The Future of Access Control: Attributes, Automation and Adaptation



Similar documents
Cyber Security Research: A Personal Perspective

Foundations Applications Technologies

The Future of Cyber Security

The Science, Engineering, and Business of Cyber Security

Security Models: Past, Present and Future

The Science, Engineering, and Business of Cyber Security

The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?

Cyber Security: Past, Present and Future

Cyber Security: What You Need to Know

BM482E Introduction to Computer Security

Chapter 23. Database Security. Security Issues. Database Security

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE

Towards Secure Information Sharing Models for Community Cyber Security

Access Control of Cloud Service Based on UCON

Chapter 23. Database Security. Security Issues. Database Security

Access Control Intro, DAC and MAC. System Security

Identity Management and Access Control

Access Control Models Part I. Murat Kantarcioglu UT Dallas

IT Networking and Security

Database Security and Authorization

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

An Object Oriented Role-based Access Control Model for Secure Domain Environments

Role Based Access Control

How To Manage Security On A Networked Computer System

Quest One Identity Solution. Simplifying Identity and Access Management

Welcome to Information Systems Security (503009)

NIST Big Data Public Working Group

ISSECO Syllabus Public Version v1.0

ITM661 Database Systems. Database Security and Administration

Extended RBAC Based Design and Implementation for a Secure Data Warehouse

Analysis of Different Access Control Mechanism in Cloud

Database Security Part 7

The Future of the Advanced SOC

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Does your Citrix or Terminal Server environment have an Achilles heel?

Weighted Total Mark. Weighted Exam Mark

Introduction to Security

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)

1. Introduction. 2. Background Cloud computing in a nutshell

Role Based Access Control: Adoption and Implementation in the Developing World

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

IT Networking and Security

Cybersecurity Definitions and Academic Landscape

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September Trianz 2008 White Paper Page 1

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

CHAPTER - 3 WEB APPLICATION AND SECURITY

Integrating Attributes into Role-Based Access Control

FISMA / NIST REVISION 3 COMPLIANCE

Chapter 8 A secure virtual web database environment

Addressing Cyber Security in Oracle Utilities Applications

Constructing Trusted Code Base XIV

Information Security and Cryptography

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Agenda SAP AG or an SAP affiliate company. All rights reserved. 2

Components- Based Access Control Architecture

Design Authorization Systems Using SecureUML

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Evaluate the Usability of Security Audits in Electronic Commerce

IoT & SCADA Cyber Security Services

Securing Virtual Applications and Servers

Egyptian Best Practices Securing E-Services

RBAC and HIPAA Security

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Data-stream Mining for Rule-based Access Control. Andrii Shalaginov, 13 th of October 2014 COINS PhD seminar

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

The Next Generation of Security Leaders

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via .

CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD

"Gaming versus Exercises: Designing Surprise-resilient Organizations for a Cybered World

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager

Toward a Usage-Based Security Framework for Collaborative Computing Systems

Role-based access control. RBAC: Motivations

A Simple Implementation and Performance Evaluation Extended-Role Based Access Control

Transcription:

Institute for Cyber Security The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair SERE NIST, Gaithersberg June 19, 2013 ravi.sandhu@utsa.edu www.profsandhu.com www.ics.utsa.edu Ravi Sandhu 1

Prognosis: Cyberspace Cyberspace will become orders of magnitude more complex and confused very quickly Overall this is a very positive development and will enrich human society It will be messy but need not be chaotic! Cyber security research and practice are loosing ground Ravi Sandhu 2

Microsec vs Macrosec Most cyber security thinking is microsec Most big cyber security threats are macrosec Microsec Retail attacks vs Targeted attacks 99% of the attacks are thwarted by basic hygiene and some luck 1% of the attacks are difficult and expensive, even impossible, to defend or detect Rational microsec behavior can result in highly vulnerable macrosec Ravi Sandhu 3

Cyber Security Goal Enable system designers and operators to say: This system is secure Not attainable There is an infinite supply of low-hanging attacks Ravi Sandhu 4

Cyber Security Goal Enable system designers and operators to say: This system is secure enough Mass scale, not very high assurance ATM network On-line banking E-commerce Many successful examples One of a kind, extremely high assurance US President s nuclear football Ravi Sandhu 5

Cyber Security Paradox Our successes are not studied as success stories Our successes are not attainable via current cyber security science, engineering, doctrine Ravi Sandhu 6

Cyber Security Cyber Security is all about tradeoffs and adjustments automation (in future) Productivity Security Let s build it Cash out the benefits Next generation can secure it Let s not build it Let s bake in super-security to make it unusable/unaffordable Let s sell unproven solutions There is a sweet spot in the middle We don t know how to predictably find it and maintain position there Ravi Sandhu 7

Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC),???? Ravi Sandhu 8

Prognosis: Access Control Fixed policy Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Flexible policy Attribute Based Access Control (ABAC),???? Ravi Sandhu 9

Prognosis: Access Control Human Driven Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Automated Adaptive Attribute Based Access Control (ABAC),???? Ravi Sandhu 10

Prognosis: Access Control Discretionary Access Control (DAC), 1970 Mandatory Access Control (MAC), 1970 Role Based Access Control (RBAC), 1995 Attribute Based Access Control (ABAC),???? Messy or Chaotic? Ravi Sandhu 11

Cyber Security Technologies ASSURANCE AUTHENTICATION RISK ANALYSIS CRYPTOGRAPHY ACCESS CONTROL INTRUSION DETECTION AND AUDIT SECURITY ENGINEERING & MANAGEMENT Ravi Sandhu 12

Access Control Limitations Analog Hole Inference Covert Channels Side Channels Phishing Safety Usability Privacy Attack Asymmetry Compatibility Federation. Ravi Sandhu 13

Access Control Limitations Analog Hole Inference Covert Channels Side Channels Phishing Safety Usability Privacy Attack Asymmetry Compatibility Federation. Can manage Cannot eliminate Ravi Sandhu 14

Access Control Models Discretionary Access Control (DAC), 1970 Owner controls access But only to the original, not to copies Grounded in pre-computer policies of researchers Mandatory Access Control (MAC), 1970 Synonymous to Lattice-Based Access Control (LBAC) Access based on security labels Labels propagate to copies Grounded in pre-computer military and national security policies Role-Based Access Control (RBAC), 1995 Access based on roles Can be configured to do DAC or MAC Grounded in pre-computer enterprise policies Numerous other models but only 3 successes: SO FAR Ravi Sandhu 15

Amount of Publications The RBAC Story NIST-ANSI Standard Proposed NIST-ANSI Standard Adopted 100 80 RBAC96 model 60 40 20 0 1992 1995 2000 2005 2008 Year of Publication 3 2 7 3 28 30 30 35 40 48 53 88 85 88 112 103 111 866 Pre-RBAC Early RBAC 1st expansion phase 2nd expansion phase Ravi Sandhu 16

RBAC96 Model Constraints Ravi Sandhu 17

Fundamental Theorem of RBAC RBAC can be configured to do MAC RBAC can be configured to do DAC RBAC is policy neutral RBAC is neither MAC nor DAC! Ravi Sandhu 18

RBAC Shortcomings Role granularity is not adequate leading to role explosion Researchers have suggested several extensions such as parameterized privileges, role templates, parameterized roles (1997-) Role design and engineering is difficult and expensive Substantial research on role engineering top down or bottom up (1996-), and on role mining (2003-) Assignment of users/permissions to roles is cumbersome Researchers have investigated decentralized administration (1997-), attribute-based implicit user-role assignment (2002-), role-delegation (2000-), role-based trust management (2003-), attribute-based implicit permission-role assignment (2012-) Adjustment based on local/global situational factors is difficult Temporal (2001-) and spatial (2005-) extensions to RBAC proposed RBAC does not offer an extension framework Every shortcoming seems to need a custom extension Can ABAC unify these extensions in a common open-ended framework? Ravi Sandhu 19

RBAC Policy Configuration Points Security Architect Security Administrator Security Administrator User Security Architect Security Architect Constraints Security Architect Ravi Sandhu 20

Access Control Models Policy Specification Policy Enforcement Policy Reality Policy Administration Ravi Sandhu 21

Access Control Models Policy Specification RBAC, ABAC Initial focus Policy Reality Policy Enforcement MAC, DAC focus Policy Administration Ravi Sandhu 22

Attribute-Based Access Control (ABAC) Attributes are name:value pairs possibly chained values can be complex data structures Associated with users subjects objects contexts device, connection, location, environment, system Converted by policies into rights just in time policies specified by security architects attributes maintained by security administrators ordinary users morph into architects and administrators Inherently extensible Ravi Sandhu 23

ABAC Status Amount of Publications Proposed Standard Standard Adopted 100 80 60 RBAC96 paper 40 1990? 2012 ABAC still in pre/early phase 20 0 1992 1995 2000 2005 2008 Year of Publication 3 2 7 3 28 30 30 35 40 48 53 88 85 88 112 103 111 866 Pre-RBAC Early RBAC 1st expansion phase 2nd expansion phase Ravi Sandhu 24

ABAC Prior Work Includes X.509, SPKI Attribute Certificates (1999 onwards) IETF RFCs and drafts Tightly coupled with PKI (Public-Key Infrastructure) XACML (2003 onwards) OASIS standard Narrowly focused on particular policy combination issues Fails to accommodate the ANSI-NIST RBAC standard model Fails to address user subject mapping Usage Control or UCON (Park-Sandhu 2004) Fails to address user subject mapping Focus is on extended features Mutable attributes Continuous enforcement Obligations Conditions Several others.. Ravi Sandhu 25

ABACα Hypothesis (DBSEC 2012) An ABAC model requires identification of policy configuration points (PCPs) languages and formalisms for each PCP A core set of PCPs can be discovered by building the ABACα model to unify DAC, MAC and RBAC Additional ABAC models can then be developed by increasing the sophistication of the ABACα PCPs discovering additional PCPs driven by requirements beyond DAC, MAC and RBAC A small but crucial step Ravi Sandhu 26

ABACα Model Structure Policy Configuration Points Ravi Sandhu 27

ABACα Model Structure Policy Configuration Points Can be configured to do DAC, MAC, RBAC Ravi Sandhu 28

Risk Adaptive Access Control (RAdAC) Ravi Sandhu 29

Authorization Leap Rights to attributes Rights Labels Roles Attributes Messy Benefits Decentralized Dynamic Contextual Consolidated?? Chaotic Risks Complexity Confusion Attribute trust Policy trust Ravi Sandhu 30

Prognosis: Cyber Security Attributes Automated Adaptive Managed but not solved Ravi Sandhu 31