STI JOINT WRITTEN PROJECT ARCHITECTURE DESIGN FOR GIAC ENTERPRISES -

advertisement

STI JOINT WRITTEN

PROJECT

ARCHITECTURE DESIGN FOR

GIAC ENTERPRISES -

DEFENSE IN DEPTH USING

ROLE BASED ACCESS

CONTROL

Version 1.7

April 12, 2020

Team: Russell Meyer, Brad Ruppert

Developed for www.sans.edu

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

Revisions

Version

1.1

1.2

1.3

1.4

1.5

1.6

1.7

Primary

Author(s)

Brad Ruppert and Russell

Meyer

Description of Version

Initial development of architecture and background of RBAC Defense in Depth

Date

Completed

09/05/2007

9/07/2007 Brad Ruppert Added content for RBAC in DMZ and internal systems

Russell Meyer Added content for RBAC use within the network, segregation of duties, and infrastructure

Brad Ruppert Formatting, TOC, error correction

Russell Meyer Updates to NAC slide and Audit slide

9/11/2007

9/11/2007

9/12/2007

9/14/2007 Russell Meyer Expansion of MetaFrame, and Networking components

Brad Ruppert Grammatical changes and Vintela expansion 9/17/2007

726886937 (04/12/20) Page 1

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

Contents

1 I

NTRODUCTION

...........................................................................................................4

1.1

O VERVIEW ................................................................................................................4

1.2

N ETWORK D IAGRAM .................................................................................................4

1.3

A

SSOCIATED

H

ARDWARE

/S

OFTWARE

.......................................................................5

2 B

ACKGROUND

.............................................................................................................7

2.1

W HAT IS RBAC ........................................................................................................7

2.2

H

ISTORY OF

RBAC ...................................................................................................7

3 RBAC

FOR

GIAC E

NTERPRISES

...............................................................................9

3.1

RBAC ON A S MALL S CALE .......................................................................................9

4 P ROTECTING THE DMZ ...........................................................................................11

4.1

A

RCHITECTING THE

DMZ .......................................................................................11

5 S

ECURING THE

I

NTERNAL

S

YSTEMS

........................................................................13

5.1

A RCHITECTING THE I NTERNAL E NVIRONMENT .......................................................13

6 RBAC FOR N ETWORK D EVICES ..............................................................................15

6.1

RBAC

FOR

N

ETWORK

D

EVICES

..............................................................................15

7 RBAC

FOR

I

NFRASTRUCTURE

.................................................................................17

7.1

RBAC

FOR

I

NFRASTRUCTURE

.................................................................................17

8 RBAC

FOR

S

EPARATION OF

D

UTIES

........................................................................18

8.1

RBAC FOR S EPARATION OF D UTIES .......................................................................18

9 RBAC FOR A UDITING ..............................................................................................19

9.1

RBAC

FOR

A

UDITING

.............................................................................................19

10 C

ONCLUSION

...........................................................................................................20

10.1

C ONCLUSION .........................................................................................................20

11 R EFERENCES ...........................................................................................................22

11.1

R

EFERENCES

.........................................................................................................22

726886937 (04/12/20) Page 2

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

Figures

Figure 1: Network Diagram of GIAC Enterprises .................................................................... 4

Figure 2: RBAC Defense in Depth ........................................................................................... 6

Figure 3: Background on RBAC ............................................................................................... 8

Figure 4: RBAC Specific to GIAC Enterprises ...................................................................... 10

Figure 5: RBAC in the DMZ .................................................................................................. 12

Figure 6: RBAC for Internal Systems ..................................................................................... 14

Figure 7: RBAC for Network Devices .................................................................................... 16

Figure 8: RBAC for Infrastructure .......................................................................................... 17

Figure 9: RBAC for Separation of Duties ............................................................................... 18

Figure 10: RBAC for Auditing ............................................................................................... 19

Figure 11: Conclusion ............................................................................................................. 21

726886937 (04/12/20) Page 3

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

1 Introduction

1.1 Overview

This presentation will outline a defense in depth approach to implementing Role Based Access Control (RBAC) for GIAC Enterprises. GIAC Enterprises is defined in Peter

Vestergaard’s paper titled “Firewalls, Perimeter Protection, and VPNs Practical Assignment.”

1.2 Network Diagram

Internal DMZ Internet

PBX DNS DC/NTP

Server

Email

Server

Antivirus

Server

IPS

IPS

Email

Server

Internal

Users

Wireless

Access

Point

Print

Server

HR

Server

File

Server

Web

Server

DB

Server

App

Server

Web

Server

Metaframe

Presentation

Server

Figure 1: Network Diagram of GIAC Enterprises

Note: The network has been upgraded to reflect a more secure and modern architecture.

External

Users

726886937 (04/12/20) Page 4

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

1.3 Associated Hardware/Software

Hardware Component

Domain Controller, Domain Name Server

Internal/External Web Server

Int/Ext Email Server

Int/Ext IPS Server

Internal File & Print Server

Database Server

Application Server

MetaFrame Presentation Server

Router

Firewall

HR Server

Antivirus Server

Users Workstations

Operating System / Application Server

Windows 2003, Active Directory

Linux, Apache

Windows 2003, Exchange 2007

Cisco 4200 Series

Windows 2003

Windows 2003, SQL Server 2005

Linux, Weblogic

Windows 2003, Citrix

Cisco 1800

Cisco PIX 500

Windows 2003, Peoplesoft

Windows 2003, Symantec

Windows XP, Office 2007

726886937 (04/12/20) Page 5

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

RBAC defense in depth for GIAC

Enterprises

GIAC Enterprises is a small company that sells fortune cookies over the web

The company is comprised of a CEO, CFO, Sales Manager, Product

Manager, Developer, and System Admin

Most of the every day work (producing, selling and marketing) will be done through external partners, which is why the headcount initially is rather low. Considering many partners and suppliers will need access to company resources, it becomes increasingly important for the perimeters to have tight security.

The network consists of 14 servers

 DMZ (Web, MetaFrame, IPS, Email Gateway)

 Internal (Email, DC, DNS, Web, App, DB, Antivirus, File/Print, IPS, HR)

Sales staff has access via MetaFrame to internal network

Figure 2: RBAC Defense in Depth

726886937 (04/12/20) Page 6

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

2 Background

2.1 What is RBAC

Role Based Access Control (RBAC) is a means of assigning permissions for specific operations to certain roles within an organization. Roles can be assigned to users, groups, and objects which provide a layer of abstraction and thus enables administrators to manage large groups of users and systems with relative ease.

2.2 History of RBAC

The concept of roles and role-based access control (RBAC) has been with us for more than a decade, but enterprises still struggle with implementation of a role-based model on a wide scale. Many projects have failed because of high cost, scope creep, lack of business unit support, and lengthy implementation time lines. But a more generic abstraction layer can be utilized to manage users and their access to resources. Efficient and timely administration, a consistent access management model for resources, and scalability to manage growing user populations are strong drivers for IT administration staffs to explore role-based models .” 1

1

Gerry Gebel, Roles and Access Management: Seeking a Balance Between Roles and Rules, Burton Group. Jun

2003

726886937 (04/12/20) Page 7

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

Background on RBAC

Role Based Access Control (RBAC) is a methodology of limiting access to objects based on permissions assigned to a specific role

Roles can be synonymous with job duties or functions and can be associated with individual users or groups

These roles can have permissions associated to systems, files, folders, and other objects within an enterprise

The goal in role development is to determine all the permissions in advance that a user might require to perform a specific task or job function and bind these permissions to the specific role

Scalability and efficiency gains are two significant benefits of rolebased administration, allowing fewer system administrators to manage higher volumes of users and resources

Figure 3: Background on RBAC

726886937 (04/12/20) Page 8

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

3 RBAC for GIAC Enterprises

3.1 RBAC on a Small Scale

Having limited resources, some companies may overlook the importance of clearly defined roles and responsibilities. Business continuity as well as future business expansion relies heavily on documented process and the ability to outline job function. RBAC supports this model by creating roles for users/groups and associates permissions to these. This provides greater ease of administration when users come aboard, transition, or exit the company.

Due to the labor resources required and the limitations of most administration tools, organizations are increasingly recognizing the futility of managing access to resources on an individual user basis. The solution to this dilemma begins with the user registration process and the initial assignment of profile information. Organizations can categorize or profile users via static and dynamic groups, role assignment, rule-based attribute processing, or digital identity. Initiating this process early in the user management lifecycle enhances the value of identity information for downstream processes such as user authentication, resource authorization, and implementation of external security domains that use portable or federated digital identity.

” 2

2

Nick Nikols, Gerry Gebel, Identity Lifecycle Management, Burton Group, Feb 2006

726886937 (04/12/20) Page 9

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

RBAC for GIAC Enterprises

The small scale of GIAC Enterprises is both a plus and minus for implementing RBAC

Smaller companies will most likely mean users will be assuming multiple roles within the organization thus making it difficult to create static roles for each users or process.

 Example: initially the domain admin may be the DBA as well depending upon the size of the IT department. Once the company can support additional staff, roles should be defined that separate developer from production support.

At first glance the implementation of RBAC in a company with under 10 employees may seem simple. If roles are not properly identified and categorized, scalability becomes a problem. The sooner you can implement principles of least privilege and segregation of duties, the more reliable your process will become.

At a high level GIAC Enterprises can be broken into four divisions

Business (CEO, CFO, Sales Manager, Product Manager)

Development (Developer)

Administration (System Administrator)

Audit (External Resource)

Figure 4: RBAC Specific to GIAC Enterprises

726886937 (04/12/20) Page 10

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

4 Protecting the DMZ

4.1 Architecting the DMZ

The DMZ will provide the middle layer between the internal network and the internet and will be enclosed by a firewall on each interface. This area will contain the email gateway, external web server, MetaFrame presentation server, and an intrusion prevention system. The role-based access control over these systems will be managed by a combination of Windows

Active Directory (AD) and Vintela Authentication Services (VAS).

Vintela Authentication Services (VAS) works as a plug-in to Windows Active Directory and enables cross-platform identity integration and authentication. VAS provides a seamless extension of the security and compliance of the Microsoft Active Directory infrastructure to

Unix, Linux, and Mac platforms and applications. It addresses the compliance need for cross-platform access control, the operational need for centralized authentication and single sign-on, and enables simplified, heterogeneous identity management.

MetaFrame is the name for a thin client/server software application from Citrix that is used to provide Microsoft's Windows Terminal Server product (WTS) with additional server and client functionality. It accomplishes this by allowing any client, regardless of operating system (OS), to connect to a Windows Terminal Server and run a Windows application through an internet browser. MetaFrame features a secure encryption option through a distributed

Windows presentation protocol developed by Citrix, called ICA (Independent Computing

Architecture). Employee access to internal systems from the internet will be routed through a

MetaFrame presentation server and their authentication and authorization will be verified against Windows AD.

Business partners will be routed through our SSL web interface (Apache on Linux) in order to access our production database (MS SQL on Win 2003). All communication between our database and web server will be managed by our application server (Weblogic on Solaris).

Authentication will take part via a java-based Single Sign On component of VAS. Vintela will be a component of our Active Directory backbone which will be used to manage access controls around the roles of users/systems/groups.

The Cisco IPS device will be self contained and managed by our system administrator.

726886937 (04/12/20) Page 11

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

RBAC in the DMZ

The DMZ houses the Email gateway, IPS, Web Server, and MetaFrame Presentation

Server

Windows systems (Email, MetaFrame) use Active Directory (AD) for maintaining rolebased access controls

Linux systems (Web, App, IPS) use Vintela Authentication Services (VAS) which sits on the AD framework for administering role-based access controls

Within AD, the following roles are defined specific to the DMZ:

User - read-only access to web pages

Administrator - read/write access to deploy changes made by developer

Auditor – read-only access to specified systems

Windows group policy security settings are used to lock down systems restricting access of to specific files/folders based on the role. Linux group policies and security scripts are deployed to multiple systems as well using the VAS interface through the

AD management console

Inbound access to systems from business partners and employees is via MetaFrame which uses role based access controls defined within AD & VAS group policies

Access to the web interface utilizes Vintela ’s Java based Single Sign On component which validates users and their access to confidential web pages

Figure 5: RBAC in the DMZ

726886937 (04/12/20) Page 12

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

5 Securing the Internal Systems

5.1 Architecting the Internal Environment

The internal systems will be comprised of a server VLAN and a user VLAN. The server

VLAN will contain a Domain Controller, DNS, Email, Antivirus, File/Print, HR, and

Web/App/Db servers. The majority of systems will be Windows 2003 and the role-based access control will be maintained through Windows Active Directory (AD). The Linux web and Solaris app servers will be managed by Vintela Authentication Services (VAS) as part of

Active Directory. The Cisco IPS device will be a self-contained entity.

The user VLAN will consist of desktop and laptop person-computers running Windows XP.

These devices will be configured securely through Window Group Policy and role-based access controls will be granted via Windows AD. The roles associated with the personal computers will be administrator and business user. The business users (CEO, CFO, Sales

Manager, Product Manager) will have read access to all files/folders but will have restricted write access to only specified non-system folders. They will also be prevented from installing software or modifying the registry. These tasks will require an administrator’s intervention.

The developer role will be restricted to partitions on the web, app, and db servers. This will create a “sand-box” for development and testing. All production changes must go through a change management process, whereby the system administrator takes the developer’s changes and deploys them to production. These access controls will be a combination of Windows

AD and VAS having file/folder permissions associated to them.

The auditor will be provided temporary read access to designated areas of systems on a caseby-case basis. This role will remain disabled by default and only be enabled for specific audits.

726886937 (04/12/20) Page 13

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

RBAC for Internal Systems

Access to the majority of GIAC Enterprise

’s internal systems (Email, File,

HR, Antivirus, DC, DNS) is governed by Windows Active Directory (AD)

Access to the Linux/Apache web server and the Solaris/Weblogic App

Server is controlled via Vintela Authentication Services (VAS) managed through AD

Internally the following roles are defined:

User - read-only access to web pages

Administrator - read/write access to deploy changes to production after they

’ve been made by a developer

Developer

– read/write access to development partitions of web/app/db servers

Auditor

– read-only access to specified systems

Employees access the sales and HR database utilizing a web-to-app interface thereby abiding by a 3-tier architecture

Systems are partitioned and segmented into development and production environments to facilitate configuration management practices

Figure 6: RBAC for Internal Systems

726886937 (04/12/20) Page 14

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

6 RBAC for Network Devices

6.1 RBAC for Network Devices

GIAC Enterprises will use Cisco’s Network Admission Control (NAC) to extend the concept of roles to the network devices. This will add another layer of defense-in-depth to the network. Devices attaching to the network will be examined and access may be granted depending on device patch status as well as user/device roles. Examples include: business users and guest users.

Roles for the internal devices such as computers will be defined. For example, which devices get access to the internal wireless network and what systems or servers they can access from the internal wireless network. For non NAC compliant devices, NAC Profiler will be used to automatically identify and assess non-PC devices such as Voice over IP phones and printers.

Using several sources of network information, NAC Profiler can identify devices, regardless of whether they are associated with a specific user.

Workstations will have to meet minimum operating systems, critical applications, anti-virus, and anti-spyware patching requirements before access will be granted to even ‘ping’ the corporate systems. Devices that do not meet specific patch requirements can be patched via the policy server. If the device can not be updated, it will be corralled as a “guest” device and will be provided restricted network access to only the MetaFrame servers.

NAC will be used to restrict and isolate vender devices and connections (i.e. visiting laptops).

They will be restricted from the corporate network but still allowed Internet access. Roles can be defined via NAC or VLANs for Internet access, access to production servers, routers and other infrastructure devices.

PGP’s encryption solution for computers, including laptops and desktops, secures the entire hard disk and therefore all the data on the computer. PGP interfaces with Active Directory so another user database would not be needed and the encryption process is transparent to the user. The user authentication process is synchronized with the Windows logon, so Windows users are automatically logged into their system without requiring additional authentication.

PGP’s encryption can also be used to secure removable hard drives. If an encrypted computer is lost or stolen, the data on the device can not be accessed. Also note that encryptions keys are backed up and stored very securely to provide recoverability.

In terms of physical security, Active Directory can be extended to access cards for the doors, labs, manufacturing and even the parking garage. They can also be used for two factor authentication (card: something you have + password: something you know) on card capable computers. Using cards tied to Active Directory credentials allows the logging of physical access as well as reducing costs in terms of replacing keys and adjusting employee’s access.

726886937 (04/12/20) Page 15

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

RBAC for Network Devices

Cisco ’s Network Admission Control (NAC) is used to control workstations and laptop access to the internal network

IBNS and 802.1x is integrated into NAC (next slide)

802.1x provides controls for both wired and wireless devices

NAC Profiler is used to automatically identify and assess non-PC devices such as

Voice over IP phones and printers

Appropriate device roles are created. For example, business user, guest user, etc...

NAC is used to isolate vender connections (i.e. visiting laptops), while still allowing

Internet access

Ensure that authorized endpoint devices have been patched (operating systems, critical applications, anti-virus, anti-spyware, etc..) via the policy server.

If the device is not up-to-date, it is quarantined and allowed access only to the remediation server

If the device can not be updated, treat device as a

“guest”, restrict access to only the

MetaFrame servers.

GIAC Enterprises uses PGP ’s “Whole Disk Encryption” solution to secure data on laptops and at-risk desktops and removable storage.

Figure 7: RBAC for Network Devices

726886937 (04/12/20) Page 16

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

7 RBAC for Infrastructure

7.1 RBAC for Infrastructure

GIAC Enterprises will use Cisco’s AAA & TACACS+ via Cisco Secure Access Control

Server & Active Directory for centralized router and firewall Authentication, Authorization, and Accounting. This will allow the network infrastructure to leverage Active Directory for user authorization.

For auditing and trouble ticket resolution, Cisco’s Role-Based CLI Access can be used to define auditor and helpdesk views. These views can be configured to restrict access to Cisco

IOS commands and configuration while allowing timely problem resolution and audit access to the IOS.

Active Directory and Citrix MetaFrame can be leveraged to provide another layer of defensein-depth. Since the MetaFrame enabled applications can be accessed 24 hours a day/7 days a week, additional roles can be defined to provide users remote access to specific applications beyond normal work hours. Not only would user roles be classified to determine access to

“what” system or application but also “when” they can access the application.

RBAC for Infrastructure

Use Cisco ’s AAA & TACACS+ via Cisco Secure Access Control Server & Active

Directory for centralized router and firewall Authentication, Authorization, and

Accounting.

Use Cisco's Identity-Based Networking Services (IBNS) identity management solution

IBNS is based on 802.1x and offers authentication, access control, and user policies to secure the network

802.1X allows enforcement of port based network access control when devices attempt to access the network

IBNS leverages Cisco's switches, Wireless APs, Cisco Secure ACS and Cisco

Secure Services Client

Cisco ’s Role-Based CLI Access is used to define auditor and helpdesk views

These views are configured to restrict access to Cisco IOS commands and configuration while allowing timely problem resolution and audit access to the IOS

If SSH is needed, Quest OpenSSH provides password-less, secure, encrypted remote login and file transfer services for Vintela Authentication Services (VAS).

The Cisco solution can also support VLANs and VPNs (if needed)

Figure 8: RBAC for Infrastructure

726886937 (04/12/20) Page 17

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

8 RBAC for Separation of Duties

8.1 RBAC for Separation of Duties

GIAC Enterprises can use RBAC as a deterrent for internal fraud by enforcing separation of duties. Fraud is a crime of opportunity; by enforcing separation of duties at an access level, the opportunity for fraud can be reduced. An example of this could be the separation of invoice payment approval and setting up a vendor in the accounting system.

GIAC Enterprises can use the RBAC concept of static separation of duties to create roles that that will prevent a user from also having another role. For example, in terms of user administration, a person that authorizes new users or access will not be allowed to also have the role that allows them to establish a new user or access.

In certain cases, dynamic separation of duties maybe necessary (limited number of users to do the jobs) but still retain some separation of duties. This would result in one user having both the “authorize” and “create new user” role but not be able to authorize and then create or grant rights to the same new user.

RBAC for Separation of Duties

GIAC Enterprises has developed roles to separate job duties

User administration - The person authorizing the new user or access should not be the same one that establishes new user or access

Accounting - The person approving the payment of an invoice should not be the same one that can create a company\vendor in the accounting system

IT Administrator vs. IT auditor. While the auditor would need the same

‘read’ or access rights as an it administrator, they would not need ‘write’ or

‘modify’ rights

The developer would require access to the development area but should not be allowed access to the production area

Data Owner vs. Data Custodian, i.e. the IT administrator. In some cases, access to the data may need to be restricted to the data owner. IT would not be granted access, but would be required to ensure the security of it

As mentioned, physical access can also be controlled via AD enabled key cards. This prevents access to unauthorized areas

Figure 9: RBAC for Separation of Duties

726886937 (04/12/20) Page 18

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

9 RBAC for Auditing

9.1 RBAC for Auditing

GIAC Enterprises can benefit by defining audit roles in advance of the audits. The appropriate auditors can then be assigned those roles for the term of the audit. For ongoing auditing or compliance, the roles can be granted on a permanent basis. For example: internal IT department self-auditing or compliance vs. once-a-year audit.

Properly implemented RBAC will make auditing user access that much easier. For example, instead of reviewing file and folder NTFS permissions on file servers, reports can be generated that list the roles each user has. Providing this report to the manager, he/she can quickly determine if that role is still appropriate for the employee. If access is no longer appropriate, the user is simply removed from the role and all of their access is terminated for that application or system.

GIAC Enterprises can review the proper access rights for each role to ensure the role has the appropriate access to the system or application.

RBAC for Auditing

RBAC will ease auditing of network and systems

Enforces unique usernames; only one username per user

Define ‘read’ or ‘view’ only access to auditing roles

Auditors can then be granted access to audit roles

Appropriate event logs from servers, Active Directory, IPS, routers,

Vintela Authentication Services, NAC, key card system and other network infrastructure devices are stored in a centralized log server

Access to the centralized log server data is restricted, IT can not access, modify or delete logs without audit ’s permission

An event correlation and reporting server is used by both IT and audit to correlate and review the data

Figure 10: RBAC for Auditing

726886937 (04/12/20) Page 19

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

10 Conclusion

10.1 Conclusion

GIAC Enterprises inherits many security and administrative benefits from the implementation of RBAC but it may not be the holy grail of access control. This is especially true for organizations that have not or can not outline well-defined access roles. Care should be taken when implementing RBAC since it can be difficult and time consuming. The benefit to the organization should outweigh the Total Cost of Ownership 3 (TCO). For some large organization,

RBAC can be implemented at a high level. For example, a policy to standardize on unique user name for all systems, assigning rights to the roles or groups only and defining a set of roles that that are general rather then specific.

“For large systems, with hundreds of roles, thousands of users and millions of permissions, managing roles, users, permissions and their interrelationships is a formidable task that cannot realistically be centralized in a small team of security administrators.” 4

It is also important to note that RBAC does not address user provisioning, the authorization for assigning users to roles or revoking those assignments. Additional policies and procedures will need to be developed.

3

Total cost of ownership (TCO) - is a financial estimate designed to help consumers and enterprise managers assess direct and indirect costs commonly related to software or hardware. Wikipedia

4

Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control:

Toward a Unified Standard". 5th ACM Workshop Role-Based Access Control: 47-63

726886937 (04/12/20) Page 20

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

Conclusion

GIAC Enterprises can benefit from Role Based Access Control by gaining scalability and efficiency

By leveraging Active Directory and implementing the appropriate roles, GIAC Enterprises can increase security and reduce system administration costs

While Role Based Access Control is considered a best practice at the system or application level, it becomes increasingly difficult to implement when scaling for large enterprises

RBAC is not a product that can be implemented per se.

Implementing RBAC involves careful planning for each systems and should involve users, management and policies for success

Care should be taken when implementing RBAC in the Enterprise.

If costs outweigh the benefits, RBAC implementation may need to be scaled back

Figure 11: Conclusion

726886937 (04/12/20) Page 21

Meyer & Ruppert, 2007

SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth

11 References

11.1 References

Vestergaard, Peter. Firewalls, Perimeter Protection, and VPNs Practical Assignment. http://www.giac.org/certified_professionals/practicals/GCFW/0309.php

. April 2002

Gebel, Gerry. Roles and Access Management: Seeking a Balance Between Roles and Rules.

Burton Group. June 2003

Peter Leight and Richard Hammer, Role-Based Access Control (RBAC) approach for Defense-in-Depth, August 2006

Nick Nikols, Gerry Gebel, Identity Lifecycle Management, Burton Group, Feb 2006

Wikipedia – Wikipedia.org

Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based

Access Control: Toward a Unified Standard". 5th ACM Workshop Role-Based Access Control: 47-63

726886937 (04/12/20) Page 22

Meyer & Ruppert, 2007

Download