Authorisation Flashcards

1
Q

Authorisation

A

security mechanism which grants/denies access to system based on identity and permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is authorisation difficult to implement?

A

Users may fall into a number of groups or roles with different abilities or privileges

Authorisation conflicts can occur and stop production

Users may try and bypass authorisation methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy Enforcement Phase

A

Done by a reference monitor which takes as input the access request and current security policy, then decides if the access request complies with the security policy.

Should always be NEAT: non-bypassable, evaluable, always-invoked, tamperproof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Difficulty of Authorisation

A

Developers frequently underestimate the difficulty of implementing authorisation schemes. Often they simply evolve along with the application which can make it very difficult to comprehend once an application nears deployment (flawed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Flawed Authorisation

A

Many flawed authorisation schemes are not difficult to discover and exploit - devastating consequences as attackers can delete, edit, exploit etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Administrative Interfaces

A

Allows web admins to manage users, data and content efficiently. However due to their power it makes them a frequent prime target for attack - both inside and outside the organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Path Traversal

A

The Path Traversal attack allows an attacker to access files, directories and commands that reside outside the web root directory.

Attackers could manipulate a URL in such a way that the app will reveal contents of files anywhere on the server. dot dot slash (../) attack as it uses a special character to alter resource location in the URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Role Based Access Control

A

RBAC is a method for controlling access based on roles assigned to users. Means lower level roles can’t access sensitive information or perform high-level tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Principle of Least Privilege

A

Limit users to the absolute minimum required role necessary for them to complete assigned tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Benefits of RBAC - Improving operation efficiency

A

Decrease need for paperwork and password changes.

Lets organisations quickly assign and change roles.

Can integrate third party users much easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Benefits of RBAC - Enhancing Compliance

A

RBAC systems help meet the regulatory and statutory requirements for confidentiality as it effectively manages how data is accessed and used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Benefits of RBAC - Giving Admins Increased Visibility

A

RBAC gives network administrators more visibility and oversight into the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Benefits of RBAC - Reducing Costs

A

Organisations can conserve or more cost effectively use resources such as network bandwidth, memory and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Benefits of RBAC - Decreasing Risk

A

Restricted access to sensitive information reduces the potential for data breaches or leakage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RBAC Issues - Role Explosion

A

When the granularity needed for access control is too detailed. Difficult and costly to manage and makes control confusing and complicated, reducing effectiveness.

More roles can lead to security holes that are difficult to find and close.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RBAC Issues - Security Risk Tolerance

A

If an organisation is averse to security risks, RBAC may not be the optimal way to secure access.

Once deployed it is hard to react to changing threats and risks.

17
Q

RBAC Issues - Scalability and Dynamism

A

When RBAC is first deployed it is known exactly what roles need to be defined. However as an organisation grows, new job definitions may not be updated or clearly defined - RBAC becomes difficult to manage and maintain.

18
Q

RBAC Issues - Expensive and Difficult

A

If an organisation chooses to upgrade to a RBAC, there is added cost and risk with migrating users while phasing out older ones. Migrations often have a variety of difficulties and unforeseen challenges, resulting in security holes along with costly defects - data loss and unplanned downtime.

19
Q

RBAC vs Access Control List

A

RBAC is superior to ACL in terms of security and administrative overhead.
ACL is better for implementing security at the user level and for low-level data.

20
Q

RBAC vs Attribute Based Access Control

A

ABAC is more dynamic and uses relation-based access control. RBAC can determine broad access while ABAC offers more granularity.

RBAC system can grant access to all managers but an ABAC policy will only grant access to managers that are part of a certain department. ABAC is more complex, in both processing power and time, so only needed when RBAC is insufficient.