Download presentation
Presentation is loading. Please wait.
Published byMercy Johns Modified over 8 years ago
1
XACML Showcase RSA Conference 2012
2
What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n Ability to use any available information n Superset of Permissions, ACLs, RBAC, etc n Scales from PDA to Internet n Federated policy administration n OASIS and ITU-T Standard
3
Trends Driving Fine-Grained Access Control n Complex authorization scenarios l Multiple attributes and attribute sources required for evaluation n De-perimeterization l A firewall is no longer sufficient security n Service Oriented Architecture l Multiple access contexts for each service n Software as a Service (looking forward) l Complex interactions of internal and external components
4
Powerful Policy Expression n “Anyone can use web servers with the ‘spare’ property between 12:00 AM and 4:00 AM” n “Salespeople can create orders, but if the total cost is greater that $1M, a supervisor must approve” n “Anyone view their own 401K information, but nobody else’s” n “The print formatting service can access printers and temporary storage on behalf of any user with the print attribute” n “The primary physician can have any of her patients’ medical records sent to a specialist in the same practice.”
5
Key XACML Features n Federated Policy Administration l Multiple policies applicable to same situation l Combining rules to resolve conflicts n Decision may include Obligations l In addition to Permit or Deny l Obligation can specify present or future action l Examples: Log request, require human approval, delete data after 30 days n Protect any resource l Web Server, Java or C++ Object, Room in building, Network Access, Web Service, Geographic Data, Health Records, etc.
6
XACML Benefits n Standard Policy Language l Investment protection l Skills reuse n Leverage XML tools n Policy not in application code l Reduce cost of changes l Consistent application l Enable audit
7
XACML Architecture PDP Decision Application Administration Policy Repository PEP Enforcement Client Authorities Attribute Repositories PDP Resources
8
XACML 3.0 New Features n Administration/Delegation Profile n Request context generalization n New Combining Algorithms n Generalized Multiple Decision Requests n Advice (non-binding Obligations) n New time and Xpath functions
9
European Identity Award 2011 XACML 3.0
10
XACML Showcase - RSA 2012 n Demonstrating policies that govern access to Intellectual Property n Metadata carried in documents n Based on draft Intellectual Property Control Profile n Documents served from different server types
11
Showcase Participants
12
Intellectual Property Control Profile n Policy-based access control to IP resources, such as proprietary, patent, and copyright information. n Standardized attribute name and value pairs promote more granular authorization model. n The potential loss of IP is not only an existential threat to companies, but also a security threat to nation states. (continued)
13
Intellectual Property Control Profile l Subject Attributes n Organizational Affiliation n Organization Type n Organizational Relationship n Affiliation-Type n Agreement-Id (continued)
14
Intellectual Property Control Profile l Resource Attributes n Copyright, Patent, Proprietary, Public Domain, Trademark n IP Owner, IP Designee, Agreement Type, Agreement Id, Effective Date, Expiration Date l Obligations n Encrypt, Marking n (not part of showcase)
15
What is Boeing C IPHER ? n Windows based application designed to examine electronic documents for: l 1. Information that is hidden from view and l 2. User defined key word phrases n The software is used extensively within Boeing, the U.S. Military and Fortune 500 companies to support: l Trusted Download - supports searching for key words and embedded objects to determine category l Export Compliance - supports searching for program specific key words and identifies hidden or obscured information to determine exportability l Information / Software Release processes - supports searching for categorization phrases to determine release-ability l Document Categorization - supports searching for key phrases to identify intellectual property, PII, and unique technologies l Metadata (“tagging”) – supports tagging of documents with metadata based on key words or patterns. l Computer Forensics - supports identification of embedded objects, code (malware) to determine threat level
16
C IPHER Document Categorization Use Case 1.Key word phrases are defined using C IPHER and stored for future use. 4.Based on which key phrases are located and their confidence factors, C IPHER assigns metadata attributes to the document and writes them in the document properties. 2.File(s) to be analyzed are dragged and dropped on the C IPHER application. 3.C IPHER opens the file in its native application and analyzes the file for previously defined key word phrases. The analysis results are documented in a log. 5.When multiple documents are analyzed, a results Excel workbook is created detailing the results of all of the documents.. 6. The file(s) is/are optionally saved.
17
Showcase Configurations PDP Policy Repository Decision Administration PEP Enforcement Client Attribute Repositories Authorities Document Server Documents Attributes
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.