Tuesday, February 17, 2015

Security Models

Security Models are used to understand the systems and processes developed to enforce security principles. There are three key elements which plays role in model implementation:

  • People
  • Processes
  • Technology

Various models discussed here are:

Access Control Models: 

There are various different access control models provide different aspect of protection but Access Control List (ACL) is the most commonly used. ACL is a list that contains the subject that has access right to a particular object. An ACL will identify not only the subject, but also the specific access that subject has for the object.

Other models discussed below: Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-based Access Control (RBAC), Rule-based Access Control (RBA)

Bell-LaPadula Confidentiality Model:


Bell-LaPadula security model is combination of mandatory and discretionary access control mechanism.

First Principle, known as - Simple Security Rule - that no subject can read information from an object with a security classification higher than that possessed by the subject itself. This is also refferred as "no-read-up" rule.

So arrange the access level in hierarchal form, with defined higher and lower level of access.

Bell-LaPadula was designed to preserve "confidentiality" - focused on read and write access.

Reading material higher than subject's level is a form of unauthorized access.
Courtesy: rutgures.edu

Second Principle, known as *-property (star property) - states that subject can write an object only if it's security classification is less than or equal to the object's security classification.

Also known as "No-Write-Down" principle.

This prevents the dissemination of information users that do not have appropriate level of access.

Usage example - to prevent data leakage, publishing bank balance - to a public page..


Take-Grant Model:

  • Built upon Graph Theory
  • Distinct Advantage: Definitively Determine Rights - Unique Rights (take and grant)
courtesy: http://clinuxpro.com/wp-content/uploads/2013/10/Take-Grant-Model.png

  • Value lies in ability to analyze an implementation is complete or might be capable to leak information.




No comments:

Post a Comment