SlideShare a Scribd company logo
1 of 35
user_sessions 
(RH) 
Role Hierarchy 
session_roles 
(UA) 
User Assign-ment 
(PA) 
Permission 
Assignment 
USERS OPS OBS 
SESSIONS 
ROLES 
PRMS 
SSD 
DSD
 Access Control a system to control, monitor 
and restrict the movement of people, assets or 
vehicles around a building or site 
 Access Control types 
• Discretionary Access Control 
• Mandatory Access Control 
• Role-Based Access Control 
http://www.ifour-consultancy.com Offshore software development company India
 Restricts access to objects based solely on 
the identity of users who are trying to access 
them. 
Application 
Access List 
Name Access 
Tom Yes 
John No 
Cindy Yes 
Individuals Resources 
Server 1 
Server 2 
Server 3 
Legacy Apps 
http://www.ifour-consultancy.com Offshore software development company India
 MAC mechanisms assign a security level to all 
information, assign a security clearance to each user, 
and ensure that all users only have access to that data 
for which they have a clearance. 
Individuals Resources 
Server 1 
“Top Secret” 
Server 2 
“Secret” 
Server 3 
“Classified” 
SIPRNET 
Legacy Apps 
http://www.ifour-consultancy.com Better secOfufshroirtey s otfthwaaren d eDveAlopCment company India
 A user has access to an object based on 
the assigned role. 
 Roles are defined based on job functions. 
 Permissions are defined based on job 
authority and responsibilities within a job 
function. 
 Operations on an object are invocated 
based on the permissions. 
 The object is concerned with the user’s 
role and not the user. 
“Ideally, the [RBAC] 
system is clearly 
defined and agile, 
making the addition 
of new applications, 
roles, and employees 
as efficient as 
possible” 
http://www.ifour-consultancy.com Offshore software development company India
Individuals Roles Resources 
Role 1 
Role 2 
Role 3 
Server 1 
Server 2 
Server 3 
User’s change frequently, Roles don’t 
http://www.ifour-consultancy.com Offshore software development company India
 Three primary rules are defined for RBAC: 
• Role assignment 
• Role authorization 
• Permission authorization 
http://www.ifour-consultancy.com Offshore software development company India
RBAC Model 
Effort 
RBAC3 
A family of RBAC with four models 
1. RBAC0: min functionality 
2. RBAC1: RBAC0 plus role inheritance 
3. RBAC2: RBAC0 plus constraints 
(restrictions on RBAC configuration) 
4. RBAC3: RBAC0 plus all of the above 
http://www.ifour-consultancy.com Offshore software development company India
 Core Components 
 Constraining Components 
• Hierarchical RBAC 
 General 
 Limited 
• Separation of Duty Relations 
 Static 
 Dynamic 
http://www.ifour-consultancy.com Offshore software development company India
 Defines: 
• USERS 
• ROLES 
• OPERATIONS (ops) 
• OBJECTS (obs) 
• User Assignments (ua) 
 assigned_users 
• Permissions (prms) 
 Assigned Permissions 
 Object Permissions 
 Operation Permissions 
• Sessions 
 User Sessions 
 Available Session Permissions 
 Session Roles 
http://www.ifour-consultancy.com Offshore software development company India
 Role Hierarchies (rh) 
• General 
• Limited 
 Separation of Duties 
• Static 
• Dynamic 
http://www.ifour-consultancy.com Offshore software development company India
CCoorree RRBBAACC 
(UA) 
User Assign-ment 
(PA) 
Permission 
Assignment 
USERS OPS OBS 
user_sessions session_roles 
SESSIONS 
ROLES 
PRMS 
 Many-to-many relationship among individual users and privileges 
 Session is a mapping between a user and an activated subset of 
assigned roles 
 User/role relations can be defined independent of role/privilege 
relations 
 Privileges are system/application dependent 
 Accommodates traditional but robust group-based access control 
http://www.ifour-consultancy.com Offshore software development company India
USERS set ROLES set 
A user can be 
assigned to one or 
more roles 
Developer 
Help Desk Rep 
A role can be assigned 
to one or more users 
http://www.ifour-consultancy.com Offshore software development company India
PRMS set ROLES set 
A prms can be 
assigned to one or 
more roles 
Admin.DB1 
A role can be assigned 
to one or more prms 
User.DB1 
Create 
Delete 
Drop 
View 
Update 
Append 
http://www.ifour-consultancy.com Offshore software development company India
The mapping of user u onto a set of sessions. 
USERS 
guest 
admin 
user 
invokes 
SESSION 
User2.FIN1.report1.session 
SQL 
User2.DB1.table1.session 
User2.APP1.desktop.session 
USER1 
USER2 
http://www.ifour-consultancy.com Offshore software development company India
The mapping of session s onto a set of roles 
SESSION ROLES 
•Admin 
•User 
•Guest SQL 
DB1.table1.session 
http://www.ifour-consultancy.com Offshore software development company India
user_sessions 
(RH) 
Role Hierarchy 
session_roles 
(UA) 
User Assign-ment 
(PA) 
Permission 
Assignment 
USERS OPS OBS 
SESSIONS 
ROLES 
PRMS 
HHiieerraarrcchhaall RRBBAACC 
Role 
Hierarchies (rh) 
General 
Limited 
http://www.ifour-consultancy.com Offshore software development company India
Production 
Engineer 1 
Engineer 1 
Quality 
Engineer 1 
Production 
Engineer 2 
Engineering Dept 
Engineer 2 
Quality 
Engineer 2 
Project Lead 1 
Production 
Engineer 1 
Quality 
Engineer 1 
Director 
Project Lead 2 
Production 
Engineer 2 
Quality 
Engineer 2 
http://www.ifour-consultancy.com Offshore software development company India
Upper roles have all the access rights of the lower roles as well 
other access rights not available to a lower role 
Production 
Engineer 1 
Engineer 1 
Quality 
Engineer 1 
Production 
Engineer 2 
Engineering Dept 
Engineer 2 
Quality 
Engineer 2 
Project Lead 1 
Director 
Project Lead 2
User Role Set 
Power User Role Set 
Admin Role Set 
User 
r-w-h 
Guest 
-r- 
Only if all permissions of r1 
are also permissions of r2 
Guest Role Set 
Only if all users of r1 are 
also users of r2 
i.e. r1 inherits r2 
Support Multiple 
Inheritance 
http://www.ifour-consultancy.com Offshore software development company India
A restriction on the immediate descendants of the 
general role hierarchy 
Role2 
Role1 
Role3 
Role2 inherits from Role1 
Role3 does not inherit from 
Role1 or Role2 
http://www.ifour-consultancy.com Offshore software development company India
CCoonnssttrraaiinneedd RRBBAACC 
user_sessions 
(RH) 
Role Hierarchy 
session_roles 
(UA) 
User Assign-ment 
(PA) 
Permission 
Assignment 
USERS OPS OBS 
SESSIONS 
ROLES 
PRMS 
SSD 
DSD 
Constrained 
RBAC 
Static 
Dynamic 
http://www.ifour-consultancy.com Offshore software development company India
 Enforces conflict of interest policies employed to 
prevent users from exceeding a reasonable level of 
authority for their position. 
 Ensures that failures of omission or commission within 
an organization can be caused only as a result of 
collusion among individuals. 
 Two Types: 
• Static Separation of Duties (SSD) 
• Dynamic Separation of Duties (DSD) 
http://www.ifour-consultancy.com Offshore software development company India
 SSD places restrictions on the set of roles and in particular 
on their ability to form UA relations. 
 No user is assigned to n or more roles from the same role 
set, where n or more roles conflict with each other. 
 A user may be in one role, but not in another—mutually 
exclusive. 
 Prevents a person from submitting and approving their own 
request. 
http://www.ifour-consultancy.com Offshore software development company India
 A constraint on the authorized users of the roles that 
have an SSD relation. 
 Based on the authorized users rather than assigned 
users. 
 Ensures that inheritance does not undermine SSD 
policies. 
 Reduce the number of potential permissions that can 
be made available to a user by placing constraints on 
the users that can be assigned to a set of roles. 
http://www.ifour-consultancy.com Offshore software development company India
 Places constraints on the users that can be assigned to 
a set of roles, thereby reducing the number of potential 
permission that can be made available to a user. 
 Constraints are across or within a user’s session. 
 No user may activate n or more roles from the roles set 
in each user session. 
 Timely Revocation of Trust ensures that permission do 
not persist beyond the time that they are required for 
performance of duty. 
http://www.ifour-consultancy.com Offshore software development company India
http://www.ifour-consultancy.com Offshore software development company India
 The small scale of GIAC Enterprises is both a plus and minus for 
implementing RBAC 
 Smaller companies will most likely mean users will be assuming 
multiple roles within the organization thus making it difficult to 
create static roles for each users or process. 
 At first glance the implementation of RBAC in a company with 
under 10 employees may seem simple. If roles are not properly 
identified and categorized, scalability becomes a problem. The 
sooner you can implement principles of least privilege and 
segregation of duties, the more reliable your process will become. 
 At a high level GIAC Enterprises can be broken into four divisions 
• Business (CEO, CFO, Sales Manager, Product Manager) 
• Development (Developer) 
• Administration (System Administrator) 
• Audit (External Resource) 
http://www.ifour-consultancy.com Offshore software development company India
 The DMZ houses the Email gateway, IPS, Web Server, and 
MetaFrame Presentation Server 
 Windows systems (Email, MetaFrame) use Active Directory (AD) 
for maintaining role-based access controls 
 Linux systems (Web, App, IPS) use Vintela Authentication Services 
(VAS) which sits on the AD framework for administering role-based 
access controls 
 Within AD, the following roles are defined specific to the DMZ: 
• User - read-only access to web pages 
• Administrator - read/write access to deploy changes made by 
developer 
• Auditor – read-only access to specified systems 
http://www.ifour-consultancy.com Offshore software development company India
 Access to the majority of GIAC Enterprise’s internal systems (Email, File, 
HR, Antivirus, DC, DNS) is governed by Windows Active Directory (AD) 
 Access to the Linux/Apache web server and the Solaris/Weblogic App 
Server is controlled via Vintela Authentication Services (VAS) managed 
through AD 
 Internally the following roles are defined: 
• User - read-only access to web pages 
• Administrator - read/write access to deploy changes to production after they’ve been 
made by a developer 
• Developer – read/write access to development partitions of web/app/db servers 
• Auditor – read-only access to specified systems 
 Employees access the sales and HR database utilizing a web-to-app 
interface thereby abiding by a 3-tier architecture 
 Systems are partitioned and segmented into development and production 
environments to facilitate configuration management practices 
http://www.ifour-consultancy.com Offshore software development company India
 Cisco’s Network Admission Control (NAC) is used to control 
workstations and laptop access to the internal network 
 IBNS and 802.1x is integrated into NAC (next slide) 
 802.1x provides controls for both wired and wireless devices 
 NAC Profiler is used to automatically identify and assess non-PC 
devices such as Voice over IP phones and printers 
 Appropriate device roles are created. For example, business user, 
guest user, etc... 
 NAC is used to isolate vender connections (i.e. visiting laptops), while 
still allowing Internet access 
 Ensure that authorized endpoint devices have been patched 
(operating systems, critical applications, anti-virus, anti-spyware, 
etc..) via the policy server. 
http://www.ifour-consultancy.com Offshore software development company India
 Use Cisco’s AAA & TACACS+ via Cisco Secure Access Control Server 
& Active Directory for centralized router and firewall Authentication, 
Authorization, and Accounting. 
 Use Cisco's Identity-Based Networking Services (IBNS) identity 
management solution 
 IBNS is based on 802.1x and offers authentication, access control, and 
user policies to secure the network 
 802.1X allows enforcement of port based network access control when 
devices attempt to access the network 
 IBNS leverages Cisco's switches, Wireless APs, Cisco Secure ACS and 
Cisco Secure Services Client 
 Cisco’s Role-Based CLI Access is used to define auditor and helpdesk 
views 
 These views are configured to restrict access to Cisco IOS commands 
and configuration while allowing timely problem resolution and audit 
access to the IOS
 RBAC will ease auditing of network and systems 
 Enforces unique usernames; only one username per user 
 Define ‘read’ or ‘view’ only access to auditing roles 
 Auditors can then be granted access to audit roles 
 Appropriate event logs from servers, Active Directory, IPS, routers, 
Vintela Authentication Services, NAC, key card system and other 
network infrastructure devices are stored in a centralized log 
server 
 Access to the centralized log server data is restricted, IT can not 
access, modify or delete logs without audit’s permission 
 An event correlation and reporting server is used by both IT and 
audit to correlate and review the data
1. NIST documents at hhttttpp::////ccssrrcc..nniisstt..ggoovv//rrbbaacc// 
2. D. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli, 
"A Proposed Standard for Role Based Access Control (PDF)," 
ACM Transactions on Information and System Security , vol. 4, 
no. 3 (August, 2001) - draft of a consensus standard for RBAC. 
3. The ARBAC97 model for role-based administration of roles 
(1999) 
4. Symbiosis 
1. Neha Kabra 
2. Jayesh Singhal 
3. Rohit Gedam 
4. Sunil Saroj 
http://www.ifour-consultancy.com Offshore software development company India
THANK YOU 
http://www.ifour-consultancy.com Offshore software development company India

More Related Content

What's hot

Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Rui Miguel Feio
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trustChinmoy Jena
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - IntroductionKnoldus Inc.
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsphanleson
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 

What's hot (20)

Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Active directory domain and trust
Active directory domain and trustActive directory domain and trust
Active directory domain and trust
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - Introduction
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
LDAP
LDAPLDAP
LDAP
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 

Viewers also liked

Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access ControlChandra Sharma
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information securityAjit Dadresa
 
An overview of access control
An overview of access controlAn overview of access control
An overview of access controlElimity
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access ControlEmpowerID
 
Discussion Paper: Bugs Tracking
Discussion Paper: Bugs TrackingDiscussion Paper: Bugs Tracking
Discussion Paper: Bugs TrackingDeny Prasetia
 
Multi-domain and Privacy-aware Role Based Access Control in eHealth
Multi-domain and Privacy-aware Role Based Access Control in eHealthMulti-domain and Privacy-aware Role Based Access Control in eHealth
Multi-domain and Privacy-aware Role Based Access Control in eHealthguest3dc8ca
 
IAM Role Management
IAM Role ManagementIAM Role Management
IAM Role Managementsgjense
 
Role-based Access Control June09 GeoSOA Workshop
Role-based Access Control June09 GeoSOA WorkshopRole-based Access Control June09 GeoSOA Workshop
Role-based Access Control June09 GeoSOA WorkshopCarbon Project
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...Richard Moore
 
Access Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk AreasAccess Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk AreasMahsa Teimourikia
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)John Wang
 
Scalable and Flexible Machine Learning With Scala @ LinkedIn
Scalable and Flexible Machine Learning With Scala @ LinkedInScalable and Flexible Machine Learning With Scala @ LinkedIn
Scalable and Flexible Machine Learning With Scala @ LinkedInVitaly Gordon
 
Database management systems 3 - Data Modelling
Database management systems 3 - Data ModellingDatabase management systems 3 - Data Modelling
Database management systems 3 - Data ModellingNickkisha Farrell
 

Viewers also liked (20)

Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access Control
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Mandatory access control for information security
Mandatory access control for information securityMandatory access control for information security
Mandatory access control for information security
 
An overview of access control
An overview of access controlAn overview of access control
An overview of access control
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
 
Discussion Paper: Bugs Tracking
Discussion Paper: Bugs TrackingDiscussion Paper: Bugs Tracking
Discussion Paper: Bugs Tracking
 
Multi-domain and Privacy-aware Role Based Access Control in eHealth
Multi-domain and Privacy-aware Role Based Access Control in eHealthMulti-domain and Privacy-aware Role Based Access Control in eHealth
Multi-domain and Privacy-aware Role Based Access Control in eHealth
 
Abac and the evolution of access control
Abac and the evolution of access controlAbac and the evolution of access control
Abac and the evolution of access control
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
IAM Role Management
IAM Role ManagementIAM Role Management
IAM Role Management
 
Role-based Access Control June09 GeoSOA Workshop
Role-based Access Control June09 GeoSOA WorkshopRole-based Access Control June09 GeoSOA Workshop
Role-based Access Control June09 GeoSOA Workshop
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...
Healthcare Identity Management and Role-Based Access in a Federated NHIN - Th...
 
Access Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk AreasAccess Control Privileges Management for Risk Areas
Access Control Privileges Management for Risk Areas
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)
 
Rbac
RbacRbac
Rbac
 
Scalable and Flexible Machine Learning With Scala @ LinkedIn
Scalable and Flexible Machine Learning With Scala @ LinkedInScalable and Flexible Machine Learning With Scala @ LinkedIn
Scalable and Flexible Machine Learning With Scala @ LinkedIn
 
Week3 lecture
Week3 lectureWeek3 lecture
Week3 lecture
 
Database management systems 3 - Data Modelling
Database management systems 3 - Data ModellingDatabase management systems 3 - Data Modelling
Database management systems 3 - Data Modelling
 

Similar to Role based access control - RBAC

Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission SetsConfigero
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
Resouce management system1
Resouce management system1Resouce management system1
Resouce management system1Guni Sonow
 
Serverless functions or microservices
Serverless functions or microservicesServerless functions or microservices
Serverless functions or microservicesRadu Vunvulea
 
software requirements specification template
software requirements specification templatesoftware requirements specification template
software requirements specification templateAzimiddin Rakhmatov
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 
yogesh_surve_resume
yogesh_surve_resumeyogesh_surve_resume
yogesh_surve_resumeyogesh surve
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ KiranKiran Kumar
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioInho Kang
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클Oracle Korea
 
Tools and competences on DevOps for 2020
Tools and competences on DevOps for 2020Tools and competences on DevOps for 2020
Tools and competences on DevOps for 2020Radu Vunvulea
 
Tools and competences on dev ops
Tools and competences on dev opsTools and competences on dev ops
Tools and competences on dev opsRadu Vunvulea
 
Srs template ieee-movie recommender
Srs template ieee-movie recommenderSrs template ieee-movie recommender
Srs template ieee-movie recommender429SAYAKTRIPATHY
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoringIAEME Publication
 
Highly confidential security system - sole survivors - SRS
Highly confidential security system  - sole survivors - SRSHighly confidential security system  - sole survivors - SRS
Highly confidential security system - sole survivors - SRSArun prasath
 
Software Requirements Analysis - concepts
Software Requirements Analysis - conceptsSoftware Requirements Analysis - concepts
Software Requirements Analysis - conceptssoftwareacademy
 
Singh durgesh projectppt
Singh durgesh projectpptSingh durgesh projectppt
Singh durgesh projectpptimdurgesh
 

Similar to Role based access control - RBAC (20)

Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
Resouce management system1
Resouce management system1Resouce management system1
Resouce management system1
 
Serverless functions or microservices
Serverless functions or microservicesServerless functions or microservices
Serverless functions or microservices
 
Security
SecuritySecurity
Security
 
software requirements specification template
software requirements specification templatesoftware requirements specification template
software requirements specification template
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
yogesh_surve_resume
yogesh_surve_resumeyogesh_surve_resume
yogesh_surve_resume
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istio
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
 
Tools and competences on DevOps for 2020
Tools and competences on DevOps for 2020Tools and competences on DevOps for 2020
Tools and competences on DevOps for 2020
 
Tools and competences on dev ops
Tools and competences on dev opsTools and competences on dev ops
Tools and competences on dev ops
 
Srs template ieee-movie recommender
Srs template ieee-movie recommenderSrs template ieee-movie recommender
Srs template ieee-movie recommender
 
Java remote control for laboratory monitoring
Java remote control for laboratory monitoringJava remote control for laboratory monitoring
Java remote control for laboratory monitoring
 
Highly confidential security system - sole survivors - SRS
Highly confidential security system  - sole survivors - SRSHighly confidential security system  - sole survivors - SRS
Highly confidential security system - sole survivors - SRS
 
Software Requirements Analysis - concepts
Software Requirements Analysis - conceptsSoftware Requirements Analysis - concepts
Software Requirements Analysis - concepts
 
Deploy tools research
Deploy tools researchDeploy tools research
Deploy tools research
 
Singh durgesh projectppt
Singh durgesh projectpptSingh durgesh projectppt
Singh durgesh projectppt
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Role based access control - RBAC

  • 1. user_sessions (RH) Role Hierarchy session_roles (UA) User Assign-ment (PA) Permission Assignment USERS OPS OBS SESSIONS ROLES PRMS SSD DSD
  • 2.  Access Control a system to control, monitor and restrict the movement of people, assets or vehicles around a building or site  Access Control types • Discretionary Access Control • Mandatory Access Control • Role-Based Access Control http://www.ifour-consultancy.com Offshore software development company India
  • 3.  Restricts access to objects based solely on the identity of users who are trying to access them. Application Access List Name Access Tom Yes John No Cindy Yes Individuals Resources Server 1 Server 2 Server 3 Legacy Apps http://www.ifour-consultancy.com Offshore software development company India
  • 4.  MAC mechanisms assign a security level to all information, assign a security clearance to each user, and ensure that all users only have access to that data for which they have a clearance. Individuals Resources Server 1 “Top Secret” Server 2 “Secret” Server 3 “Classified” SIPRNET Legacy Apps http://www.ifour-consultancy.com Better secOfufshroirtey s otfthwaaren d eDveAlopCment company India
  • 5.  A user has access to an object based on the assigned role.  Roles are defined based on job functions.  Permissions are defined based on job authority and responsibilities within a job function.  Operations on an object are invocated based on the permissions.  The object is concerned with the user’s role and not the user. “Ideally, the [RBAC] system is clearly defined and agile, making the addition of new applications, roles, and employees as efficient as possible” http://www.ifour-consultancy.com Offshore software development company India
  • 6. Individuals Roles Resources Role 1 Role 2 Role 3 Server 1 Server 2 Server 3 User’s change frequently, Roles don’t http://www.ifour-consultancy.com Offshore software development company India
  • 7.  Three primary rules are defined for RBAC: • Role assignment • Role authorization • Permission authorization http://www.ifour-consultancy.com Offshore software development company India
  • 8. RBAC Model Effort RBAC3 A family of RBAC with four models 1. RBAC0: min functionality 2. RBAC1: RBAC0 plus role inheritance 3. RBAC2: RBAC0 plus constraints (restrictions on RBAC configuration) 4. RBAC3: RBAC0 plus all of the above http://www.ifour-consultancy.com Offshore software development company India
  • 9.  Core Components  Constraining Components • Hierarchical RBAC  General  Limited • Separation of Duty Relations  Static  Dynamic http://www.ifour-consultancy.com Offshore software development company India
  • 10.  Defines: • USERS • ROLES • OPERATIONS (ops) • OBJECTS (obs) • User Assignments (ua)  assigned_users • Permissions (prms)  Assigned Permissions  Object Permissions  Operation Permissions • Sessions  User Sessions  Available Session Permissions  Session Roles http://www.ifour-consultancy.com Offshore software development company India
  • 11.  Role Hierarchies (rh) • General • Limited  Separation of Duties • Static • Dynamic http://www.ifour-consultancy.com Offshore software development company India
  • 12. CCoorree RRBBAACC (UA) User Assign-ment (PA) Permission Assignment USERS OPS OBS user_sessions session_roles SESSIONS ROLES PRMS  Many-to-many relationship among individual users and privileges  Session is a mapping between a user and an activated subset of assigned roles  User/role relations can be defined independent of role/privilege relations  Privileges are system/application dependent  Accommodates traditional but robust group-based access control http://www.ifour-consultancy.com Offshore software development company India
  • 13. USERS set ROLES set A user can be assigned to one or more roles Developer Help Desk Rep A role can be assigned to one or more users http://www.ifour-consultancy.com Offshore software development company India
  • 14. PRMS set ROLES set A prms can be assigned to one or more roles Admin.DB1 A role can be assigned to one or more prms User.DB1 Create Delete Drop View Update Append http://www.ifour-consultancy.com Offshore software development company India
  • 15. The mapping of user u onto a set of sessions. USERS guest admin user invokes SESSION User2.FIN1.report1.session SQL User2.DB1.table1.session User2.APP1.desktop.session USER1 USER2 http://www.ifour-consultancy.com Offshore software development company India
  • 16. The mapping of session s onto a set of roles SESSION ROLES •Admin •User •Guest SQL DB1.table1.session http://www.ifour-consultancy.com Offshore software development company India
  • 17. user_sessions (RH) Role Hierarchy session_roles (UA) User Assign-ment (PA) Permission Assignment USERS OPS OBS SESSIONS ROLES PRMS HHiieerraarrcchhaall RRBBAACC Role Hierarchies (rh) General Limited http://www.ifour-consultancy.com Offshore software development company India
  • 18. Production Engineer 1 Engineer 1 Quality Engineer 1 Production Engineer 2 Engineering Dept Engineer 2 Quality Engineer 2 Project Lead 1 Production Engineer 1 Quality Engineer 1 Director Project Lead 2 Production Engineer 2 Quality Engineer 2 http://www.ifour-consultancy.com Offshore software development company India
  • 19. Upper roles have all the access rights of the lower roles as well other access rights not available to a lower role Production Engineer 1 Engineer 1 Quality Engineer 1 Production Engineer 2 Engineering Dept Engineer 2 Quality Engineer 2 Project Lead 1 Director Project Lead 2
  • 20. User Role Set Power User Role Set Admin Role Set User r-w-h Guest -r- Only if all permissions of r1 are also permissions of r2 Guest Role Set Only if all users of r1 are also users of r2 i.e. r1 inherits r2 Support Multiple Inheritance http://www.ifour-consultancy.com Offshore software development company India
  • 21. A restriction on the immediate descendants of the general role hierarchy Role2 Role1 Role3 Role2 inherits from Role1 Role3 does not inherit from Role1 or Role2 http://www.ifour-consultancy.com Offshore software development company India
  • 22. CCoonnssttrraaiinneedd RRBBAACC user_sessions (RH) Role Hierarchy session_roles (UA) User Assign-ment (PA) Permission Assignment USERS OPS OBS SESSIONS ROLES PRMS SSD DSD Constrained RBAC Static Dynamic http://www.ifour-consultancy.com Offshore software development company India
  • 23.  Enforces conflict of interest policies employed to prevent users from exceeding a reasonable level of authority for their position.  Ensures that failures of omission or commission within an organization can be caused only as a result of collusion among individuals.  Two Types: • Static Separation of Duties (SSD) • Dynamic Separation of Duties (DSD) http://www.ifour-consultancy.com Offshore software development company India
  • 24.  SSD places restrictions on the set of roles and in particular on their ability to form UA relations.  No user is assigned to n or more roles from the same role set, where n or more roles conflict with each other.  A user may be in one role, but not in another—mutually exclusive.  Prevents a person from submitting and approving their own request. http://www.ifour-consultancy.com Offshore software development company India
  • 25.  A constraint on the authorized users of the roles that have an SSD relation.  Based on the authorized users rather than assigned users.  Ensures that inheritance does not undermine SSD policies.  Reduce the number of potential permissions that can be made available to a user by placing constraints on the users that can be assigned to a set of roles. http://www.ifour-consultancy.com Offshore software development company India
  • 26.  Places constraints on the users that can be assigned to a set of roles, thereby reducing the number of potential permission that can be made available to a user.  Constraints are across or within a user’s session.  No user may activate n or more roles from the roles set in each user session.  Timely Revocation of Trust ensures that permission do not persist beyond the time that they are required for performance of duty. http://www.ifour-consultancy.com Offshore software development company India
  • 28.  The small scale of GIAC Enterprises is both a plus and minus for implementing RBAC  Smaller companies will most likely mean users will be assuming multiple roles within the organization thus making it difficult to create static roles for each users or process.  At first glance the implementation of RBAC in a company with under 10 employees may seem simple. If roles are not properly identified and categorized, scalability becomes a problem. The sooner you can implement principles of least privilege and segregation of duties, the more reliable your process will become.  At a high level GIAC Enterprises can be broken into four divisions • Business (CEO, CFO, Sales Manager, Product Manager) • Development (Developer) • Administration (System Administrator) • Audit (External Resource) http://www.ifour-consultancy.com Offshore software development company India
  • 29.  The DMZ houses the Email gateway, IPS, Web Server, and MetaFrame Presentation Server  Windows systems (Email, MetaFrame) use Active Directory (AD) for maintaining role-based access controls  Linux systems (Web, App, IPS) use Vintela Authentication Services (VAS) which sits on the AD framework for administering role-based access controls  Within AD, the following roles are defined specific to the DMZ: • User - read-only access to web pages • Administrator - read/write access to deploy changes made by developer • Auditor – read-only access to specified systems http://www.ifour-consultancy.com Offshore software development company India
  • 30.  Access to the majority of GIAC Enterprise’s internal systems (Email, File, HR, Antivirus, DC, DNS) is governed by Windows Active Directory (AD)  Access to the Linux/Apache web server and the Solaris/Weblogic App Server is controlled via Vintela Authentication Services (VAS) managed through AD  Internally the following roles are defined: • User - read-only access to web pages • Administrator - read/write access to deploy changes to production after they’ve been made by a developer • Developer – read/write access to development partitions of web/app/db servers • Auditor – read-only access to specified systems  Employees access the sales and HR database utilizing a web-to-app interface thereby abiding by a 3-tier architecture  Systems are partitioned and segmented into development and production environments to facilitate configuration management practices http://www.ifour-consultancy.com Offshore software development company India
  • 31.  Cisco’s Network Admission Control (NAC) is used to control workstations and laptop access to the internal network  IBNS and 802.1x is integrated into NAC (next slide)  802.1x provides controls for both wired and wireless devices  NAC Profiler is used to automatically identify and assess non-PC devices such as Voice over IP phones and printers  Appropriate device roles are created. For example, business user, guest user, etc...  NAC is used to isolate vender connections (i.e. visiting laptops), while still allowing Internet access  Ensure that authorized endpoint devices have been patched (operating systems, critical applications, anti-virus, anti-spyware, etc..) via the policy server. http://www.ifour-consultancy.com Offshore software development company India
  • 32.  Use Cisco’s AAA & TACACS+ via Cisco Secure Access Control Server & Active Directory for centralized router and firewall Authentication, Authorization, and Accounting.  Use Cisco's Identity-Based Networking Services (IBNS) identity management solution  IBNS is based on 802.1x and offers authentication, access control, and user policies to secure the network  802.1X allows enforcement of port based network access control when devices attempt to access the network  IBNS leverages Cisco's switches, Wireless APs, Cisco Secure ACS and Cisco Secure Services Client  Cisco’s Role-Based CLI Access is used to define auditor and helpdesk views  These views are configured to restrict access to Cisco IOS commands and configuration while allowing timely problem resolution and audit access to the IOS
  • 33.  RBAC will ease auditing of network and systems  Enforces unique usernames; only one username per user  Define ‘read’ or ‘view’ only access to auditing roles  Auditors can then be granted access to audit roles  Appropriate event logs from servers, Active Directory, IPS, routers, Vintela Authentication Services, NAC, key card system and other network infrastructure devices are stored in a centralized log server  Access to the centralized log server data is restricted, IT can not access, modify or delete logs without audit’s permission  An event correlation and reporting server is used by both IT and audit to correlate and review the data
  • 34. 1. NIST documents at hhttttpp::////ccssrrcc..nniisstt..ggoovv//rrbbaacc// 2. D. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, R. Chandramouli, "A Proposed Standard for Role Based Access Control (PDF)," ACM Transactions on Information and System Security , vol. 4, no. 3 (August, 2001) - draft of a consensus standard for RBAC. 3. The ARBAC97 model for role-based administration of roles (1999) 4. Symbiosis 1. Neha Kabra 2. Jayesh Singhal 3. Rohit Gedam 4. Sunil Saroj http://www.ifour-consultancy.com Offshore software development company India
  • 35. THANK YOU http://www.ifour-consultancy.com Offshore software development company India

Editor's Notes

  1. Offshore software development company India – http://www.ifour-consultancy.com
  2. Offshore software development company India – http://www.ifour-consultancy.com
  3. Offshore software development company India – http://www.ifour-consultancy.com
  4. Offshore software development company India – http://www.ifour-consultancy.com
  5. Offshore software development company India – http://www.ifour-consultancy.com
  6. Three primary rules are defined for RBAC: Role assignment: A subject can exercise a permission only if the subject has selected or been assigned a role. Role authorization: A subject's active role must be authorized for the subject. With rule 1 above, this rule ensures that users can take on only roles for which they are authorized. Permission authorization: A subject can exercise a permission only if the permission is authorized for the subject's active role. With rules 1 and 2, this rule ensures that users can exercise only permissions for which they are authorized. Offshore software development company India – http://www.ifour-consultancy.com
  7. Offshore software development company India – http://www.ifour-consultancy.com
  8. Offshore software development company India – http://www.ifour-consultancy.com
  9. Offshore software development company India – http://www.ifour-consultancy.com
  10. Offshore software development company India – http://www.ifour-consultancy.com
  11. The RBAC model as a whole is fundamentally defined in terms of individual users being assigned to roles and permissions being assigned to roles. A role is a means for naming many-to-many relationships among individual users and permissions. In addition it includes a set of sessions where each session is a mapping between a user and an activated subset of roles that are assigned to user. The type of operations and objects that RBAC controls are dependent on the type of the system in which they are implemented. The set of objects covered by RBAC includes all the objects listed in the permissions that are assigned to roles. Offshore software development company India – http://www.ifour-consultancy.com
  12. Offshore software development company India – http://www.ifour-consultancy.com
  13. Offshore software development company India – http://www.ifour-consultancy.com
  14. Offshore software development company India – http://www.ifour-consultancy.com
  15. Offshore software development company India – http://www.ifour-consultancy.com
  16. It adds requirements for supporting role hierarchies. A hierarchy is mathematically a partial order defining a seniority relation between roles, whereby the seniors roles acquire the permission of their juniors, and junior roles acquire the user membership of their seniors. This standard recognizes two types of role hierarchies General Hierarchical RBAC: In this case, there is support for an arbitrary partial order to serve as role hierarchy, to include the concept of multiple inheritance of permissions and user membership among roles. Limited Hierarchical RBAC: Some systems may impose restrictions on the role hierarchy. Most commonly, hierarchies are limited to simple structures such as trees and inverted trees Offshore software development company India – http://www.ifour-consultancy.com
  17. Offshore software development company India – http://www.ifour-consultancy.com
  18. Upper roles have all the access rights of the lower roles as well other access rights not available to a lower role Offshore software development company India – http://www.ifour-consultancy.com
  19. General role hierarchies support the concept of multiple inheritance, which provides the ability to inherit permission from two or more role sources and to inherit user membership from two or more role sources. Multiple inheritances provide important hierarchy properties. The first is the ability to compose a role from multiple subordinate roles (with fewer permissions) in defining roles and relations that are characteristic of the organization and business structures, which these roles are intended to represent. Second, multiple inheritances provide uniform treatment of user/role assignment relations and role/role inheritance relations. Users can be included in the role hierarchy, using the same relation to denote the user assignment to roles, as well as permission inheritance from a role to its assigned users. General role hierarchies support the concept of multiple inheritance, which provides the ability to inherit permission from two or more role sources and to inherit user membership from two or more role sources. Multiple inheritances provide important hierarchy properties. The first is the ability to compose a role from multiple subordinate roles (with fewer permissions) in defining roles and relations that are characteristic of the organization and business structures, which these roles are intended to represent. Second, multiple inheritances provide uniform treatment of user/role assignment relations and role/role inheritance relations. Users can be included in the role hierarchy, using the same relation to denote the user assignment to roles, as well as permission inheritance from a role to its assigned users. Offshore software development company India – http://www.ifour-consultancy.com
  20. Roles in a limited role hierarchy are restricted to a single immediate descendant. Although limited role hierarchies do not support multiple inheritances, they nonetheless provide clear administrative advantages over Core RBAC. We represent r1 as an immediate descendent of r2   r1 r2, if r1 ≥ r2, but no role in the role hierarchy lies between r1 and r2. That is, there exists no role r3 in the role hierarchy such that r ≥ r3 ≥ r2, where r1 ≠ r2 and r2 ≠ r3. Definition of limited Role Hierarchy:  r, r1, r2  ROLES, r ≥ r1  r ≥ r2 )r1 = r2: Offshore software development company India – http://www.ifour-consultancy.com
  21. It adds separation of duty relations to the RBAC model. As a security principle, SOD has long been recognized for its wide application in business, industry, and government. Its purpose is to ensure that failures of omission or commission within an organization can be caused only as a result of collusion among individuals. To minimize the likelihood of collusion, individuals of different skills or divergent interests are assigned to separate tasks required in the performance of a business function. The motivation is to ensure that fraud and major errors cannot occur without deliberate collusion of multiple users. This RBAC standard allows for both static and dynamic separation of duty Offshore software development company India – http://www.ifour-consultancy.com
  22. Offshore software development company India – http://www.ifour-consultancy.com
  23. Separation of duty relations are used to enforce conflict of interest policies. Conflict of interest in a role-based system may arise as a result of a user gaining authorization for permissions associated with conflicting roles. One means of preventing this form of conflict of interest is though static separation of duty (SSD), that is, to enforce constraints on the assignment of users to roles. An example of such a static constraint is the requirement that two roles be mutually exclusive; for example, if one role requests expenditures and another approves them, the organization may prohibit the same user from being assigned to both roles. The SSD policy can be centrally specified and then uniformly imposed on specific roles. Because of the potential for inconsistencies with respect to static separation of duty relations and inheritance relations of a role hierarchy, we define SSD requirements both in the presence and absence of role hierarchies Offshore software development company India – http://www.ifour-consultancy.com
  24. Offshore software development company India – http://www.ifour-consultancy.com
  25. Dynamic separation of duty (DSD) relations, like SSD relations, limit the permissions that are available to a user. However DSD relations differ from SSD relations by the context in which these limitations are imposed. DSD requirements limit the availability of the permissions by placing constraints on the roles that can be activated within or across a user’s sessions. Offshore software development company India – http://www.ifour-consultancy.com
  26. Offshore software development company India – http://www.ifour-consultancy.com
  27. Offshore software development company India – http://www.ifour-consultancy.com
  28. Offshore software development company India – http://www.ifour-consultancy.com
  29. Offshore software development company India – http://www.ifour-consultancy.com
  30. Offshore software development company India – http://www.ifour-consultancy.com
  31. Offshore software development company India – http://www.ifour-consultancy.com
  32. Offshore software development company India – http://www.ifour-consultancy.com
  33. Offshore software development company India – http://www.ifour-consultancy.com
  34. Offshore software development company India – http://www.ifour-consultancy.com