Page 55 - DCAP516_COMPUTER_SECURITY
P. 55

Unit 5: Access Control Mechanism




          Access control further evolved into the authentication, authorization and audit of a user for a  Notes
          session. Access control authentication devices evolved to include id and password, digital
          certificates, security tokens, smart cards and biometrics.
          Access control authorization meanwhile evolved into Role Based Access Control (RBAC). This
          normally involves “mandatory access control”. Mandatory access control is access control policies
          that are determined by the system and not the application or information owner.
          RBAC is commonly found in government, military and other enterprises where the role
          definitions are well defined, the pace of change is not that fast and the supporting human
          resource environment is capable of keeping up with changes to an identity re their roles and
          privileges.
          Access control is the process by which users are identified and granted certain privileges to
          information, systems, or resources. Understanding the basics of access control is fundamental to
          understanding how to manage proper disclosure of information.

          5.1 Access Control Overview

          Access control is the ability to permit or deny the use of a particular resource by a particular
          entity. Access control mechanisms can be used in managing physical resources (such as a movie
          theater, to which only ticket holders should be admitted), logical resources (a bank account,
          with a limited number of people authorized to make a withdrawal), or digital resources (for
          example, a private text document on a computer, which only certain users should be able to
          read).
          Today, in the age of digitization, there is a convergence between physical access control and
          computer access control. Modern access control (more commonly referred to in the industry as
          “identity management systems”) now provide an integrated set of tools to manage what a user
          can access physically, electronically and virtually as well as providing an audit trail for the
          lifetime of the user and their interactions with the enterprise.
          Modern access control systems rely upon:

               Integrated enterprise user and identity databases and Lightweight Directory Access Protocol
               (LDAP) directories.
               Strong business processes pertaining to the provisioning and de-provisioning of a user.

               Provisioning software integrated with the business provisioning and
               de-provisioning process.
               Site, building and room based access control systems that are LDAP enabled or, able to be
               integrated into a virtual enterprise LDAP directory.
               A global enterprise id for each user to integrate the user’s identity between many
               applications and systems.
               A strong end to end audit of everywhere the physical person went as well as the systems,
               application and information systems they accessed.

          With many portions of an enterprise now outsourced, the challenges to access control have
          increased. Today, it is becoming common to have contractual agreements with the enterprise’s
          outsource partners that:

               Automatically provision and de-provision users
               Build trusted authentication and authorization mechanisms





                                           LOVELY PROFESSIONAL UNIVERSITY                                   49
   50   51   52   53   54   55   56   57   58   59   60