CISSP考点拾遗——基于xx的访问控制

本文解析了访问控制领域的三种核心模型:IBAC、RBAC及ABAC。分别介绍了它们的工作原理、特点及其应用场景,并强调了ABAC模型在动态访问控制方面的优势。

说明:“考点拾遗”系列基于日常为学员和网友做的答疑整理,主要涉及教材中没有完全覆盖到的知识点。

以下内容主要参考的NIST SP 800-162和NIST SP 800-178,本人水平有限,请以原文为准。

ACL(IBAC):

注意ACL是以客体为出发点的权限控制实现(具体请查阅CISSP教材访问控制矩阵、访问控制列表、访问能力表相关知识点内容)。

在IBAC模型中,如果一个主体提供的凭证与ACL中要求的凭证相匹配,则该主体被给予对客体的访问权。每个主体对该客体可执行的操作(读、写、编辑、删除等)权限,由客体所有者单独管理。每个客体都有自己的ACL和分配给每个主体的一组特权。

在IBAC模型中,授权决定在任何特定的访问请求之前做出,并导致主体被添加到ACL中。这个决定是静态的,需要一个通知过程来应对主体、客体或上下文可能发生的变化,当上述因素变化时,通知客体所有者重新评估和修改ACL。

如果涉及跨机构访问,即机构A的用户需要访问机构B的资源时,需要在机构B中预先为机构A的用户创建账号,并在访问列表中预先填写许可的操作。

IBAC模型的特征:

  • 每个客体对应一个ACL;

  • 权限逐一的分配给单个主体。

RBAC

基于角色的访问控制模型采用了可分配给主体、具有特定权限集合的预定义角色。在处理主体的访问请求时,访问控制机制评估已分配给该主体的角色,以及该角色已被授权对客体执行的操作集(权限集合),然后呈现和执行访问决策。

与IBAC相似,授权决定是静态的,在访

CHAPTER ONE INTRODUCTION nformation and Communications Technology (ICT) relies on a complex, globally distributed, and interconnected supply chain ecosystem that is long, has geographically diverse routes, and consists of multiple tiers of outsourcing. This ecosystem is composed of public and private sector entities (e.g., acquirers, system integrators, suppliers, and external service providers) and technology, law, policy, procedures, and practices that interact to design, manufacture, distribute, deploy, and use ICT products and services. This ecosystem has evolved to provide a set of highly refined, cost-effective, reusable ICT solutions. Federal government information systems1 have rapidly adopted this ecosystem of solution options, which has increased their reliance on commercially available products, system integrator support for custom-built systems, and external service providers. This in turn has resulted in increased complexity, diversity, and scale of the federal government’s ICT supply chains. Commercially available ICT solutions present significant benefits including low cost, interoperability, rapid innovation, a variety of product features, and choice among competing vendors. These commercial off-the-shelf (COTS) solutions can be proprietary or open source and can meet the needs of a global base of public and private sector customers. However, the same globalization and other factors that allow for such benefits also increase the risk of a threat event which can directly or indirectly affect the ICT supply chain, often undetected, and in a manner that may result in risks to the end user. These ICT supply chain risks may include insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software and hardware, as well as poor manufacturing and development practices in the ICT supply chain. These risks are associated with an organization’s decreased visibility into, and understanding of, how the technology that they acquire is developed, integrated, and deployed, as well as the processes, procedures, and practices used to assure the integrity, security, resilience, and quality of the products and services.2 Threats and vulnerabilities created by malicious actors (individuals, organizations, or nation states) are often especially sophisticated and difficult to detect, and thus provide a significant risk to organizations. It should be noted that ICT products (including libraries, frameworks, and toolkits) or services originating anywhere (domestically or abroad) might contain vulnerabilities that
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值