Access Control UNICAM
UNICAM AC Partial 2
UNICAM AC Partial 2
Fichier Détails
Cartes-fiches | 71 |
---|---|
Langue | English |
Catégorie | Informatique |
Niveau | Université |
Crée / Actualisé | 04.12.2021 / 04.12.2021 |
Lien de web |
https://card2brain.ch/box/20211204_access_control_unicam
|
Intégrer |
<iframe src="https://card2brain.ch/box/20211204_access_control_unicam/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
If we store the Access Rights at the Object we call this ?
Access Control Lists
Objects: Use an ACL which stores the access rights to an object as a list with the object itself. Corresponds to a column of the AC Matrix and state who may access a given object.
How do we call the entries in an ACL
- Entries in an ACL are called AC Entries (ACEs)
Whats the problem if we manage individual subjects in ACEs and what might be a solution?
Management of individual subjects is rather complex -> therefore its best practice to group subjects into access groups.
How does the UNIX ACE sturcture look like?
- User, group and others
For which systems are ACL's best fitted?
fitted for operating system that apply access management towards Objects
What are disadvantegs of ACLs?
if you want to find out what kind of permissions a single subject has you face laborious search through all ACLs
How do we call the discipline of who's in charge of setting security policies?
Ownership
What are the two fundamental options in terms of Ownership?
- Define an owner for each resource and let him decide who has access -> policies defined by the owner are called discreationary -> cause access control is at the discretion of the owner
- A System-wide policy decrees who is allowed to have access. Policies imposed by the system are called mandatory
What is IBAC? and what is the disadvantge
Identity based access control - incurs an identity management overhead and does not scale well
What is the difference between Discretionary and mandatory access control?
Duscretuibary -> at the discretion of the owner -> he must take care of it (e.g. IBAC)
Mandatory -> security labels for classified objects ->
How can we reprents policies in a more manageable fashion?
By implementing intermediate layers between users and object
What is the idea behind intermediate control groups?
- Means of simplifying the definition of access control policies
- Users with similar access rights are collected in groups
- This groups are given permission to access Objects.
What is a negative Permission?
- Policy exceptions exist
- Some users should get a permission for an object directly
- Or denied a permission that normally follows a group
What can happen with negative permissions? And how can we handle such a scenario?
- This may result in a POLICY Conflict as Group rules an direct rules interfere with each other
- We must consider such conflict by the reference monitor
- Possible Solution: First entry is valid – the later ones will be ignored
What is a privilege?
A policy refers to the operations a user is allowed to execute. A Privilege stands for the right to execute certain operations.
- Are associated with OS functions – Sys Ad for e.g., can perform functions such as backup, mail access or network access
- Are an intermediate Layer between subjects and operations.
What is RBAC - Role Based Access Control ?
A role can be defined as a collection of application specific operations (Procedures). Subjects derive their access rights from the role they are performing. (RBAC) introduces roles, procedures and possible data types as intermediate layers between subjects and objects
In RBAC a role is defined by
- A collection of procedures.
- A user assigned to a role can execute the procedures defined for that role
- A user can have multiple role and more than one user can have the same role
in RBAC a Procedures is defined as?
- High-level access control methods with a more complex semantic than read or write
- Can only be applied to objects of certain data types -> consider a funds transport between two bank accounts
in RBAC data types are defined as ?
- Each object is of a certain data type
- Can only be accessed through procedures which are defined for this kind of data type
Controlling access to an object by restricting the procedures that may access this object is a general programming practice. It is a fundamental concept in the theory of abstract data types
If we talk about inheritance in RBAC what do we define by that?
Inheritance of Child Roles Permissions in Parent -> Teacher can do what a student can do + extra power
The least privilege principle - what does it suggest in which context?
RBAC - The least privilege principle suggests that only roles necessary for the current task should be activated
How can we structure roles ?
By hirarchy
Tasks exist, where the execution must be performed by distinct user - how do we call this principle?
Seperation of Duties
What do we understand under static seperation of duties
- The roles may be assigned to a user are fixed and have to take into account separation of duties requirement
- A user can either issue an order or approve a payment
What do we understand under dynamic seperation of duties
- Roles may be assigned to a user depend on the current task
- A user who has issued a particular purchase may not approve payment for that specific order but for other order he did not issue the purchase
What are Flat RBAC's
user are assigned to roles,
permissions to role,
users get permissions via role
What is Hierachical RBAC
Add support for role hierarchies. Teacher Role can be defined as senior to teaching assistant
Constrained RBAC
adds support for seperation of duties
a rule that sutdents cannot be teaching assistand on a course they are taking
What are Protection Rings?
PR’s are simple example of an intermediate layer of hardware based access control for subjects and objects
Unix uses Protections rings how?
- Unix uses two levels with root and operating system running in ring 0 and user processes running in 3
What is Policy instantiation?
When developing software, you rarely will be in position to know your eventual users. This means policies cannot refer to specific user identities but can perhaps refer to generic placeholder principals such as Teach and Student.