Domain 1 - Access Controls Flashcards
Three constructs someone implementing an AC system should consider.
AC Policies, Models, and Mechanisms
DAC
DISCRETIONARY ACCESS CONTROL
Allows the creator of a file to delegate access to others.
Attributes of a subject are referred to as…?
privilege attributes or sensitives
Total number of permissions in a Windows OS uses the NTFS file system?
14
Number of Standard Permissions in a Windows OS NTFS File System?
5
Authorization
Process where requests to access a particular resource should be granted or declined.
Authentication
Providing and validating identity.
Capability List
DAC matrix that sorts by rows.
RSBAC
RULES SET BASED ACCESS CONTROLS
Discretionary controls giving data owners the discretion to determine the rules necessary to faciliate access.
Open Source Framework logic for GFAC by Abrams and LaPadula
CUI
CONSTRAINED USER INTERFACE
Methodology that restricts the user’s actions to specific functions by not allowing them to request functions that are outside of their respective level of privilege or role.
3 Main Types of CUI
- Menus and Shells
- Database Views
- Physically Constraining a UI
Menus and Shells
Users are given the commands they can execute.
Database Views
Mechanism used to restrict user access to data contained in databases.
Physically Constraining a UI
Provides only certain keys on a keypad or a certain touch button on a screen.
VBAC
VIEW-BASED ACCESS CONTROL
Restricts or limits and AC subject’s ability to view or perhaps act on an object on the AC subject’s assigned level of authority.
CDAC
CONTENT-DEPENDENT ACCESS CONTROL
Protects databases containing sensitive information. Permits or denies the subjects access to objects based on explicit content within the object.
ex. HIV test.
CBAC
CONTEXT-BASED ACCESS CONTROL
Used in FW applications to extend the FW’s decision making process. ex. Stateful Inspection FW.
CDAC vs CBAC
CDAC - Makes decisions based on the content within an object
CBAC - Only concerned with context or the sequence of events leading to the object being allowed through the FW.
TRBAC
TEMPORAL ROLE-BASED ACCESS CONTROL
Support periodic role enabling and disabling and temporal dependencies among such actions.
NDAC
NON-DISCRETIONARY ACCESS CONTROL
Policies that have rules that are not established at the discretion of the user.
MAC
MANDATORY ACCESS CONTROL
Used in environments of high levels of security. Decisions are made by a single entity.
MAC’s 3 Object Level Classifications
Top Secret
Secret
Confidential
*-property
Star Property BLP
A subject can save an object only at the same or higher classification. BIBA - A subject cannot modify an object of a higher integrity level (No write up)
Strict *-property
Strict Star Property Requires information can be written at, but not above, the subject’s clearance level.
2 Models that use MAC?
Bell-LaPaula Confidentitiaity
Biba Integrity
ABAC
ATTRIBUTE-BASED ACCESS CONTROL
Access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies.
Separation of Duties is a key element in which Model?
Clark-Wilson formal model
Bell-LaPadula Model Components
Components are: Subjects, Objects and an AC Matrix.
Objects are classified into a hierarchy of security levels based on sensitivity (low to high)
Subjects assigned security levels called ‘Clearance Levels’.
AC Matrix - Relation between the sensitivity levels of Objects and Subjects. Defines permissions for each clearance level and object classification.
Bell-LaPadula Model Tenet
A given subject can read objects at the same or lower sensitivity level.
Simple Security Property
When a subject can read objects at the same or lower sensitivity level, but not higher.
Limitations of the Bell-LaPadula Model?
- Concerned only with confidentiality and makes no mention of other properties
- Does not address important goals such as ‘need to know’ or the ability to restrict access to individual objects based on a subject’s need to access them.
Which model was designed for controlling access to sensitive data in government and military applications?
Bell-LaPadula Confidentiality Model
Biba Model
Lattice Based.
Integrity model focusing on ensuring that the integrity of information is being maintained by preventing corruption.
Core is a multilevel approach to integrity designed to prevent unauthorized subjects from modifying objects.
Biba Model - How is Access Controlled?
To Ensure that objects maintain their current state of integrity as subjects interact with them.
Biba Model - How it assigns Integrity?
Assigns levels to subjects and objects depending on how trustworthy they are considered to be.
ss-property
BLP - A subject cannot read/access an object of higher classification (No read up).
BIBA - A Subject cannot observe an object of a lower integrity level (no read down)
Invocation Property
BLP - Not used.
BIBA - A subject cannot send logical service requests to an object of a higher integrity.
Clark-Wilson Components
Authenticated Principals (Users)
Programs Acting on Data (Transaction Processes)
Data Items
Clark-Wilson Integrity Policy
Well-formed transactions (that maintain a consistent level of integrity between initial and end state. Also instills the Separation of Duties principals.
MLS Systems
Multilevel Security Systems Systems in which information with various sensitivities or integrity requirements can be processed concurrently in a single system by users or actors with multiple levels of clearance or need to know.
Brewer-Nash Model
‘Chinese Wall’ Principal is that users should not access the confidential information of both a client organization and one or more of it’s competitors.
Rare because the access control rules change based on subject behavior.
Graham-Denning Model
Concerned with how subjects and objects are created, how subjects are assigned rights or privileges, and how ownership of objects is managed. *Primarily concerned with how a model system controls subjects and objects at a very basic level where other models simply assumed such control.
Graham-Denning Model 3 Parts
- Set of Objects
- Set of Subjects
- Set of Rights
Graham-Denning Subjects
Two Parts:
- Process
- Domain - Set of constraints controlling how subjects may access objects.
Graham-Denning Model Eight Primitive Protection Rights
Also called Commands that subjects can execute to have an effect on other subjects or objects.
- Create Object
- Create Subject
- Delete Object
- Delete Subject
- Read Access Right
- Grant Access Right
- Delete Access Right
- Transfer Access Right
Harrison-Ruzzo-Ullman Model
Very similar to Graham-Denning.
Composed of a set of generic rights and a finite set of commands. Also concerned with Situations in which a subject should be restricted from gaining particular privileges.
Process Flow involved in the implementation of authentication mechanisms are?
- Identify - Process used to allow the access control subject to provide information as to their identity.
- Authenticate - Set of providing and validating identity within the access control system.
- Authorize - Process where requests to access a particular resource should be granted or denied based on outcome of the authentication process.
3 Most Common Methods Used to Provide User Identity in an AC System
- User ID - Username and Password
- PIN - Typically a 4 digit numerical combination created by the user.
- Account Number - Typically an 8-16 unique numerical sequence assigned to an individual.
Automated Provisioning
Solutions that provide a framework for managing AC Policies by role, interconnection with IT systems, workflows to sign-off
3 Common Factors in Authentication
- Something you know
- Something you have
- Something you are
ISO 7816
Standard for landing contact readers (Smart Cards)
Dynamic Passwords
One time passwords. Could be from a token or hard word.
2 Types of Tokens
- Synchronous - Time is synchronized between the token device and the authentication server. (RSA Token)
- Asynchronous - Provides a new, one-time password with each use of the token. (SafeWord eToken PASS)
Process for Asynchronous Subject to gain access to object
5 Step Process.
- Authentication server presents a challenge request to subject
- Subject enters the challenge into token device
- Token calculates a correct response
- Subject enters response to the challenge along with a password or PIN
- Response & Password (or PIN) is verified by the authentication server.
RFID
Radio Frequency Identification
Wireless, non-contact use of radio electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to objects.