Advanced Computer Networks & Computer and Network Security: Prof. Dr. Hasan Hüseyin BALIK (4 Week)
Advanced Computer Networks & Computer and Network Security: Prof. Dr. Hasan Hüseyin BALIK (4 Week)
(4th Week)
Outline
• 2. Computer security technology and
principles
—2.1. Cryptographic Tools
—2.2. User Authentication
—2.3 Access Control
—2.4 Malicious Software
—2.5. Denial-of-Service Attacks
—2.6 Intrusion Detection
—2.7 Firewalls and Intrusion Prevention Systems
2.3. Access Control
2.3.Outline
• Access Control Principles
• Subjects, Objects, and Access Rights
• Discretionary Access Control
• Example: UNIX File Access Controll
• Role-Based Access Control
• Attribute-Based Access Control
• Identity, Credential, and Access Management
• Trust Frameworks
Access Control Definitions
1/2
NISTIR 7298 (Glossary of Key Information Security
Terms , May 2013) defines access control as:
5
collusion.
Employ the principle of least privilege, including for specific security functions and
Access
6
privileged accounts.
Use non-privileged accounts or roles when accessing nonsecurity functions.
Control
7 Prevent non-privileged users from executing privileged functions and audit the execution Security
of such functions.
8 Limit unsuccessful logon attempts. Requirements
9 Provide privacy and security notices consistent with applicable CUI rules.
10 Use session lock with pattern-hiding displays to prevent access and viewing of data after ( SP 800-171)
period of inactivity.
11 Terminate (automatically) a user session after a defined condition.
12 Monitor and control remote access sessions.
13 Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
14 Route remote access via managed access control points.
15 Authorize remote execution of privileged commands and remote access to security-
relevant information.
16 Authorize wireless access prior to allowing such connections.
17 Protect wireless access using authentication and encryption.
18 Control connection of mobile devices.
19 Encrypt CUI on mobile devices.
20 Verify and control/limit connections to and use of external information systems.
21 Limit use of organizational portable storage devices on external information systems.
22 Control CUI posted or processed on publicly accessible information systems.
Read Own
User C Read Read
Write Write
(a) Access matrix
File 4 B C
Own (c) Capability lists for files of part (a)
R R
W
•
ss
ss
as
a
a
cl
cl
Unique user identification
cl
⚫
er
ne
u
number (user ID)
ro
th
w
O
O
⚫ Member of a primary group rw- r-- ---
identified by a group ID
user: :rw-
⚫ Belongs to a specific group group::r--
⚫ 12 protection bits other::---
⚫ Specify read, write, and
execute permission for the (a) Traditional UNIX approach (minimal access control list)
owner of the file, members
of the group and all other
users Figure 4.5 UNIX File Access Control
s
The owner ID, group ID, and
as
s
as
⚫
as
cl
cl
cl
protection bits are part of the
er
ne
u
file’s inode
ro
th
w
O
O
rw- rw- ---
user: :rw-
masked user:joe:rw-
Traditional UNIX
File Access Control
⚫ “Set user ID”(SetUID)
⚫ “Set group ID”(SetGID)
⚫ System temporarily uses rights of the file owner/group in
addition to the real user’s rights when making access
control decisions
⚫ Enables privileged programs to access files/resources not
generally accessible
⚫ Sticky bit
⚫ When applied to a directory it specifies that only the owner
of any file in the directory can rename, move, or delete
that file
⚫ Superuser
⚫ Is exempt from usual access control restrictions
⚫ Has system-wide access
Access Control Lists (ACLs)
in UNIX
Modern UNIX systems support ACLs
•FreeBSD, OpenBSD, Linux, Solaris
FreeBSD
Role 1
Role 2
Role 3
U1
U2
U3
U4
U5
U6
Um
OBJECTS
R1 R2 Rn F1 F1 P1 P2 D1 D2
RBAC1 RBAC2
Role hierarchies Constraints
RBAC0
Base model
(RH) Role
Hierarchy Oper-
ations
user_sessions session_roles
Objects
Sessions
Engineer 1 Engineer 2
Engineering Dept
Main obstacle to
its adoption in Web services
real systems has have been
Can define been concern pioneering
There is
authorizations about the technologies
Strength is its considerable
that express performance through the
flexibility and interest in
conditions on impact of introduction of
expressive applying the
properties of evaluating the eXtensible
power model to cloud
both the resource predicates on Access Control
services
and the subject both resource Markup
and user Language
properties for (XAMCL)
each access
ABAC Model: Attributes
Subject Object Environment
attributes attributes attributes
• A subject is an active • An object (or • Describe the
entity that causes resource) is a passive operational,
information to flow information system- technical, and even
among objects or related entity situational
changes the system containing or environment or
state receiving information context in which the
information access
• Attributes define the • Objects have occurs
identity and attributes that can • These attributes have
characteristics of the be leverages to so far been largely
subject make access control ignored in most
decisions access control
• A subject’s role can
also be viewed as an policies
attribute.
ABAC
Relies upon the evaluation
of attributes of the subject,
Distinguishable because it
attributes of the object,
controls access to objects
and a formal relationship
by evaluating rules against
or access control rule
the attributes of entities,
defining the allowable
operations, and the
operations for subject-
environment relevant to a
object attribute
request
combinations in a given
environment
Allows an unlimited
Systems are capable of
number of attributes to be
enforcing DAC, RBAC,
combined to satisfy any
and MAC concepts
access control rule
Subject Object Environmental
Attributes Attributes Attributes
2b 2c 2d
Permit
1 3
Access
control Deny
mechanism
Subject (user)
2a
Access Control
Policies
Typically
written Privileges represent the authorized behavior of a subject
from the and are defined by an authority and embodied in a policy
perspective
of the
object that
needs
protecting
and the Other terms commonly used instead of privileges are: rights,
privileges authorizations, and entitlements
available to
subjects
Identity, Credential, and
Access Management (ICAM)
• A comprehensive approach to managing and
implementing digital identities, credentials, and
access control
• Developed by the U.S. government
• Designed to:
o Create trusted digital identity representations of individuals and
nonperson entities (NPEs)
o Bind those identities to credentials that may serve as a proxy for the
individual of NPE in access transactions
• A credential is an object or data structure that authoritatively binds
an identity to a token possessed and controlled by a subscriber
o Use the credentials to provide authorized access to an agency’s
resources
Identity Federation
• Term used to describe the technology, standards,
policies, and processes that allow an organization
to trust digital identities, identity attributes, and
credentials created and issued by another
organization
• Addresses two questions:
o How do you trust identities of individuals from external
organizations who need access to your systems
o How do you vouch for identities of individuals in your
organization when they need to collaborate with external
organizations
Identity (Possible contract)
Service Relying
Provider Party
Te OS
en e
em ic
rm ) a
(T
t
re rv
a g Se
s o gr
S) o f
f S eem
O s
er en
(T erm
vi t
ce
T
Identity (Possible contract)
Service Relying
Provider Users Party
e
Te OS ic t
(a) Traditional triangle of parties involved in an exchange of identity information
v
rm ) a er men
(T
S
s o gr f ee
f S eem s o gr
rm S) a
Trust Framework
er en Providers
e
vi t T O
ce (T
Attribute Providers
Identity
Service Attribute Exchange
Network Relying
Providers
Parties
Assessors Dispute
& Auditors Resolvers
Users
Attribute Providers
Identity
Service Attribute Exchange
Network Relying
Providers
Parties
Assessors Dispute
& Auditors Resolvers
Users