Authorisation Flashcards
Authorisation
security mechanism which grants/denies access to system based on identity and permissions
Why is authorisation difficult to implement?
Users may fall into a number of groups or roles with different abilities or privileges
Authorisation conflicts can occur and stop production
Users may try and bypass authorisation methods
Policy Enforcement Phase
Done by a reference monitor which takes as input the access request and current security policy, then decides if the access request complies with the security policy.
Should always be NEAT: non-bypassable, evaluable, always-invoked, tamperproof
Difficulty of Authorisation
Developers frequently underestimate the difficulty of implementing authorisation schemes. Often they simply evolve along with the application which can make it very difficult to comprehend once an application nears deployment (flawed).
Flawed Authorisation
Many flawed authorisation schemes are not difficult to discover and exploit - devastating consequences as attackers can delete, edit, exploit etc.
Administrative Interfaces
Allows web admins to manage users, data and content efficiently. However due to their power it makes them a frequent prime target for attack - both inside and outside the organisation.
Path Traversal
The Path Traversal attack allows an attacker to access files, directories and commands that reside outside the web root directory.
Attackers could manipulate a URL in such a way that the app will reveal contents of files anywhere on the server. dot dot slash (../) attack as it uses a special character to alter resource location in the URL.
Role Based Access Control
RBAC is a method for controlling access based on roles assigned to users. Means lower level roles can’t access sensitive information or perform high-level tasks.
Principle of Least Privilege
Limit users to the absolute minimum required role necessary for them to complete assigned tasks
Benefits of RBAC - Improving operation efficiency
Decrease need for paperwork and password changes.
Lets organisations quickly assign and change roles.
Can integrate third party users much easier
Benefits of RBAC - Enhancing Compliance
RBAC systems help meet the regulatory and statutory requirements for confidentiality as it effectively manages how data is accessed and used.
Benefits of RBAC - Giving Admins Increased Visibility
RBAC gives network administrators more visibility and oversight into the business.
Benefits of RBAC - Reducing Costs
Organisations can conserve or more cost effectively use resources such as network bandwidth, memory and storage.
Benefits of RBAC - Decreasing Risk
Restricted access to sensitive information reduces the potential for data breaches or leakage.
RBAC Issues - Role Explosion
When the granularity needed for access control is too detailed. Difficult and costly to manage and makes control confusing and complicated, reducing effectiveness.
More roles can lead to security holes that are difficult to find and close.