Authorization– The process of ensuring only authorized rights are exercised– Policy enforcement– The process of determining rights– Policy definition
Users receive rights based on – Access Control models– Different business needs or mission requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Least privilege
A
Rights and permissions should be set to the bare minimum– You only get exactly what’s needed to complete your objective
All user accounts must be limited– Applications should run with minimal privileges
Don’t allow users to run with administrative privileges– Limits the scope of malicious behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Mandatory Access Control (MAC)
A
The operating system limits the operation on an object– Based on security clearance levels
Every object gets a label– Confidential, secret, top secret, etc.
Labeling of objects uses predefined rules– The administrator decides who gets access to what security level– Users cannot change these settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Discretionary Access Control (DAC)
A
Used in most operating systems– A familiar access control model
You create a spreadsheet– As the owner, you control who has access– You can modify access at any time
Very flexible access control– And very weak security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Role-based access control (RBAC)
A
You have a role in your organization– Manager, director, team lead, project manager
Administrators provide access based on the role of the user– Rights are gained implicitly instead of explicitly
In Windows, use Groups to provide role-based access control– You are in shipping and receiving, so you can use the shipping software– You are the manager, so you can review shipping logs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Rule-based access control
A
Generic term for following rules– Conditions other than who you are
Access is determined through system-enforced rules– System administrators, not users
The rule is associated with the object– System checks the ACLs for that object
Rule examples– Lab network access is only available between 9 AM and 5 PM– Only Chrome browsers may complete this web form
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Attribute-based access control (ABAC)
A
Users can have complex relationships to applications and data– Access may be based on many different criteria
ABAC can consider many parameters– A “next generation” authorization model– Aware of context
Combine and evaluate multiple parameters– Resource information, IP address, time of day, desired action, relationship to the data, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Time-of-day restrictions
A
Almost all security devices include a time-of-day option– Restrict access during certain times or days of the week– Usually not the only access control
Can be difficult to implement– Especially in a 24-hour environment
Time-of-day restrictions– Training room network is inaccessible between midnight and 6 AM– Conference room access is limited after 8 PM– R&D databases are only after between 8 AM and 6 PM