PRIVILEGE BRACKETING AND RELINQUISHING

112 CHAPTER 8. CASE STUDY: SOLARIS TRUSTED EXTENSIONS processes could be simply bestowed their appropriate privilege sets. However, better protection of the file resources above is necessary to prevent a malicious process from circumventing such limitations. Of course, administrators should use as few UID 0 processes as possible. This reduces the size of the system’s trusted computing base, thus limiting the number of processes that must be tamperproof. Where possible, a root process should be replaced with programs running under a different UID but with exactly the privileges they need. For example, daemons that never need to exec subprocesses should remove the privilege to execute processes from their permitted and limit sets.

8.4.3 ASSIGNED PRIVILEGES AND SAFEGUARDS

While it is possible for privileges to be assigned to a user, they should really be assigned to programs. An system administrator could give a user more powers than intended. The administrator should consider whether additional safeguards are needed. For example, if the privilege to lock process mem- ory is given to a user, the administrator should consider setting the project.max-locked-memory resource control as well, to prevent that user from locking all memory.

8.5 ROLE-BASED ACCESS CONTROL RBAC

Role-based Access Control RBAC in Solaris is an alternative to the all-or-nothing security model of traditional superuser-based systems. With RBAC [ 94 ], an administrator can assign privileged functions to specific user accounts or special accounts, called roles. RBAC is in keeping with the security principle of least privilege by allowing organizations to selectively grant privileges to users or roles based upon their unique needs and requirements. In general, organizations are strongly encouraged to use Solaris RBAC to restrict access to privileged operations rather than granting users complete access to the backwardly compatible root account. Solaris RBAC was introduced in the Solaris 8 operating system, having come from Trusted Solaris, and has been enhanced and expanded with each new release of Solaris. Solaris RBAC functionality contains several discrete elements that can be used individually or together including authorizations, privileges, rights profiles and role designations. Figure 8.3 illustrates the relationship between these elements that are described in turn below.

8.5.1 RBAC AUTHORIZATIONS

An authorization is a unique string that represents a user’s right to perform some operation or class of operations. Authorization definitions are stored in a database called auth_attr. For programming authorization checks, only the authorization name is significant. Some typical values in an auth_attr database are shown below. solaris.jobs.:::Cron and At Jobs::help=JobHeader.html solaris.jobs.grant:::Delegate Cron At \ Administration::help=JobsGrant.html

8.5. ROLE-BASED ACCESS CONTROL RBAC 113

Figure 8.3: Relationship between RBAC elements. solaris.jobs.admin:::Manage All Jobs::help=AuthJobsAdmin.html solaris.jobs.user:::Cron At User::help=JobsUser.html Authorization name strings ending with the grant suffix are special authorizations that give a user the ability to delegate authorizations with the same prefix and functional area to other users. An authorization is a permission that can be assigned to a role, be assigned to a user, or be embedded in a rights profile for performing a class of actions that are otherwise prohibited by security policy. Very often, authorizations are used in concert with privileged programs or services for the purpose of access control. For example, access to crontab is denied: • If etccron.dcron.allow exists and the user’s name is not in it. • If etccron.dcron.allow does not exist and user’s name is in etccron.dcron.deny . • If neither file exists, only a user with the solaris.jobs.user authorization is allowed to submit a job. In this case, the solaris.jobs.user authorization can be used to grant access to the cron facility when other access control mechanisms are not present. 114 CHAPTER 8. CASE STUDY: SOLARIS TRUSTED EXTENSIONS

8.5.2 RIGHTS PROFILES

A rights profile is a collection of overrides that can be assigned to a role or user. A rights profile can consist of authorizations, individual commands, and other rights profiles. Each of the commands stored in a rights profile can define security attributes that determine how the program will be run. The following is the list of security attributes that can be assigned to commands in a rights profile: • uid euid: The euid and uid attributes contain a single user name or a numeric user ID. Commands designated with euid run with the effective UID indicated, which is similar to setting the setuid bit on an executable file. Commands designated with uid run with both the real and effective UIDs. • gid egid: The egid and gid attributes contain a single group name or a numeric group ID. Commands designated with egid run with the effective GID indicated, which is similar to setting the setgid bit on a file. Commands designated with gid run with both the real and effective GIDs. • privs. The privs attribute contains a privilege set which will be added to the inheritable set prior to running the command. • limitprivs. The limitprivs attribute contains a privilege set which will be assigned to the limit set prior to running the command.

8.5.3 USERS AND ROLES

A Solaris role is a special identity for running privileged applications that can be assumed by assigned users only. A role is similar to a normal user in that it has its own UID, GID, home directory, shell and password. A role differs from a normal user in two ways: • A role cannot be used to initially log directly into a system either at the console or by any remote access service. Users must first log into the system before assuming a role. • A role can only be accessed by a user who has previously been authorized to assume that role. Most often, roles are used for administrative accounts to restrict access to sensitive operations as well as for service accounts e.g., web server or application server UID. It is important to ensure that actions taken by such accounts be attributable back to a specific user who accessed the role. It should also be noted that delayed jobs e.g., cron or batch are independent of role assumption.

8.5.4 CONVERTING THE SUPERUSER TO A ROLE

Taken together, authorizations, rights profiles and roles offer the ability to delegate access to admin- istrative functions with a level of detail that can be customized based upon an organization’s policies and requirements. One of the most commonly cited examples of RBAC is the conversion of the root account to a role.

Dokumen yang terkait

Pengaruh Hutang, Operating Ratio, Earning Power of Total Invesment, Rate of Return for Owners , Working Capital, Quick Ratio terhadap Dividen Tunai pada Perusahaan Perkebunan yang Terdaftar di BEI Periode 2009-2013

3 49 100

Pengaruh Liquidity Ratio (Quick Ratio), Profitability Ratio (ROA dan ROE) Terhadap Dividend Payout Ratio pada Perusahaan Perbankan yang Terdaftar Di Bursa Efek Indonesia

4 64 101

Sikap Dan Perilaku Room Attendant Dalam Melaksanakan Standard Operating Procedure Bagian Kamar Di J.W.Marriott Hotel Medan

21 300 74

Pengaruh Likuiditas, Laba, Kebijakan Hutang, dan Operating Leverage Terhadap Price To Book Value pada Perusahaan Real Estate dan Property yang Terdaftar di Bursa Efek Indonesia (BEI)

1 43 77

Pengaruh Cash Dividend Coverage, Operating Cashflow Per Share, Return On Equity, Return On Assets, Total Assets Turnover, dan Earning Per Share terhadap Harga Saham pada Perusahaan Manufaktur yang Terdaftar di BEI

1 39 84

Analisis pengaruh Gross Profit Margin (GPM), Operating Profit Margin (OPM), Net Profit Margin (NPM), dan Return On Asset (ROA) terhadap harga saham: studi empiris pada perusahaan manufaktur sektor industri barang konsumsi Tahun 2008 -2012.

3 51 124

Analisis Dan Perancangan Site-To-Site Virtual Private Network (VPN) Berbasis IP Security Menggunakan Mikrotik Router Operating System

4 22 144

Pengaruh Operating Leverage, Financial Leverage, dan Compound Leverage Terhadap Risiko Sistematik

0 8 113

PENGARUH OPERATING ASSETS TURNOVER DAN OPERATING PROFIT MARGIN TERHADAP EARNING POWER.

2 6 48

Operating a forklift

0 0 1