access control intro, dac and mac

27
Access Control Intro, DAC and MAC System Security

Upload: deiondre

Post on 23-Feb-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Access Control Intro, DAC and MAC. System Security. System Security. It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication : uniquely identifying entities Authorisation : assigning access rights to entities. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Access Control Intro, DAC and MAC

Access Control Intro, DAC and MACSystem Security

Page 2: Access Control Intro, DAC and MAC

System Security• It is concerned with regulating how entities use resources in a

system• It consists of two main phases:• Authentication: uniquely identifying entities• Authorisation: assigning access rights to entities

Page 3: Access Control Intro, DAC and MAC

Authentication Phase• It is only concerned with identifying an entity against a known

set• Assigning a unique identifier to the entity (i.e., user name)• Using a secret (supposedly) known only to the specific entity• Alternatively, using a unique feature that characterizes the entity

Page 4: Access Control Intro, DAC and MAC

Authorisation Phase• Known also as Access Control• “The prevention of unauthorized use of a resource, including

the prevention of use of a resource in an unauthorized manner”

• It assumes users have been• authenticated to the system• assigned access rights to certain resources on the system (for

instance, by an admin)

Page 5: Access Control Intro, DAC and MAC

Access Control Requirements• Reliable Input• Authenticated entities• Genuine information

• Least Privilege• Entities granted minimum set of access rights

• Administrative Duties• Only a special entity should be able to manage access rights for

other entities

Page 6: Access Control Intro, DAC and MAC

Access Control Refinements• Separation of Duty• Fine Vs. Coarse Specifications• Open and Closed policies• (Automated) Conflict Resolution

Page 7: Access Control Intro, DAC and MAC

Access Control Elements• Subject - entity that can access objects• a process representing user/application

• Object - access controlled resource• e.g. files, directories, records, programs etc

• Access right - way in which subject accesses an object• e.g. read, write, execute, delete, create, search

Page 8: Access Control Intro, DAC and MAC

Security Modules

Page 9: Access Control Intro, DAC and MAC

Access Control Models• Discretionary AC (DAC)• Mandatory AC (MAC)• Role-based AC (RBAC)• Usage Control (UCON)• Policy-based Access Control

Page 10: Access Control Intro, DAC and MAC

Discretionary Access Control• A means of restricting access to objects based on the identity

of subjects and/or groups to which they belong. • The controls are discretionary in the sense that a subject with a

certain access permission is capable of passing that permission on to any other subject

• Subjects are able to assign rights to other subjects on the objects they control

• Model used in operating systems and DB management systems

• Often provided using an access matrix

Page 11: Access Control Intro, DAC and MAC

Access Control Matrix

Page 12: Access Control Intro, DAC and MAC

Access Control List

Page 13: Access Control Intro, DAC and MAC

Capability List

Capability Myths Demolished: http://srl.cs.jhu.edu/pubs/SRL2003-02.pdf

Page 14: Access Control Intro, DAC and MAC

Access Matrix Details

Page 15: Access Control Intro, DAC and MAC

UNIX Access Control Lists• Modern UNIX systems support ACLs• Can specify any number of additional users / groups and

associated rwx permissions• ACLs are optional extensions to std perms

Page 16: Access Control Intro, DAC and MAC

Mandatory Access Control• Entities cannot enable other entities to access their resources• It enforces a lattice between labels assigned to subjects and

object• security labels: how sensitive or critical a system resource is• security clearances: which entities are eligible to access certain

resources

Page 17: Access Control Intro, DAC and MAC

MAC: The Bell-LaPadula ModelThe main goal is to control the confidentiality of information

Page 18: Access Control Intro, DAC and MAC

MAC Confidentiality RulesSimple Security Property: No Read-Up

Read

Page 19: Access Control Intro, DAC and MAC

MAC Confidentiality Rules*(Star)property: No Write-Down

Write

Page 20: Access Control Intro, DAC and MAC

MAC Confidentiality RulesStrong *(Star)-property: No Write-Down & No Write-up

Write

Page 21: Access Control Intro, DAC and MAC

MAC: Biba Integrity ModelThe main goal is to control the integrity of information

Page 22: Access Control Intro, DAC and MAC

MAC Integrity RulesSimple Integrity Axiom: No Read Down

Read

Page 23: Access Control Intro, DAC and MAC

MAC Integrity Rules*(Star)-Integrity Axiom: No Write Up

Write

Page 24: Access Control Intro, DAC and MAC

Where is MAC used• BLP: Implemented the multi-level security policy for US

Department of Defense• BIBA: Implemented in the FreeBSD MAC policy• A combined versions of BLP and BIBA is used in Android

Page 25: Access Control Intro, DAC and MAC

Summary• Introduced access control principles• subjects, objects, access rights

• Discretionary Access Control• access matrix, access control lists (ACLs), capability tickets• UNIX traditional and ACL mechanisms

• Mandatory Access Control• Bell-Lapadula• Biba

Page 26: Access Control Intro, DAC and MAC

Resources• Chapter 8 in Mark Stamp, Information Security: Principles and

Practice, Wiley 2011.• Matt Bishop, Computer Security: Art and Science, Addison-

Wesley 2003.

Page 27: Access Control Intro, DAC and MAC

Questions?