Top Banner
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University
39

INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

Mar 26, 2015

Download

Documents

Alyssa Bates
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

INFS 767 Fall 2003

The RBAC96 Model

Prof. Ravi Sandhu

George Mason University

Page 2: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

2© Ravi Sandhu

AUTHORIZATION, TRUST AND RISK

Information security is fundamentally about managing authorization and trust

so as to manage risk

Page 3: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

3© Ravi Sandhu

SOLUTIONS

OM-AM RBAC PKI and others

Page 4: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

4© Ravi Sandhu

THE OM-AM WAY

Objectives

Model

Architecture

Mechanism

What?

How?

Assurance

Page 5: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

5© Ravi Sandhu

LAYERS AND LAYERS

Multics rings Layered abstractions Waterfall model Network protocol stacks OM-AM

Page 6: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

6© Ravi Sandhu

OM-AM AND MANDATORY ACCESS CONTROL (MAC)

What?

How?

No information leakage

Lattices (Bell-LaPadula)

Security kernel

Security labels

Assurance

Page 7: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

7© Ravi Sandhu

OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)

What?

How?

Owner-based discretion

numerous

numerous

ACLs, Capabilities, etc

Assurance

Page 8: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

8© Ravi Sandhu

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Policy neutral

RBAC96

user-pull, server-pull, etc.

certificates, tickets, PACs, etc.

Assurance

Page 9: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

9© Ravi Sandhu

ROLE-BASED ACCESS CONTROL (RBAC)

A user’s permissions are determined by the user’s roles rather than identity or clearance roles can encode arbitrary attributes

multi-faceted ranges from very simple to very

sophisticated

Page 10: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

10© Ravi Sandhu

WHAT IS THE POLICY IN RBAC?

RBAC is a framework to help in articulating policy

The main point of RBAC is to facilitate security management

Page 11: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

11© Ravi Sandhu

RBAC SECURITY PRINCIPLES

least privilege separation of duties separation of administration and

access abstract operations

Page 12: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

12© Ravi Sandhu

RBAC96IEEE Computer Feb. 1996

Policy neutral can be configured to do MAC

roles simulate clearances (ESORICS 96) can be configured to do DAC

roles simulate identity (RBAC98)

Page 13: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

13© Ravi Sandhu

WHAT IS RBAC?

multidimensional open ended ranges from simple to sophisticated

Page 14: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

14© Ravi Sandhu

RBAC CONUNDRUM

turn on all roles all the time turn on one role only at a time turn on a user-specified subset of

roles

Page 15: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

15© Ravi Sandhu

RBAC96 FAMILY OF MODELS

RBAC0BASIC RBAC

RBAC3ROLE HIERARCHIES +

CONSTRAINTS

RBAC1ROLE

HIERARCHIES

RBAC2CONSTRAINTS

Page 16: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

16© Ravi Sandhu

RBAC0

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

Page 17: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

17© Ravi Sandhu

PERMISSIONS

Primitive permissions read, write, append, execute

Abstract permissions credit, debit, inquiry

Page 18: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

18© Ravi Sandhu

PERMISSIONS

System permissions Auditor

Object permissions read, write, append, execute, credit,

debit, inquiry

Page 19: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

19© Ravi Sandhu

PERMISSIONS

Permissions are positive No negative permissions or denials

negative permissions and denials can be handled by constraints

No duties or obligations outside scope of access control

Page 20: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

20© Ravi Sandhu

ROLES AS POLICY

A role brings together a collection of users and a collection of permissions

These collections will vary over time A role has significance and meaning

beyond the particular users and permissions brought together at any moment

Page 21: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

21© Ravi Sandhu

ROLES VERSUS GROUPS

Groups are often defined as a collection of users

A role is a collection of users and a collection of permissions

Some authors define role as a collection of permissions

Page 22: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

22© Ravi Sandhu

USERS

Users are human beings or other active agents

Each individual should be known as exactly one user

Page 23: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

23© Ravi Sandhu

USER-ROLE ASSIGNMENT

A user can be a member of many roles

Each role can have many users as members

Page 24: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

24© Ravi Sandhu

SESSIONS

A user can invoke multiple sessions In each session a user can invoke

any subset of roles that the user is a member of

Page 25: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

25© Ravi Sandhu

PERMISSION-ROLE ASSIGNMENT

A permission can be assigned to many roles

Each role can have many permissions

Page 26: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

26© Ravi Sandhu

MANAGEMENT OF RBAC

Option 1:

USER-ROLE-ASSIGNMENT and PERMISSION-ROLE ASSIGNMENT can be changed only by the chief security officer

Option 2:

Use RBAC to manage RBAC

Page 27: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

27© Ravi Sandhu

RBAC1

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

Page 28: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

28© Ravi Sandhu

HIERARCHICAL ROLES

Health-Care Provider

Physician

Primary-CarePhysician

SpecialistPhysician

Page 29: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

29© Ravi Sandhu

HIERARCHICAL ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

Page 30: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

30© Ravi Sandhu

PRIVATE ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

HardwareEngineer’

SoftwareEngineer’

Page 31: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

31© Ravi Sandhu

EXAMPLE ROLE HIERARCHY

Employee (E)

Engineering Department (ED)

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Director (DIR)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 32: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

32© Ravi Sandhu

EXAMPLE ROLE HIERARCHY

Employee (E)

Engineering Department (ED)

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 33: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

33© Ravi Sandhu

EXAMPLE ROLE HIERARCHY

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Director (DIR)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 34: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

34© Ravi Sandhu

EXAMPLE ROLE HIERARCHY

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 35: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

35© Ravi Sandhu

RBAC3

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 36: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

36© Ravi Sandhu

CONSTRAINTS

Mutually Exclusive Roles Static Exclusion: The same individual

can never hold both roles Dynamic Exclusion: The same

individual can never hold both roles in the same context

Page 37: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

37© Ravi Sandhu

CONSTRAINTS

Mutually Exclusive Permissions Static Exclusion: The same role should

never be assigned both permissions Dynamic Exclusion: The same role can

never hold both permissions in the same context

Page 38: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

38© Ravi Sandhu

CONSTRAINTS

Cardinality Constraints on User-Role Assignment At most k users can belong to the role At least k users must belong to the role Exactly k users must belong to the role

Page 39: INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.

39© Ravi Sandhu

CONSTRAINTS

Cardinality Constraints on Permissions-Role Assignment At most k roles can get the permission At least k roles must get the permission Exactly k roles must get the permission