07. Access Control and Policies

Restricting access to the system.

Christchurch hot pools: stored proof of residence (driver’s license, passports) in system; had vulnerable plugin which allowed hacker to access this data. NZ privacy laws: data was not needed after initial verification, so they should have destroyed the data instead of storing it.

Early Memory Access Model

Processes are isolated from each other:

Relies on a privileged bit to control access to the descriptor register. It must be stored in read-only memory.

Limitations:

Multics

Each process has an array of segment descriptors:

This allowed the creation of an access control matrix:

Exercise: Assignment 2

Unix - Discretionary Access Control

Everything is a file.

Is directory
|
v | user | group | other |
d | rwx  |  rwx  |   rwx |
      ^       ^        ^
      |       |        |
setuid (s) setgid (s) t-bit (t)
Special bits replace the execute bit

Mandatory Access Control

Security policies are not under the user (or even admin’s) control. In comparison, discretionary access control gives owners (e.g. creator of the file) full control.

This was:

Influenced other access control mechanisms:

Rings of protection:

Windows

Access control appeared in Windows NT (NB: UC’s domain is UOCNT):

Can create domains of users:

Lots of users, lots of permissions, lots of programs: a nightmare for admins, and incorrect permissions being assigned (and possibly even just giving admin access to everyone).

Take two:

Attack surface hardened with a closed kernel, TPM added, and most drivers were removed from the kernel:

Cleaner abstractions with principals and objects:

Web Browsers

Reign of cookies:

Security measures:

Cross-origin:

Hardware-level Protection Mechanisms