Title: Access Control MAC
1Access ControlMAC
2Reading assignments
- Required for access control classes
- Ravi Sandhu and P. Samarati, Access Control
Principles and Practice, IEEE Communications,
Volume 32, Number 9, September 1994
http//citeseerx.ist.psu.edu/viewdoc/summary?doi1
0.1.1.30.5029 - Ravi Sandhu, Lattice-Based Access Control Models,
IEEE Computer, Volume 26, Number 11 (Cover
Article), November 1993 http//citeseerx.ist.psu.
edu/viewdoc/summary?doi10.1.1.54.8395
3Mandatory Access Control
- Objects security classification
- e.g., grades(confidential, student-info)
- Subjects security clearances
- e.g., Joe(confidential, student-info)
- Access rules defined by comparing the security
classification of the requested objects with the
security clearance of the subject - e.g., subject can read object only if
label(subject) dominates label(object)
4Mandatory Access Control
- If access control rules are satisfied, access is
permitted - e.g., Joe wants to read grades.
- label(Joe)(confidential,student-info)
- label(grades)(confidential,student-info)
- Joe is permitted to read grades
- Granularity of access rights!
5Mandatory Access Control
Security Classes (labels) (A,C) A total order
authority level C set of categories e.g., A
confidential gt public , C student-info,
dept-info
(confidential,student-info,dept-info)
(confidential,dept-info)
(confidential,student-info)
(confidential, )
(public,student-info,dept-info)
(public,student-info)
(public,,dept-info)
(public, )
6Mandatory Access Control
- Dominance (?) label l(A,C) dominates l(A,C)
iff A ? A and C ? C - e.g., (confidential,student-info) ?
(public,student-info) - BUT
- (confidential, student-info) ?
(public,student-info, department-info)
7Bell- LaPadula (BLP) Model
- Confidentiality protection
- Lattice-based access control
- Subjects
- Objects
- Security labels
- Supports decentralized administration
8BLP Reference Monitor
- All accesses are controlled by the reference
monitor - Cannot be bypassed
- Access is allowed iff the resulting system state
satisfies all security properties - Trusted subjects subjects trusted not to
compromise security
9BLP Axioms 1.
- Simple-security property a subject s is allowed
to read an object o only if the security label
of s dominates the security label of o - No read up
- Applies to all subjects
10BLP Axioms 2.
- -property a subject s is allowed to write an
object o only if the security label of o
dominates the security label of s - No write down
- Applies to un-trusted subjects only
11Blind Writes
- Improper modification of data
- Most implementations disallow blind writes
12Tranquility
- Read and write accesses mediated based on the
security labels of objects and subjects - Read and write accesses are not atomic, i.e.,
sequences of operations that may or may not be
interrupted - Example secret subject requests a read to a
secret object. While the request is being
processed, the subjects lowers its level to
unclassified gt unclassified subject gained read
access to secret object
13Tranquility
- Tranquility changing security labels
- Strong tranquility security labels of subjects
and objects never change during an operation - Advantage system state always satisfies security
requirements - Disadvantage not flexible
14Tranquility
- Weak tranquility security labels of subjects and
objects never change such a way as to violate the
security policy - High watermark on subject during read a subject
may upgrade its security clearance - High watermark on objects during write an
objects security classification may be upgraded.
15Discretionary Security Property
- Every current access must be in the access matrix
16Trojan Horse and BLP
Brown read, write
Employee
Reference Monitor
Word Processor
Secret
Use shared program
Read Employee
Brown
Black, Brown read, write
Secret
Blacks Employee
TH
Copy Employee To Blacks Employee
Public
Insert Trojan Horse Into shared program
Black
Secret ? Public
Public
17Biba Model Integrity Protection
- Integrity protection
- Lattice-based access control
- Subjects
- Objects
- Integrity labels
- Access Control List
18Integrity Labels
- Hierarchical integrity levels e.g.,
- Crucial gt Very important gt Important
- Non-hierarchical categories e.g.,
- medical, personal, administrative
19Strict Integrity Policy
- Integrity -property a subject s can modify an
object o only if the integrity level of the
subject dominates the integrity level of the
object (no write up) - Simple integrity property a subject s can
observe an object o only if the integrity label
of s is dominated by the integrity label of o (no
read down) - Invocation property a subject s1 can invoke a
subject s2 only if the integrity label of s1
dominates the integrity label of s2
20Next Class Role-Based Access Control