Top Banner
ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu is also affiliated with eorge Mason University, Fairfax, V
22

ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

Mar 26, 2015

Download

Documents

Elijah Kirk
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

ROLE-BASED ACCESS CONTROL:A MULTI-DIMENSIONAL VIEW

Ravi Sandhu, Edward Coyne,Hal Feinstein and Charles Youman

Seta CorporationMcLean, VA

Ravi Sandhu is also affiliated withGeorge Mason University, Fairfax, VA

Page 2: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

2

RBAC

• An alternative to classical MAC and DAC

• Substantial history and tradition

• Often used to separate administrative functions

• Extend this concept into application domain

Page 3: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

3

RBAC

ROLE

USER-ROLEASSIGNMENT

PRIVILEGE-ROLEASSIGNMENT

USERS PRIVILEGES

Page 4: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

4

PRIVILEGES

• Primitive privileges

• read, write, append, execute

• Abstract privileges

• credit, debit, inquiry

• Generic privileges

• auditor

Page 5: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

5

USERS

• Users are human beings

• Each individual should be known as exactly one user

Page 6: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

6

POLICY VERSUS MECHANISM

• Roles are a policy concept

• Several mechanisms can be used to implement roles

• Roles

• Groups

• Compartments

• Some mechanisms are better suited than others

Page 7: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

7

WHAT IS THE POLICY IN RBAC?

• There is no information flow policy

• RBAC is a framework to help in articulating policy

• The main point of RBAC is to facilitate security management

Page 8: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

8

INTERACTION OF RBAC, MAC AND DAC

RBAC

MAC DAC

permitted accesses

Page 9: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

9

RBAC

ROLE

USER-ROLEASSIGNMENT

PRIVILEGE-ROLEASSIGNMENT

USERS PRIVILEGES

Page 10: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

10

RBAC

ROLE

USER-ROLEASSIGNMENT

PRIVILEGE-ROLEASSIGNMENT

USERS PRIVILEGES

ROLEHIERARCHIES

Page 11: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

11

HIERARCHICAL ROLES

Health-Care Provider

Physician

Primary-CarePhysician

SpecialistPhysician

Page 12: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

12

HIERARCHICAL ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

Page 13: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

13

SCOPED INHERITANCE

Department Head

Project 1 Manager Project 2 Manager

Department Public

Project 1 Public Project 2 Public

Project 1Programmers

Project 1Testing

Project 2Programmers

Project 2Testing

Page 14: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

14

RBAC

ROLEUSERS PRIVILEGES

ROLEHIERARCHIES

CONSTRAINTS

USER-ROLEASSIGNMENT

PRIVILEGE-ROLEASSIGNMENT

Page 15: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

15

CONSTRAINTS

• Mutually Exclusive Roles

• Static Exclusion: The same individual can never hold both roles

• Dynamic Exclusion: The same individual can never hold both roles in the same context

Page 16: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

16

CONSTRAINTS

• Mutually Exclusive Privileges

• Static Exclusion: The same role should never be assigned both privileges

• Dynamic Exclusion: The same role can never hold both privileges in the same context

Page 17: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

17

CONSTRAINTS

• Cardinality Constraints on User-Role Assignment

• At most k users can belong to the role

• At least k users must belong to the role

• Exactly k users must belong to the role

• Cardinality Constraints on Privilege-Role Assignment

• At most k roles can get the privilege

• At least k roles must get the privilege

• Exactly k roles must get the privilege

Page 18: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

18

RBAC

ROLE

USER-ROLEASSIGNMENT

PRIVILEGE-ROLEASSIGNMENT

USERS PRIVILEGES

ROLEHIERARCHIES

Page 19: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

19

SCALE

• Hundreds of roles

• User-role assignment will change frequently

• Privilege-role assignment will change frequently

• Role hierarchy will change occasionally

Page 20: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

20

RBAC SUMMARY

• RBAC is a sophisticated and multi-dimensional concept

• Different products will support variations of RBAC (even if standards emerge)

Page 21: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

21

BELL-LAPADULA AND RBAC

• Can BLP be practically and conveniently done in RBAC?

YES

Page 22: ROLE-BASED ACCESS CONTROL: A MULTI-DIMENSIONAL VIEW Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman Seta Corporation McLean, VA Ravi Sandhu.

22

IS RBAC A PANACEA?

• NO