function is to control which principles (persons, processes, machines, …) have access to which resources in the system – which files they can read, which programs they can execute, and how they share data with other principles, and so on. Access control is pervasive OS (unix, windows), databases, Java

Night Club Example Authentication ID Check Access Control Over 18 - allowed in Over 21 - allowed to drink On VIP List - allowed to access VIP area Enforcement Mechanism Walls, Doors, Locks, Bouncers

Access control and other security services Identification and Authentication – establishing and verifying the identity of the user Something you know, such as a password or a personal identification number (PIN). Something you have, such as a smart card or security token. Something you are, such as fingerprint, voice, retina, or iris characteristics. Where you are, for example on or off campus, inside or outside a company firewall Access control determines which subject can access what resources after identification and authentication

Access control and other security services Enforcement mechanisms Auditing – posteriori analysis of all the requests and activities of users in the system Deterrent – users may be discouraged from attempting violations Means to analyze users behavior to detect possible violations

Access control and other security services

Access control Access control mechanisms – low level software functions that can be used to implement a policy Access matrix model Implementation approaches Access control policies – high level guidelines that determine how accesses are controlled Discretionary access control (DAC) Mandatory access control (MAC) Role based access control (RBAC) Attribute based access control (ABAC)

Access Matrix Model A set of subjects S A set of objects O A set of rights R An access control matrix One row for each subject One column for each subject/object Elements are right of subject on an another subject or object

Access matrix

Implementation approaches Access control lists (ACLs) Capabilities Authorization relation or table

Access control lists (ACLs) Each object is associated with an ACL Storing the matrix in columns Modern OS typically take the ACL approach

Capabilities Each subject is associated with a capability list Storing the matrix in rows

Authorization relation Each row, or tuple, specifies one access right of a subject to an object Relational databases typically use it

Access control Access control mechanisms – low level software functions that can be used to implement a policy Access matrix model Implementation approaches Access control policies – high level guidelines that determine how accesses are controlled Discretionary access control (DAC) Mandatory access control (MAC) Role based access control (RBAC)

Discretionary AC Name Access Tom Yes John No Cindy Yes Application Access List Restricts access to objects based solely on the identity of users who are trying to access them No restrictions on information flow Individuals Resources database 1 database 3 database 2

Mandatory AC Governs access based on the classification of subjects and objects Assign a security level to all information – sensitivity of information Assign a security level to each user – security clearance Military and government: Top secret (TS) > secret (S) > confidential (C) > unclassified (U) Access principles Read Down – a subject’s clearance must dominate the security level of the object being read Write Up – a subject’s clearance must be dominated by the security level of the object being written

Mandatory AC (cont) IndividualsResources/Information Database 1 DS Database 3 C Database 2 S Write up Read down TS C S U Information can only flow upwards or within the same class

Role-Based AC Governs the access based on roles Access authorizations on objects are specified for roles Users are given authorizations to adopt roles A user has access to an object based on the roles

Role-Based AC IndividualsRolesResources Role 1 Role 2 Role 3 Database 1 Database 3 Database 2 User’s change frequently, Roles don’t

Role-based Access Control Benefits Authorization management – assigning users to roles and assigning access rights to roles Hierarchical roles – Inheritance of privileges based on hierarchy of roles Least privilege – allow a user to sign on with least privilege required for a particular task Separation of duties – no single user should be given enough privileges Object classes – objects can be grouped based on classifications

RBAC Reference Model (Sandhu ‘96) RBAC0, minimum requirement RBAC1, RBAC0 + role hierarchies RBAC2, RBAC0 + constraints RBAC3, RBAC1 + RBAC2 ModelsHierarchiesConstraints RBAC 0 No RBAC 1 YesNo RBAC 2 NoYes RBAC 3 Yes

user_sessionssession_roles (UA) User Assign- ment (PA) Permission Assignment USERSOBSOPS SESSIONS ROLES PERMISSIONS Core RBAC System

USERS Process Person Intelligent Agent

ROLES Developer Budget Manager Help Desk Representative A role is a job function with some associated semantics regarding responsibility and authority (permissions). Director MTM relation between USERS & PRMS

Permissions SQL A permission is an approval of a particular access to one or more objects Database – Update Insert Append Delete Locks – Open Close Reports – Create View Print Applications - Read Write Execute

UA (user assignment) A user can be assigned to one or more roles Developer USERS set ROLES set Help Desk Rep A role can be assigned to one or more users

PA (permission assignment) A prms can be assigned to one or more roles Admin.DB1 PRMS set ROLES set A role can be assigned to one or more prms User.DB1 View Update Append Create Delete Drop

SESSIONS Each session is a mapping of one user to possibly many roles USER guest user admin invokes SQL DB1.table1 FIN1.report1 APP1.desktop SESSION

user_sessions (RH) Role Hierarchy session_roles (UA) User Assign- ment (PA) Permission Assignment USERSOBSOPS SESSIONS ROLES PERMISSIONS Role Hierarchy RBAC

Tree Hierarchies Production Engineer 1 Quality Engineer 1 Engineering Dept Production Engineer 2 Quality Engineer 2 Production Engineer 1 Project Lead 1 Quality Engineer 1 Director Production Engineer 2 Project Lead 2 Quality Engineer 2

Lattice Hierarchy Production Engineer 1 Quality Engineer 1 Engineering Dept Production Engineer 2 Quality Engineer 2 Project Lead 1 Director Project Lead 2

user_sessions (RH) Role Hierarchy session_roles (UA) User Assign- ment (PA) Permission Assignment USERSOBSOPS SESSIONS ROLES PERMISSIONS SSD DSD Constrained RBAC

Static mutual exclusion constraints Two mutually exclusive roles: cannot both have the same user as members Two mutually exclusive roles: cannot both have the same permissions Two mutually exclusive permissions: one role cannot have both permissions

Cardinality constraints On user-role assignment At most k users can belong to the role At least k users must belong to the role Exactly k users must belong to the role

Dynamic Constraints At most k users can activate the same role in one session No user is allowed to activate n or more roles in one session

Constraints with Role Hierarchies Two roles can be mutually exclusive only if neither one inherits the other If two roles are mutually exclusive, no roles can inherit from both If two roles are mutually exclusive, there can be no “root” or “super users”

Separation of Duty Constraints is a means rather than an end Separation of duty is the goal No single user possesses all the permissions needed to accomplish a sensitive task Permission assignment problem

Attribute based Access Control (ABAC) Access control decisions are made based on a set of characteristics, or attributes, associated with the requestor and/or the resource A requester provides a set of attributes, they are checked against permissible attributes E.g. a person in UltraMegaCorp tries to access an administration interface for customer data in Atlanta must present credentials with a division attribute of “customer relations division” and a title of “senior manager” and a location attribute of “Atlanta” No need for predefined list of roles or permissions

References Access control: principle and practice, Sandhu, 1994 Role-based Access Control Models, Sandhu, 1996

Coming up Hippocratic databases Fine-grained access control Policy management and enforcement