Dr. O. Aly
Computer Science
Introduction
The purpose of this discussion it to discuss access control and their three models of DAC, MAC, and RBAC. The discussion includes the recommendation for each model use and the technique to implement them.
Access Controls
Access controls allow only the authorized users, applications, devices and systems to access the resources of the organization including the information. Once the vulnerabilities are identified, and the absence or weaknesses of countermeasures are identified, Access Controls are implemented as a countermeasure to these identified vulnerabilities. Access controls can be implemented to ensure confidentiality by preventing the disclosure of data to unauthorized users. Access controls can also be used to provide data integrity. The approach of organizations to information security has a direct impact on the access control strategy. For instance, organizations can apply the “deny-by-default” strategy instead of “allow-by-default” strategy to enforce much stricter default stance, which denies access by default. Access controls strategy is also implemented as an additional layer, as the first layer, of a good defense-in-depth security plan (Abernathy & McMillan, 2016).
Access Control Implementation
Access control implementation should be done at every level and area of the information system infrastructure. However, in the defense-in-depth, more access control is enforced. Access controls must be included in the security plan to provide confidentiality, integrity, and availability (CIA) for the assets of the organization. The Access controls are not implemented by the data owner whose role is to deny or approve access rights to the data. The implementation of Access Control strategies is part of the continuous security program life cycle. As the employees are regarded to be the greatest threat to organizations, access controls must be implemented to protect confidential resources from unauthorized internal access. The process of Access Control involves three main steps; resource identification, users identification, and the relationship between users and resource determination. It is highly recommended to avoid complexity when implementing Access Control strategy because when it is complex, it becomes hard to implement and manage (Abernathy & McMillan, 2016).
Access Control Techniques
The Access Controls techniques are categorized into seven categories; compensative, corrective, detective, deterrent, directive, preventive, and recovery. While these seven access control categories classify the access controls based on where they fit in time, the types of access control are based on the implementation method. The types of Access Control involve three types; administrative or management control, logical or technical control, and physical control. When the defense-in-depth in the organization has a priority, all three types of access control are implemented. The administrative controls often referred to as “soft controls,” involves the administration of the assets of the organization, and personnel by implementing security policies, procedures, standards, baseline, and guidelines which are established and developed by the management. Example of these administrative controls includes security awareness training, data classification, and data labeling. The logical or technical controls involves the hardware and software components which are implemented to restrict access. Example of the logical controls includes firewall, encryption, authentication system, protocols, biometrics, smart cards, password, and so forth. The physical controls are implemented to protect the facilities and employees of the organization. Example of the physical controls includes perimeter security, guards, locks, biometrics, cabling, badges, and so forth (Abernathy & McMillan, 2016).
Access Control Models
Organizations can deploy the authorization techniques to control access to systems. The authorization techniques include various access control models, and access control policies. The access control model describes the security policy of the organization. Organizations implement access control models to simplify the access control administration by grouping entities which request access to certain objects such as a computer, database, files and so forth. The access control models include eight models including discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), role-based access control, content-dependent versus context-dependent access control, access control matrix, capabilities table, and access control list. This discussion is limited to DAC, MAC, and RBAC (Abernathy & McMillan, 2016).
The DAC model is used in local, and dynamic scenarios, where
the owner of an object such as database determines which entities can have
access. The access is based on the
identity of the entity or users, profile, or role. The disadvantage of the DAM model is that it
can be an administrative burden because the owner grants access privileges to
users. Such a grant must be terminated as soon as the user leaves the organization or the department. The identity-based access control is
categorized as a sub-set of DAC model and is
based on the identity of the user or membership of a group. The non-discretionary
access control is the opposite of DAC, where access
controls are configured by the security administrator or other authority,
and the system compares the identity of the user with the access control list
of the object (Abernathy & McMillan,
2016).
The MAC is often described as
prohibitive because it is based on a
security label system. Labeling is required in MAC because of the importance of
security. When using MAC model, a
clearance is a privilege for the users and entities. The labeling technique is hierarchical. For commercial organizations, the levels of
security labels could be proprietary, confidential, sensitive, and public. However, for the government or military
entities, the level of security labels can be top secret, secret, confidential
and unclassified. When using MAC, the
system makes an access decision based on
the clearance level comparison with the security label of the object. MAC is regarded to be more secure than
DAC. However, DAC is more flexible and
scalable than MAC (Abernathy & McMillan,
2016).
The RBAC model is used to enforce the minimum privileges for subjects easily,
and when one or more role is assigned to
each subject. Access control is defined
based on roles which are hierarchical. The implementation of access control policy
for bank tellers, or loan officer is an example of RBAC. RBAC is not as secure as MAC or DAC because
security is based on roles. RBAC model is
commonly used in commercial applications, and its implementation has a much lower cost than the other models
of DAC and MAC. If an organization has a
high employee turnover, this model can be a good fit. There are four approaches for RBAC; non-RBAC, limited-RBAC, hybrid-RBAC, and full-RBAC. In the non-RBAC sub-model, no roles are used, while in the limited-RBAC, the users are mapped to a single
application role. In the hybrid-RBAC,
each user is mapped to a single user
accessing multiple systems. In the
full-RBAC, users are mapped to a single
role as defined by the security policy, and access to the systems is managed through the organizational roles (Abernathy & McMillan,
2016).
Access Control – Centralized vs. Decentralized approaches
The administration of Access Control can be either centralized or decentralized. The centralized approach dedicates a central department, or personnel to oversee the access to all resources of the organization. This approach ensures consistency of the access control application. However, it can be slow because the central entity must process all access. The decentralized approach allows the employees who are closest to the resources oversee the access control to these resources. This approach is good to ensure the access rights to the data they know. However, this approach lacks uniformity and can be hard to implement. Giving the nature of both approaches, some organization implement a hybrid approach which involves both centralized and decentralized access control, where the centralized access is used for basic access, but granular access to individual assets such as data on a specific server for a department can be handled by the data owner (Abernathy & McMillan, 2016).
References
Abernathy, R., & McMillan, T. (2016). CISSP Cert Guide: Pearson IT
Certification.