240 likes | 257 Views
Explore the role-based approach to engineering authority and trust in cyberspace through policy models, RBAC security principles, system architectures, and more. Learn how RBAC can enhance information security management by encoding permissions based on roles rather than identity.
E N D
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu www.list.gmu.edu
AUTHORIZATION, TRUST AND RISK • Information security management is fundamentally about managing • authorization and • trust so as to manage risk
What? How? ENGINEERING AUTHORITY & TRUST4 LAYERS Policy Model Architecture Mechanism
What? How? ENGINEERING AUTHORITY & TRUST4 LAYERS Multilevel Security No information leakage Lattices (Bell-LaPadula) Security kernel Security labels
What? How? ENGINEERING AUTHORITY & TRUST4 LAYERS Role-Based Access Control (RBAC) Policy neutral RBAC96 user-pull, server-pull, etc. certificates, tickets, PACs, etc.
ROLE-BASED ACCESS CONTROL (RBAC) • A user’s permissions are determined by the user’s roles • rather than identity or clearance • roles can encode arbitrary attributes • multi-faceted • ranges from very simple to very sophisticated
RBAC SECURITY PRINCIPLES • least privilege • separation of duties • separation of administration and access • abstract operations
RBAC96IEEE Computer Feb. 1996 • Policy neutral • can be configured to do MAC • roles simulate clearances (ESORICS 96) • can be configured to do DAC • roles simulate identity (RBAC98)
RBAC1 ROLE HIERARCHIES RBAC2 CONSTRAINTS RBAC96 FAMILY OF MODELS RBAC3 ROLE HIERARCHIES + CONSTRAINTS RBAC0 BASIC RBAC
USER-ROLE ASSIGNMENT PERMISSION-ROLE ASSIGNMENT USERS ROLES PERMISSIONS ... SESSIONS RBAC0
... RBAC1 ROLE HIERARCHIES USER-ROLE ASSIGNMENT PERMISSION-ROLE ASSIGNMENT USERS ROLES PERMISSIONS SESSIONS
HIERARCHICAL ROLES Primary-Care Physician Specialist Physician Physician Health-Care Provider
EXAMPLE ROLE HIERARCHY Director (DIR) Project Lead 1 (PL1) Project Lead 2 (PL2) Production 1 (P1) Quality 1 (Q1) Production 2 (P2) Quality 2 (Q2) Engineer 1 (E1) Engineer 2 (E2) Engineering Department (ED) PROJECT 1 PROJECT 2 Employee (E)
... RBAC3 ROLE HIERARCHIES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS ROLES PERMISSIONS SESSIONS CONSTRAINTS
... ADMINISTRATIVE RBAC ROLES PERMISSIONS USERS CONSTRAINTS ADMIN ROLES ADMIN PERMISSIONS
EXAMPLE ROLE HIERARCHY Director (DIR) Project Lead 1 (PL1) Project Lead 2 (PL2) Production 1 (P1) Quality 1 (Q1) Production 2 (P2) Quality 2 (Q2) Engineer 1 (E1) Engineer 2 (E2) Engineering Department (ED) PROJECT 1 PROJECT 2 Employee (E)
EXAMPLE ADMINISTRATIVE ROLE HIERARCHY Senior Security Officer (SSO) Department Security Officer (DSO) Project Security Officer 1 (PSO1) Project Security Officer 2 (PSO2)
RBAC PARAMETERS • RBAC has many facets, including • number of roles: large or small • flat roles versus hierarchical roles • permission-role review capability • static separation of duties • dynamic separation of duties • role-activation capability • at least 64 variations
NIST RBAC MODELin progress • Level 1: flat RBAC • user-role review • Level 2: hierarchical RBAC • plus role hierarchies • Level 3: constrained RBAC • plus separation constraints • Level 4: true RBAC • plus permission-role review
CLASS I SYSTEMSENFORCEMENT ARCHITECTURE Client Server
CLASS I SYSTEMSADMINISTRATION ARCHITECTURE Server1 Administrative Client Authorization Center Server2 ServerN
CLASS II SYSTEMSSERVER-PULL Client Server Authorization Server Authentication Server
CLASS II SYSTEMSUSER-PULL Client Server Authorization Server Authentication Server
R&D IN INTERNET TIME • new technology needs to be developed and deployed continuously in the very short term • need focused applied research • need synergy between Universities and Industry