|
Managing ACLs in a distributed system
Bhatt, Sandeep; Horne, Bill; Rajagopalan, S.; Rao, Prasad
HPL-2007-171
Keyword(s): access control, validation, configuration generation, e
nd-to-end requirements
Abstract: Managing access control in a distributed system is a challenge. Components across the technology stack - network devices, infrastructure servers, and software applications - contain access control lists. Managing these ACLs requires skilled administrators, often from different organizations and at different sites. Moreover, the ACLs must be coordinated to satisfy the high-level, end-to-end access requirements of the enterprise. Current procedures to coordinate ACLs are manual; not only is this slow and costly, but it is prone to sub tle errors. A significant problem stems from the fact that there can be multiple ways to access a resource; some of these paths are indirect, transiting through multiple component applications, making them hard to find. When access to a resource must be blocked, every path - direct and indirect - must be blocked. The inability to determine all access paths is one cause of poorly configured and vul nerable systems. This report presents a systematic approach to manage ACLs in a distributed system. We describe our prototype system, Vantage, and illustrate its use in managing 3-tier web architectures to comply with end- to-end access requirements. Our approach is based on models that capture the input-output behavior of individual components; the models are designed to allow efficient and scalable algorithms to analyze systems and to generate component ACLs that are compliant with end-to-end access requirements
16 Pages
Back to Index
|