Access Control Model2
Access Control Model2
Access Control Model2
CONTROL MODELS
Presented By:
LAVANYA CHHABRA (11021210045)
ADITI (11021210014)
Section: D
WHAT IS ACCESS CONTROL ?
Access control is a fundamental component of data security that dictates
who’s allowed to access and use company information and resources.
Access control can be as simple as a door with a lock on it. Access control
allows you to manage who enters your property and at which time they are
allowed to do so.
ACCESS
CONTROL MODEL
Access Control Models allow organizations to grant user
permissions and enforce access policies.
OR
The purpose of ABAC is to protect objects such as data, network devices, and
IT resources from unauthorized users and actions—those that don’t have
“approved” characteristics as defined by an organization’s security policies.
HOW IT WORKS ?
ABAC grants permissions according to who a user is
rather than what they do, which allows for granular
controls. Attributes are analyzed to assess how they
interact in an environment; then, rules are enforced
based on relationships.
4) Action attributes
Action attributes indicate how a user wants to engage with a resource. Examples of
common action attributes in access requests are view, read, write, copy, edit, transfer,
delete, or approve. These can be used individually or in combination for more complex
scenarios.
EXAMPLE
Let's say you have a system where employees can access certain documents based
on their department, role, and location.
ATTRIBUTES RULES
User attributes: Department (e.g., HR, Only HR department employees can
Finance), Role (e.g., Manager, access payroll documents.
Employee), Location (e.g., Office A, Managers can access budget
Office B) documents for their respective
Resource attributes: Document type departments.
(e.g., Payroll, Budget), Sensitivity level Employees working remotely can only
(e.g., Public, Confidential) access public documents.
Access to confidential documents
requires multi-factor authentication.
Using these attributes and rules, the system can dynamically determine who has access to
what documents based on their specific attributes and the conditions set in the access control
policies. This provides a more flexible and fine-grained approach to access control compared
to traditional methods.
PROS OF ABAC
Specific Access: ABAC lets you control who can access what very precisely.
Adaptable Access: It can change access based on things like the time of day or
where someone is trying to access from.
Works with Lots of People and Things: ABAC can handle a big crowd of users
and resources without getting confused.
You Can Make Your Own Rules: You get to decide what traits matter for access,
giving you a lot of flexibility.
Keeps Everything in Check: It helps you follow rules and keeps track of who's
doing what for audits.
CONS OF ABAC
Complicated Setup: Setting up ABAC can be tricky because you have to define a
lot of rules and traits.
Needs Regular Attention: You have to keep updating and managing all the
traits and rules, which can be a hassle.
Can Be Misused: If you're not careful with how you set it up, it might let the
wrong people in.
Compatibility Issues: Sometimes, it might not work well with older systems or
other security measures you already have in place.
DISCRETIONARY ACCESS CONTROL MODEL
Discretionary access control is an identity-based access control model that
provides users with a certain amount of control over their data. Data owners
(document creators or any users authorized to control data) can define access
permissions for specific users or groups of users.
In other words, whom to give access to and what privileges to grant are
decided at the resource owner’s discretion.
Access permissions for each piece of data are stored in an access control list
(ACL). An administrator creates this list when a user grants access to somebody.
The list can be generated automatically.
An ACL includes users and groups that may access data and the levels of access
they have. A system administrator can also enforce an ACL. In this case, the ACL
acts as a security policy, and regular users can’t edit or overrule it.
BASIC PRINCIPLES OF DAC
Object characteristics (size, name, directory path) are invisible to users that
aren’t authorized.
Users can transfer their object ownership to other users. Also, the owner
determines the access type of other users. Based on these access privileges, the
operating system decides whether to grant access to a file.
HOW IT WORKS?
User 1 creates a file and becomes its owner, or obtains
access rights to an existing file.
1. Ownership: Alice owns the file, which means she has full control over it.
2. Permissions: She can set permissions for herself (the owner), the group she belongs to, and
others (everyone else).
For herself: Alice grants read and write permissions, allowing her to view and modify the file.
For the group: Alice belongs to a group called "Project Team." She decides to grant read-only
access to the file for all members of the Project Team.
For others: She decides to deny any access to the file for all other users.
Alice can now control who can access her file and what actions they can perform on it.
If Alice later decides to change the permissions, she can do so at any time.
With DAC, Alice has discretion over who can access her file and what they can do with it,
without needing approval from a central authority.
PROS OF DAC
User-friendly: Users can manage their data and quickly access data of other
users.
Easy to maintain: Adding new objects and users doesn’t take much time for the
administrator.
Granular: Users can configure access parameters for each piece of data.
CONS OF DAC
Low level of data protection: DAC can’t ensure reliable security because users
can share their data however they like.