22
Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

Embed Size (px)

Citation preview

Page 1: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

Policy Evaluation Testbed

Vincent Hu

Tom Karygiannis

Steve Quirolgico

NIST ITL PET Report

May 4, 2010

Page 2: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

2

AC Policy Composing Problems

• No structure model framework to support policy authoring.

• No tool to check correct policy rule specifications, which are hand crafted by administrators.

• No tool for checking the effect (conflicts of rules) when combining more than one polices.

• No efficient ways to generate exhaust test cases for the correctness of an access control system.

Page 3: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

3

Access Control Policy Tool (ACPT)

ACPT is a tool for composing access control models (such as RBAC and Multi-Level models)

Features:

• Allows specification of policy combinations, rules and properties through model templates

• Allows testing and verification of policies against specified properties and reports problems that may lead to security holes

• Generates efficient test suites (by applying NIST’s combinatorial testing technology) for testing of access control implementation

• Test suites can be applied to any access control implementation

• Ensures the safety and flexibility in composing access control policies

• XACML policy generation

Page 4: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

4

ACPT Architecture

GUI

AC Model TemplatesData

Acquisition

Policy GeneratorModel Checker

Test SuiteGenerator

CombinatorialArray Generator

Access Control Policy Tool

User,attribute,

resource,role,

etc. data

GUI allows specification of users, groups, attributes, roles, rules, policies, and resources

Generates encoded policies

.xml

Generates test suites

Validates access control policy models

API/mechanism to consume/acquire

external data related to policies

Generates combinatorial test

array

Test suite

Administrator

optional functions

XACML

Page 5: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

5

ACPT

Page 6: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

6

ACPT

Page 7: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

7

ACPT Demo

Policy A (excerpt from 28 CFR Part 23 Statutes and Govt. Category)

Subject Attributes Resource Attributes

Action

Rule number

28 CFR Part 23 Training

Government Category

Privacy Category

Read

1 Current Federal ISE Yes

2 Current State ISE Yes

3 Expired/None

Federal ISE Yes

4 Current Federal SLT Yes

5 Current State SLT Yes

6 Expired/None

State SLT Yes

Policy B (excerpt from Govt. Category, Remote Access, and OMB/NIST Assurance)

Subject Attributes Resource Attributes

Action

Rule number

Government Category

Remote Access

OMB/NIST Assurance Level

Privacy Category

Read

7 Federal Yes 2 ISE Yes

8 Federal Yes 3 or greater ISE Yes

9 Federal No 2 or greater ISE Yes

10 State Yes 3 or greater ISE Yes

11 State No 2 ISE Yes

12 Federal Yes 3 or greater SLT Yes

13 Federal No 2 or greater SLT Yes

14 State Yes 2 SLT Yes

15 State Yes 3 or greater SLT Yes

16 State No 2 SLT Yes

Page 8: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

8

ACPT Demo

Property to test:

A request with the attributes: * “Current” for 28 CFR Part 23 Training, * “Federal” for Government Category, * “ 1” for Assurance Level, * “True” for Remote Access,to “read” data with * “ISE” Privacy Category attribute should not be allowed.

The rules say:

Rule number 1 of Policy A grants the request of the property, but no rule in Policy B grants such request.

Page 9: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

9

ACPT Demo

Property specification in ACPT

Page 10: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

10

ACPT Demo

Test the property against Policy A, the result return false with counterexample.

Page 11: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

11

ACPT Demo

Test the property against Policy B, the result return true.

Page 12: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

12

ACPT Demo

Test the property against Policy A merged with Policy B, the result return false for Policy A but true for Policy B. Note that for merged policies there is no priorities between policies

Page 13: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

13

ACPT DemoTest the property against Policy A combined with Policy B. Combined polices has the priorities of

the combined rules. This slide shows the combination of policies, where Policy B has higher priority than policy A

Page 14: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

14

ACPT Demo

Test the property against Policy A combined with Policy B, and we set the “Default Deny” rules for both policies, the verification result return true for the combined policy.

Page 15: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

15

ACPT Demo

Test cases generation:

Page 16: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

16

ACPT Demo

XACML generation:

Page 17: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

17

Live Demo

Live Demo

Page 18: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

18

Compare ACPT with commercial AC tools

So far, a commercial AC policy management tool does not have all the following capabilities that NIST ACPT has:

AC (access control) model templates for entering polices: RBAC, Multi-Level, RuBAC (rule based), and Workflow, even some (such as IBM Tivoli) claims provide RuBAC, RBAC, and ABAC templates which are only simulated by using rules, in other words, there is no Role or Attribute relation (hierarchy) building capability,

Combining different AC models into one. (e.g. combine RBAC policy with RuBAC and ABAC policies)

AC Property (described by Boolean predicate) verification (IBM has limited SOD (Separation of Duty) check) to ensure the created policy can satisfy any combination of rule constraints.

Test case (suite) generator for testing in real operation environment to assure there is no privilege leakage caused by faults other than the AC policy.

Page 19: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

19

ACPT Future Work

Policy (or rule) priority configuration for combining different models or rules (e.g., combinations of global and local policies)

White-box model/properties verification to verify coverage and confinement of access control rules

Generate XACML policies derived from verified access control model or rules

Additional access control policy templates including dynamic and historical access control models

API or mechanism for acquiring or consuming information about users, attributes, resources, etc.

Web-ACPT allowing convenient web-based policy composition

Page 20: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

20

Progress Report

PET• State-to-State policy scenarios defined• XACML and PEP coding to support new scenario• Numerous software enhancements• Preparing demo for Fusion Center conference

DHS/JHUAPL• Identity Provider Service• Privacy Policy Matrix

DoJ and HHS Presentations Computer Associates CRADA

• Policy Expression and Automated Extraction

National Security Agency• Quarterly Technical Exchanges

Page 21: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

21

Progress Report (cont.)

Presentation and Demo, 2010 Fusion Center Technology Workshop, June 8th and 9th, 2010

Decentralized Information Group, Computer Science & Artificial Intelligence Lab, Massachusetts Institute of Technology

Nationwide Health Information Network (NHIN), CONNECT, HHS – ACPT Tool

Page 22: Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010

22

Contact Information

Vincent Hu – [email protected]

Tom Karygiannis – [email protected]

Steve Quirolgico – [email protected]