Access Control
- Abhilasha
- Jul 13, 2024
- 2 min read
Identification, Authentication, and Authorization
Identification: This is the process where a user declares their identity. It uniquely identifies a user or application within a system.
Authentication: The process of verifying that the user is indeed who they claim to be. This is typically done through something the user knows (passwords), has (smart cards), or is (biometrics).
Authorization: Determines what actions a user is allowed to perform. It specifies access rights and privileges to system resources based on the authenticated identity.
Multifactor Authentication (MFA)
MFA enhances security by requiring two or more verification factors before granting access. It combines elements like something the user knows, has, or is, reducing the likelihood of successful cyber attacks.
Access Control Models
Discretionary Access Control (DAC):
Access is based on the identity of the requester and access rules.
Typically implemented using access control lists (ACLs) or capability tickets.
Mandatory Access Control (MAC):
Access decisions are based on comparing security labels with security clearances.
Designed to enforce confidentiality and integrity policies.
Role-Based Access Control (RBAC):
Access is based on the roles that users assume within the organization.
Users are assigned roles, and roles are assigned permissions.
Supports the principle of least privilege and simplifies management of permissions.
Attribute-Based Access Control (ABAC):
Access decisions are based on attributes of the subject, object, and current environment.
Provides flexibility and granularity in access control, especially useful in dynamic environments like cloud services.
Access Control Elements
Subject: Entity (user or process) seeking access to objects.
Object: Resource (file, database record) to which access is controlled.
Access Right: Specific actions (read, write, execute) a subject can perform on an object.
Access Control Mechanisms
Access Matrix: Represents access rights in a matrix form, defining permissions for subjects on objects.
Access Control Lists (ACLs): Lists of subjects and their permissible access rights to specific objects.
Capability Tickets: Tokens that grant specific access rights to subjects.
Security Principles
Least Privilege: Granting each user the minimum privileges necessary to perform their tasks.
Separation of Duty: Dividing responsibilities among different individuals to prevent abuse of privileges.
Audit: Monitoring and recording system activities to detect security breaches and ensure compliance with policies.
Comentários