engineering authority and trust in cyberspace: the om-am and rbac way prof. ravi sandhu george mason...

19
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University www.list.gmu.edu

Upload: cameron-shelton

Post on 26-Mar-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

Engineering Authority and Trust in Cyberspace:The OM-AM and RBAC Way

Prof. Ravi Sandhu

George Mason University

www.list.gmu.edu

Page 2: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

2© Ravi Sandhu 2000

AUTHORIZATION, TRUST AND RISK

Information security is fundamentally about managing authorization and trust

so as to manage risk

Page 3: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

3© Ravi Sandhu 2000

THE OM-AM WAY

Objectives

Model

Architecture

Mechanism

What?

How?

Assurance

Page 4: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

4© Ravi Sandhu 2000

LAYERS AND LAYERS

Multics rings Layered abstractions Waterfall model Network protocol stacks Napolean layers RoFi layers OM-AM etcetera

Page 5: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

5© Ravi Sandhu 2000

OM-AM AND MANDATORY ACCESS CONTROL (MAC)

What?

How?

No information leakage

Lattices (Bell-LaPadula)

Security kernel

Security labels

Assurance

Page 6: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

6© Ravi Sandhu 2000

OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)

What?

How?

Owner-based discretion

numerous

numerous

ACLs, Capabilities, etc

Assurance

Page 7: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

7© Ravi Sandhu 2000

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Objective neutral

RBAC96, ARBAC97, etc.

user-pull, server-pull, etc.

certificates, tickets, PACs, etc.

Assurance

Page 8: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

8© Ravi Sandhu 2000

DISTRIBUTED RBAC (DRBAC)CASE STUDY

Approximately a dozen physical sites Approximately 2-3 simulation models/site Fewer than 100 roles structured in a very shallow

hierarchy A subset of roles is used in any single simulation model

Fewer than 100 users A user uses only one role at a time

Convenient but not critical

Moderate rate of change

Page 9: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

9© Ravi Sandhu 2000

DISTRIBUTED RBAC (DRBAC)CASE STUDY

Permission-role assignment Locally determined at each simulation model

User-role assignment A user can be assigned to a role if and only if all

simulation models using that role agree A user is revoked from a role if and only if any

simulation model using that role revokes the user

Page 10: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

10© Ravi Sandhu 2000

DISTRIBUTED RBAC (DRBAC)CASE STUDY

Each simulation model has a security administrator role authorized to carry out these administrative tasks

A simulation model can assign permissions to a role X at any time even if X is previously unused in that

simulation model

Consequently any simulation model can revoke any user from any role!

Page 11: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

11© Ravi Sandhu 2000

RBAC3

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 12: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

12© Ravi Sandhu 2000

MODEL CUSTOMIZATION

Each session has a single role SM = {sm1, …, smk}, simulation models OP = {op1, …, opl}, operations P= SM X OP, permissions SMA = {sma1, …, smk}, administrative roles R SMA = Admin: SM SMA

Page 13: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

13© Ravi Sandhu 2000

MODEL CUSTOMIZATION

Can formalize the administrative rules given earlier

For each simulation model designate a unique user to be the chief security administrator who is authorized to assign and revoke users from the security administrator role for that model

Page 14: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

14© Ravi Sandhu 2000

DRBAC ARCHITECTURES

Permission-role Enforced locally at each simulation model

Permission-role administration Enforced locally at each simulation model May need to communicate to other simulation models

User-role See following slides

User-role administration Centralized or decentralized

Page 15: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

15© Ravi Sandhu 2000

SERVER MIRROR

Client Server

User-roleAuthorization

Server

Page 16: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

16© Ravi Sandhu 2000

SERVER-PULL

Client Server

User-roleAuthorization

Server

Page 17: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

17© Ravi Sandhu 2000

USER-PULL

Client Server

User-roleAuthorization

Server

Page 18: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

18© Ravi Sandhu 2000

PROXY-BASED

Client ServerProxyServer

User-roleAuthorization

Server

Page 19: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way Prof. Ravi Sandhu George Mason University

19© Ravi Sandhu 2000

THE OM-AM WAY

Objectives

Model

Architecture

Mechanism

What?

How?

Assurance