Boojong Flashcards
What is Access Control?
The process of granting or denying specific requests to obtain and use information and enter specific facilities
What are the principles of Access Control?
- To prevent unauthorised users from gaining access to resources
- To prevent legitimate users to access resources in an unauthorised manner
- To enable legitimate users to access resources in authorised manner
What is Authentication?
Verification that the credentials of a user or other system entity are valid
What is Authorsiation?
The granting of a right or permission to a system entity to access a system resource
What is Audit?
An independent review and examination of system record and activities
What is a Subject?
- An entity capable of accessing objects
- A process that represents a user or application actually gains access to an object
- Three classes of subject: owner, group, world
What is an Object?
- A resource to which access is controlled
- An entity used to contain and/or receive information
What is access rights?
- The way in which a subject may access an object
- Read, write, execute, delete, create and search
What are the main models of access control?
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-based Access Control (RBAC)
- Attribute-based Access Control (ABAC)
How does Discretionary Access Control work (DAC)?
- Identity-based Controls
- Every object has an owner and a discretionary access control list (DACL)
- DACLs form an access matrix
What are the principles behind DAC?
- Users own resources and control their access
- Owner may change object’s permissions at its discretion
- Owners may also be able to transfer ownership to other users
What are issues around DAC?
- Flexible, but open to mistakes, negligence or abuse
- Managing the policies for a large system is a complex task
- Difficult to understand the correct accesses are provided to the right users
- The objects and subjects change frequently, thus, their permissions do as well
- Access matrix represents explicit relation between each individual subject and object, it grows very large very quickly
How does MAC work?
Classification of subjects and objects by security levels
- Every subject has a profile, which includes their clearance and their need-to-know
- Every object has a security label composed of two parts classification and a category
What are the principles behind of MAC?
- Classification of subjects and objects by security levels
- MAC policies often identified with multi-level security policies
- MAC requires careful planning and continuous monitoring too keep all resource objects’ and users’ classifications up to date
- MAC helps prevent data leakage, making it suitable for environments where information confidentiality and integrity are critical
How does MAC differ to DAC?
- More rigid than DAC but also more secure
- Mandatory because subjects may not transfer access rights
- Shifts power from users to system owner
How does Role-Based Access Control (RBAC) work?
- Access is based on user’s role in the organisation
- The administrator associates various permissions to each role
- Each user is assigned at least one role and inherits the permissions associated to the role(s)
What are the advantages of RBAC?
- Increases abstraction in policies
- Policies become more manageable
- Reduces user administration
- Easy to adult
- Higher flexibility and scalability
What are the different types of RBAC?
- Base model
- Role hierarchies
- Constraints
- Consolidated model
How does Role hierarchies work in RBAC?
- Enable one role to inherit permissions from another role
How does Constrain work in RBAC?
Restrict the ways in which components of an RBAC may be configured
How does the consolidated model work for RBAC?
Consolidates model combines role hierarchies and constrains
What are the different types of constrains in RBAC?
- Mutually exclusive roles
- Cardinality
- Prerequisite roles
What are Attributes?
Characteristics that define specific aspects of the subject, object, environment conditions and/or requested operations
How does Attribute-Based Access Control (ABAC)?
Access control by evaluating rules against attributes of entities, operations, and the environment relevant to a request