Abstract
The principle of least privilege – users/programs should operate using the least amount of privilege necessary to complete the job – is stated as a critical security (access control policy) objective in most high-level information security policy documents and information security related government regulations and guidance documents. “True least privilege” is a (mostly) theoretical optimum of exactly only the access provisioning that is required, while most real-world least privilege implementations are “suboptimal” in that they overprovision access (e.g. in privilege user account access, government regulations/guidance/ standards) – with disasters such as the U.S. embassy Wikileaks incident as a result. Least privilege is harder to implement the more optimal it should be, because doing it right can be highly complex: (1) it requires fine-grained access policy management that goes beyond identity and roles based access controls, towards attribute-based (ABAC), resource-based (ResBAC), and authorization-based (ZBAC) access controls; (2) access policies need to be highly contextual in order to minimize excess access provisioning; (3) implementing such fine-grained, contextual across policies reliably and verifiably is particularly challenging for today’s dynamically changing IT application landscapes such as agile Service Oriented Architectures (SOAs) and emerging Cloud mash-ups (with “Platform as a Service”, PaaS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Literature
US Cert. Build Security In Website. 2012. https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/principles/351-BSI.html
D.F. Ferraiolo and D.R. Kuhn (October 1992). “Role-Based Access Control”. 15th National Computer Security Conference. pp. 554–563. http://csrc.nist.gov/rbac/ferraiolo-kuhn-92.pdf
Guardian (UK), “US embassy cables leak sparks global diplomatic crisis”, 28 November 2010, http://www.guardian.co.uk/world/2010/nov/28/us-embassy-cable-leak-diplomacy-crisis
Karp, A. H., H. Haury, and M. H. Davis. “From ABAC to ZBAC: The Evolution of Access Control Models”, Journal of Information Warfare, vol. 9, #2, pp. 37-45, September 2010. http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf
Lang, U. and Mullen, J. “SOA & Cloud Application Information Assurance By Enforcing Enterprise Policies”. April 2012 (publication pending)
Lang, U., “Security Policy Automation: Improve Cloud Application Security ROI” ISSA Journal, October 2010, https://www.issa.org/images/upload/files/Lang-Security%20Policy%20Automation.pdf
Lang, U. “Cloud & SOA Application Security as a Service” Proceedings of ISSE 2010, Berlin, Germany, 5-7 October 2010
Lang, U. “Authorization as a Service for Cloud & SOA Applications”, Proceedings of the International Workshop on Cloud Privacy, Security, Risk & Trust (CPSRT 2010), Collocated with 2nd IEEE International Conference on Cloud Computing Technology and Science (Cloudcom) CPSRT 2010, Indianapolis, In-diana, USA, December 2010
U. Lang, “Authorization as a Service for Cloud & SOA Applications”, Proceedings of the International Workshop on Cloud Privacy, Security, Risk & Trust (CPSRT 2010), Collocated with 2nd IEEE International Conference on Cloud Computing Technology and Science (Cloudcom) CPSRT 2010, Indianapolis, Indiana, USA, December 2010
Lang, U. Blog. “Security policy automation using model driven security”, www.modeldrivensecurity.org
Lang, U. Blog. “Study estimates 59% accreditation cost saving using automated Correct by Construction (CxC) tools (& more for agile SOA/Cloud), 2012, http://objectsecurity-mds.blogspot.com/2012/03/study-estimates-59-accreditation-cost.html
Lang, U and R. Schreiner. “Model Driven Security (MDS) management and en-forcement to support SOA-style agility”. Proceedings of the Information Security Solutions Europe (ISSE) conference, Warsaw, Poland, 26 September 2007
Lang, U. and R. Schreiner. “Model Driven Security Accreditation (MDSA) for Agile, Interconnected IT Landscapes”, Proceedings of WISG 2009 Conference, November 2009
Lang, U. and Schreiner, R. Analysis of recommended cloud security controls to validate Open- PMF “policy as a service”. Information Security Technical Report, Volume 16, Issues 3–4, August– November 2011, Pages 131–141
Lang, U. and Schreiner R. Security Policy Automation for Smart Grids: Manageable Security & Compliance at Large Scale, ISSE Conference Proceedings 2011
NIST. A Survey of Access Control Models. Working Draft, 26 August 2009. http://csrc.nist.gov/news_events/privilege-management-workshop/PvM-Model-Survey-Aug26-2009.pdf
OASIS, Extensible Access Control Markup Language (XACML), OASIS Standard, 2.0, March 2005, xml.coverpages.org/xacml.html
ObjectSecurity. OpenPMF website. openpmf.com, 2000-2011
ObjectSecurity. “ObjectSecurity and Promia implement XML security features for next-generation US military security technology”, Press Release. objectsecu-rity.com/doc/20100430-objectsecurity- promia-navy-soa3.pdf, April 2010
ObjectSecurity/Promia. “SOA IA Demonstrator: Information Assurance (IA) for Serviec Oriented Architecture (SOA)”, demo video tutorial, 2011, http://www.youtube.com/watch?v= AH -0B4Zr_KlI
[RiSL06] Ritter, T, R. Schreiner, U. Lang. “Integrating Security Policies via Container Portable Interceptors”,IEEE distributed systems online, (vol. 7, no. 7), art. no. 0607-o7001, 1541-4922, July 2006
Saltzer, Jerome H. (1974). “Protection and the control of information sharing in multics”. Communications of the ACM 17 (7): 389. doi:10.1145/361011.361067. ISSN 00010782. (computer scientists Peter Denning and Roger Needham also contributed to the definition of least privilege).
Langford, J. SANS Institute InfoSec Reading Room. Implementing Least Privilege at your Enterprise. 2003 (http://www.sans.org/reading_room/whitepapers/bestprac/implementing-privilege-enterprise_1188)
Wikipedia. Least Privilege. 2012. http://en.wikipedia.org/wiki/Principle_of_least_privilege)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Lang, U., Schreiner, R. (2012). Implementing Least Privilege for Interconnected, Agile SOAs/Clouds. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_10
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)