Role Based Access Control Flashcards

1
Q

What is RBAC

A
  • It is a method for controlling access based on roles assigned to users and it is most commonly used within organisations
  • Organisations can decide which user gets what role, and then each of them gets their own privileges.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a role

A

Roles are a collection of pre-defined privileges or permissions bound to a resource.
It follows that a users assigned role determines the permissions that the individual is granted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RBAC Benefits

A
  • Improving operational efficiency
  • Enhancing Compliance
  • Giving Administrators Increased Visibility
  • Reducing costs
  • Decreasing Risk of breaches and data leaks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Applying RBAC steps

A

1 Understanding business needs
2 Planning the scope of implementation
3 Defining Roles
4 Implementations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RBAC Issues

A
  • Role Explosion
  • Security risk tolerance
  • Scalability and Dynamism
  • Expensive and difficult implemenation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RBAC alternatives

A
  • Access control list
  • Attribute based access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Understanding business needs

A
  • A comprehensive analysis should be conducted to examine job functions
  • Regulatory or audit requirements should be considered and current security posture of the organisation assessed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Planning the scope of implementation

A
  • The requirements should be identified and implementation planned to align with organisational needs.
  • Scope should be narrowed to focus on systems or applications that store sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Defining roles

A
  • Roles are defined once needs analysis has been performed and how individuals perform their tasks is understood.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Implementation

A
  • Rolling out the RBAC within systems.
  • Best done in stages to avoid disruption to business.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access control list (ACL)

A
  • It is a table listing permissions attached to computing resources.
  • Tells OS what users can access an object.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC vs ACL

A

RBAC is more effective on a large organisational level, but ACL is better at an individual level and for low-level data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribute Based Access Control (ABAC)

A
  • It evaluates a set of rules and policies to manage access rights for specific attributes.
  • Applies Boolean logic to grant and deny access to users based on a complex evaluation of the users attributes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RBAC vs ABAC

A
  • RBAC relies on pre-defined roles, ABAC is more dynamic and uses regulation-based access control
  • ABAC executes a more complex search and requires more power an time, only used when RBAC is insufficient.
    e.g RBAC gives access to all managers but ABAC policy will only grant access to managers in the financial department.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Role Explosion

A
  • This occurs when the difference in roles becomes too detailed.
  • Difficult to manage and costly to manage as new roles require more monitoring
  • This creates more issues: a user has too many roles assigned to them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security risk tolerance

A
  • RBAC is not ideal if your organisation is susceptible to security risks
  • Once RBAC is deployed it difficult to react to changing security risks.
17
Q

Scalability and Dynamism

A
  • When RBAC is first deployed, it arguably knows what roles need to be defined and what users they should be defined to.
  • Issues occur with organisations growing and more people joining
  • May require a redesign to get back on track
18
Q

Expensive and difficult implementation

A
  • If an organisation does not have RBAC and decides to implement it, it requires duplication of servers and infrastructures which support RBAC. This is a very complex and thus becomes a costly process.
  • Migrating users contains a variety of difficulties and challenges. This can result in security holes, unplanned downtimes and data loss.