April 12, 2020
Developed for www.sans.edu
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Version
1.1
1.2
1.3
1.4
1.5
1.6
1.7
Primary
Author(s)
Brad Ruppert and Russell
Meyer
Description of Version
Initial development of architecture and background of RBAC Defense in Depth
Date
Completed
09/05/2007
9/07/2007 Brad Ruppert Added content for RBAC in DMZ and internal systems
Russell Meyer Added content for RBAC use within the network, segregation of duties, and infrastructure
Brad Ruppert Formatting, TOC, error correction
Russell Meyer Updates to NAC slide and Audit slide
9/11/2007
9/11/2007
9/12/2007
9/14/2007 Russell Meyer Expansion of MetaFrame, and Networking components
Brad Ruppert Grammatical changes and Vintela expansion 9/17/2007
726886937 (04/12/20) Page 1
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
.......................................................................5
...............................................................................9
DMZ .......................................................................................11
........................................................................13
A RCHITECTING THE I NTERNAL E NVIRONMENT .......................................................13
..............................................................................15
.................................................................................17
.................................................................................17
........................................................................18
.............................................................................................19
726886937 (04/12/20) Page 2
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
726886937 (04/12/20) Page 3
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
This presentation will outline a defense in depth approach to implementing Role Based Access Control (RBAC) for GIAC Enterprises. GIAC Enterprises is defined in Peter
Vestergaard’s paper titled “Firewalls, Perimeter Protection, and VPNs Practical Assignment.”
PBX DNS DC/NTP
Server
Server
Antivirus
Server
IPS
IPS
Server
Internal
Users
Wireless
Access
Point
Server
HR
Server
File
Server
Web
Server
DB
Server
App
Server
Web
Server
Metaframe
Presentation
Server
Figure 1: Network Diagram of GIAC Enterprises
Note: The network has been upgraded to reflect a more secure and modern architecture.
External
Users
726886937 (04/12/20) Page 4
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Hardware Component
Domain Controller, Domain Name Server
Internal/External Web Server
Int/Ext Email Server
Int/Ext IPS Server
Internal File & Print Server
Database Server
Application Server
MetaFrame Presentation Server
Router
Firewall
HR Server
Antivirus Server
Users Workstations
Operating System / Application Server
Windows 2003, Active Directory
Linux, Apache
Windows 2003, Exchange 2007
Cisco 4200 Series
Windows 2003
Windows 2003, SQL Server 2005
Linux, Weblogic
Windows 2003, Citrix
Cisco 1800
Cisco PIX 500
Windows 2003, Peoplesoft
Windows 2003, Symantec
Windows XP, Office 2007
726886937 (04/12/20) Page 5
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises is a small company that sells fortune cookies over the web
The company is comprised of a CEO, CFO, Sales Manager, Product
Manager, Developer, and System Admin
Most of the every day work (producing, selling and marketing) will be done through external partners, which is why the headcount initially is rather low. Considering many partners and suppliers will need access to company resources, it becomes increasingly important for the perimeters to have tight security.
The network consists of 14 servers
DMZ (Web, MetaFrame, IPS, Email Gateway)
Internal (Email, DC, DNS, Web, App, DB, Antivirus, File/Print, IPS, HR)
Sales staff has access via MetaFrame to internal network
Figure 2: RBAC Defense in Depth
726886937 (04/12/20) Page 6
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Role Based Access Control (RBAC) is a means of assigning permissions for specific operations to certain roles within an organization. Roles can be assigned to users, groups, and objects which provide a layer of abstraction and thus enables administrators to manage large groups of users and systems with relative ease.
“
The concept of roles and role-based access control (RBAC) has been with us for more than a decade, but enterprises still struggle with implementation of a role-based model on a wide scale. Many projects have failed because of high cost, scope creep, lack of business unit support, and lengthy implementation time lines. But a more generic abstraction layer can be utilized to manage users and their access to resources. Efficient and timely administration, a consistent access management model for resources, and scalability to manage growing user populations are strong drivers for IT administration staffs to explore role-based models .” 1
1
Gerry Gebel, Roles and Access Management: Seeking a Balance Between Roles and Rules, Burton Group. Jun
2003
726886937 (04/12/20) Page 7
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Role Based Access Control (RBAC) is a methodology of limiting access to objects based on permissions assigned to a specific role
Roles can be synonymous with job duties or functions and can be associated with individual users or groups
These roles can have permissions associated to systems, files, folders, and other objects within an enterprise
The goal in role development is to determine all the permissions in advance that a user might require to perform a specific task or job function and bind these permissions to the specific role
Scalability and efficiency gains are two significant benefits of rolebased administration, allowing fewer system administrators to manage higher volumes of users and resources
Figure 3: Background on RBAC
726886937 (04/12/20) Page 8
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Having limited resources, some companies may overlook the importance of clearly defined roles and responsibilities. Business continuity as well as future business expansion relies heavily on documented process and the ability to outline job function. RBAC supports this model by creating roles for users/groups and associates permissions to these. This provides greater ease of administration when users come aboard, transition, or exit the company.
“
Due to the labor resources required and the limitations of most administration tools, organizations are increasingly recognizing the futility of managing access to resources on an individual user basis. The solution to this dilemma begins with the user registration process and the initial assignment of profile information. Organizations can categorize or profile users via static and dynamic groups, role assignment, rule-based attribute processing, or digital identity. Initiating this process early in the user management lifecycle enhances the value of identity information for downstream processes such as user authentication, resource authorization, and implementation of external security domains that use portable or federated digital identity.
” 2
2
Nick Nikols, Gerry Gebel, Identity Lifecycle Management, Burton Group, Feb 2006
726886937 (04/12/20) Page 9
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
The small scale of GIAC Enterprises is both a plus and minus for implementing RBAC
Smaller companies will most likely mean users will be assuming multiple roles within the organization thus making it difficult to create static roles for each users or process.
Example: initially the domain admin may be the DBA as well depending upon the size of the IT department. Once the company can support additional staff, roles should be defined that separate developer from production support.
At first glance the implementation of RBAC in a company with under 10 employees may seem simple. If roles are not properly identified and categorized, scalability becomes a problem. The sooner you can implement principles of least privilege and segregation of duties, the more reliable your process will become.
At a high level GIAC Enterprises can be broken into four divisions
Business (CEO, CFO, Sales Manager, Product Manager)
Development (Developer)
Administration (System Administrator)
Audit (External Resource)
Figure 4: RBAC Specific to GIAC Enterprises
726886937 (04/12/20) Page 10
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
The DMZ will provide the middle layer between the internal network and the internet and will be enclosed by a firewall on each interface. This area will contain the email gateway, external web server, MetaFrame presentation server, and an intrusion prevention system. The role-based access control over these systems will be managed by a combination of Windows
Active Directory (AD) and Vintela Authentication Services (VAS).
Vintela Authentication Services (VAS) works as a plug-in to Windows Active Directory and enables cross-platform identity integration and authentication. VAS provides a seamless extension of the security and compliance of the Microsoft Active Directory infrastructure to
Unix, Linux, and Mac platforms and applications. It addresses the compliance need for cross-platform access control, the operational need for centralized authentication and single sign-on, and enables simplified, heterogeneous identity management.
MetaFrame is the name for a thin client/server software application from Citrix that is used to provide Microsoft's Windows Terminal Server product (WTS) with additional server and client functionality. It accomplishes this by allowing any client, regardless of operating system (OS), to connect to a Windows Terminal Server and run a Windows application through an internet browser. MetaFrame features a secure encryption option through a distributed
Windows presentation protocol developed by Citrix, called ICA (Independent Computing
Architecture). Employee access to internal systems from the internet will be routed through a
MetaFrame presentation server and their authentication and authorization will be verified against Windows AD.
Business partners will be routed through our SSL web interface (Apache on Linux) in order to access our production database (MS SQL on Win 2003). All communication between our database and web server will be managed by our application server (Weblogic on Solaris).
Authentication will take part via a java-based Single Sign On component of VAS. Vintela will be a component of our Active Directory backbone which will be used to manage access controls around the roles of users/systems/groups.
The Cisco IPS device will be self contained and managed by our system administrator.
726886937 (04/12/20) Page 11
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
The DMZ houses the Email gateway, IPS, Web Server, and MetaFrame Presentation
Server
Windows systems (Email, MetaFrame) use Active Directory (AD) for maintaining rolebased access controls
Linux systems (Web, App, IPS) use Vintela Authentication Services (VAS) which sits on the AD framework for administering role-based access controls
Within AD, the following roles are defined specific to the DMZ:
User - read-only access to web pages
Administrator - read/write access to deploy changes made by developer
Auditor – read-only access to specified systems
Windows group policy security settings are used to lock down systems restricting access of to specific files/folders based on the role. Linux group policies and security scripts are deployed to multiple systems as well using the VAS interface through the
AD management console
Inbound access to systems from business partners and employees is via MetaFrame which uses role based access controls defined within AD & VAS group policies
Access to the web interface utilizes Vintela ’s Java based Single Sign On component which validates users and their access to confidential web pages
Figure 5: RBAC in the DMZ
726886937 (04/12/20) Page 12
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
The internal systems will be comprised of a server VLAN and a user VLAN. The server
VLAN will contain a Domain Controller, DNS, Email, Antivirus, File/Print, HR, and
Web/App/Db servers. The majority of systems will be Windows 2003 and the role-based access control will be maintained through Windows Active Directory (AD). The Linux web and Solaris app servers will be managed by Vintela Authentication Services (VAS) as part of
Active Directory. The Cisco IPS device will be a self-contained entity.
The user VLAN will consist of desktop and laptop person-computers running Windows XP.
These devices will be configured securely through Window Group Policy and role-based access controls will be granted via Windows AD. The roles associated with the personal computers will be administrator and business user. The business users (CEO, CFO, Sales
Manager, Product Manager) will have read access to all files/folders but will have restricted write access to only specified non-system folders. They will also be prevented from installing software or modifying the registry. These tasks will require an administrator’s intervention.
The developer role will be restricted to partitions on the web, app, and db servers. This will create a “sand-box” for development and testing. All production changes must go through a change management process, whereby the system administrator takes the developer’s changes and deploys them to production. These access controls will be a combination of Windows
AD and VAS having file/folder permissions associated to them.
The auditor will be provided temporary read access to designated areas of systems on a caseby-case basis. This role will remain disabled by default and only be enabled for specific audits.
726886937 (04/12/20) Page 13
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Access to the majority of GIAC Enterprise
’s internal systems (Email, File,
HR, Antivirus, DC, DNS) is governed by Windows Active Directory (AD)
Access to the Linux/Apache web server and the Solaris/Weblogic App
Server is controlled via Vintela Authentication Services (VAS) managed through AD
Internally the following roles are defined:
User - read-only access to web pages
Administrator - read/write access to deploy changes to production after they
’ve been made by a developer
Developer
– read/write access to development partitions of web/app/db servers
Auditor
– read-only access to specified systems
Employees access the sales and HR database utilizing a web-to-app interface thereby abiding by a 3-tier architecture
Systems are partitioned and segmented into development and production environments to facilitate configuration management practices
Figure 6: RBAC for Internal Systems
726886937 (04/12/20) Page 14
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises will use Cisco’s Network Admission Control (NAC) to extend the concept of roles to the network devices. This will add another layer of defense-in-depth to the network. Devices attaching to the network will be examined and access may be granted depending on device patch status as well as user/device roles. Examples include: business users and guest users.
Roles for the internal devices such as computers will be defined. For example, which devices get access to the internal wireless network and what systems or servers they can access from the internal wireless network. For non NAC compliant devices, NAC Profiler will be used to automatically identify and assess non-PC devices such as Voice over IP phones and printers.
Using several sources of network information, NAC Profiler can identify devices, regardless of whether they are associated with a specific user.
Workstations will have to meet minimum operating systems, critical applications, anti-virus, and anti-spyware patching requirements before access will be granted to even ‘ping’ the corporate systems. Devices that do not meet specific patch requirements can be patched via the policy server. If the device can not be updated, it will be corralled as a “guest” device and will be provided restricted network access to only the MetaFrame servers.
NAC will be used to restrict and isolate vender devices and connections (i.e. visiting laptops).
They will be restricted from the corporate network but still allowed Internet access. Roles can be defined via NAC or VLANs for Internet access, access to production servers, routers and other infrastructure devices.
PGP’s encryption solution for computers, including laptops and desktops, secures the entire hard disk and therefore all the data on the computer. PGP interfaces with Active Directory so another user database would not be needed and the encryption process is transparent to the user. The user authentication process is synchronized with the Windows logon, so Windows users are automatically logged into their system without requiring additional authentication.
PGP’s encryption can also be used to secure removable hard drives. If an encrypted computer is lost or stolen, the data on the device can not be accessed. Also note that encryptions keys are backed up and stored very securely to provide recoverability.
In terms of physical security, Active Directory can be extended to access cards for the doors, labs, manufacturing and even the parking garage. They can also be used for two factor authentication (card: something you have + password: something you know) on card capable computers. Using cards tied to Active Directory credentials allows the logging of physical access as well as reducing costs in terms of replacing keys and adjusting employee’s access.
726886937 (04/12/20) Page 15
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Cisco ’s Network Admission Control (NAC) is used to control workstations and laptop access to the internal network
IBNS and 802.1x is integrated into NAC (next slide)
802.1x provides controls for both wired and wireless devices
NAC Profiler is used to automatically identify and assess non-PC devices such as
Voice over IP phones and printers
Appropriate device roles are created. For example, business user, guest user, etc...
NAC is used to isolate vender connections (i.e. visiting laptops), while still allowing
Internet access
Ensure that authorized endpoint devices have been patched (operating systems, critical applications, anti-virus, anti-spyware, etc..) via the policy server.
If the device is not up-to-date, it is quarantined and allowed access only to the remediation server
If the device can not be updated, treat device as a
“guest”, restrict access to only the
MetaFrame servers.
GIAC Enterprises uses PGP ’s “Whole Disk Encryption” solution to secure data on laptops and at-risk desktops and removable storage.
Figure 7: RBAC for Network Devices
726886937 (04/12/20) Page 16
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises will use Cisco’s AAA & TACACS+ via Cisco Secure Access Control
Server & Active Directory for centralized router and firewall Authentication, Authorization, and Accounting. This will allow the network infrastructure to leverage Active Directory for user authorization.
For auditing and trouble ticket resolution, Cisco’s Role-Based CLI Access can be used to define auditor and helpdesk views. These views can be configured to restrict access to Cisco
IOS commands and configuration while allowing timely problem resolution and audit access to the IOS.
Active Directory and Citrix MetaFrame can be leveraged to provide another layer of defensein-depth. Since the MetaFrame enabled applications can be accessed 24 hours a day/7 days a week, additional roles can be defined to provide users remote access to specific applications beyond normal work hours. Not only would user roles be classified to determine access to
“what” system or application but also “when” they can access the application.
Use Cisco ’s AAA & TACACS+ via Cisco Secure Access Control Server & Active
Directory for centralized router and firewall Authentication, Authorization, and
Accounting.
Use Cisco's Identity-Based Networking Services (IBNS) identity management solution
IBNS is based on 802.1x and offers authentication, access control, and user policies to secure the network
802.1X allows enforcement of port based network access control when devices attempt to access the network
IBNS leverages Cisco's switches, Wireless APs, Cisco Secure ACS and Cisco
Secure Services Client
Cisco ’s Role-Based CLI Access is used to define auditor and helpdesk views
These views are configured to restrict access to Cisco IOS commands and configuration while allowing timely problem resolution and audit access to the IOS
If SSH is needed, Quest OpenSSH provides password-less, secure, encrypted remote login and file transfer services for Vintela Authentication Services (VAS).
The Cisco solution can also support VLANs and VPNs (if needed)
Figure 8: RBAC for Infrastructure
726886937 (04/12/20) Page 17
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises can use RBAC as a deterrent for internal fraud by enforcing separation of duties. Fraud is a crime of opportunity; by enforcing separation of duties at an access level, the opportunity for fraud can be reduced. An example of this could be the separation of invoice payment approval and setting up a vendor in the accounting system.
GIAC Enterprises can use the RBAC concept of static separation of duties to create roles that that will prevent a user from also having another role. For example, in terms of user administration, a person that authorizes new users or access will not be allowed to also have the role that allows them to establish a new user or access.
In certain cases, dynamic separation of duties maybe necessary (limited number of users to do the jobs) but still retain some separation of duties. This would result in one user having both the “authorize” and “create new user” role but not be able to authorize and then create or grant rights to the same new user.
GIAC Enterprises has developed roles to separate job duties
User administration - The person authorizing the new user or access should not be the same one that establishes new user or access
Accounting - The person approving the payment of an invoice should not be the same one that can create a company\vendor in the accounting system
IT Administrator vs. IT auditor. While the auditor would need the same
‘read’ or access rights as an it administrator, they would not need ‘write’ or
‘modify’ rights
The developer would require access to the development area but should not be allowed access to the production area
Data Owner vs. Data Custodian, i.e. the IT administrator. In some cases, access to the data may need to be restricted to the data owner. IT would not be granted access, but would be required to ensure the security of it
As mentioned, physical access can also be controlled via AD enabled key cards. This prevents access to unauthorized areas
Figure 9: RBAC for Separation of Duties
726886937 (04/12/20) Page 18
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises can benefit by defining audit roles in advance of the audits. The appropriate auditors can then be assigned those roles for the term of the audit. For ongoing auditing or compliance, the roles can be granted on a permanent basis. For example: internal IT department self-auditing or compliance vs. once-a-year audit.
Properly implemented RBAC will make auditing user access that much easier. For example, instead of reviewing file and folder NTFS permissions on file servers, reports can be generated that list the roles each user has. Providing this report to the manager, he/she can quickly determine if that role is still appropriate for the employee. If access is no longer appropriate, the user is simply removed from the role and all of their access is terminated for that application or system.
GIAC Enterprises can review the proper access rights for each role to ensure the role has the appropriate access to the system or application.
RBAC will ease auditing of network and systems
Enforces unique usernames; only one username per user
Define ‘read’ or ‘view’ only access to auditing roles
Auditors can then be granted access to audit roles
Appropriate event logs from servers, Active Directory, IPS, routers,
Vintela Authentication Services, NAC, key card system and other network infrastructure devices are stored in a centralized log server
Access to the centralized log server data is restricted, IT can not access, modify or delete logs without audit ’s permission
An event correlation and reporting server is used by both IT and audit to correlate and review the data
Figure 10: RBAC for Auditing
726886937 (04/12/20) Page 19
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises inherits many security and administrative benefits from the implementation of RBAC but it may not be the holy grail of access control. This is especially true for organizations that have not or can not outline well-defined access roles. Care should be taken when implementing RBAC since it can be difficult and time consuming. The benefit to the organization should outweigh the Total Cost of Ownership 3 (TCO). For some large organization,
RBAC can be implemented at a high level. For example, a policy to standardize on unique user name for all systems, assigning rights to the roles or groups only and defining a set of roles that that are general rather then specific.
“For large systems, with hundreds of roles, thousands of users and millions of permissions, managing roles, users, permissions and their interrelationships is a formidable task that cannot realistically be centralized in a small team of security administrators.” 4
It is also important to note that RBAC does not address user provisioning, the authorization for assigning users to roles or revoking those assignments. Additional policies and procedures will need to be developed.
3
Total cost of ownership (TCO) - is a financial estimate designed to help consumers and enterprise managers assess direct and indirect costs commonly related to software or hardware. Wikipedia
4
Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based Access Control:
Toward a Unified Standard". 5th ACM Workshop Role-Based Access Control: 47-63
726886937 (04/12/20) Page 20
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
GIAC Enterprises can benefit from Role Based Access Control by gaining scalability and efficiency
By leveraging Active Directory and implementing the appropriate roles, GIAC Enterprises can increase security and reduce system administration costs
While Role Based Access Control is considered a best practice at the system or application level, it becomes increasingly difficult to implement when scaling for large enterprises
RBAC is not a product that can be implemented per se.
Implementing RBAC involves careful planning for each systems and should involve users, management and policies for success
Care should be taken when implementing RBAC in the Enterprise.
If costs outweigh the benefits, RBAC implementation may need to be scaled back
Figure 11: Conclusion
726886937 (04/12/20) Page 21
Meyer & Ruppert, 2007
SANS Technology Institute STI - Joint Written Project – RBAC Defense in Depth
Vestergaard, Peter. Firewalls, Perimeter Protection, and VPNs Practical Assignment. http://www.giac.org/certified_professionals/practicals/GCFW/0309.php
. April 2002
Gebel, Gerry. Roles and Access Management: Seeking a Balance Between Roles and Rules.
Burton Group. June 2003
Peter Leight and Richard Hammer, Role-Based Access Control (RBAC) approach for Defense-in-Depth, August 2006
Nick Nikols, Gerry Gebel, Identity Lifecycle Management, Burton Group, Feb 2006
Wikipedia – Wikipedia.org
Sandhu, R., Ferraiolo, D.F. and Kuhn, D.R. (July 2000). "The NIST Model for Role Based
Access Control: Toward a Unified Standard". 5th ACM Workshop Role-Based Access Control: 47-63
726886937 (04/12/20) Page 22
Meyer & Ruppert, 2007