a mechanism for risk adaptive access control radac
play

A Mechanism for Risk Adaptive Access Control (RAdAC) Machon Gregory - PowerPoint PPT Presentation

A Mechanism for Risk Adaptive Access Control (RAdAC) Machon Gregory 14 March 2007 National Information Assurance Research Laboratory (NIARL) Motivation Need for new access control model, Risk Adaptive Access Controls Commonly deployed


  1. A Mechanism for Risk Adaptive Access Control (RAdAC) Machon Gregory 14 March 2007 National Information Assurance Research Laboratory (NIARL)

  2. Motivation  Need for new access control model, Risk Adaptive Access Controls  Commonly deployed systems are incapable of supporting a policy with ability to change  Technology exists with the ability to create a system capable of providing Risk Adaptive Access Controls National Information Assurance Research Laboratory (NIARL)

  3. Outline  Background  Problem  Solution  Implementation  Current Status  Future Work National Information Assurance Research Laboratory (NIARL)

  4. Background  Risk Adaptive Access Control (RAdAC) − Global Information Grid − “Need to Know” ➔ “Need to Share” − Flexible (escalation and revoke privileges) − Access decisions based on changing risk − Risk is defined by numerous factors National Information Assurance Research Laboratory (NIARL)

  5. Problem  What I want to do − Selectively Share Information − Maintain Originator Control − Flexible Access Controls  Why I can't do it now − Trusted Computer − Access Control Limitation − State of the Remote System National Information Assurance Research Laboratory (NIARL)

  6. Scenario  Document Server/Document Viewer  Protection of documents on remote machines  Provide access controls over network objects  Escalate and revoke privileges based on a risk knob National Information Assurance Research Laboratory (NIARL)

  7. Scenario Document Client Server Client National Information Assurance Research Laboratory (NIARL)

  8. Solution  Applications of the Flask Security Architecture − Client/Server (SELinux) − Policy over Network Object  Least Privilege Environment − Prevents Release of Information − Provides a Level of Assurance  IPSec Labeled Security Associations National Information Assurance Research Laboratory (NIARL)

  9. Implementation  User-space Security Server  Document Server and Viewer  IPSec with labeled security associations (SA)  Translation Mechanism  Mandatory Access Control Operating System  Local and network policy National Information Assurance Research Laboratory (NIARL)

  10. Implementation NSS This is paragraph This is paragraph This is paragraph one. one. one. Client This is paragraph This is paragraph This is paragraph This is paragraph This is paragraph This is paragraph two. two. two. two. two. two. This is paragraph This is paragraph This is paragraph This is paragraph This is paragraph This is paragraph Document three. three. three. three. three. three. Server Client National Information Assurance Research Laboratory (NIARL)

  11. Current Status  Limited functionality application  3 static policies representing risk  Policies for the system components National Information Assurance Research Laboratory (NIARL)

  12. Future Work  More robust application such as a Virtual Machine, Word Processor, or Streaming Media Server  Incorporation of a more secure windowing environment  Study the applicability of RAdAC concepts to real world applications National Information Assurance Research Laboratory (NIARL)

  13. Questions? Machon Gregory mbgrego@tycho.nsa.gov National Information Assurance Research Laboratory (NIARL)

Recommend


More recommend