<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RBAC - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/rbac-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/rbac-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 20 Dec 2024 10:05:35 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>RBAC - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/rbac-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Access management: how is authorisation evolving to meet the challenges and needs of organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/#respond</comments>
		
		<dc:creator><![CDATA[Elie TOAHI]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 12:36:38 +0000</pubDate>
				<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[access management]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DIgital Identity]]></category>
		<category><![CDATA[GBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24943</guid>

					<description><![CDATA[<p>Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time. To...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Managing access rights to an organisation&#8217;s resources is a central issue in IAM. An authorisation model provides a layer of abstraction that guides the allocation of technical permissions to users and makes it easier to monitor them over time.</p>
<p style="text-align: justify;">To this end, there are many existing rights models: MAC, DAC, GBAC, ABAC, etc.</p>
<p style="text-align: justify;">How do you understand these many different rights models in practical terms and apply them to your business?</p>
<p style="text-align: justify;">The models differ in their degree of complexity and in the response they provide to the specific needs and constraints of an organisation or system. The most recent models incorporate issues of security, scalability and compliance in an increasingly complex technological environment.</p>
<p style="text-align: justify;">In this article, we will follow a chronological logic, identifying how authorisation has evolved over the decades to meet the challenges faced by organisations. We will see that, like information systems, rights model approaches have become increasingly complex and now include more and more parameters for deciding whether to grant or deny access.</p>
<p style="text-align: justify;">Models can be grouped into 3 approaches reflecting their progressive sophistication:</p>
<p style="text-align: justify;">&#8211; Classic approach: admin-time</p>
<p style="text-align: justify;">&#8211; Modern approach: run-time</p>
<p style="text-align: justify;">&#8211; Forward-looking approaches: event-time</p>
<p style="text-align: justify;">We will illustrate each of these approaches with emblematic models, highlighting:</p>
<p style="text-align: justify;">1) The response to an initial need</p>
<p style="text-align: justify;">2) The limitations of the model</p>
<p style="text-align: justify;">We conclude with a chronological summary of the approaches and their models.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Classic authorisation approaches: Admin-time</h2>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><strong>In the 60s and 70s</strong> the development of computer systems, marked by the development of the first multi-user systems (Multics, HP-3000), gave rise to the need to rethink user rights.</p>
<p style="text-align: justify;">Innovative security principles, which are still used today, were defined for these systems such as rings of protection, which aim to protect the integrity of the operating system against deliberate and accidental modifications and initiate a rethink of user access policies to resources.</p>
<p style="text-align: justify;">In the first access rights models to emerge, the management of rights remained summary, <strong>defined in hard terms by ‘administrators’: this was admin-time</strong>, of which the DAC and MAC (60s-70s) and RBAC (90s) models are particularly noteworthy.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Discretionary Access Control (DAC) and Access Control Lists (ACLs)</h3>
<p style="text-align: justify;">As its name suggests, the DAC model &#8211; for <strong>‘discretionary access control’</strong> &#8211; leaves it up to each resource owner to assign permissions to users. This is the basic rights model <strong>found on Unix systems</strong>, which can be supplemented by the ACL mechanism, or ‘<strong>access control lists</strong>’. Often associated with DAC, ACLs specify, for a given resource, the users and their rights over the resource, as illustrated below using the Unix example.</p>
<figure id="attachment_24948" aria-describedby="caption-attachment-24948" style="width: 1395px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="size-full wp-image-24948" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png" alt="Explanation and code for DAC and ACL authorization models" width="1395" height="944" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG.png 1395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image1-ENG-768x520.png 768w" sizes="(max-width: 1395px) 100vw, 1395px" /><figcaption id="caption-attachment-24948" class="wp-caption-text"><em>Representation of rights on a Unix system, with or without an ACL attached to the ‘projectRI’ file.</em><br /><em>Note that the <strong>minimal ACL</strong> describes the rights set for the <strong>basic Unix rights triplet</strong> (owner &#8211; owner group &#8211; other users), but it can be modified to give <strong>rights to additional users or groups</strong>, as in this case specific rights for the user ‘alice’. This extends and enables more detailed rights management.</em></figcaption></figure>
<p style="text-align: justify;">Beyond Unix, file-sharing systems such as <strong>OneDrive</strong> and <strong>social networks</strong>, where the user can choose who can view or comment on each publication, are other examples of the use of <strong>DACs and ACLs</strong>.</p>
<p style="text-align: justify;">In fact, the flexibility and granularity of this model are an advantage for local implementations centred on individuals. On the other hand, they <strong>become problematic for ensuring a correct level of resource protection on a large scale in more complex systems.</strong></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Mandatory Access Control (MAC)</h3>
<p style="text-align: justify;">The MAC model, which stands for <strong>Mandatory Access Control</strong>, is the opposite of DAC. Rather than leaving the assignment of rights to the ‘discretion’ of individual users, resource by resource, limiting system-wide visibility and encouraging errors and vulnerabilities, <strong>rules are predefined by administrators according to different security classifications and strictly enforced by a central authority</strong>, generally represented by the operating system itself.</p>
<p style="text-align: justify;">It is particularly prevalent in <strong>government, military and industrial environments</strong>, because it allows <strong>tight control over access to sensitive data</strong>. It uses <strong>labels</strong> that characterise the sensitivity of objects and users, according to the rules of the organisation concerned:</p>
<p style="text-align: justify;">&#8211; A <strong>resource classification</strong> level, for example: ‘Unclassified’, ‘Restricted’, ‘Confidential’, etc.<a href="#_ftn1" name="_ftnref1"></a></p>
<p style="text-align: justify;">&#8211; A <strong>level of user authorisation</strong>, linked to the existing resource classification levels.</p>
<p style="text-align: justify;">Below we describe Multics and SELinux, two fundamental examples of MAC implementation.</p>
<h4 style="text-align: justify;">MAC example 1: Multics and protection rings</h4>
<figure id="attachment_24902" aria-describedby="caption-attachment-24902" style="width: 308px" class="wp-caption aligncenter"><img decoding="async" class=" wp-image-24902" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg" alt="Multics systems logo (Source). It stylistically highlights the protection rings that are at the heart of Multics." width="308" height="308" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR.jpg 251w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-191x191.jpg 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image2-FR-39x39.jpg 39w" sizes="(max-width: 308px) 100vw, 308px" /><figcaption id="caption-attachment-24902" class="wp-caption-text"><em>Multics systems logo (<a href="https://commons.wikimedia.org/wiki/File:Multics-logo.svg">Source</a>). It stylistically highlights the protection rings that are at the heart of Multics.</em></figcaption></figure>
<p style="text-align: justify;">Already mentioned above as a precursor of <strong>multi-user systems</strong> (also known as ‘time-sharing’ systems), the <strong>Multics project</strong>, released in 1969, was the source of <strong>many innovative features</strong>, particularly in its memory management and security. It prefigured MAC even before the formulation of models such as <strong>Bell-LaPadula (1973)</strong> and its first formal definition set out in the Department of Defense&#8217;s <strong>Orange Book (1983)</strong>, which established US computer security standards.</p>
<p style="text-align: justify;">It is based on the concept of <strong>rings of protection</strong>, which Multics created, as shown by its logo (image above), and which form the basis of MLS &#8211; Multi-Level Security &#8211; systems, widely used in highly confidential contexts. It consists of a <strong>set of concentric rings representing levels of sensitivity that increase the closer you get to the centre</strong> (ring 0) &#8211; and therefore the privileges required for access. <strong>Mechanisms known as guards or gatekeepers, located at the interface between two rings, closely control the legitimacy of access in both directions</strong>, which they grant or deny.</p>
<p style="text-align: justify;">In reality, these rings are of <strong>two types</strong>:</p>
<p style="text-align: justify;">&#8211; <strong>Kernel protection rings</strong> are physical rings built into processors and used by the operating system to guarantee its integrity against faults (which cause the machine to crash) or modifications, whether intentional or not.</p>
<p style="text-align: justify;">&#8211; <strong>User space rings</strong> are logical rings implemented by the operating system. This is where MAC comes in. By means of labels, each user and each resource is attached to a ring level. From there, rules define the actions that can or cannot be taken, following the example of the Bell-LaPadula model, which emphasises data confidentiality: ‘No read up’ (a user cannot read access to layers higher than his own), ‘No write down’ (he cannot write to layers lower than his own, to avoid leaks).</p>
<p style="text-align: justify;">The image below summarises the principle of protection rings.</p>
<figure id="attachment_24952" aria-describedby="caption-attachment-24952" style="width: 1454px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-24952" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png" alt="The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system." width="1454" height="746" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG.png 1454w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-372x191.png 372w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image3-ENG-768x394.png 768w" sizes="(max-width: 1454px) 100vw, 1454px" /><figcaption id="caption-attachment-24952" class="wp-caption-text"><em>The 2 types of protection ring. On the left, the hardware implementation used to protect the system. On the right, a transposition for the user context, with classification levels ranging from ‘unclassified’ to ‘top secret’, which are managed by the operating system.</em></figcaption></figure>
<h4 style="text-align: justify;"><br /> MAC example 2: SELinux, the Linux kernel security module</h4>
<figure id="attachment_24906" aria-describedby="caption-attachment-24906" style="width: 264px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24906" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png" alt="SELinux logo. It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function." width="264" height="241" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image4.-FR-43x39.png 43w" sizes="auto, (max-width: 264px) 100vw, 264px" /><figcaption id="caption-attachment-24906" class="wp-caption-text"><em>SELinux logo (<a href="https://en.m.wikipedia.org/wiki/File:SELinux_logo.svg">Source</a>). It represents the Unix system mascot (Tux) armed with a shield, emphasising its system protection function.</em></figcaption></figure>
<p style="text-align: justify;">Initially <strong>developed by the NSA </strong>in 2001, <strong>SELinux</strong> was proposed and added to the <strong>Linux kernel security modules</strong> (LSM, Linux Security Modules) in 2003, and is natively integrated into RedHat distributions such as Fedora.</p>
<p style="text-align: justify;">This is another <strong>well-known example of MAC implementation</strong>: it allows administrators to <strong>assign a security context label to each resource in order to classify them</strong> and <strong>define the security policies to be applied by the operating system</strong>. Even with privileged rights, an application will see its rights restricted to the domain it needs to function (for example, the folders specified), with <strong>SELinux detecting and preventing any non-compliant action</strong>.</p>
<p style="text-align: justify;">SELinux therefore provides an <strong>additional layer of protection in the event that a user or process manages to bypass traditional access controls</strong>.</p>
<p style="text-align: justify;">In practice, <strong>MAC policies are rarely sufficient on their own, but are superimposed</strong> on existing <strong>DAC rules</strong>, whose flexibility they compensate for.</p>
<p style="text-align: justify;">Two models based above all on the identity of the user or process, on the basis of which they authorise or deny access: this is <strong>known as Identity-Based Access Control</strong> (IBAC). <strong>These models are still limited to local contexts and have little resistance to scaling up</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Role-based Access Control (RBAC)</h3>
<p style="text-align: justify;">Formulated in 1992 by David FERRAIOLO and Richard KUHN, two engineers from the American NIST, the RBAC model &#8211; <strong>role-based access model</strong> &#8211; was designed to simplify the management of permissions throughout an organisation while reflecting its structure as closely as possible (hierarchy, responsibilities, departments, etc.).</p>
<p style="text-align: justify;">Instead of granting rights directly to an identity, as with IBAC, a method that can quickly become <strong>difficult to maintain</strong>, we design <strong>business roles and the associated privileges</strong>. <strong>Users then inherit the rights associated with their role within the company</strong>, enabling them to access the various applications and enterprise sharing systems considered necessary for their internal activities.</p>
<figure id="attachment_24956" aria-describedby="caption-attachment-24956" style="width: 1373px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-24956" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png" alt="RBAC model operating principle" width="1373" height="840" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG.png 1373w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-312x191.png 312w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image5-ENG-768x470.png 768w" sizes="auto, (max-width: 1373px) 100vw, 1373px" /><figcaption id="caption-attachment-24956" class="wp-caption-text"><em>RBAC model operating principle</em></figcaption></figure>
<p style="text-align: justify;">This initial conceptual framework was completed and <strong>standardised in 2004 with the ANSI INCITS 359-2004 standard</strong>, which takes into account practical business cases and scenarios. For example, it addresses the need to separate responsibilities (SoD, Segregation of Duty), which is fundamental in financial and banking institutions, as well as the principle of least privilege and the inheritance of permissions.</p>
<h4 style="text-align: justify;">Progressive and increasingly centralised adoption of RBAC</h4>
<p style="text-align: justify;">From the 80s and 90s onwards, <strong>databases</strong>, which were widely adopted by large companies and likely to contain sensitive information to which access was naturally controlled, <strong>were pioneers in the implementation of the RBAC model</strong>. They illustrate its implementation at the level of isolated applications, with no repercussions for external applications or systems.</p>
<p style="text-align: justify;">The 2000s saw the launch of <strong>Microsoft&#8217;s Active Directory</strong>, starting with Windows 2000 Server. This centralised directory is designed to <strong>manage all the organisation&#8217;s resources</strong> (people, physical resources, applications). Although it is not strictly speaking an RBAC tool, a comparison can be made. The allocation of access rights is based on <strong>security groups</strong> &#8211; which can be perceived as roles &#8211; with <strong>permission inheritance mechanisms</strong> and the concepts of domains, trees and forests designed to <strong>represent the logical structures of the company</strong>.</p>
<p style="text-align: justify;"><strong>Modern IAM solutions</strong>, such as Okta, SailPoint IIQ and Microsoft AzureAD, now support RBAC for <strong>heterogeneous environments</strong>, including cloud services. They illustrate the <strong>gradual centralisation of access rights management</strong>, which was initially managed locally within applications, and is now increasingly delegated to IAM solutions covering the widest possible spectrum.</p>
<p>RBAC assigns rights based on a business role, whereas IBAC is linked to an identity. <strong>The layer of abstraction created between the subject&#8217;s identity and an individual&#8217;s </strong><strong>role means that it can be extracted from restricted contexts</strong> (file systems for DAC, operating systems for MAC) <strong>and adapted (at last!) to the access control needs of organisations</strong>. However, they all share the characteristic of a <strong>rigid definition of rights, based on an identity or a role</strong>.</p>
<p>In entities where exchanges are increasingly dynamic and fluctuating, this abstraction through roles alone may prove insufficient. New models have emerged to <strong>represent more complex organisations</strong>, taking into account <strong>additional, evolving attributes to assess access rights to a higher accuracy</strong><strong> at a given time</strong>: we are moving from admin-time to run-time.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">New approaches to authorisation: Run-time</h2>
<p> </p>
<p style="text-align: justify;">The increasing complexity of information systems, and therefore of access, has led to the run-time approach. This approach meets organisations&#8217; needs for dynamic <strong>flexibility and security</strong>. Unlike the ‘admin-time’ era, characterised by static permissions, the ‘run-time’ era offers real-time management at the time of the access request, based on various contextual elements. This transition to more flexible and precise authorisation models enables organisations for <strong>adapting to change </strong><strong>and better protect their resources against today&#8217;s threats</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Graph-Based Access Control (GBAC)</h3>
<p style="text-align: justify;">The GBAC (Graph-Based Access Control) or GraphBAC model is based on the use of graphs to represent the relationships between users, roles and resources within an organisation. These 3 types of entities (users, roles, resources) and the relationships between them form the core of this model: entities can be represented by the nodes of the graph, and the relationships between them by the edges.</p>
<p style="text-align: justify;">Access authorisations to a resource are <strong>determined in real time by queries to this graph database</strong>, enabling <strong>access decisions to be made based on the connections between entities</strong> at the time of the request. Users can thus obtain access to a resource according to their role and their relationships with other users or resources in the organisation.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24960" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png" alt="GBAC Graph-Based Access Control principle" width="965" height="596" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG.png 965w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image6-ENG-768x474.png 768w" sizes="auto, (max-width: 965px) 100vw, 965px" /></p>
<p style="text-align: justify;">The GBAC model is <strong>suited to the dynamic environments of large organisations</strong>, where relationships between entities are constantly evolving. On the other hand, it can be complex to <strong>implement</strong>, and the projects involved are relatively<strong> long</strong>, with <strong>significant costs</strong>. In addition, the gradual addition of new relationships can make the <strong>graph increasingly difficult to manage, complicating internal audit or recertification activities, for example</strong>.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Attribute-Based Access Control (ABAC)</h3>
<p style="text-align: justify;">In the ABAC (Attribute-Based Access Control) access model, the management of access to a resource is based on the dynamic combination of attributes. These attributes relate to the user requesting access (role, group), the resource requested (type of resource) and the context in which the request is made (time of day, type of network). This approach makes it possible to authorise or deny access flexibly and in real time.</p>
<p style="text-align: justify;">The model was formalised in 2014 in the publication by <strong>NIST (SP 800-162)</strong> which provides detailed information for its implementation.</p>
<p style="text-align: justify;">4 components are essential to the operation of this model: Policy Enforcement Points (PEPs), Policy Decision Points (PDPs), Policy Administration Points (PAPs) and Policy Information Points (PIPs).</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24964" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png" alt="ABAC Attribute-Based Access Control principle" width="1201" height="556" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG.png 1201w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image7-ENG-768x356.png 768w" sizes="auto, (max-width: 1201px) 100vw, 1201px" /></p>
<p style="text-align: justify;">After interception by the <strong>PEP</strong>, the access request is transmitted to the <strong>PDP</strong>, which is responsible for making decisions by analysing the access policies managed by the PAP and often accessible from an access policy database. The <strong>PIP</strong> provides the <strong>PDP</strong> with additional information on the user or resource from different sources, enabling it to make decisions in line with access rules. For contextual information, the information system can be connected to other tools or sources (IDS, logs, sensors) that enable this information to be collected at the time of an access request.</p>
<p style="text-align: justify;">ABAC is a <strong>particularly</strong> <strong>interesting model in environments where access needs are varied and evolving</strong>, as it enables fine, granular management of authorisations, particularly in the context of PAM (Privileged Access Management), concerning access and critical resources.</p>
<p style="text-align: justify;">However, this level of detail and flexibility comes with <strong>challenges</strong> such as the ongoing <strong>review of attributes</strong> and the <strong>maintenance of policies</strong>, which require constant attention to ensure they meet the needs of the business. Over time, the <strong>increasing number</strong> of attributes and conditions can make it difficult to <strong>maintain a clear and functional ABAC architecture</strong>, especially in environments undergoing constant transformation.</p>
<p style="text-align: justify;">In current ABAC architectures, <strong>PEPs are generally designed to work only with PDPs from the same vendor</strong>, using proprietary protocols, with no support for compatibility between different vendors.</p>
<p style="text-align: justify;">Standardizing the way these different PEPs and PDPs interact, in order to improve system interoperability and reduce dependence on a single supplier, is the aim of the OpenID AuthZEN working group.</p>
<h4 style="text-align: justify;">OpenID AuthZEN: towards improved interoperability</h4>
<p style="text-align: justify;">AuthZen is a working group initiative <strong>launched in 2023</strong> by the OpenID Foundation to standardize the interactions between PEPs and PDPs, in order to improve interoperability between systems from different suppliers.</p>
<p style="text-align: justify;">This initiative responds to current problems where authorization services (PEPs and PDPs) are often designed to work only with solutions from the same vendor, limiting their interoperability.</p>
<p style="text-align: justify;">AuthZen was launched to develop a <strong>standardised protocol that would facilitate integration and communication between PEPs and PDPs</strong>, reducing dependency on single vendor solutions and improving overall authorisation security.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24968" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png" alt="AuthZen access model principle" width="1507" height="613" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG.png 1507w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-437x178.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image8-ENG-768x312.png 768w" sizes="auto, (max-width: 1507px) 100vw, 1507px" /></p>
<p style="text-align: justify;">To make these interactions more flexible and universal, <strong>AuthZen relies on existing architectures and technologies (OPA/Rego, XACML, etc.) to improve deployment, scalability and interoperability</strong>. The first two stages of this standardisation with Open ID AuthZen are the implementation of a simple <strong>‘Request/Response’</strong> and <strong>‘Permit/Deny’</strong> type <strong>protocols</strong> and a multiple decision approach in order to <strong>group several authorisation requests into a single request and receive several decisions in return</strong>.</p>
<p style="text-align: justify;">The AuthZen think tank includes security players such as 3Edges, Axiomatic and others. It is also open to players who want to develop authorisation systems and make architectures more secure and interoperable.</p>
<h2 style="text-align: justify;"> </h2>
<h2 style="text-align: justify;">Prospects for the evolution of authorisation: Event-time</h2>
<p> </p>
<p>A new approach to the evolution of access systems is event-time. It is defined as an <strong>implementation of dynamic authorisation where access rights are adjusted in real time</strong> <strong>in response to immediate events or changes that occur.</strong> Unlike static or attribute-based approaches, event-time is characterised by a <strong>continuous evaluation of access rights</strong>, to ensure that all access remains compliant with the policies in place within the organisation.</p>
<p>For example, when a user&#8217;s status changes (promotion, departure, mobility, etc.), the system automatically adjusts or revokes their access rights. This proactive, event-based adjustment approach is common in information systems monitoring and security incident management.</p>
<p>Event-time is based on the following key concepts:</p>
<p>&#8211; <strong>Listeners</strong>: system components that monitor events in time and analyse important changes (mobility, promotions, departures, etc.) from various sources, in particular HR systems.</p>
<p>&#8211; <strong>Triggers</strong>: actions in response to an event identified by a listener, such as the revocation of access rights on the actual day a user leaves.</p>
<p>&#8211; <strong>Shared Signals</strong>: enabling different systems to share information about events in real time.</p>
<p>&#8211; Continuous evaluation: constant checking of access rights to ensure that each action or access remains in compliance with policies.</p>
<p>Frameworks and standards play a key role in implementing event-time by providing a structure for implementing the concepts in systems:</p>
<p>The Shared Signals Framework (SSF) is directly linked to the concept of shared signals, which <strong>enables systems via an API to share information about events in real time to ensure consistent access management</strong>. The continuous evaluation of this information is supported by <strong>CAEP</strong> (Continuous Access Evaluation Protocol), a <strong>protocol for standardising the writing of status changes</strong>. <strong>RISC</strong> (Risk and Incident Sharing and Coordination) is a <strong>generic protocol</strong> for <strong>standardising the transmission</strong> and reception of security incidents between these different systems, thereby enhancing the overall responsiveness of an information system.</p>
<p>Event-time is not based on a specific model such as RBAC or ABAC, but can <strong>function as a complementary access management layer</strong> to these traditional access systems, making them <strong>more dynamic and aligned</strong> with real-time situations.</p>
<p> </p>
<p> </p>
<p>The evolution of authorisation models, from traditional approaches to modern, dynamic methods, reflects the <strong>ongoing adaptation of IAM</strong> and access systems to the growing and changing needs of organisations.</p>
<p><strong>Admin-time approaches laid the foundations for resource security</strong> with models such as DAC and MAC. RBAC introduced structured rights management, which is <strong>widely adopted in organisations</strong> today due to its relatively simple application.</p>
<p><strong>With the advent of the runtime, access decisions became more refined</strong>, based on attributes specific to users, resources and context, as with the ABAC and GBAC models. However, these <strong>increasingly sophisticated</strong> models have led to the emergence of numerous <strong>proprietary solutions</strong>, limiting <strong>the interoperability</strong> of authorisation components and creating a <strong>dependency</strong> on specific technologies. This has led to the emergence of initiatives such as the <strong>AuthZen working group</strong>, which is working to develop standards.</p>
<p><strong>The event-time approach provides real-time responsiveness</strong>, enabling systems to <strong>automatically adjust access</strong> in response to specific events. <strong>CAEP and the Shared Signals Framework</strong> facilitate this dynamic by standardising the exchange of information between systems, thereby strengthening security and compliance.</p>
<p>An overview of these different approaches and their associated models is presented in the timeline below, together with a summary table of the different models discussed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24972" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png" alt="Timeline of the different approaches and their associated models for authorization models" width="1560" height="738" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG.png 1560w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-404x191.png 404w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-768x363.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image9-ENG-1536x727.png 1536w" sizes="auto, (max-width: 1560px) 100vw, 1560px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-24976" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png" alt="Summary table of the authorizations models discussed" width="1522" height="987" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG.png 1522w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/Image10-ENG-768x498.png 768w" sizes="auto, (max-width: 1522px) 100vw, 1522px" /></p>
<p>By combining these different approaches, you can implement more secure, flexible and proactive access management, capable of responding to current and future identity-related challenges. These developments also highlight the importance of adopting adaptive and interoperable authorisation solutions to ensure effective protection of resources while meeting the operational requirements of teams.</p>
<p>These developments raise an essential question about the <strong>ability of organisations to anticipate these changes and integrate these new access management dynamics</strong>.</p>
<p>Whether you are still using admin-time models, exploring runtime options, or considering moving to event-time management, it is crucial to choose a model that meets your specific needs. It is also very important to anticipate the consequences for the management of this model over time (review of rights, measurement of data quality, review of policies, definition of expected reactions, etc.).  </p>
<p>What type of model do you use? </p>
<p>Don&#8217;t hesitate to contact us to find out more and understand how to apply these authorisation models to your organisation&#8217;s context!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/">Access management: how is authorisation evolving to meet the challenges and needs of organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/12/access-management-how-is-authorisation-evolving-to-meet-the-challenges-and-needs-of-organisations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/#respond</comments>
		
		<dc:creator><![CDATA[Arnaud Soullié]]></dc:creator>
		<pubDate>Fri, 07 Apr 2023 13:00:00 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20232</guid>

					<description><![CDATA[<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing. Azure, in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing.</p>
<p>Azure, in recent years, has been gaining a foothold in this sector, as Gartner has pointed out, ranking them among the <strong>visionary leaders</strong> of Industrial IoT (IIoT) platforms [1] due to its capabilities, and its almost complete coverage of all use cases and industries.</p>
<p>The IoT, by nature often widely exposed, even on the Internet, can be the<strong> target of attacks</strong>. It is therefore essential to put in place security mechanisms, and to<strong> apply best practices</strong> to improve the security level of the platform and the objects that connect to it, which we will explore in this article.</p>
<p>Before moving on to specific <strong>recommendations</strong> for protecting your IoT devices and data, let&#8217;s look at how the various Azure IoT services can be used together to<strong> create secure IoT solutions</strong>.</p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Presentation of the Azure IoT offer</span></h1>
<p>Microsoft Azure IoT is an <strong>end-to-end platform</strong> for connectivity, analysis and visualization of data from IoT devices. It also offers <strong>interconnection with other standard Azure services</strong> such as Azure Machine Learning and Azure SQL Database.</p>
<p>Azure IoT offers <strong>two solution ecosystems</strong> to its customers:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central is a <strong>fully managed aPaaS</strong>, Platform as a Service application that <strong>simplifies the creation of IoT solutions</strong>. This service is responsible for connecting, managing and operating fleets of devices, and provides a management user interface. Azure IoT Central is an <strong>aggregate of different Azure IoT services</strong> such as Azure IoT Hub or Azure IoT Hub Device Provisioning Service (DPS).</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20200 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png" alt="" width="836" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png 836w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-294x191.png 294w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-768x499.png 768w" sizes="auto, (max-width: 836px) 100vw, 836px" /></p>
<p><em>Azure IoT Central </em><strong>offers application models</strong> according to several business domains: Retail, Health, Energy, Industry, etc., and aims at a &#8220;turnkey&#8221; implementation.  </p>
<ul style="text-align: justify;">
<li>A <strong>customised ecosystem</strong> thanks to the various Azure PaaS (Platform as a Service) services. In this ecosystem, two services; Azure IoT Hub and Azure Digital Twins are the <strong>foundations of an IoT solution</strong>. We have also combined them with Azure Device Provisioning and Azure Device Update for optimal coverage of cyber security needs.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20202 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png" alt="" width="830" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png 830w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-768x480.png 768w" sizes="auto, (max-width: 830px) 100vw, 830px" /></p>
<p>These two ecosystems enable Azure to <strong>address all types of IoT and IIoT needs</strong>:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central offers a complete service if you want to quickly develop a <strong>low-complexity application</strong> thanks to its application template catalogue.</li>
<li>If you want a <strong>custom solution</strong>, or with features not supported by Azure IoT Central: opt for an ecosystem based on Azure IoT Hub.</li>
</ul>
<p>Now that we have a good understanding of the Azure IoT ecosystems, it is important to <strong>focus on securing these ecosystems</strong>. How can we effectively protect IoT devices and data when using Azure IoT services? This is what we will explore in the following sections.</p>
<p> </p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Preamble: the Azure CLI tool</span></h1>
<p>In order to manage Azure resources, Microsoft provides several tools, most of which can be used in CLI (Command Line Interface). The tool offering the most functionality for management is <strong>Azure CLI</strong>.</p>
<p>This tool, available for <strong>Windows</strong> and <strong>UNIX</strong> operating systems, allows a user who is a member of an Azure environment to <strong>manage and obtain information about Azure resources</strong>. It should be noted that the range of possibilities of this tool varies according to the rights that the user has over the resources in question.</p>
<p>To install it, Microsoft provides a <a href="https://learn.microsoft.com/fr-fr/cli/azure/install-azure-cli">dedicated page</a> explaining the steps for any type of environment.</p>
<p>In order to use it, all you must do is <strong>connect</strong> to an Azure user account via the chosen command interface (<strong>PowerShell</strong> or <strong>Bash</strong>), then <strong>enter the desired commands</strong>. Once the use of this tool is finished, a disconnection of the account is recommended.</p>
<p>A <strong>typical use</strong> of this tool is shown below:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> login [<span style="color: #808080;">-u</span> Nom d’utilisateur] [<span style="color: #808080;">&#8211;use-device</span>]</span></p>
<p><span style="color: #ffffff;">[Commandes Azure CLI] [Exemple : ]</span><br /><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource list</span></p>
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> logout</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">The documentation of this tool, presenting and explaining all the possible commands, is available at this </span><a style="font-size: revert;" href="https://learn.microsoft.com/fr-fr/cli/azure/reference-index?view=azure-cli-latest">address</a><span style="font-size: revert; color: initial;">.</span></p>
<p>This tool will be used later in the example of technical manipulations.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">1st security vector: authentication of objects</span></h1>
<p>Device authentication is crucial for an Azure infrastructure as it ensures that <strong>only authorised devices can access cloud resources</strong>. Azure IoT services support two main means of authentication for IoT devices:</p>
<ul style="text-align: justify;">
<li>A <strong>SAS Token</strong> (Shared Access Signature) is a <strong>string of characters</strong> used to authenticate devices and services. An SAP token has the following structure:</li>
</ul>
<p style="text-align: justify;"> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20249 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png" alt="" width="2426" height="637" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png 2426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-437x115.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-768x202.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-1536x403.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-2048x538.png 2048w" sizes="auto, (max-width: 2426px) 100vw, 2426px" /></p>
<p>This type of authentication has a <strong>defined validity period</strong> and permissions, which are assigned based on an access policy, on a <strong>given perimeter</strong>. The <strong>signature</strong>, on the other hand, is a crucial element because it is responsible for guaranteeing the security of communications between the object and Azure services, but also for proving the identity of the device. This signature is generated from a secret that must be <strong>specific to each device</strong>.</p>
<ul style="text-align: justify;">
<li>An <strong>X.509 certificate</strong> [2] is a digital certificate allowing <strong>strong authentication</strong> of the object. It contains information about the <strong>entity issuing</strong> the certificate, the validity period of the certificate and the<strong> identity of the subject</strong> (e.g. the object). One of the strengths of certificates is the ability to create chains of certificates, and thus <strong>create trust relationships</strong>:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20206 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png" alt="" width="844" height="426" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png 844w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-378x191.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-768x388.png 768w" sizes="auto, (max-width: 844px) 100vw, 844px" /></p>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">X.509 certificates offer a <strong>higher level of security</strong>, assuming a state-of-the-art cryptographic algorithm, as they <strong>allow trust relationships to be represented</strong>. However, the management and use of certificates can involve <strong>additional complexity</strong> for an IoT project.</span></p>
<p>In order to force the use of X.509 certificates to authenticate connected objects, it is possible <strong>to prohibit SAS tokens for an IoT Hub</strong>. Indeed, Azure IoT Hubs have three properties related to the <strong>use or not of SAS tokens</strong>: disableLocalAuth, disableDeviceSAS and disableModuleSAS. Therefore, the best practice associated with disabling SAS tokens is to set these three parameters to True. This can be done using the <strong>Azure CLI</strong> tool:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource update <span style="color: #808080;">&#8211;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt;<span style="color: #808080;"> &#8211;resource-type</span> Microsoft.Devices/IotHubs <span style="color: #808080;">&#8211;set</span> properties.disableDeviceSAS=true properties.disableModuleSAS=true properties.disableLocalAuth=true</span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>Checking the values of these same parameters can also be done using the <strong>Azure CLI</strong>:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;(disableLocalAuth|disableDeviceSAS|disableModuleSAS)&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>In the example response below, the disableDeviceSAS property has been set correctly, but the other two have not.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20217 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png" alt="" width="907" height="127" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png 907w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-437x61.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-768x108.png 768w" sizes="auto, (max-width: 907px) 100vw, 907px" /></p>
<p style="text-align: justify;">The <strong>Azure portal</strong> also allows you to perform this verification:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20208 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png" alt="" width="580" height="317" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png 580w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-71x39.png 71w" sizes="auto, (max-width: 580px) 100vw, 580px" /></p>
<p style="text-align: justify;">The choice of authentication method for Azure IoT will <strong>depend on the security requirements</strong> of your solution. If you need <strong>strong security</strong> and have the infrastructure to manage certificates, then <strong>X.509 certificate</strong> authentication is a good option. However, if you are looking for <strong>a solution that is simple to manage and use</strong>, the SAS token may be more suitable for your needs.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">2nd security vector: RBAC and alerts </span></h1>
<p>The assignment of roles on your Azure IoT infrastructure must be <strong>thoughtful and defined according to the needs of the users</strong>. A <strong>precise definition of roles and permissions</strong> makes it possible to limit access to resources and to the various functionalities available on the platform. The various Azure IoT services provide a <strong>multitude of pre-configured roles</strong> that can be adapted to your needs and your organisation. Secondly, <strong>applying the principle of least privilege</strong>, and limiting the number of accounts with important privileges, allows you to <strong>improve the security level</strong> of your Azure IoT infrastructure.</p>
<p><strong>Azure CLI </strong>allows you to <strong>list the users with rights to the desired Azure IoT</strong> resource and their associated roles. The following command allows you to perform this action</p>
<table style="border-collapse: collapse; width: 100%; height: 129px;">
<tbody>
<tr style="height: 129px;">
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid; height: 129px;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #33cccc;"><span style="color: #ffff00;">az</span> <span style="color: #ffffff;">role assignment list</span> <span style="color: #808080;">&#8211;scope</span> &#8220;/subscriptions/&lt;ID_de_souscription&gt;/resourceGroups/&lt;Resource_Group&gt;/providers/Microsoft.Devices/IotHubs/&lt;IoT_Hub&gt;&#8221; <span style="color: #808080;">&#8211;include-inherited</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p><span style="font-size: revert; color: initial;">It is possible to use string selectors (Select-String for </span><strong style="font-size: revert; color: initial;">PowerShell</strong><span style="font-size: revert; color: initial;">, grep for </span><strong style="font-size: revert; color: initial;">Bash</strong><span style="font-size: revert; color: initial;">) to retrieve only the desired information.</span></p>
<p>In the example below, <strong>names, types</strong> and <strong>roles</strong> were the only items retrieved using Select-String:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20220 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png" alt="" width="852" height="802" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png 852w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-203x191.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-768x723.png 768w" sizes="auto, (max-width: 852px) 100vw, 852px" /></p>
<p>The Azure built-in roles feature is available on <a href="https://learn.microsoft.com/fr-fr/azure/role-based-access-control/built-in-roles">this page</a>.</p>
<p>Configuring <strong>alerts based on the metrics</strong> of your Azure IoT services is another tool to consider. Alerts can be configured to detect suspicious behaviour or anomalies, <strong>allowing for rapid investigation</strong> of your infrastructure. Azure provides its customers with a large collection of signals to define alert conditions. It is also possible to <strong>define custom alert signals </strong>via the query language used by Azure Log Analytics.</p>
<p>The <strong>Azure Portal</strong> is the easiest way to set up alerts based on the data collected by the IoT Hub. For example, to define a log alert rule, you need to:</p>
<ol style="text-align: justify;">
<li>Go to the management page of the desired IoT Hub;</li>
<li>Go to the Logs sub-category of the Monitoring category;</li>
<li>Choose a rule using the Azure Log Analytics language;</li>
<li>Add an alert rule related to this query;</li>
<li>Choose the operator, unit, threshold value, check recurrence and time period for the rule</li>
</ol>
<p style="text-align: justify;">These actions are summarised in the screenshots below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20210 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png" alt="" width="909" height="244" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png 909w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-437x117.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-768x206.png 768w" sizes="auto, (max-width: 909px) 100vw, 909px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20212 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png" alt="" width="824" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png 824w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-768x562.png 768w" sizes="auto, (max-width: 824px) 100vw, 824px" /></p>
<p>It will then be sufficient to choose an <strong>action group</strong> linked to a type of action (sending an email, SMS, etc.).</p>
<p>The example given will lead to an action if the number of failed connections of connected objects to the IoT Hub concerned exceeds 10 failures in 10 minutes or less.</p>
<p>A <a href="https://learn.microsoft.com/fr-fr/azure/azure-monitor/alerts/tutorial-log-alert">detailed guide</a> in the form of a tutorial is available on the Azure documentation. Note that this service is available at an additional cost.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">3rd vector of security: the service itself </span></h1>
<p>Finally, <strong>setting up proper configuration</strong> of Azure IoT services is a key element in improving the platform&#8217;s cyber maturity level. This includes options such as <strong>routing rules</strong> or setting the minimum version of TLS used by devices to connect to Azure IoT Hub.</p>
<p><strong>Routing rules</strong> are used to <strong>redirect messages</strong> from IoT devices to an endpoint (storage, services, database, etc.) and are configurable by routing requests. It is recommended to <strong>filter incoming messages</strong>, via routing requests, to increase the security of your IoT solution.</p>
<p><strong>Checking the minimum TLS version accepted</strong> can be done using the <strong>Azure CLI</strong>: indeed, an IoT Hub has the minTlsVersion attribute to check this property. This check is performed using the following command:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;minTlsVersion&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">Si cette commande <strong>ne retourne rien</strong>, ou retourne <strong>une valeur inférieure à 1.2</strong>, alors la configuration <strong>n’est pas satisfaisante</strong>.</p>
<p style="text-align: justify;">Le <strong>portail d’Azure</strong> permet également d’effectuer cette vérification</p>
<p>If this command <strong>returns nothing</strong>, or returns a <strong>value less than 1.2</strong>, then the configuration <strong>is not satisfactory</strong>.</p>
<p>The <strong>Azure portal</strong> also allows you to perform this check:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20214 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png" alt="" width="668" height="315" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png 668w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-405x191.png 405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-71x33.png 71w" sizes="auto, (max-width: 668px) 100vw, 668px" /></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>En synthèse</strong></h1>
<p><strong>Security is a major issue for IoT projects</strong>: Microsoft, with its Azure IoT product, provides an IoT platform that meets the majority of IoT needs in a secure manner, provided that it is configured correctly. In this article, we have discussed<strong> recommendations for improving the security</strong> of your Azure IoT infrastructure.</p>
<p>It is important to keep in mind that <strong>other attack vectors exist</strong>, such as hardware and software vulnerabilities and the networks used by IoT devices.  Securing an IoT infrastructure is a <strong>complex challenge that requires an end-to-end approach</strong>.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;"><em> </em></p>
<p style="text-align: center;"><em>With the help of Marius ANDRE</em></p>
<p style="text-align: justify;">[1] “Magic Quadrant for Global Industrial IoT Platforms”</p>
<p style="text-align: justify;"><a href="https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb">https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb</a></p>
<p style="text-align: justify;">[2] “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”</p>
<p style="text-align: justify;"><a href="https://www.rfc-editor.org/rfc/rfc5280">https://www.rfc-editor.org/rfc/rfc5280</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Redesigning your authorization model: the key issues (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/</link>
		
		<dc:creator><![CDATA[David GIORGETTI]]></dc:creator>
		<pubDate>Mon, 21 Dec 2020 09:13:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[ABAC]]></category>
		<category><![CDATA[Authorization model]]></category>
		<category><![CDATA[DAC]]></category>
		<category><![CDATA[GraphBAC]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[OrBAC]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14875</guid>

					<description><![CDATA[<p>Introduction DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity. Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: justify;">Introduction</h1>
<p style="text-align: justify;">DAC, RBAC, OrBAC, ABAC or GraphBAC? Flagship authorization models evolve regularly and each one brings its share of challenges, promises, and complexity.</p>
<p style="text-align: justify;">Over the last twenty years or so, during which the RBAC/OrBAC models seem to have prevailed, the difficulties of designing, implementing and maintaining an authorization model have remained the same, and there are few examples of perfectly satisfactory achievements.</p>
<p style="text-align: justify;"><strong>There are many questions about designing or redesigning one’s authorization model. In these two articles, we try to answer the most frequent ones.</strong></p>
<p style="text-align: justify;">Before we do that, let&#8217;s go back to some basic notions about authorization models.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">What is an authorization model?</h1>
<h2 style="text-align: justify;">A layer of abstraction…</h2>
<p style="text-align: justify;">An authorization model is a layer of abstraction that comes above technical entitlements (application rights, transactions, groups, etc.). It is made up of carefully defined objects (roles, profiles, etc.), with a name in natural language, and often organized hierarchically.</p>
<h2 style="text-align: justify;">… which simplifies the management of authorizations…</h2>
<p style="text-align: justify;">This layer of abstraction makes it possible to rationalize the number of objects to handle.</p>
<p style="text-align: justify;">For the business, it becomes easier to understand the available authorizations and to request or validate the appropriate rights.</p>
<p style="text-align: justify;">For IT and support teams, the burden of allocating authorizations is reduced overall. The implementation of automation tools can support a large part of the daily requests, allowing specific requests to be processed more carefully.</p>
<h2 style="text-align: justify;">… and improves security</h2>
<p style="text-align: justify;">Beyond the regulatory and normative dimensions of authorization management, often highlighted by Auditors during their work, the lack of control of authorizations is an open door to intrusions and misuse of the information system.</p>
<p style="text-align: justify;">Knowing one’s authorizations is a prerequisite for securing them, and the implementation of a model makes it possible to simplify the controls, particularly during review campaigns. It is indeed much easier for a manager to validate the allocation of a meaningful business role, rather than of a transaction with a very technical name.</p>
<p>&nbsp;</p>
<figure id="post-14878 media-14878" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14878 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/1-2-437x185.png" alt="" width="437" height="185" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2-768x325.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/1-2.png 1152w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Overview of possible models</h2>
<h3 style="text-align: justify;">DAC: Discretionary Access Control, aka no model at all!</h3>
<p style="text-align: justify;">What if the best model was the absence of a model? In some limited cases, especially if the number of authorizations or users is very limited, one can very well do without designing a model that would add an unnecessary layer of complexity. This implies, however, that the authorizations are sufficiently meaningful.</p>
<p>&nbsp;</p>
<figure id="post-14880 media-14880" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14880 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/2-2-437x166.png" alt="" width="437" height="166" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-437x166.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2-768x292.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/2-2.png 1063w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">RBAC: Role-Based Access Control</h3>
<p style="text-align: justify;">The RBAC model allows to group the authorizations required to perform a function within a company (business, mission, project&#8230;) in “roles”. These roles are then assigned in lieu of discretionary authorizations. They can be organized hierarchically, for example by subdividing “business roles” into “application roles”.</p>
<p>&nbsp;</p>
<figure id="post-14882 media-14882" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14882 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/3-2-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/3-2.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">OrBAC: Organization-Based Access Control</h3>
<p style="text-align: justify;">The OrBAC model is a variant of the RBAC model in which the entities that make up a company are one of the modeling dimensions. Each user then has one or more roles depending on which team(s) they belong to.</p>
<p>&nbsp;</p>
<figure id="post-14884 media-14884" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14884 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/4-1-437x144.png" alt="" width="437" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-437x144.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1-768x254.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/4-1.png 1233w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">ABAC: Attribute-Based Access Control</h3>
<p style="text-align: justify;">The allocation of authorizations via the ABAC model is handled through a set of rules based on attributes related to users, resources themselves, or the environment. This allocation is often “dynamic”, meaning that the authorization to access an application or part of an application is evaluated at the moment the user tries to access it. In practice, it is possible to set up an ABAC model that takes advantage of user&#8217;s roles, as in the RBAC model.</p>
<p>&nbsp;</p>
<figure id="post-14886 media-14886" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14886 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/5-1-437x154.png" alt="" width="437" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-437x154.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1-768x270.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/5-1.png 1353w" sizes="auto, (max-width: 437px) 100vw, 437px" /></figure>
<p>&nbsp;</p>
<h3 style="text-align: justify;">GraphBAC: Graph-Based Access Control</h3>
<p style="text-align: justify;">The GraphBAC or GBAC model is based on the representation of authorizations using a graph linking objects (file, user account…) through various relationships (link between collaborator and manager, belonging to a structure, possession of a file…). The authorizations are then the result of queries on this graph, which allows to give access to a resource according to its relationship with other objects.</p>
<p>&nbsp;</p>
<figure id="post-14888 media-14888" class="align-none"><img loading="lazy" decoding="async" class="size-medium wp-image-14888 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/6-1-395x191.png" alt="" width="395" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/6-1.png 1326w" sizes="auto, (max-width: 395px) 100vw, 395px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Market vision</h2>
<p style="text-align: justify;">The table below compares in a very synthetic way the different authorization models that we have just seen.</p>
<table class=" aligncenter" style="width: 601px;" width="601">
<tbody>
<tr>
<td width="120"><strong>Authorization model</strong></td>
<td width="120"><strong>Ease of implementation and management of the model</strong></td>
<td width="120"><strong>Possibilities</strong></td>
<td width="120"><strong>Market presence</strong></td>
<td width="120"><strong>Trend</strong></td>
</tr>
<tr>
<td width="120">No model</td>
<td width="120">n/a</td>
<td width="120">&#8212;</td>
<td width="120">Marginal</td>
<td width="120">à</td>
</tr>
<tr>
<td width="120">RBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Very common</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">OrBAC</td>
<td width="120">+</td>
<td width="120">+</td>
<td width="120">Frequent</td>
<td width="120">Ú</td>
</tr>
<tr>
<td width="120">ABAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Rare</td>
<td width="120">Þ</td>
</tr>
<tr>
<td width="120">GraphBAC</td>
<td width="120">&#8211;</td>
<td width="120">++</td>
<td width="120">Very rare</td>
<td width="120">Þ</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">
<p>&nbsp;</p>
<h1 style="text-align: left;">The most common questions about authorization models</h1>
<h2 style="text-align: left;">What should my empowerment model be used for?</h2>
<p style="text-align: justify;">Setting up an authorization model can be complex, costly, and time-consuming. Therefore, it is crucial to study the needs in depth and to clearly define expectations. As mentioned in the introduction, the implementation of an authorization model can help address access security issues, meet regulatory objectives, but also simplify the user experience and improve the efficiency of Identity &amp; Access Management (IAM) processes. One of the key success factors for an authorization modeling project is the ability to express the expectations precisely, using KPIs if necessary: reducing the time required for a manager to grant accesses when an new employee joins to 15 minutes, mitigating 90% of risks considered critical, etc.</p>
<h2 style="text-align: left;">Who should I involve to build, instantiate, and keep my model alive?</h2>
<p style="text-align: justify;">Given the cross-cutting nature and scale of the transformation induced by a change or creation of an authorization model, a strong governance is necessary.</p>
<p style="text-align: justify;">It is preferable to involve a sponsor with high visibility from the EXCOM, who will be able to provide support, and obtain strong engagement from the business, the first concerned by the changes, and from application managers, who will be heavily involved during the design and implementation phases. Key contacts can also be identified, so that they can help different teams within the organization (HR, IT, Internal Control…).</p>
<p style="text-align: justify;">Beyond the project phase, it is also necessary to identify the actors who will be in charge of keeping the model alive. A key success factor in the implementation of an authorization model is the identification of role owners. If each role includes only authorizations from a single application, one can easily to turn to the application manager, but in most cases, each role is made up of authorizations from various applications.</p>
<p style="text-align: justify;">The ideal is to find someone who has both knowledge of business processes, company organization, applications, and an understanding of security rules: it&#8217;s a difficult exercise! Otherwise, a small team combining the different area of expertise should be able to perform this function.</p>
<h2 style="text-align: left;">Do I have to include “fine-grained authorizations”? The “perimeters”? How granular should my model be?</h2>
<p style="text-align: justify;">The world of entitlements is as vast as the multitude of existing applications, and the use cases that an authorization model must cover are numerous.</p>
<p style="text-align: justify;">The topic of fine-grained authorizations and perimeter management regularly comes up during the design phase: should they be included in the model or not? There is no predefined answer.</p>
<p style="text-align: justify;">It is perfectly conceivable, in some cases, to restrict the model only to the binary access to the application (yes/no), and to leave the management of the fine-grained authorizations and perimeters in the hands of the application manager and their team. The request form may then provide a text field to provide additional information. This results in less auditability, but the management of requests is simplified.</p>
<p style="text-align: justify;">If we decide to include the concept of perimeter, we must choose between a cross-implementation, in which we create as many roles as there are combinations between authorizations and perimeters (possibly increasing significantly the number of roles), and a separate implementation, where the authorizations are created on one hand and the perimeters on the other.</p>
<p style="text-align: justify;">It is probably best to deal with this issue separately, even if it means creating roles combined with their perimeter in the future, depending on the real use cases: the resulting model thus has a more reasonable size.</p>
<h2 style="text-align: justify;">What should I include in my model? What about physical accesses and physical <em>assets?</em></h2>
<p style="text-align: justify;">Including all the authorizations within one’s model is extremely difficult, if not impossible given the wide variety of cases, and for the sake of project efficiency.</p>
<p style="text-align: justify;">The goal of the model must always be kept in sight. For example, if the goal is to improve the user experience when requesting rights, it is better to prioritize the processing of business-oriented authorizations, which are likely to be allocated frequently, over little-used technical authorizations.</p>
<p style="text-align: justify;">In addition, it may be tempting to include physical access (premises, specific rooms, etc.) or physical <em>assets</em> (badges, PCs, telephones, etc.) in its authorization model, as they are part of the means that employees must have to work, just like logical accesses.</p>
<p style="text-align: justify;">Again, there are no major prohibitions, and some companies may well manage access to their premises within their authorization model, but as a general rule, physical access and <em>assets</em> are rarely part of it.</p>
<p style="text-align: justify;">An IAM solution may however help manage them properly:</p>
<ul style="text-align: justify;">
<li>By centralizing requests, sent to different actors or systems upon arrival of a collaborator. This “arrival package” then includes both logical accesses (accounts and default rights) as well as physical resources.</li>
<li>By providing a reference source for data and events related to a person. This information, especially arrival/departure dates, is shared with badge management systems to manage the badge lifecycle.</li>
</ul>
<p style="text-align: justify;">
<p>&nbsp;</p>
<p style="text-align: justify;"><em>We have just addressed four initial questions to carry out a project to overhaul an authorization model. Other questions will be detailed in a second article, to be published shortly.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/redesigning-your-authorization-model-the-key-issues-1-2/">Redesigning your authorization model: the key issues (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
