CS 356 Lecture 7 Access Control. Spring 2013

Similar documents
General Access Control Model for DAC

Chapter 4: Access Control

Access Control. Discretionary Access Control

Access Control. Discretionary Access Control

Module 4: Access Control

Post-Class Quiz: Access Control Domain

Liferay User Management. Kar Joon Chew Oct 2011

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

Core Role Based Access Control (RBAC) mechanism for MySQL

Efficient Role Based Access Control Method in Wireless Environment

Access Control (slides based Ch. 4 Gollmann)

CSN11111 Network Security

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Computer Security. Access control. 5 October 2017

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

The R BAC96 RBAC96 M odel Model Prof. Ravi Sandhu

Data Security and Privacy. Unix Discretionary Access Control

CS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control

Security Models Trusted Zones SPRING 2018: GANG WANG

Week 10 Part A MIS 5214

Computer Security 3e. Dieter Gollmann. Chapter 5: 1

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations,

Discretionary Access Control (DAC)

Information Security CS 526

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

CS 416: Operating Systems Design April 22, 2015

IBM Security Identity Manager Version Planning Topics IBM

Identity, Authentication and Authorization. John Slankas

Chapter 7: Hybrid Policies

Access Control Models

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

CSE 565 Computer Security Fall 2018

CSC 474/574 Information Systems Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018

Access Control Mechanisms

Operating Systems Security Access Control

19.1. Security must consider external environment of the system, and protect it from:

Information Security & Privacy

CIS433/533 - Introduction to Computer and Network Security. Access Control

Access Control Models Part II

CSE Computer Security

Introduction to Security

Intrusion Detection Types

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences

? Resource. Announcements. Access control. Access control in operating systems. References. u Homework Due today. Next assignment out next week

CS 425 / ECE 428 Distributed Systems Fall 2017

RBAC: Motivations. Users: Permissions:

Discretionary Vs. Mandatory

SharePoint 2010 and 2013 Auditing and Site Content Administration using PowerShell

Access Control Part 1 CCM 4350

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

HPE Intelligent Management Center

Role-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India

Jérôme Kerviel. Dang Thanh Binh

CompTIA SY CompTIA Security+

State of Colorado Cyber Security Policies

Overview. SSL Cryptography Overview CHAPTER 1

CS 356 Operating System Security. Fall 2013

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

(2½ hours) Total Marks: 75

Role-Based Cryptography

Unix, History

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

Configuring Port-Based and Client-Based Access Control (802.1X)

Radius, LDAP, Radius used in Authenticating Users

Discretionary Access Control (DAC)

RedCastle v3.0 for Asianux Server 3 Certification Report

EXAMINATION [The sum of points equals to 100]

Information Security CS 526

DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW. Version 2, Release October Developed by DISA for the DoD

Datasäkerhet/Data security EDA625 Lect5

CS /29/17. Paul Krzyzanowski 1. Fall 2016: Question 2. Distributed Systems. Fall 2016: Question 2 (cont.) Fall 2016: Question 3

Chapter 19 Security. Chapter 19 Security

Formal methods and access control. Dr. Hale University of Nebraska at Omaha Information Security and Policy Lecture 8

Access control. Frank Piessens KATHOLIEKE UNIVERSITEIT LEUVEN

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

CS 6903: Modern Cryptography Spring 2011

Policy vs. Mechanism. Example Reference Monitors. Reference Monitors. CSE 380 Computer Operating Systems

Verteilte Systeme (Distributed Systems)

Role-based access control for loosely coupled distributed database management systems

Operating system security models

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

the SWIFT Customer Security

A Closer Look at Authentication and Authorization Mechanisms for Web-based Applications

CSE 380 Computer Operating Systems

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Overview of Information Security

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

Summary. Final Week. CNT-4403: 21.April

CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

YubiHSM 2 for ADCS Guide. Securing Microsoft Active Directory Certificate Services with YubiHSM 2

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Detecting MAC Spoofing Using ForeScout CounterACT

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

A Survey of Access Control Policies. Amanda Crowell

Transcription:

CS 356 Lecture 7 Access Control Spring 2013

Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive, insider/outsider Lots of terminology and general concepts Chapter 2: Basic Cryptographic Tools Symmetric key encryption and secure hashing Public key cryptography Random Numbers Chapter 3 User Authentication Passwords Checking passwords and other user auth techniques Chapter 4 Access Control Lists Concepts and Discretionary Access Control Role Based Access Control (RBAC)

Chapter 4 Access Control

Access Control Policies

UNIX File Access Control l unique user identification number (user ID) l member of a primary group identified by a group ID l belongs to a specific group l 12 protection bits l specify read, write, and execute permission for the owner of the file, members of the group and all other users l the owner ID, group ID, and protection bits are part of the file s inode

Role-Based Access Control (RBAC)

Access Control Matrix

Role-Based Access Control Models

Scope RBAC Models

Example of Role Hierarchy

Constraints - RBAC provide a means of adapting RBAC to the specifics of administrative and security policies of an organization a defined relationship among roles or a condition related to roles types: mutually exclusive roles a user can only be assigned to one role in the set (either during a session or statically) any permission (access right) can be granted to only one role in the set cardinality setting a maximum number with respect to roles prerequisite roles dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role

RBAC System and Administrative Functional Specification administrative functions provide the capability to create, delete, and maintain RBAC elements and relations supporting system functions provide functions for session management and for making access control decisions review functions provide the capability to perform query operations on RBAC elements and relations

NIST RBAC Model

object Basic Definitions any system resource subject to access control, such as a file, printer, terminal, database record operation an executable image of a program, which upon invocation executes some function for the user permission an approval to perform an operation on one or more RBAC protected objects

Core RBAC administrative functions add and delete users from the set of users add and delete roles from the set of roles create and delete instances of user-torole assignment create and delete instances of permission-to-role assignment supporting system functions create a user session with a default set of active roles add an active role to a session delete a role from a session check if the session subject has permission to perform a request operation on an object review functions enable an administrator to view but not modify all the elements of the model and their relations

Hierarchical RBAC general role hierarchies limited role hierarchies allow an arbitrary partial ordering of the role hierarchy impose restrictions resulting in a simpler tree structure supports multiple inheritance, in which a role may inherit permissions from multiple subordinate roles and more than one role can inherit from the same subordinate role role may have one or more immediate ascendants but is restricted to a single immediate descendant

Static Separation of Duty Relations (SSD) enables the definition of a set of mutually exclusive roles, such that if a user is assigned to one role in the set, the user may not be assigned to any other role in the set can place a cardinality constraint on a set of roles defined as a pair (role set, n) where no user is assigned to n or more roles from the role set includes administrative functions for creating and deleting role sets and adding and deleting role members includes review functions for viewing the properties of existing SSD sets

Dynamic Separation of Duty Relations (DSD) limit the permissions available to a user places constraints on the roles that can be activated within or across a user s sessions define constraints as a pair (role set, n), where n is a natural number n 2, with the property that no user session may activate n or more roles from the role set enables the administrator to specify certain capabilities for a user at different, non-overlapping spans of time includes administrative and review functions for defining and viewing DSD relations

Functions and Roles for Banking Example (a) Functions and Official Positions

Functions and Roles for Banking Example (b) Permission Assignments

Functions and Roles for Banking Example (c) PA with Inheritance

Example of Access Control Administration

Summary access control prevent unauthorized users from gaining access to resources prevent legitimate users from accessing resources in an unauthorized manner enable legitimate users to access resources in an authorized manner subjects, objects, access rights authentication, authorization, audit discretionary access controls (DAC) controls access based on identity mandatory access control (MAC) controls access based on security labels role-based access control (RBAC) controls access based on roles

What s Next Read Chapter 1, 2, 3, 4, (skip 5), and 6 Chap 1: Focus on big picture and recurring concepts Chap 2: Identify cryptographic tools and properties Chap 3: How can you authenticate a user? Chap 4: Access Control Chap 6: Intrusion Detection Homework Posted on Course Website Due Tuesday Project 1 Posted on Course Website Next Lecture Topics From Chapter 6 Malicious Software