Chapter 4 - Access Control Flashcards
Acess Control Definition
Define Access Control
The prevention of unauthorized access of a resource (or entering into physical facility)
also prevent legitimate users from using in unauthorize way
RFC Definition (of computer security)
Define Access Control
Process by which use of system** resources** is regulated according to a security policy and permitted only by authorized entities
Difference between User Authentication and Access Control
Define Access Control
Authentication establishes **who **you are and Access control establishes what you can do within a system
Relationship to other security functions
Define Access Control
“Broader Context of Access Control”
- Authentication: first verifies credentials of user are valid
- Access Control: Grants permissions to a system resource
- Auditing: Independent review of system records and activities to test adequacy, ensure compliance, and detect breaches
Access control policies should dictate:
Access Control Principles
- Who can access a resource
- What type of access is allowed
- Under what conditions
Access Control Basic Elements
Access Control Basic Elements
- Subject (entity capable of accessing objects)
- Object (Resource to be accessed)
- Access Rights (What subject can do with object)
Subjects held accountable for actions they initiate!!!
Classes of Subject (3)
Access Control Basic Elements
- Owner
- Group
- World
Examples of Access Rights
Access Control Basic Elements
- read
- write
- execute
- delete
- create
- search
What are the three main Access Control Policies?
Access Control Principles
- Discretionary Access Control (DAC): Based on identity of requestor
- Mandatory Access Control (MAC): Based on labels and security clearances
- Role-based Access Control (RBAC): Based on roles that users have in system
Not mutually exclusive, we can implement multiple at once!!!
DAC definition
DAC
Scheme in which an entity may enable another entity to access some resource
How is DAC often implemented?
DAC
An access matrix where:
- Rows = subjects
- Columns = objects
- Each cell = access rights
(That subject has to an object)
The value of cell password file:Eric = read
*From these we make access control lists and capability lists
Why use ACLs or Capability Lists?
DAC
- Access matrix can become huge
- most of the cells are empty which wastes space
- changing permissions requires modifying matrix, more cumbersome than list
What are Access Control Lists (ACLs)
DAC
List of subjects that can acccess a particular object
What are capability lists?
DAC
List of objects that a particular subject can access
ACL
Pro vs Con
DAC
Pro:
* Object owner can easily control who can access their resource
Con:
* Takes up too much space/search overhead (Many more objects in system compared to subjects)
good for managing permissions from perspective of objects (unix)
Capability List
Pro vs Con
DAC
Pro:
* Easy to see what a user is allowed to access
* More flexible, subjects can access many objects and its easier to control that with capability lists
Con:
* Harder to manage by object (see all subjects that can access specific object)
Good for user-focused resource control
How are UNIX files managed?
DAC
inodes