31
ABAC AND THE EVOLUTION OF ACCESS CONTROL MODEL I-Security Seminar ITS Surabaya, Sept 2014

Abac and the evolution of access control

Embed Size (px)

DESCRIPTION

This presentation discuss the evolution of Access Control Model and also introducing ABAC or Attributes Based Access Control as a new approach for authorization.

Citation preview

Page 1: Abac and the evolution of access control

ABAC AND THE EVOLUTION OF

ACCESS CONTROL MODEL

I-Security Seminar ITS Surabaya, Sept 2014

Page 2: Abac and the evolution of access control

Co Founder of BelajarMikrotik.Com

Founder of ForumMikrotik.Com

Trainer and Lecturer for Project Management and Information Security Classes

ICT Manager of Services at PT. Bayan Resources Tbk,

AKBAR AZWIR, MM, PMP, CISSP

Page 3: Abac and the evolution of access control

INFORMATION SECURITY

Information

Security

Confidentiality

Availability

Integrity

Page 4: Abac and the evolution of access control

AAA

Authentication

Authorization

Accounting

To answer question “Who are you”3 factor : Who you are, what you have and what you are

To answer question “What can you access”

To answer question “What you have accessed”

Page 5: Abac and the evolution of access control

Let’s talk about Access Control

Page 6: Abac and the evolution of access control

ACCESS CONTROL MECHANISM

“The logical component that serves to receive the access request from the subject, to decide, and to enforce the access decision.”

- NIST Special Publication 800-162

Page 7: Abac and the evolution of access control

ACCESS CONTROL MODEL

“Framework that dictates how Subjects Access Object.”

- CISSP AIO Exam Guide, 6th Edition

Page 8: Abac and the evolution of access control

ACCESS CONTROL MODEL

DAC MAC

RBAC

ABA

C

Page 9: Abac and the evolution of access control

DISCRETIONARY ACCESS CONTROL (DAC)

ACL

• Decentralized

• Owner Discretion, usually via administrator

• Enforce through ACL

• Identity Based

• Permission rule attached to the Object

Page 10: Abac and the evolution of access control

DISCRETIONARY ACCESS CONTROL (DAC)

ACL

Folder Accounting Dept

Johny, Accounting Staff

RudiAccounting Manager

Agung, Logistic Staff

Subject Permission

Rudi Full Control

Johny R W D C

Page 11: Abac and the evolution of access control

DISCRETIONARY ACCESS CONTROL (DAC)

Pros

• Easy to implement

• Great Flexibility

• Built-in in most OS

Cons

• Doesn’t scale well

• Possibility of ACL Explosion

• Prone for mistakes

Page 12: Abac and the evolution of access control

ACCESS CONTROL MODEL

DAC MAC

RBAC

ABA

C

Page 13: Abac and the evolution of access control

MANDATORY ACCESS CONTROL (MAC)

Subject with Clearance Object with Classification

• Centralized

• Access Control enforced with Clearance and Classification

• Only Subject with Clearance the same or above from Object Classification can Access the Object

Page 14: Abac and the evolution of access control

MANDATORY ACCESS CONTROL (MAC)

Ken Watanabe, Intelligent AnalysisClearance Level 2

Project PegasusData Classification Top Secret

Clearance Level Classification

Level 5 Top Secret, Secret, Classified, UnClassified

Level 4 Secret, Classified, UnClassified

Level 3 Classified, UnClassified

Level 2 UnClassified

Page 15: Abac and the evolution of access control

MANDATORY ACCESS CONTROL (MAC)

Pros

• Most Secure• Easy to scale

Cons

• Not Flexible• Limited user

functionality• High admin

overhead• Expensive

Page 16: Abac and the evolution of access control

ACCESS CONTROL MODEL

DAC MAC RBAC

ABAC

Page 17: Abac and the evolution of access control

ROLE BASED ACCESS CONTROL (RBAC)

ACL

Subject Assigned to Role Role Object with ACL for Role

Page 18: Abac and the evolution of access control

ROLE BASED ACCESS CONTROL (RBAC)

ACL

Accounting Manager

Accounting Staff

Jim

Lisa

Lucas

Andrew

Subject Permission

Accounting Manager

Full Control

Accounting Staff

R W D C

Page 19: Abac and the evolution of access control

ROLE BASED ACCESS CONTROL (RBAC)

• Centralized and Decentralized at once

• Subject access permission are enforced through Role membership

• Role permissions are enforced through Object’s ACL

• Subject can be a member of more than one role

Page 20: Abac and the evolution of access control

ROLE BASED ACCESS CONTROL (RBAC)

Pros

• Scalable to some degree

• Great for organizations with high turn over

Cons

• Roles needs provisioning and maintenance

• Possibility of Role explosion

• Unable to accommodate real-time context

Page 21: Abac and the evolution of access control

ACCESS CONTROL MODEL

DAC MAC

RBA

C ABAC

Page 22: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)

• Centralized

• Access Control enforced by taking Subject Attributes, Object Attributes, and Environment Context and compare them to the Policy

• Policy written using human readable language that easily understood, XACML (eXtensible Access Control Markup Language)

Subject with Attributes Object with Attributes

EnvironmentConditions

Page 23: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)

User Dept X Folder Classified Dept X

EnvironmentConditions

• Ex 1 : User can only access their Dept Folder from their own Office location at Working Hour only

• Ex 2 : Certain Folders can only be accessed from Specific Workstations if the bandwidth usage is low

Page 24: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)

PEP

PDP

PAP PIP EnvironmentConditions

Attribute Repository

Policy Repository

PEP : Policy Enforcement Point

PDP : Policy Decision Point

PAP : Policy Administration Point

PIP : Policy Information Point

Page 25: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)

Pros

• Scalable• Real time

Context aware• Segregation of

Duty, different people can manage different Subject and Object Attributes and Policy

Cons

• It’s new• Requires

socialization and convincing

• Organization change required to manage Attributes

Page 26: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)• ABAC is still in it’s early stage

• Gartner predicts that by 2020 70% of business will use ABAC

Page 27: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)• Microsoft Windows Server 2012 Claim Based

Access Control or Dynamic Access Control is Microsoft implementation of ABAC

• Fedora 3.3 FESL (Fedora Security Layer) using XACML to implement ABAC

• 3rd party auth service companies such as Axiomatics and Avatier offer ABAC implementation to OS and Applications and or Databases

Page 28: Abac and the evolution of access control

ATTRIBUTE BASED ACCESS CONTROL (ABAC)• Open source ABAC projects such as :

• http://abac.deterlab.net

• OpenAZ, http://www.openliberty.org

Page 29: Abac and the evolution of access control

DAC SIMPLE DEMONSTRATION

ICT

Marketing

Finance

ICT

Marketing

Finance

DC1, Jakarta FS1, Medan

User Attribute - Department

Attribute – st (State)

Andi.Michael Finance Jakarta

Bayu. Achmad Finance Medan

Ken. Surahyo Marketing Jakartq

David.Lim Marketing Medan

Zeru.Halim Information Technology

Jakarta

Page 30: Abac and the evolution of access control

CONCLUSION

• The current information system ecosystem require a flexible yet secure access control and that’s what ABAC is trying to answer

• As Gartner predicts, by 2020, 70% of business will use ABAC for authorization. Let’s familiarize early

• There is still a lot of study required as there is no standard implementation of ABAC, therefor there is still a lot of involvement that we can offer to the Information System world

Page 31: Abac and the evolution of access control

ABAC AND THE EVOLUTION OF

ACCESS CONTROL MODEL

I-Security Seminar ITS Surabaya, Sept 2014

Thank You

Q & A