5 Access Control in Larger Networks
Access Rights
Access rights determine what users are allowed to do (read, write/change, execute).
These rights can vary based on user groups, attributes, or roles.
Example: "All Monash students are allowed to access this website."
One method of defining access rights is through Access Control Lists (ACLs).
ACLs list who (individual user, role, set of attributes) is allowed to do what.
ACLs do not scale well.
In a company with 1000 staff managing 200 applications, 2 million entries would be needed and maintained across a network.
Ticket or Token-Based Access Control
A central server checks authenticity and issues tickets.
A ticket contains identity information and can also restrict capabilities (i.e., what the user is allowed to do).
Examples: Kerberos, Microsoft Active Directory
The goal is to make access control manageable and usable.
Kerberos (Idealised Abstraction)

Single Sign-On
Benefits:
Log in once and access many services (e.g., Monash University).
Very convenient and high usability.
Drawbacks:
Single point of failure.
Needs secure implementation and high-level control.
Usually one of the first targets for network intruders.
Main Goal of Access Control
Limit the damage that can be done by users or groups of users.
Privilege escalation is a common goal for attacks.
There are many ways access control can fail.
Circumventing Access Control
Methods:
Weaknesses in software, interfaces, protocols.
Physical attacks (remove hard disk, access internal buses, etc.).
Race conditions, feature interaction problems.
Connecting unauthorized devices (USB).
Social engineering.
Additional Security Mechanisms
Hard disk encryption.
Backups.
Security updates.
Reduce the number of services / reduce complexity.
Trusted Computing (special security hardware).
Disconnect critical devices.