Ch.8 - Access Control Flashcards
Access Control Models
Method to determine what privileges are and are not associated with each user (in Authorization system)
Discretionary Access Control (DAC)
Owner of each controlled object decides who can access it
and what permissions they have
o Used by Windows - Common in Unix OS, but widely used in other business apps
o Typical DAC system: every file/folder/resource has owner
▪ Owner sets access permissions by editing access control list (ACL)
Mandatory Access Control (MAC)
Admins assign security classifications, or labels, to each user and each resource - User can only access given resource if their labels are compatible
o Mainly used in military or high-security environment
o Centrally managed by admins
o Main model: Bell-LaPadula Model – Compare clearance level to resource’ sensitivity
▪ Simple Security Property states that subject at a given security level may not
read object at higher security level (but can write)
▪ The “*” (star) Security Property states that subject at given security level may not write to any object at lower security level
Role-Based Access Control (RBAC1)
Admins define permissions and centrally control (MAC),
but users are assigned to one or more roles and not clearance levels (ex: job functions)
o Each role has list of permissions
o Popular in commercial app/military system
▪ Like DAC: Allows access to be permitted for individual resources on more flexible level (perform most functions of DAC or MAC)
▪ Unlike DAC: No strict concept of ownership, and doesn’t store permissions on each object
Rule-Based Access Control (RBAC2)
Access determined by set of rules (static, dynamic, or triggered by other events) configured by admins
o Used to describe multiple, mutually exclusive approaches
▪ Like DAC: Uses list of rules configured in an ACL
▪ Unlike DAC: Stored on system/device (routers) controlled by admin
Attribute-Based Access Control (ABAC)
Applies security attributes to resources, users, and env
then defines policies governing combinations of those attributes
o Sometimes called a “next-generation” access control because of its flexibility
o Every time access is requested, system evaluates it according to set of policies defined by admin (Boolean evaluations – involve coding – can be complex)
Conditional Access
Boolean policy-based access allowing admins to define policies that determine whether user can access resource or require different authentication conditions
Time and Location-Based Access Control (TLBAC)
Based on location/time of request
Geolocation
Either general term for technologies that determine geographic location, or specific technique of using IP address to determine physical location via routing information and internet registries – popular for region-based content
Geofencing
Use of GPS, RFID, cellular, or Wi-Fi data to identify the location of a mobile device and compare it to a virtual fence around a defined area – use location to make decision
Geotagging
Application feature allowing location data to be embedded in photo, message, online post, or any other kind of file or communication – mainly implemented in mobile technologies
The Identity Life Cycle (Identity and Access Provisioning Life Cycle)
Steps a given account passes through to gain access– Depends on org, but mainly follow this cycle
Account Types
Allow for customizable permissions of given account
- User
- Privileged
- Shared/Generic
- Guest
- Service
User
- Ordinary accounts for authenticated users
- Usually have permission to perform everyday tasks and access information suitable to the user’s job role
- Don’t have access to administrative functions or sensitive data outside user’s specific job role
Privileged
- Accounts with access to resources ordinary users do not, including but not limited to administrator accounts
- For example: Help desk worker might be able to reset passwords for user accounts, but not change more critical security settings