KeyAssignment 2 Sevuri GCYSEC 502
KeyAssignment 2 Sevuri GCYSEC 502
1. Subject characteristics:
The user who requests access or tries
to perform an activity in an ABAC
system is the subject. Different
methods can be used to identify
subjects:
distinct IDs and positions. 3. Measures:
belonging to a certain user The way users engage with network
group. resources are referred to as actions.
seniority or affiliation with a The settings differ in these
department. properties. On the other hand, read,
clearance for security. write, delete, save, and transfer are
typical action properties. The
Authentication tokens can also majority of acts that jeopardize data
be used by ABAC systems to are covered by these key actions.
collect user attributes. This might
be a practical way to confirm and Administrators can prevent data
give permission for remote misuse by using ABAC. The actions
employees to connect to critical that people can perform are defined
business resources. by administrators. They can even
permit acts at particular times or
locations and establish acceptable
HR departments' directories are circumstances. [1][14][15]
typically where personal user 4. Features of the environment:
attributes are found. Utilizing pre- Environmental characteristics are
existing HR data, ABAC systems tidbits of knowledge about the
enforce restrictions on who has surroundings of access events. Time
access to the data and what they may of day, device location, time zone,
do once they have. [1][14][15] and device kind are examples of
2. Attributes of the resource: common properties.
The objects that users try to access
are referred to as resource attributes. There are various benefits to setting
Applications, servers, APIs, and values for environmental attributes.
individual files are all included in Limiting access to people in the
this. Dates of file creation and vicinity, for instance, makes it more
modification, file formats, and the difficult for attackers to enter from
asset's sensitivity level are a few distant areas. This holds true even in
examples of relevant attributes. the event that hackers have gained
authentic credentials. [1][14][15]
Because of these features, Historical elements can also be
administrators may safeguard present in environmental qualities.
databases and applications with fine- Access controls provide the ability to
grained attribute-based controls. For record past sessions of user activity
instance, clinicians who are on-site and identify if a user is acting
and affiliated with a specific strangely. At the greatest degrees of
department could be the only ones sensitivity, this provides an
with access to medical records, additional layer of security.
according to security teams. [1][14] Access is granted by ABAC systems
[15] if the user has the necessary
characteristics. Aspect-based access Simple to use: ABAC offers users a
control policies are compared by the straightforward interface. Policies
system with user profiles. For this are accessible and simple to amend
reason, policy-based access control since they are written in a common
(PBAC) is another name for ABAC. language. [1][14][15]