“Access Control” Keamanan Komputer Puji Hartono 2010 Pembahasan • Pengertian access control • Model Access Control – DAC – Role based – Mandatory • Metode Access Control – Terpusat – Terdistribusi • Identifikasi dan Autentifikasi – You know … – You have … – You are … Autentifikasi vs Access Control • Identifikasi memastikan keabsahan user • Acces control mengatur wewenang Contoh Access Control (1) • Contoh: Access Control Policy for son Edward – Allowed access: • House – Disallowed access: • Automobile 4 Contoh Access Control (2) • Contoh: • Access Control Policy for son Edward – Allowed access: • House – Disallowed access: • Automobile 5 Contoh Access Control (3) • Contoh: Access Control policy – Allowed access: House: – Disallowed access: Automobile Problem! Unauthorized access 6 Contoh Access Control (4) • Contoh: Correct Access Control Policy for son Edward – Allowed access: House Kitchen – Disallowed access: Automobile Car key 7 Access Control (1) • “Close your front door before remove backdoor” • Access control: menjamin bahwa seluruh akses ke objek hanya bisa dilakukan oleh yang berhak • Melindungi terhadap insiden dan ancaman berbahaya pada data dan program dengan menerapkan aturan baca-tulis-eksekusi • Untuk itu dibutuhkan: – Identidikasi dan autentifikasi yang benar – Hak akses terjaga dari perubahan 8 Access Control (2) • Access Control requirement – Cannot be bypassed – Enforce least-privilege and need-to-know restrictions – Enforce organizational policy 9 Access Control (3) • Beberapa definisi : – Resource/objek: Memory, file, directory, hardware resource, software resources, external devices, etc. – Subjects: entitas yang melakukan akses ke resource • User, owner, program, etc. – Access mode: jenis akses • Read, write, execute subject request reference allow/deny object monitor 10 Access Control (4) • Access control components: – Access control policy: specifies the authorized accesses of a system – Access control mechanism: implements and enforces the policy • Separation of components allows to: – Define access requirements independently from implementation – Compare different policies – Implement mechanisms that can enforce a wide range of policies 11 Access Control (5) • Close vs Open System Closed system Open System (minimum privilege) (maximum privilege) Access requ. Exists Rule? yes Access permitted no Access denied Access requ. Allowed accesses Exists Rule? no Access permitted Dissallowed accesses yes Access denied 12 Model Access Control • Model-model access control – DAC (Discretionary Access Control) – Role based – Mandatory Discretionary Access Control (1) • Access control berdasarkan – Identitas user – Rule access control • Sistem administrasi yang umum: berdasarkan kepemilikan – Users can protect what they own – Owner dapat memberikan hak akses objek miliknya kepada subjek lain – Owner dapat mendefinisikan hak akses yang diberikan kepada subjek lain Discretionary Access Control (2) • Access Matrix Model File 1 File 2 File 3 … User 1 {r,w} {w} User 2 {w} {w} User 3 File n {r,w} {r,w} {r} {w} {r,w} {r} {w} … User k {r} {r} Discretionary Access Control (4) • DAC dan Trojan horse Brown: read, write Employee Black, Brown: read, write Brown Read Employee REJECTED! Black is not allowed To access Employee Black Black’s Employee 16 Discretionary Access Control (5) • DAC dan Trojan horse Brown: read, write Employee Word Processor Uses shared program Reads Employee Brown Black, Brown: read, write TH Inserts Trojan Horse Into shared program Black Copies Employee To Black’s Employee Black’s Employee Discretionary Access Control (6) • Kelebihan dan kekurangan – Kelebihan • Intuitif • Mudah diimplementasika – Kekurangan • Inherent vulnerability (contoh: trojan horse) • Perlunya pemeliharaan ACL/Capability lists • Perlunya pemeliharaan grant/revoke Discretionary Access Control (7) • Contoh implementasi – Access control pada sistem unix, ms windows dll Discretionary Access Control (8) – Access control pada sistem database: • User • Database/tabel • Privledge Non-DAC (1) • Disebut juga role based • Motivasi – Multi-user systems – Multi-application systems – Permissions are associated with roles – Role-permission assignments are persistent v.s. user-permission assignments – Intuitive: competency, authority and responsibility Non-DAC (2) – Express organizational policies • Separation of duties • Delegation of authority – Flexible: easy to modify to meet new security requirements – Supports • Least-privilege Separation of duties Data abstraction Non-DAC (3) • Roles – User group: collection of user with possibly different permissions – Role: mediator between collection of users and collection of permissions – RBAC independent from DAC and MAC (they may coexist) – RBAC is policy neutral: configuration of RBAC determines the policy to be enforced Non-DAC (4) U User Users assignment S Sessions . . . R Roles Permission P assignment Permissions User: human beings Role: job function (title) Permission: approval of a mode of access • Always positive • Abstract representation • Can apply to single object or to many Non-DAC (5) • Contoh sederhana: Akses PC Users Roles Resources research Server 1 marketing Server 2 admin Server 3 Non-DAC (6) • Contoh sederhana: Facebook Non-DAC (7) • Contoh sederhana: Facebook Mandatory AC (1) • Sistem memutuskan bagaimana data akan di share (mandatory) • Ciri-2 Mandatory Access Control (MAC) – Menentukan tingkat sensitivitas alias label – Setiap obyek diberikan label sensitivitas dan hanya dapat diakses oleh user yang sudah memperoleh klarifikasi di level tsb – Hanya administrator yang diperbilehkan mengganti level obyek, bukan pemilik obyek – Dipakai oleh system dimana keamanan adalah sangat critical Mandatory AC (2) – – – – Sulit diprogram konfigurasi serta implementasinya Performa berkurang Bergantung pada system untuk akses control Sebagai contoh: Bila suatu file diklasifikasikan sebagai rahasia, MAC akan mencegah setiap orang untuk menuliskan informasi rahasia atau sangat rahasia kedalam file tersebut – Seluruh output, spt print job, flopy disk, media magnetic lainnyaharus dilabel tingkat sensitivisme nya. Mandatory AC (3) • Contoh pelabelan objek Mandatory AC (4) • Contoh: Publikasi di Wordpress Metodhologi access control (1) • Terpusat. Contoh: VPN remote site, remote login di sistem Unix • Terdistribusi. Contoh: NIS Identification, Authentifications (1) • Identifikasi dan autentifikasi – Merupakan kunci utama dalam acces control • Identifikasi – Memastikan apakah user tersebut boleh mengakses ke sistem – Contoh: form login berisi “username” • Autentifikasi – Verifikasi apakah user yang mengaku berhak tersebut benar-benar valid Metode Authentifications • Metode Autentifikasi – Something you know? • Contoh: Password, PIN – Something you have? • Contoh: Kartu magnetic – Something you are? • Contoh: Biometric Password (1) • Password ideal – – – – – Seseuatu yang anda ketahui Sesuatu yang tidak diketahui orang lain Sesuatu yang sulit ditebak Jumlah karakter cukup panjang Terdapat kombinasi huruf kecil, huruf besar, angka dan karakter • Contoh: P0kem0N Password (2) • Password ideal – Seseuatu yang anda ketahui – Sesuatu yang tidak diketahui orang lain – Sesuatu yang sulit ditebak Biometrics (1) • Fingerprint – Menggunakan pola “minutia” yang khas tiap orang – Proses • Ekstrak minutia • Compare minutia Biometrics (2) • Handgeometri – Menggunakan pola geometris tangan yang khas tiap orang – Proses • Ekstrak • Compare Biometrics (3) • Iris Scan – Menggunakan pola iris mata yang khas tiap orang – Proses • Ekstrak • Compare Something you have • Something you have – Kartu magnetik – SmartCard – RFID Kartu magnetik Smart Card RFID transmiter