Differentiating Between Access Control Terms
Differentiating Between Access Control Terms
Table of Contents
INTRODUCTION 3
LEGAL NOTICE 12
2
Access Control White Paper
1. INTRODUCTION
Access control, by the broadest definition, is the ultimate goal of all network security
– granting access when appropriate and denying when inappropriate. Access control
tools help accomplish this purpose, as do firewalls, encryption, and intrusion
detection. In light of the true mission of network security, however, having the right
access control tool is absolutely essential.
Almost every network has some form of access control, even if it is merely that of the
native operating systems – some networks have several access control tools that
protect different resources. The various types of access control tools enforce security
policy and/or users’ privileges by protecting mail servers, web applications, database
systems, fileservers, applications, or some combination of these resources. In fact,
there are so many types of access control tools and so many non-standardized terms to
describe them that it is difficult to determine which solution is right for a given
network. An understanding of the more common usages of these terms can make it
easier to discern between the basic types of solutions available .
Whatever the access control solution, there are only a few approaches to configuring
access permissions, regardless of the terms different companies use to represent those
approaches. These approaches strive to achieve the common goals of fineness of
granularity and management simplification, usually sacrificing one goal to some
extent, in order to meet the other.
The finer the granularity, the less likely any user is to be granted unnecessary access –
or to be denied necessary access. Likewise, the coarser the granularity, the more likely
unnecessary privileges will be granted. The supreme goal of refining access privileges
is to attain the level of least privilege - something generally thought in security to be
unattainable. Least privilege is the concept of defining user privileges to precisely
what users need, with no extraneous privileges. The need to achieve this level of
security for a variety of resources (fileservers, applications, and web applications) has
been the driving force in developing new approaches to access control.
3
Access Control White Paper
UBAC, which has also been called identity-based access control, requires a system
administrator to define permissions for each user, based on the individual’s needs.
UBAC has the potential to result in more finely grained permissions, although an
effective UBAC system would be so labor intensive as to be cost-prohibitive. It is
impossible for security management to know precisely what access each and every
user needs, accordingly configure permissions, and update them daily to avoid build-
up of outdated permissions.
For example, an assistant to the CEO may need specific permissions that an assistant
in the marketing department doesn’t need. Rather than assigning all assistants to a
group that can access the same resources, the CEO’s assistant is assigned permissions
to the CEO’s files, and other resources that he/she will need on a day-to-day basis; all
assistants are defined individually and not grouped together.
RBAC has the potential for refining granularity by assigning specific types of
privileges to specific resources. Users in a certain “role” may be granted access to
“read” but not to “write” certain files. However, with a finite number of pre-defined
roles, “we do not expect to have many read-only or write-only roles. Yet it is really
only within the read-only roles that we get much differentiation in security levels.” 1
Pre-defined roles are overly broad. For example, a secretary in marketing may need
“write” privileges for marketing documents, but permissions assigned to the
secretarial “role” may be “read only.” As there are exceptions like this in every role
and security clearances differ from department to department even in the same “role”
or position, new “roles” must be constantly defined in the system. The more
meticulous the manual definition of roles, the finer the granularity; however this
multiplies the management effort exponentially.
1
“Mandatory Access Control and Role-Based Access Control Revisited” Sylvia Osborn p.10
4
Access Control White Paper
In order to attain a finer degree of granularity than found in most UBAC group
permissions schemes, RBAC requires incredible management effort and guesswork.
Policy Based Access Control is also known as Rule Set Based Access Control
(RSBAC). An access control policy is a set of rules that determine users’ access rights
to resources within an enterprise network (e.g., files, directories, sites, web pages). A
typical example would be a policy regulating employees’ access to corporate internal
documents via an intranet. A policy, in that case, may impose a limit on the number of
documents that can be downloaded by an employee during a certain time period, limit
his/her access to certain sites or to certain web pages on the intranet.
One prevailing mechanism for enforcing enterprise policy is the use of access control
lists (ACLs). ACLs associate with every resource, lists of users or groups of users and
their access rights (i.e., the type of access attempts that should be allowed).
ACLs are ineffective in enforcing policy. When using ACLs to enforce a policy, there
is usually no distinction between the policy description and the enforcement
mechanism - the policy is essentially defined by the set of ACLs associated with all
the resources on the network. Having a policy being implicitly defined by a set of
ACLs makes the management of the policy inefficient, error prone, and hardly
scalable up to large enterprises with large numbers of employees and resources. In
particular, every time an employee leaves a company, or even just changes his/her
role within the company, an exhaustive search of all ACLs must be performed on all
servers, so that user privileges are modified accordingly. It follows that such policies
are usually defined with a very low granularity, and hence tend to be overly
permissive.
In contrast, policy-based access control makes a strict distinction between the formal
statement of the policy and its enforcement. Making rules explicit, instead of
concealing them in ACLs, makes the policy easier to manage and modify. Such a
mechanism is usually based on a specification language which should be expressive
enough to easily formulate the policy rules.
In all the examples (see Matrix) one can maintain an explicit access control policy,
and use the appropriate technology to enforce it. The firewalls example stands out in
that the enforcement technology is based on the existence of an explicit table of rules
that defines the policy, and hence it is in a sense a strict policy-based access control
mechanism.
5
Access Control White Paper
Policy Based Access Control, alone, like ACLs or the access control of native
operating systems, isn’t designed with fine granularity or management simplification
in mind. However, these approaches can be used in combination with other access
control tools.
One can argue that anti-virus software is a content-based access control system - as it
allows access only to files that do not contain viruses. Resource attributes may also be
viewed as part of its content - though usually they are not regarded as part of it.
For example, each file in an operating system of the Windows™ family has a "Read
Only" attribute. “Write” access to such a file is denied regardless of what the
permissions for this file are, if the flag is On. If the attribute is considered to be part of
the file, then this would in theory be a content-dependent access control system, but
it's not considered as such.
Content Dependent Access Control involves a lot of overhead resulting from the need
to scan the resource when access is to be determined (in some implementations it may
really slow down the users, even if the security policy doesn't utilize the content -
dependent capabilities). High levels of granularity are only achievable with extremely
labor-intensive permissions configuration and continuous management.
CBAC is most commonly used to protect traffic through firewalls. Since Context and
Content sound similar, many people confuse them - but these are actually two
completely different approaches to access control, which may be used simultaneously.
Context Based Access Control means that the decision whether a user can access a
resource doesn't depend solely on who the user is and which resource it is - or even
the resource content, as in the case of Content Dependent Access Control - but also in
the sequence of events that preceded the access attempt.
For example, a system that doesn't allow a user to access a certain resource more than
100 times a day, is a context based access control system, since it counts the number
of accesses performed and blocks everything beyond the first 100 accesses, regardless
of the fact that the user is the same user and that the resource is the same resource. As
an example, a quota control is a program that allows system administrators to control
collective use of corporate fileservers, i.e. users may save up to a certain volume of
6
Access Control White Paper
data to shared fileservers, but may not exceed a predefined quota. Such a system may
be viewed as a context-based access control system, because once a user has reached
his/her quota, he/she will not be permitted to save any additional data, regardless of
any other policy.
A firewall typically performs "stateful inspection" which means it updates the "state"
of every connection when a new packet arrives, and drops packets or allows them to
continue, based not only on their content, but also on the current state, the context in
which the packets arrive. Checkpoint coined the term “stateful inspection”, an
essential element of their patented firewall technology, to contrast with the industry
term “stateless”; with stateless inspection every information packet is considered
individually out of context.
Configuration of permissions for specific users is not required. Strict security policy
rules are set and form the basis of decisions to permit or deny access.
View Base d Access Control primarily protects database systems; thus for files and
other applications, VBAC is not a functional solution. As opposed to other notions of
access control, which usually relate to tangible objects, like files, directories, printers,
etc., VBAC perceives the resource itself as a collection of sub-resources. For example
a hospital’s patient record could be considered a resource. Employees in the finance
department might need to see sub-resources of a patient record, while nurses
administering drugs might need to see physician’s instructions on that record. All
users access the same record, but different sub-resources are viewable by different
users.
7
Access Control White Paper
As the name implies, a MAC policy is obligatory – that is, it dictates whether an
operation should be permitted or denie d without letting a user override the policy.
Most mail servers, for example, enforce a policy that disallows messages larger than a
predetermined size to be sent through them. Many mail servers also reject any
incoming messages that are suspected of containing a computer virus. Both policies
are MAC because they cannot be overridden by a decision of an end-user – neither the
sender nor the recipient of a message can ask the mail server to disregard the policy
for a specific message. The term “access control” is not in common use with respect
to mail servers, but effectively, what the policy controls is access to the mailboxes
managed by the mail server.
A DAC policy, on the other hand, leaves final decision in the hands of the end-user.
The most common exa mple is a computer file system. The owner of a file can grant or
deny access rights at his/her discretion. For example, a company may decide on a
policy that prohibits employees from disclosing expense reports to each other, and
requires that every manager be able to inspect the expense reports of his/her
employees. However, as long as the file system policy is discretionary, so is the
adherence to the company policy, and it is up to every employee to adhere to it or
violate it by granting or restricting access to his/her files.
Strict security standards such as the Trusted Computer System Evaluation Criteria
(TCSEC) employe d in military environments, require MAC policies to be in effect. In
the business world, MAC policies are usually not used – not because they are not
useful, but rather because they are practically impossible to implement using the
operating system’s standard tools.
The reader should be aware that both MAC and DAC stand for many other things.
DAC also stands for Digital/Analog Converter. MAC is also used as an acronym for
Message Authentication Code in secure transport systems, Medium or Media Access
Control protocols determine rules for fairly sharing wireless bandwidth. With respect
to security policies, however, they stand for Mandatory and Discretionary access
control.
8
Access Control White Paper
DAC can be very finely grained – in theory. In reality, DAC is extremely labor
inte nsive, as each user must define permissions for all users to every resource he/she
“owns” – if all users don’t cooperate and define permissions to a minimum level of
granularity, the system administrator or security officer will have to configure
separately for all resource “owners”. The fineness of granularity achievable with
MAC is dependent on the ability to precisely define least privilege permissions for all
users. Any real fineness in granularity requires painstaking configuration.
2
“A White Paper on Authentication and Access Management Issues in Cross-organizational Use of
Networked Information Resources” by Clifford Lynch, Coalition for Networked Information p.7
3
“Firewalls Becoming Ineffective, Experts Say” by Karen Schwartz
http://www.planetit.com/techcenters/docs/security-firewalls/news/PIT20001222S0006?printDoc=1
9
Access Control White Paper
Network Intelligence as applied to access control could produce the most finely
grained user-based permissions, whilst simultaneously simplifying management far
beyond any manually configured system.
4
“FBI spy case highlights insider threat to corporate data” by Dan Verton
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO57889,00.html
10
Access Control White Paper
In order to help differentiate between access control terms, the matrix below matches the various terms with common settings, with
examples. Several of the settings and examples are not applicable in practice; the matrix should be used as an aid for understanding,
not as an authoritative definition of access control in the various settings.
Setting User/Role Policy Based/ Content Context Based View Based Mandatory/
Based ACLs Dependent Discretionary
ATM User based; Policy dictates Cannot Cannot withdraw No appropriate Mandatory;
privileges withdrawal limit withdraw more more than $2500 example. account owner
assigned per day and per than account per 24 hours. cannot grant others
specifically to individual account. balance. right to access his
account account with their
owner. cards.
Magnetic User based; ACL based No appropriate Deny access if No appropriate Mandatory; key
Door Keys access because access is example. door opened more example. owner cannot
assigned assigned through than 3 times in an autonomously
specifically to lists of authorized hour, or during delegate his access
key owner. users. nightshift. rights to other key
owners.
Firewall Usually Role Both policy and Do not allow Do not allow No appropriate Mandatory; an
based; access ACL based. You emails access to internal example. internal user
granted by set policy in containing network resources cannot grant access
role, e.g. configuring a viruses to go until the user has to data through the
employee, firewall. through. been authenticated. firewall.
subcontractor,
customer.
Hospital Usually Role There could be Deny access to No appropriate A finance user can Discretionary; a
Database based; access policy and ACLs, anyone except a example. receive a list of doctor or nurse
System granted by but historically, tending patient treatments may grant a
role, e.g. there has been no physician to and costs but not the colleague access to
Doctor, enforcement of V.I.P. patient associated diagnosis a patient’s file to
Nurse, such rules. records. or details receive his
Finance opinion.
Operating Both Role- Access controlled Before running Users cannot save No appropriate Discretionary; the
Systems based and by ACLs; it is an application another file on the example. file owner can
Native User- based. impossible to set a program, run shared fileserver usually grant
Access Access to data policy that would anti-virus check once they have access to her data
Control & granted either apply to files not –deny if virus is exceeded their to anyone,
File Servers by Rule or yet created. present. quota. regardless of
specifically to company policy.
a user.
Browsing a User based; Policies can be set, Do not allow Only allow full Content editors get Mandatory; a user
personalized personalizatio such as contributed access after the access to complete cannot usually
community n and access webmasters get content to have user has gone contribution details, delegate his rights
web site. control are complete access. obscene content. through an including author to other users, or
usually user- Users can be “introductory tour” history. Other users bypass the site’s
specific. assigned limited of the web site. only get to see the policy.
ability to modify/ contribution and
customize pages author’s nickname.
through ACLs.
Sending an User based; Impractical for Disallow No appropriate Email author has Mandatory: neither
email email ACLs or user- sending emails example. access to all recipient sender nor
accounts are specific rules. longer than 5 names, including recipient can
created for Policies can be set Megs. bcc-line recipients. override policy.
each such as: only Other recipients can
individual designated users only see to-line
user. may send emails to recipients.
the entire
company.
11
Access Control White Paper
Hark!, Hark! Logo, Network Intelligence and Camelot Logo are registered trademarks
of Camelot Information Technologies Ltd. All other company and product names
mentioned here are used for identification purposes only, and may be trademarks of
their respective owners.
12