Access Control
Access Control
Fundamental Concepts
• Access Operations: Include read, write, and others, varying across systems.
Authorization
• Imagine an office where certain documents can only be accessed by specific individuals.
• Implementation involves filing cabinets (objects) and keys (access rights) issued to
individuals (subjects).
Focus of Control
• Bell-LaPadula Model (BLP) establishes four access rights: execute, read, append (blind
write), and write.
• Ownership impacts access control rules; typically, the creator of an object becomes its
owner.
Policy Setting
• Individual access rights can become complex with numerous subjects and objects,
necessitating intermediate control levels.
• Capabilities: Rights are stored with subjects (rows of the access matrix).
• ACLs: Rights linked to objects (columns of the access matrix), often involving groups of
users.
Aggregation Techniques
• Utilize concepts like groups, roles, and procedures to manage access efficiently.
• Use of security labels to manage access control based on security levels, employing a
structure known as partial ordering.
Bell-LaPadula Model
• A key access control model focusing on confidentiality through information flow policies,
where read/write assessments depend on security labels.
o Read Access: Granted if the subject's label is equal to or higher than that of the
object.
o Write Access: Granted if the subject’s label is lower than that of the object.
• A state is secure if all access tuples (subject, object, operation) comply with the BLP
properties.
Harrison-Ruzzo-Ullman Model
• Extends BLP to include operations for modifying access rights and encompasses a model to
manipulate the access matrix, involving operations like create and delete.
Access Control - Note Reviewer
1. Access Control - A security technique that regulates who or what can view or use
resources in a computing environment.
4. Access Control List (ACL) - A list that defines permissions associated with specific users or
system processes.
5. Role-Based Access Control (RBAC) - A security model that assigns permissions to users
based on their role within an organization.
6. Mandatory Access Control (MAC) - A strict security model where access permissions are
predefined and controlled by a central authority.
7. Discretionary Access Control (DAC) - A model where the resource owner determines
access permissions.
9. Single Sign-On (SSO) - A user authentication process that allows access to multiple
applications with a single set of credentials.
10. Principle of Least Privilege (PoLP) - A security concept where users are given the minimum
levels of access necessary to perform their tasks.
11. Separation of Duties (SoD) - A security principle that prevents a single individual from
having control over all aspects of a critical process.
12. Access Control Policy - A set of rules that define how access to resources is managed and
enforced.
13. Identity and Access Management (IAM) - A framework for ensuring that the right
individuals have access to the right resources at the right time.
16. Federated Identity Management (FIM) - A system that allows users to access multiple
services using a single identity across different organizations.
17. Zero Trust Model - A security framework that assumes no entity should be trusted by
default, even inside the network.
18. Time-Based Access Control - Restricts access based on specific time windows.
19. Attribute-Based Access Control (ABAC) - A dynamic security model that evaluates
attributes (e.g., department, location, device) to grant access.
20. Access Control Models - Frameworks that dictate how access permissions are granted
and enforced.
o Mandatory Access Control (MAC): Government and military use this strict model.
• Key Differences:
o MAC vs. DAC: MAC is rigid and centrally controlled, whereas DAC gives resource
owners more flexibility.
o RBAC vs. ABAC: RBAC is predefined based on roles, while ABAC is more dynamic
and context-aware.
• Best Practices: