Access Control UNICAM

UNICAM AC Partial 2

UNICAM AC Partial 2


Kartei Details

Karten 71
Sprache English
Kategorie Informatik
Stufe Universität
Erstellt / Aktualisiert 04.12.2021 / 04.12.2021
Weblink
https://card2brain.ch/box/20211204_access_control_unicam
Einbinden
<iframe src="https://card2brain.ch/box/20211204_access_control_unicam/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

Why do we need Access Control - whats is the purpose?

We need a language for expressing our intended access control policies together wit a mechanism to enforce this access control behavior.We need a language for expressing our intended access control policies together wit a mechanism to enforce this access control behavior.

What do we need to consider for shared data in terms of security?

  • Integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life cycle.
  • Confidentiality deals with protecting against the disclosure of information by ensuring that the data is limited to those authorized

Basic Terminology for AC

How do we call the active entity?

Subject or Principal

Basic Terminology for AC

How do we call the passive entity?

Object

Basic Terminology for AC

How do we call the process?

Access Operation

Basic Terminology for AC

How do we call logic behind AC?

Reference Monitor

What does the subject do in AC?

Performs an operation - wants to access something

What are Object examples?

Files, folders, printers, memory

What does the reference monitor do?

Acts as a guard and grants or denies access

What is Identity-based access Cotnrol?

Traditional Security - Policy refers to human users ->most common in OS

Is there a difference between subject and principial?

Principals are the real users identity

Subjects operate on behalf of human users we call princiapls -> subjects are bound to principals

To identify a Subject in identiy based access control - A subject name must be?

Globally Unique

Readable

Meamorable

Do Subjects have to be bound to principals?

Do Prinicpals need to represent human users or attributes of human users?

What is the reference monitor doing?

Checks whether the principal that is bound to the subject has the right to access the object

Make an example in an operating system for a principal and a subject

Prinicpal = User Identity

Subject = process running under a user identity

Prinicipals and objects present two options for focusing control

A) what a principal is allowed to do = e.g. DB User -> Access Rights

B) what may be done with an object = e.g. OS files : infrastrcturure to manage files and resources

Access control consists of two steps

1) Authentication : who sad this statement

2) Authorization : who is trusted to access the object

Do Access Operation vary on different systems ?

Make some examples for access operations:

Read and write physical memory

methods calling in OO system

Access Modes:

What are the two most basic level of Access Modes

Obser - look at the contents of an objects

Alter . change the contents of an object

Draw theh Bell - LaPadula Model

Execute | Append | read | write

Observe                                              x       x

Alter                                      x                     x

Why does it make sense to add a read to the write access mode in the lapadula model

In terms of efficiency - it makes senste to combine both as otherwise a user may open a file twice - once for reading once for writing

In the LaPadula Access Model - Append has no Ovserver rights - does this make sense and where ?

  • Logs or a Process who is writing to a log but has no need to read it.

In the LaPadula Access Mode Execute none - Observe and Alter are selecter - for what is it then useful?

  • Neither observe or alter -> rarely the case
  • Tamper-resistant register (Key cannot be read but access control rules access to execute encrypton)

What is different in terms of Access Mode for example in the Multics OS?

It differs access attributes for files and for directories

R / W and Execute are different to the basic Lapdaula Model

Multics OS Access Modes - show us the File Modes along with the LaPadula notations

Files:

Read - r

execute - e,r

read and write - w

write a

Multics OS Access Modes - show us the Directories Modes along with the LaPadula notations

Status - r

status and modify - w

append - a

search e

IN the unix operatin system access control policies are expressed in term of 3 operations:

Read - reading from a file

Write - writing to a file

Execute: executing a program file

As with multics, Linux does not imply read access to write operations.

If those operations are applied to directories – they have the following meaning:

  • Read: list directory contents
  • Write: create or rename a file in the directory
  • Execute: search the directory

Unix controls who can create and delete files by controlling write access to the file’s directory

  • Access can be changed by modifying a files entry in its directory
  • Defines access rights to file and dirs. Via access rights to the parent directory
  • Grant and Revoke -> manipulating a subject’s access rights by some other party
  • Assert and deny when the subject changes its own access rights.
    • Delegation policies -> subject invokes another subjects and the rights of invoked subject have to be established

Administrative access rights - how do we call the definition if the AR get modified by some other party ?

Administrative access rights - how do we call the definition if the AR get modified by its own ?

Access Control Structure - why ?

we know the operations but we need to somehow which access operations are permitted

What are the requierements of Access Control Structures?

  • Access control Structures help to express your desired access control policy
  • We need some way to check if our intended policy has been capture correctly

What is a tool fr Access Control Structures? And how is it modeled?

Access Controll Matrix

 

 Subject | Object Object Object

Alice         r             r          w

Bob          rw           w         r

 

What are some disadvantegs of an access control matrix and what should we use in such scenarios?

Disadvantage: not suitable if number of subjects and objects is large or if they change frequently -> in such scenarios intermediate levels of control are preferred

Where can an access control matrix be implemented ?

At both - subject or object

Capabilites -> what is it ?

If we store the access control matrix with the subject -> we give them capability - a unforgeable toke that specifies this subjects accds rights. It corresponds to the subjects row in the access control matrix

 

E.G

Alice: capability: edite.exe: execute etc...

What are the downsides of capabilites?

  • Disadvantage: difficult to get an overview of who has permission to access given objects.
  • It is difficult to revoke a capability – either OS has to be given the task or the user who passed those to keep everything up-to-date -> it gets even more awkward if 3rd parties are involved.
  • Where to store capabilities -> if over network exchange-> cryptography is required.