Access control and policy configuration, tools for security administration. Norman Wu, Ziwei Hu

Similar documents
Jeffrey Friedberg. Chief Trust Architect Microsoft Corporation. July 12, 2010 Microsoft Corporation

Named Data Networking

Intro to Linux & Command Line

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Access control models and policies

Access control models and policies

Access control models and policies. Tuomas Aura T Information security technology

OX App Suite Product Highlights. New and updated features & functions May, 2017

Role-Based Access Control (RBAC) Lab Minix Version

The Rock, Paper, Scissors of Autodesk Vault Security

OM22: Exploring Office 365 & Sharepoint: A Hands-on Immersion Experience Presented by Ruth Halpern

Introduction to Security in Laserfiche 8.3 and later. White Paper

Psychology 282 Lecture #21 Outline Categorical IVs in MLR: Effects Coding and Contrast Coding

The Corticon Rule Modeling Methodology. A Case Study. Mortgage Approval

Customer Interconnection Tool (CIT)

Mobile Phone Examiner Plus 5.8 Release Notes

Architectures in Context

CPSC 340: Machine Learning and Data Mining. Multi-Dimensional Scaling Fall 2017

AUDIENCE PARTICIPATION PORTION OF PROGRAM

Human-Computer Interaction Design

Detecting and Resolving Policy Misconfigurations in Access-Control Systems

SCALING LIKE TWITTER WITH APACHE MESOS

Usable Privacy and Security, Fall 2011 Nov. 10, 2011

The instructions here- in outline the process(es) for grading group wikis.

Data Discovery - Introduction

What s New in Laserfiche 10

Newsletter Popup v3.x Configuration for Magento 2

TRAINING GUIDE. Tablet: Cradle to Mobile Configuration and Setup

Adding Groups to Groups

XMLmind XML Editor - Using Google Drive as an XML Document Repository

Managing Group Policy application and infrastructure

Usability in Multimedia. By Pınar Koçer Aydın and Özgür Bayram

Part I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL

Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0

The Project Plan Checklist

CS 5614: Transaction Processing 121. Transaction = Unit of Work Recall ACID Properties (from Module 1)

Manifest Safety and Security. Robert Harper Carnegie Mellon University

What s New in Pentana v5.0

Requirements Validation and Negotiation

Information Visualization In Practice

Cloud Computing. Contents. Vince DiNoto.

NTFS File and Folder Permissions. Windows Server Ins and Outs of NTFS permissions in Windows Server 2012.

Module 4: Access Control

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation

OX App Suite 7.10 Highlights

IVOA/AstroGrid SSO system and Grid standards

Investigation of System Timing Concerns in Embedded Systems: Tool-based Analysis of AADL Models

CSE 486/586: Distributed Systems

Rodale. Upper East Side

PISA 2018 COMPUTER-BASED SCHOOL QUESTIONNAIRE: PRINCIPAL S MANUAL

Lab 2: Introduction to mydaq and LabView

41 X : ] [ : 100 : ] III IV V. [ Turn over

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Web Design I. CE Spring 2013 Continuing Education [Pick the date][type the sender company name]

PREDICTIONS TO EASE USERS EFFORT IN SCALABLE SHARING. Jacob William Bartel. Chapel Hill 2015

NaviCloud Sphere. Role Based Access Control (RBAC) Introductory Tutorial. A Time Warner Cable Company. March 17, 2011

CSE 160: Introduction to Parallel Computation

Note-Taking Guide. ü To get the most out of this course you will need three things:

Course: Google Drive Episode: Introduction. Note-Taking Guide

Towards Open Innovation with Open Data Service Platform

INSE 6130 Operating System Security

Configuring IP Multicast Routing

HPE Enterprise Maps Security. HPE Software, Cloud and Automation

Ecommerce UX Nielsen Norman Group. Lecture notes

T p o p T e T chn h o n l o o l g o i g e i s & T r T end n s Roy Tennant

User Interface 4 Fundamentals

Content 27 September Link Status Searching by the status of a page to return Live (published), Pending (unpublished), Mobile of Offline content.

P1L5 Access Control. Controlling Accesses to Resources

EECS 470. Branches: Address prediction and recovery (And interrupt recovery too.) Lecture 7 Winter 2018

Compiler Design Prof. Y. N. Srikant Department of Computer Science and Automation Indian Institute of Science, Bangalore

Team : Let s Do This CS147 Assignment 7 (Low-fi Prototype) Report

Access Control Part 1 CCM 4350

COMPUTERIZED OFFICE SUPPORT PROGRAM

Attention Tool - Survey Module

MICROSOFT ONLINE (ONEDRIVE) VS G SUITE (GOOGLE DRIVE)

CISNTWK-11. Microsoft Network Server. Chapter 4

Lecture 16 of 41. Transparency, Painter s Algorithm, & Z-Buffer Lab 3a: Shading & Transparency

ORACLE UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

Cisco TrustSec How-To Guide: Monitor Mode

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

User-Driven Usability Assessment of Internet Maps

Google Hangout Lin Zhong

A Framework to Maintain Data Relevance in a Data Lake. Tejas Dharamsi, Satyanarayana Srinivas Sadiur Rahman, Rupam Rai

CS 1653: Applied Cryptography and Network Security Fall Term Project, Phase 2

Windows Server 2008 Active Directory Resource Kit

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series

Two phase commit protocol. Two phase commit protocol. Recall: Linearizability (Strong Consistency) Consensus

Google docs as a collaborating tool for academicians

A Security Model for Multi-User File System Search. in Multi-User Environments

WHITE PAPER. Visibility from Your Network into the Cloud: Today s New Essentials

Managing Group Policy application and infrastructure

Dropbox. Table of Contents

ANDROID APPS (NOW WITH JELLY BEANS!) Jordan Jozwiak November 11, 2012

COS 116 The Computational Universe Laboratory 9: Internet Structure and Congestion Control

Renewal Registration & CPE for CPAs in Iowa

Transformation Hierarchies. CS 4620 Lecture 5

Configuring IP Multicast Routing

Course 10972B: Administering the Web Server (IIS) Role of Windows Server

Lecture 15 Pipelining & ILP Instructor: Prof. Falsafi

ACCESS CONTROL IN A SOCIAL NETWORKING ENVIRONMENT

Transcription:

Access control and policy configuration, tools for security administration Norman Wu, Ziwei Hu

Outline Access control introduction Demos of different access control systems A quick look at papers Other aspects of AC beyond required reading Usability problems of access control Class discussion on conflict AC rules

Introduction

Access control definition Access control is the selective restriction of access to resource. [1] Its function is to control which principals (persons, processes, machines,...) have access to which resources in the system which programs they can execute, how they share data with other principals, and so on.[2]

Common access control mechanisms

Scenarios & Demo Physical Access Control File System Access Control Photo Sharing File Sharing

Physical Access Control

Windows: File System Access Control

Facebook: Photo Sharing

Google Doc: File Sharing

A naive access control system PC data access control system based mobile phone, 2011

Typical Mechanisms Access groups and roles Access control list

Access groups Role-Based Access Control (RBAC) Information will be repeatedly shared with that particular group Group membership information is normally visible to all members of an organization Lack of transparency

Access Control List Store the access control matrix a column at a time, along with the resource to which the column refers. ACLs are suited to environments where protection is data-oriented ACLs are less suited where the user population is large and constantly changing

Papers Some of the slides in this section are stolen from Prof. Lorrie, Lujo and Reb s paper and lecture slides.

Policy configuration on Grey

How the policy in grey works

How the policy in grey works

How to make configuration correct Setting up policies takes effort Incorrectly set up policies can allow or deny access How to help user easily set up correct policies

How to make configuration correct Mechanism involves two steps: 1. Identifying intended policy and misconfigurations in the implemented policy 2. Resolving misconfigurations by augmenting the implemented policy Misconfiguration refers to authority that is intended to exist but has not been given

Tools for security administration 2nd worst Windows UI of all time Rob Reeder Sr. Research Scientist, Google

Example: Jana Scenario: You are a TA in a Music Department and have to maintain the department file server Task: Jana, a Theory 101 TA, complained that when she tried to change the Four-part Harmony handout to update the assignment, she was denied access. Set permissions so that can the file in the folder.

Jana setup Jana is a TA this year (did the study in 2007) Is in the group Theory 101 TAs 2007 Jana was a TA last year Is in the group Theory 101 TAs 2006 2007 TAs are allowed READ & WRITE 2006 TAs are denied READ & WRITE Since Jana is in both groups, she is denied access

Learn Jana s effective permissions

Learn Jana s group membership

Learn Jana s group membership

Change Jana s groups permission

Check Jana s permission

Solution: Expandable grid

Solution: Expandable grid

Result: Grid vs Windows

Study result: conflict resolution But... The grid changed conflict-resolution method to recency-takes-precedence Were the effects of original study due to the new visualization idea, the new conflict resolution method, or both? Ran another study to find out More than Skin Deep

Semantics Study Laboratory study 3 conditions: Expandable Grid with specificity semantics Expandable Grid with Windows semantics Native Windows file permissions interface 54 participants, 18 per condition, novice policy authors;10 minutes training for all conditions; 12 tasks

Semantics study: result 1. Does semantics make a difference? YES! 2. Does specify help resolve rules conflicts YES! 3. Is specificity semantics always better than Windows NO!

Summary of More than Skin Deep Changing semantics has effect on usability, regardless of interface.

Usability problems

Usability problems Permission errors Only discovered at the time access is really needed Lack of transparency Unaware of the actual membership of a group Conflict rules

Discussion

Access control conflict rules Scenario: You are a TA in a Music Department and have to maintain the department file server Jana comes back to pursue her master degree at Carnegie Mellon University and once again become a TA for Theory 101 in 2014. In 2014, TA are only allowed to READ but not WRITE. How would you resolve the conflict in access control rules under Windows and Grid? Recall: 2007 TAs are allowed READ & WRITE 2006 TAs are denied READ & WRITE

Reference [1] RFC 4949 [2] Ross Anderson. Chapter 4: Access Control In Security Engineering (Second Edition). Wiley, 2008.