CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

34
Rethinking Your Authorization Strategy Gerry Gebel, Axiomatics @ggebel

Transcript of CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Page 1: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Rethinking Your Authorization Strategy Gerry Gebel, Axiomatics @ggebel

Page 2: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Agenda  

2

Before Hard coded AuthZ: Group Lists, Roles and ACLs

Now Externalized AuthZ: ABAC, OpenID Connect

Future More options: ABAC for big data, Provision policies, Authorization Token Service

© 2015 Axiomatics AB

Page 3: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 3

Need to Know …

Page 4: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 4

Need to Share …

Page 5: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 5

“We no longer operate largely on the principle of compartmentalization, that is, sharing information based on “need to know.” We now start from the imperative of “responsibility to share,” in order to collaborate with and better support our intelligence consumers – from the White House to the foxhole.”

James R. Clapper, September 2011

Page 6: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 6

“Success in coping with these kinds of challenges ultimately depends on finding ways to overcome the “need to know” default option in most organizations and moving to a “need to share” network culture.”

American Society for Public Administration, 2009

Page 7: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 7

“Need to Share” paradigms require changes in technology…

…as well as organizational dynamics and culture.

Externalized AuthZ helps you address one of the above

Page 8: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 8

Big Data

BYOD

Mobile

Cloud

Internet of

Things

APIs

Page 9: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Data  sharing  concerns  

§ Are privacy rules being enforced?

§ Is collaboration causing excessive risk?

§ What is the potential for data leakage?

§ How can the insider threat risk be reduced?

© 2015 Axiomatics AB 9

Page 10: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 10

Secure  collaboration  

…depends on efficient information sharing…

… which depends on precision in access controls.

Page 11: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Before  

© 2015 Axiomatics AB 11

Agenda

Page 12: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2014 Axiomatics AB 12

Hundreds  or  thousands  of  IF-­‐clauses  scattered  all  over  your  code  

If the user is member of group Z then … else …

If device is android

then … else …

If project X is in production phase

then … else … If role is manager AND location is TX then … else …

Page 13: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 13

“A role’s got to know its limitations”

Clint Eastwood in Magnum Force, 1973

Page 14: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

The  RBAC  model  

© 2015 Axiomatics AB 14

A

B

C

Page 15: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

You  know  you’ve  lost  control  of  your  RBAC  deployment  when…  

© 2015 Axiomatics AB 15

Volumetrics of existing customer base today: 7,000 customers 73,000 functional roles 20,000 data roles

“We have more than 50 people assigned to search for SoD conflicts in role definitions and assignments”

Page 16: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Don’t  make  a  wrong  turn  

© 2015 Axiomatics AB 16

The journey to ABAC

Existing RBAC definitions

ABAC Goal State

Page 17: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 17

The journey to ABAC

Existing RBAC definitions

ABAC Goal State

ABAC starting point

Page 18: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Legacy  access  control  issues  

§ Hard coded in applications § Audit and certification are difficult § Change control is time consuming and expensive

§ Not suitable for dynamic or complex scenarios

§ Manageability challenges: that role explosion issue

© 2015 Axiomatics AB 18

Page 19: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Now  

© 2015 Axiomatics AB 19

Agenda

Page 20: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

What  is  Attribute  Based  Access  Control  (ABAC)?  §  A mode of externalized authorization

§  Authorization policies/rules are managed in a centralized service (deployment can be centralized/distributed/hybrid)

§  Policies utilize attributes to describe specific access rules, which is why it is called attribute based access control

© 2014 Axiomatics AB 20

Page 21: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Policies

Attribute Sources

1.  Access request is intercepted

2.  A query is sent to the external authorization service

3.  The authorization engine evaluates the relevant policies

4.  It may also need to query external attribute sources for more info

5.  The decision – PERMIT or DENY is returned and enforced

User: Bob Application

Can Bob access record #22 PERMIT/DENY

Authorization Service

Externalized Authorization

Page 22: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

ABAC  Enables  Secure  Information  Sharing  

§  Attributes of different types provide the context

§  Policy language defines the conditions for allowing or denying access

22

WHO WHAT WHERE WHEN WHY HOW It’s not just about but also and

© 2015 Axiomatics AB

Page 23: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Brokers can view the insurance policies of a customer if the broker is assigned to the customer

Role==broker

Action==view

Resource==insurance policy This is the relationship

userId == customer.assignedBroker

A user with the role == broker can do the action == view on resources of type == insurance policy if the user id == the customer’s assigned broker id.

High level process for ABAC

© 2015 Axiomatics AB 23

Page 24: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Trending:  Consent  management  and  Externalized  access  §  Allow end users to manage who can access their private data

§  Most common in health care, insurance and financial services

§  Patient controls who can see medical records and other patient records §  Personal data, diagnosis, treatment §  White list, black list

§  Insurance client controls who can see ins policy or claims records §  Distinguish access for brokers, adjusters, etc. §  Useful in family scenarios: spouse, children, parent access

© 2015 Axiomatics AB 24

Page 25: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Question:  Where  do  you  manage  consent/profile  data?  

§  In the authorization service?

§  In the application/service?

§  Both, other?

© 2015 Axiomatics AB 25

Page 26: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Externalized  access  control  issues  

§ It’s new, must overcome decades of ingrained approaches and techniques

§ COTS applications rarely provide “hooks” to enable externalized authorization

§ Don’t make simple scenarios more complex – Make complex scenarios manageable

© 2015 Axiomatics AB 26

Page 27: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Future  

© 2015 Axiomatics AB 27

Agenda

Page 28: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

The  concept  of  “Policy  Provisioning”  §  Define access policies in the XACML standard

§  Translate or transform policies into formats supported by other platforms §  Could be other standards or proprietary formats

§  Target platform performs its normal access control §  No call out to external service

© 2015 Axiomatics AB 28

Page 29: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

© 2015 Axiomatics AB 29

Policy provisioning into Windows Server 2012

1. Author and test access policies in XACML

2. Translate XACML to SDDL and import into AD

3. Enforce access on Windows Server 2012 file system

Page 30: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

In  federated  SSO,  we  have  the  Security  Token  Service…  

© 2015 Axiomatics AB 30

Page 31: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Do  we  need  an  Authorization  Token  Service  (ATS)?  §  Input: subject ID and proposed claims Output: OAuth token w/ valid claims

© 2015 Axiomatics AB 31

Authorization Service

Policies

ATS userID123 claim 1 claim 2 claim 3 …

OAuth token Subject=userID123 Scopes=claim 1 & claim 3

Page 32: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Do  we  need  an  Authorization  Token  Service  (ATS)?  

© 2015 Axiomatics AB 32

Authorization Service

Policies

ATS userID123 resourceType = medicalRecord

OAuth token Subject=userID123 Scopes: claim1=NY, claim3=MtSainai, claimZ=oncology

§  Input: subject ID and resource ID Output: OAuth token w/ valid claims

Page 33: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

Do  we  need  an  Authorization  Token  Service  (ATS)?  

© 2015 Axiomatics AB 33

JWT

Authorization Service

Policies

ATS userID123 claim 1 claim 2 claim 3 …

§  Input: subject ID and proposed claims Output: JWT token w/ valid claims

Page 34: CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel

In summary

•  Think of authorization in the context of macro trends in the industry

•  Roles/groups work well, but with constraints •  Externalized authZ is on the rise, based on attributes,

policies and context •  The future holds many possibilities and you will need

many authZ tools to meet a variety of scenarios