CH04 CompSec4e
CH04 CompSec4e
CH04 CompSec4e
Access Control
Security
Requirements
( SP 800-171)
Access
Control
System
Commands
(Table is on page
116 in the
textbook)
Protection Domains
• Set of objects together with access rights to those objects
• More flexibility when associating capabilities with protection
domains
• In terms of the access matrix, a row defines a protection domain
• User can spawn processes with a subset of the access rights of the
user
• Association between a process and a domain can be static or dynamic
• In user mode certain areas of memory are protected from use and
certain instructions may not be executed
• In kernel mode privileged instructions may be executed and
protected areas of memory may be accessed
UNIX File Access Control
UNIX files are administered using inodes (index
nodes)
• Control structures with key information needed for a particular file
• Several file names may be associated with a single inode
• An active inode is associated with exactly one file
• File attributes, permissions and control information are sorted in the
inode
• On the disk there is an inode table, or inode list, that contains the
inodes of all the files in the file system
• When a file is opened its inode is brought into main memory and
stored in a memory resident inode table
FreeBSD
• Setfacl command assigns a list of UNIX user IDs and groups
• Any number of users and groups can be associated with a file
• Read, write, execute protection bits
• A file does not need to have an ACL
• Includes an additional protection bit that indicates whether the file has an extended ACL
Mutually exclusive
Cardinality Prerequisite roles
roles
• A user can only be • Setting a maximum • Dictates that a user can
assigned to one role in the number with respect to only be assigned to a
set (either during a session roles particular role if it is
or statically) already assigned to some
• Any permission (access other specified role
right) can be granted to
only one role in the set
Attribute-Based Access
Control (ABAC)
Allows an unlimited
Systems are capable of
number of attributes to
enforcing DAC, RBAC,
be combined to satisfy
and MAC concepts
any access control rule
ABAC Policies
A policy is a set of rules and relationships that govern allowable behavior
within an organization, based on the privileges of subjects and how
resources or objects are to be protected under which environment
conditions
Examples of credentials are smart cards, private/public An authorized individual sponsors an individual or entity
cryptographic keys, and digital certificates for a credential to establish the need for the credential
A credential is produced
• Depending on the credential type, production may involve encryption, the
use of a digital signature, the production of a smart card or other functions
• Concerned with defining rules for a resource that requires access control
• Rules would include credential requirements and what user attributes,
resource attributes, and environmental conditions are required for access of
a given resource for a given function
Privilege management
Policy management