Domain 1 - Access Controls Flashcards
Three constructs someone implementing an AC system should consider.
AC Policies, Models, and Mechanisms
DAC
DISCRETIONARY ACCESS CONTROL
Allows the creator of a file to delegate access to others.
Attributes of a subject are referred to as…?
privilege attributes or sensitives
Total number of permissions in a Windows OS uses the NTFS file system?
14
Number of Standard Permissions in a Windows OS NTFS File System?
5
Authorization
Process where requests to access a particular resource should be granted or declined.
Authentication
Providing and validating identity.
Capability List
DAC matrix that sorts by rows.
RSBAC
RULES SET BASED ACCESS CONTROLS
Discretionary controls giving data owners the discretion to determine the rules necessary to faciliate access.
Open Source Framework logic for GFAC by Abrams and LaPadula
CUI
CONSTRAINED USER INTERFACE
Methodology that restricts the user’s actions to specific functions by not allowing them to request functions that are outside of their respective level of privilege or role.
3 Main Types of CUI
- Menus and Shells
- Database Views
- Physically Constraining a UI
Menus and Shells
Users are given the commands they can execute.
Database Views
Mechanism used to restrict user access to data contained in databases.
Physically Constraining a UI
Provides only certain keys on a keypad or a certain touch button on a screen.
VBAC
VIEW-BASED ACCESS CONTROL
Restricts or limits and AC subject’s ability to view or perhaps act on an object on the AC subject’s assigned level of authority.
CDAC
CONTENT-DEPENDENT ACCESS CONTROL
Protects databases containing sensitive information. Permits or denies the subjects access to objects based on explicit content within the object.
ex. HIV test.
CBAC
CONTEXT-BASED ACCESS CONTROL
Used in FW applications to extend the FW’s decision making process. ex. Stateful Inspection FW.
CDAC vs CBAC
CDAC - Makes decisions based on the content within an object
CBAC - Only concerned with context or the sequence of events leading to the object being allowed through the FW.
TRBAC
TEMPORAL ROLE-BASED ACCESS CONTROL
Support periodic role enabling and disabling and temporal dependencies among such actions.
NDAC
NON-DISCRETIONARY ACCESS CONTROL
Policies that have rules that are not established at the discretion of the user.
MAC
MANDATORY ACCESS CONTROL
Used in environments of high levels of security. Decisions are made by a single entity.
MAC’s 3 Object Level Classifications
Top Secret
Secret
Confidential
*-property
Star Property BLP
A subject can save an object only at the same or higher classification. BIBA - A subject cannot modify an object of a higher integrity level (No write up)
Strict *-property
Strict Star Property Requires information can be written at, but not above, the subject’s clearance level.