Page 211 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 211

Unit 14: Web Services and Privacy




          Parties within the similar trust zone can consider they do not need to authenticate each other,  Notes
          while for all sensitive communication across trust boundaries, authentication is needed.
          Where the trust zone is a useful concept, it does not fulfill all requirements. Trust zones are
          frequently hierarchical, and some interaction with external parties can be completed without
          requiring  to authenticate the incoming party. A business might see itself as a single trust zone
          in the sense that no one apart from employees can use network resources inside the firewall.
          Though, a single-zone picture like this will be misleading if, as generally happens, there is also
          a trust zone separating the ERP (Enterprise Resource Planning) and CRM (Customer Relationship
          Management) applications, as each of these executes and maintains its own application-level
          security. The business might also view itself as a member of an  external trust  zone via  its
          membership of a trading extranet. In this concern, we suggest that trust and authentication are
          explicit, yet overlapping, intents that can be accessed to a collaboration model.
          This domain is initially accountable for making sure that, once we understand who you are, we
          can limit your choices to only those functions you are authorized to execute.  This needs the
          potential to perform authentication, since we must know who you are before we can judge what
          you are efficient to do. The business stakeholder would like to recognize those functions that
          require to be made protected, in the sense that we know who might execute them and we know
          (via  audit)  when  they  were  executed.  There  are  obviously  functions  that  do  not  need
          authorization, either as we want them to be usable to  everyone, or since, for  performance
          reasons, we have recognized a trust zone inside which services can securely assume the requester’s
          right to use them.
          This trust zone thought becomes imperative when we think of performance as another, sometimes
          competing, issue, and since there is a cost related with implementing security, and sometimes
          that price is pretty high. Consider a function to return the number of marvelous orders for a
          customer — a very simple query from a database. If we query for authentication, authorization,
          and privacy we are forced to accept imperative costs:

          1.   We have to ask the requester to offer credentials.
          2.   We have to verify those credentials, probably with a remote service.
          3.   We have to encrypt the returned information.
          If we understand that the requester and provider are both services of the similar application, we
          can recognize them as a single trust zone, dispense with the overhead, and reap the advantage in
          increased performance. From an architectural standpoint it is also significant to recognize all
          the communication that occurs on within trust zones. This kind of communication should be
          minimized and handled as much as possible as it displays the most likely point of failure in the
          overall security execution.
          In views of execution, there are two main approaches to authorization that are appealing to note
          here:
          1.   Authorization of Individual Parties: Every party can be allocated an explicit set of access
               rights to functions (even though to optimize the process, we might agree to consider the
               absence of an explicit access right as either and implicit approval or disapproval of that
               access right).

          2.   Authorization through Roles: Numerous roles can be generated for each application, and
               access rights allocated as described above to those roles rather than to individual parties.
               When every party is authenticated, the  credentials supplied for the  party involve the
               party’s role, which then identifies whether the party is  authorized to access a specific
               function.





                                           LOVELY PROFESSIONAL UNIVERSITY                                   205
   206   207   208   209   210   211   212   213   214   215   216