Group 5
Security Policies and Acess Control
Team Members Names
Gilbert Mashawi
Godknows Mugaduyi
John Moyo
Innocent Manyange
Panashe Chinyerere
Sam Chiveya
Phylosophy Betera
Tadiwanashe Magaracha
Overview
• Security policies define rules for access control.
• Aim to protect data and resources from unauthorized use.
• Implemented through different models like:
• Mandatory Access Control (MAC)
• Discretionary Access Control (DAC)
• Role-Based Access Control (RBAC)
What is Access Control?
• Mechanism to regulate who can access what in a system.
• Enforces confidentiality, integrity, and availability.
• Composed of:
• Subjects (users/processes)
• Objects (files, databases)
• Access rights (read, write, execute)
Mandatory Access Control (MAC)
• Access control decided by the system.
• Users cannot change access rules.
• Common in government/military systems.
• Labels like Top Secret, Secret, Confidential.
• Based on security clearance and classification.
Pros and Cons
Pros:
• Very secure, difficult to bypass
Cons:
• Inflexible, hard to manage in dynamic environments
Discretionary Access Control (DAC)
• Access control defined by the resource owner.
• Users can grant/restrict access to others.
• Uses Access Control Lists (ACLs).
• Common in personal and commercial systems.
Pros and Cons
Pros:
• Flexible and user-friendly
Cons:
• Less secure, prone to accidental or malicious sharing
Role-Based Access Control (RBAC)
• Access is based on user roles (e.g., admin, editor).
• Permissions assigned to roles, not individuals.
• Users are assigned roles dynamically.
Pros
Scalable and easy to manage
Ideal for enterprise environments
Cons
Requires clear role definitions and policy design
Acess Control matrices anad models
• Introduction
Access Control Matrix
(ACM)
A conceptual model representing access
rights of subjects over objects
A 2D table:
Rows = Subjects
Columns = Objects
Cells = Set of permissions (read, write, etc.)
Characteristics of ACM
• Simple and general model
• Helps visualize who has access to what
• Not practical for large systems due to sparsity and size
Implementations of ACM
Access Control Lists (ACLs):
• Stored per object
• Lists subjects and their permissions
• Example: File A → {Alice: read, Bob: write}
Capability Lists:
Stored per subject
Lists objects and access rights
Example: Alice → {File A: read, File B: write}
Access Control Models Overview
• Formal models help define and enforce security policies.
• Common models:
• Discretionary Access Control (DAC)
• Mandatory Access Control (MAC)
• Role-Based Access Control (RBAC)
• Attribute-Based Access Control (ABAC)
• Bell-LaPadula (Confidentiality)
• Biba (Integrity)
Bell-LaPadula Model (Confidentiality)
• Focus: Protecting confidentiality of data
Key Rules:
• No Read Up (Simple Security Property)
• No Write Down (Star Property)
• Used in military and government
Biba Model (Integrity)
• Focus: Maintaining data integrity
• Key Rules:
• No Read Down (can’t read lower integrity data)
• No Write Up (can’t write to higher integrity level)
• Prevents contamination of critical data
Clark-Wilson Model
• Focuses on commercial integrity policies
• Enforces well-formed transactions and separation of duties
• Uses:
• Users,
• Transformation Procedures (TPs),
• Constrained Data Items (CDIs)
Understanding The Principle of Least
Privilege?
• Users, programs, and systems should be granted the minimum access
rights necessary to perform their tasks.
• Applies to:
• Users
• Applications
• Services
• Processes
Why Is PoLP Important?
• Reduces Attack Surface
• Limits Damage from malware or human error
• Improves System Stability
• Helps meet compliance and audit requirements
Real Wolrd Application
• Layman Terms
• Like giving a janitor access to only the rooms they clean, not the whole building.
• Or an employee given access only to their department’s documents, not the
company’s entire database.
• Technical Terms
• A user with read-only access to reports, not edit/delete rights.
• A backup program that can read files but not modify them.
• A web server process that only accesses web content, not system files.
Implementing PoLP
• Role-Based Access Control (RBAC)
• Use of permissions and ACLs
• Regular review and auditing of access rights
• Temporary privilege elevation when needed ("just-in-time access")
Benefits of PoLP
• Prevents privilege escalation attacks
• Reduces risk of insider threats
• Enhances compliance (e.g., GDPR, HIPAA)
• Promotes accountability and auditability
Challenges and Best Practices
• Can be hard to enforce in complex environments
• Must avoid over-restriction that impairs productivity
• Best Practices:
• Start with default deny
• Use automation and role reviews
• Log and monitor privileged access
•Thank YOU

Group 5 computer security and terms.pptx

  • 1.
    Group 5 Security Policiesand Acess Control Team Members Names Gilbert Mashawi Godknows Mugaduyi John Moyo Innocent Manyange Panashe Chinyerere Sam Chiveya Phylosophy Betera Tadiwanashe Magaracha
  • 2.
    Overview • Security policiesdefine rules for access control. • Aim to protect data and resources from unauthorized use. • Implemented through different models like: • Mandatory Access Control (MAC) • Discretionary Access Control (DAC) • Role-Based Access Control (RBAC)
  • 3.
    What is AccessControl? • Mechanism to regulate who can access what in a system. • Enforces confidentiality, integrity, and availability. • Composed of: • Subjects (users/processes) • Objects (files, databases) • Access rights (read, write, execute)
  • 4.
    Mandatory Access Control(MAC) • Access control decided by the system. • Users cannot change access rules. • Common in government/military systems. • Labels like Top Secret, Secret, Confidential. • Based on security clearance and classification.
  • 5.
    Pros and Cons Pros: •Very secure, difficult to bypass Cons: • Inflexible, hard to manage in dynamic environments
  • 6.
    Discretionary Access Control(DAC) • Access control defined by the resource owner. • Users can grant/restrict access to others. • Uses Access Control Lists (ACLs). • Common in personal and commercial systems.
  • 7.
    Pros and Cons Pros: •Flexible and user-friendly Cons: • Less secure, prone to accidental or malicious sharing
  • 8.
    Role-Based Access Control(RBAC) • Access is based on user roles (e.g., admin, editor). • Permissions assigned to roles, not individuals. • Users are assigned roles dynamically. Pros Scalable and easy to manage Ideal for enterprise environments Cons Requires clear role definitions and policy design
  • 9.
    Acess Control matricesanad models • Introduction
  • 10.
    Access Control Matrix (ACM) Aconceptual model representing access rights of subjects over objects A 2D table: Rows = Subjects Columns = Objects Cells = Set of permissions (read, write, etc.)
  • 11.
    Characteristics of ACM •Simple and general model • Helps visualize who has access to what • Not practical for large systems due to sparsity and size
  • 12.
    Implementations of ACM AccessControl Lists (ACLs): • Stored per object • Lists subjects and their permissions • Example: File A → {Alice: read, Bob: write} Capability Lists: Stored per subject Lists objects and access rights Example: Alice → {File A: read, File B: write}
  • 13.
    Access Control ModelsOverview • Formal models help define and enforce security policies. • Common models: • Discretionary Access Control (DAC) • Mandatory Access Control (MAC) • Role-Based Access Control (RBAC) • Attribute-Based Access Control (ABAC) • Bell-LaPadula (Confidentiality) • Biba (Integrity)
  • 14.
    Bell-LaPadula Model (Confidentiality) •Focus: Protecting confidentiality of data Key Rules: • No Read Up (Simple Security Property) • No Write Down (Star Property) • Used in military and government
  • 15.
    Biba Model (Integrity) •Focus: Maintaining data integrity • Key Rules: • No Read Down (can’t read lower integrity data) • No Write Up (can’t write to higher integrity level) • Prevents contamination of critical data
  • 16.
    Clark-Wilson Model • Focuseson commercial integrity policies • Enforces well-formed transactions and separation of duties • Uses: • Users, • Transformation Procedures (TPs), • Constrained Data Items (CDIs)
  • 17.
    Understanding The Principleof Least Privilege? • Users, programs, and systems should be granted the minimum access rights necessary to perform their tasks. • Applies to: • Users • Applications • Services • Processes
  • 18.
    Why Is PoLPImportant? • Reduces Attack Surface • Limits Damage from malware or human error • Improves System Stability • Helps meet compliance and audit requirements
  • 19.
    Real Wolrd Application •Layman Terms • Like giving a janitor access to only the rooms they clean, not the whole building. • Or an employee given access only to their department’s documents, not the company’s entire database. • Technical Terms • A user with read-only access to reports, not edit/delete rights. • A backup program that can read files but not modify them. • A web server process that only accesses web content, not system files.
  • 20.
    Implementing PoLP • Role-BasedAccess Control (RBAC) • Use of permissions and ACLs • Regular review and auditing of access rights • Temporary privilege elevation when needed ("just-in-time access")
  • 21.
    Benefits of PoLP •Prevents privilege escalation attacks • Reduces risk of insider threats • Enhances compliance (e.g., GDPR, HIPAA) • Promotes accountability and auditability
  • 22.
    Challenges and BestPractices • Can be hard to enforce in complex environments • Must avoid over-restriction that impairs productivity • Best Practices: • Start with default deny • Use automation and role reviews • Log and monitor privileged access
  • 23.