Chapter 5: Authorization - Object Security


Authorization is the process of controlling access to system resources. Access should be granted based on individual userids and group memberships. Therefore, userids must be carefully assigned based on the principles of Least Privilege, Individual Accountability and Separation of Duties .

User access to system objects (files, processes and devices) should be granted based on job function, mediated by the principles of Least Privilege and Separation of Duties.

Defining User Access to System Resources

This section outlines how to secure a system using the principles of Least Privilege, Separation of Duties and Individual Accountability.

Principles for Granting Access to System Resources

BP-POLICY-USER-01 Userid assignment must be based on the principles of Least Privilege and Separation of Duties.

Least Privilege Least Privilege dictates that each user has access only to the resources required to perform their job and nothing more.

For example, operators are generally responsible for running the backup program, for managing the batch system and keeping various system devices, such as printers and communication lines, functioning. Individuals performing operations tasks should be assigned userids in the Operations administrative group.

Separation of Duties Separation of duties dictates that job duties and responsibilities be divided among people or functional groups to a point where collusion is necessary for fraud to occur.

For example, operators should be able to 'bounce' communication lines, but not add new communication lines. Users who generate credit card account numbers should not be responsible for creating PINs for those accounts.

A Typical Access Matrix

The Corporate Security Standard should dictate which user groups have what access to each type of resource. Users should be granted access to only those programs and files necessary to perform their job. Application users are generally authenticated and regulated by the application itself.

Some Common Task- related User Groups

Systems Mgt.

OPS Mgt

Change Control

Help Desk

App Support

App Data Owner

App Exec ID

Security

Production Data files

R(W)

RWPC

RW

Production Object Files

RWP

R

E

Production Log Files

R

R

R

R

R

R

RWP

Security Utilities and Files

R(E)

(RE)

RWEP

Safeguard and 3 RD party Audit Files

R

(R)

R

Op Sys Utilities

RWE

E

E

E

E

E

( ) = access granted via the application, 3 rd Party Access Control products or customer-written utilities which provide only limited, audited access to sensitive data or utilities.




HP NonStop Server Security 2004
HP NonStop Server Security 2004
ISBN: 159059035X
EAN: N/A
Year: 2004
Pages: 157

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net