COMP3355 Cyber Security (2024 Fall)Access ControlOverview▪Access Control Models▪DAC▪MAC▪RBAC▪ABAC
COMP3355 Cyber Security (2024 Fall)Access ControlRole-Based Access Control▪Role-based access control (RBAC) is a security model that manages user access to systems and resources based on their roles within an organization.
COMP3355 Cyber Security (2024 Fall)Access ControlRole-Based Access Control▪Access rights need to change as the responsibilities of users change.▪When a new user is authorized for a system, the appropriate rights for that user must be established.▪When a user changes job functions, some rights should be deleted, some maintained, and some added.
COMP3355 Cyber Security (2024 Fall)Access ControlRole-Based Access Control▪Unlike access control policies that assign access rights to subjects, RBAC associates access rights with roles within an organization.▪A roleis a collection of job functions. E.g., roles within a course might include: student, teacher, teaching assistants, marker, invigilators, etc.
COMP3355 Cyber Security (2024 Fall)Access ControlRoles and Transactions▪A subject has▪A set of authorized roles, which the subject is allowed to fill at various time;▪E.g., the instructor can be teacher, marker, invigilators▪A set of active roles, which the subject currently occupies.▪Roles have an associated set of transactions, which are the activities that subjects in that role is permitted to carry out▪E.g., releasing assignments, grading, etc. ▪Roles are hierarchical▪E.g., the ”teacher” should have all the access rights that a TA has
COMP3355 Cyber Security (2024 Fall)Access ControlAccess Control Policy▪{subjects, access rights, objects}▪{roles, access rights, objects}▪subjects {authorized roles, active roles}
COMP3355 Cyber Security (2024 Fall)Access ControlPrimary Rules1.Role assignment: A subject can exercise a transaction only if the subject has been assigned a role.2.Role authorization: A subject's active role must be authorized for the subject. 3.Transaction authorization: A subject can exercise a transaction only if the transaction is authorized for the subject's active role.
COMP3355 Cyber Security (2024 Fall)Access ControlExampleInvigilationGrade HomeworkInvigilatorTAGrade Final ExamTeacher▪Bob is a TA and serves as an invigilator▪Bob’s “TA” role is always activated▪Bob’s “invigilator” role is only activated during the exam▪After the final exam, can Bob grade the exam paper?
COMP3355 Cyber Security (2024 Fall)Access ControlWhat are the differences with groups in Unix file system using DAC?▪A group is a set of users; a role is a set of access rights.▪A user is always a member of a group, whereas a subject may activate or deactivate the access rights associated with any of the subject’s roles.
COMP3355 Cyber Security (2024 Fall)Access ControlWhat are the differences with groups in Unix file system using DAC?▪E.g., Bob creates a new file, and he wants to allow Alice to read-write the file and allow Eve to read the file.▪DAC?▪RBAC?
COMP3355 Cyber Security (2024 Fall)Access ControlAttribute-Based Access Control▪Sometimes, a subject's authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment attributes.▪E.g., ▪An employee can update the database between 9 am and 6 pm▪A guest can access the airport’s VIP lounge if his/her medallion’s status is platinum
COMP3355 Cyber Security (2024 Fall)Access ControlAttribute-Based Access Control▪Attribute-based access control is a model evolved from RBAC.▪This model assigns a set of attributes to subjects, objects, and it also considers the environment attributes▪Subject (e.g., employee position, IP address, clearance level, etc.)▪Object (e.g., type, creator, sensitivity, required clearance level, etc.)▪Environment (e.g., time, day of the week, location, etc.)
COMP3355 Cyber Security (2024 Fall)Access ControlPolicy▪A set of rules allowing or restricting any action in the system; rules are “IF/THEN” statements based on attributes of any element (subject, object, environment)
COMP3355 Cyber Security (2024 Fall)Access ControlRBAC vs. ABAC▪Flexibility▪Granularity▪Performance