170 likes | 298 Views
COMMIT/. Controlling Break-the-glass Through Alignment. A. Adriansyah B.F. van Dongen N. Zannone {a.adriansyah,b.f.v.dongen, n.zannone }@tue.nl. 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust. Washington D.C., 11 Sep 2013. Enforcement mechanisms.
E N D
COMMIT/ Controlling Break-the-glass Through Alignment A. Adriansyah B.F. van Dongen N. Zannone {a.adriansyah,b.f.v.dongen,n.zannone}@tue.nl 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust Washington D.C., 11 Sep 2013
Enforcement mechanisms • Security policies define allowed behavior • Basic idea: infringements are violations and as such should not be permitted :acl : a :aclreh :ac Trace 3
Break-the-Glass • Existing protection mechanisms are very rigid • Systems have to cope with exceptions • e.g., dealing with emergencies • Include break-the-glass functionality • Bypass security mechanisms • Introduce weak point in the system 5
Overview Trace (Event Log) Alignments Break-the-glass Architecture High-level Deviations Experiments Process Model 6
Alignments Non-completion is penalized Alignment : Move on Log Synchronous moves a l r c e >> >> r t2 c t4 l t3 e t5 h t9 a t1 >> Move on Model a e r l c Trace : a l r c e >> Prefix Alignment : r t2 c t4 l t3 e t5 a t1 >> 7
Overview Trace (Event Log) Alignments Break-the-glass Architecture High-level Deviations Experiments Process Model 8
Controlled Break-the-glass Architecture Access Control Process Model Restricted Data Break-the-glass Control User Security Officer Logging Server Deviation Budget Conformance Checker Event Log 9
Controlled Break-the-glass Example a e r l c Trace : Budget l r c e >> 2 1 0 Prefix Alignment : r t2 c t4 l t3 e t5 >> 10
Overview Trace (Event Log) Alignments Break-the-glass Architecture High-level Deviations Experiments Process Model 11
Swapped Activities Synchronous move: x/2 Move on model: + r l l r a l r c e a l r c e >> a t1 a t1 r t2 c t4 l t3 l t2' e t5 r t3' c t4 e t5 >> Pattern a l r c e >> a t1 r t2 c t4 l t3 e t5 >> a e c Trace : Prefix Alignment : Prefix Alignment (without Pattern) Process Model 12
Replaced Activities l r a r l e l t >> a t1 r t2 l t3 c t4 e t5 t t9' >> Synchronous move: x Move on model: + Pattern a l t e Trace : Alignment : Process Model 14
Overview Trace (Event Log) Alignments Break-the-glass Architecture High-level Deviations Experiments Process Model 15
Synthetic Data Generated traces from a process model Injected deviations in traces Real-life Data Logs of a Dutch hospital 70% used to mine process model 30% used to verify compliance Comparison between automatic and manual verification Experiments 16
Experiments: Synthetic data Without pattern Selected patterns All possible patterns 17
Overview Trace (Event Log) Alignments Break-the-glass Architecture High-level Deviations Experiments Process Model 19
Conclusions • Flexible architecture for controlling break-the-glass • Diagnostics on high/low-level deviations • Open Issues • Assumption: Cost optimal alignment is the most “probable” • Define cost function • Determine deviation budget 20