SlideShare uma empresa Scribd logo
1 de 28
XACML pilot at a large Dutch bank
Using XACML to implement context-
enhanced authorizations
Maarten Wegdam, Novay
With contributions of Martijn Oostdijk, Novay
XACML seminar, 26 April 2012




                            www.novay.nl | maarten.wegdam@novay.nl
                            | +31 53 4850414 | @maartenwegdam |
                            http://maarten.wegdam.name (blog) |
                            http://www.linkedin.com/in/wegdam
formerly Telematica
    research & advice
                                Instituut




                               innovation projects
    multi-disciplinairy, ~50
                               (government, financial, health)
     researchers/advisors




2
digital identity,
    Managing Advisor                                    privacy, trust

                                          Maarten
                                         Maarten
                                          Wegdam
                                        Wegdam
      PhD in computer                                   CV: KPN Research,
    science (RuG, UT)                                   Bell Labs, UD@UT




3        XACML pilot - context-enhanced authorization
Authorization & Context?




                                                     (Attribute Based
                                                     Access Control)




4     XACML pilot - context-enhanced authorization
Context-enhanced authz

    • XACML pilot at a large Dutch bank
    • Context = location and more
    • DYNAMIC!! policies
    • Usefulness through use cases +
      feasibility study through demonstrator
    • Scope: employees



5   XACML pilot - context-enhanced authorization
CEA – the movie
    http://youtu.be/lGUprbxJNvE




6   XACML pilot - context-enhanced authorization
I will NOT discuss
    • ABAC
    • XACML

    So I have MORE TIME FOR
    • Context-enhanced authz
    • Use case + demonstrator
    • Lessons learned


7    XACML pilot - context-enhanced authorization
Context and examples
                                 Environment                                   Social
                                                      Physiological
                                    • security                              • SN friends
                                    incidents
                                                       • heart rate
                                                                          • activity twitter




                                    Location
                                 • cell-id, GPS             Time              Mental
                                    • country          • office hours       • stressed
                                   • proximity



                                                                             Activities
                                    Network                Device
                                                                            • travelling
                                     • VPN                 • type
                                                                             • meeting
                                     • Wifi             • ownership
                                                                             • sleeping


8                          XACML pilot - context-enhanced authorization
Use-cases – a high level …

    Read-only outside the office for transactions


    Used device


    User proximity


    Data loss prevention when travelling


9       XACML pilot - context-enhanced authorization
Demonstrator
      Proximity
       dongle                         User                   Application

     NFC reader
                               Context client

       Google
       Latitude

                                                             Policies
       Outlook                                      Policy
                                                    Engine
       Google
      Calendar                                                    Policies incl.
                                                                  ctxt variables
                                   Context
     Device Mgmt                   server

10         XACML pilot - context-enhanced authorization
11   XACML pilot - context-enhanced authorization
12   XACML pilot - context-enhanced authorization
13   XACML pilot - context-enhanced authorization
Our approach: authZ levels
     All
     • @office, proximity, IT-dept. mngd laptop

     A lot
     • @home, proximity, IT-dept. mngd laptop, 6.00-23.00

     Some
     • @office, user mngd (registered) iPad, agenda, 06.00-23.00
     • IT-dept. mngd laptop, proximity, agenda, time in 6.00-23.00

     A little
     • Proximity, registered device

     Nothing

14           XACML pilot - context-enhanced authorization
15   XACML pilot - context-enhanced authorization
16   XACML pilot - context-enhanced authorization
17   XACML pilot - context-enhanced authorization
LESSONS LEARNED


18     XACML pilot - context-enhanced authorization
Main lesson

     YES we can 
 It is useful

 It is feasible using XACML
 tooling

 BUT … (next slides)


19       XACML pilot - context-enhanced authorization
Context – low-hanging fruit
     Location, location, location
     Stuff derived from location
     Used device (BYOD, enterprise mobility etc)
     Used network (VPN/local, access point etc)
     Time-of-day
     Security incidents / events
     And of course normal usage patterns

         Please note: context is just an attribute
20
         for XACML, but then dynamic
     XACML pilot - context-enhanced authorization
Quality of context

     Sensors have limitations


     Context is vague
      (probability, accuracy, outdated)

     Requires knowing how vague, and
     combining context: not trivial!

21   XACML pilot - context-enhanced authorization
Authenticity of context

     Attack by faking or disabling context sources

     We need verification
     • Rely on trusted sources, e.g., company owned
     • Combining multiple sources (cf. quality of context)
     • Context history
     Depends very much on specific scenario


22      XACML pilot - context-enhanced authorization
Trust in context vs usefullness



   needed
   trust in
 authenticity
  of context




23          XACML pilot - context-enhanced authorization
Context is privacy sensitive

     Minimize privacy consequences
      • Limit (centralized) storage
      • Minimize sensing
      • Privacy-by-design, PETs etc
     Acceptance
      • Ensure sufficient benefit for the users!!!
      • Transparency & consent

24   XACML pilot - context-enhanced authorization
Complexity of policies


     Context will increase complexity
     • Complete and conflict free

     Expressing context at high abstraction helps

     Not too high: lose quality and authenticity

     We defined discrete ‘authz levels’


25     XACML pilot - context-enhanced authorization
Scalability & performance

     Typical XACML attribute are static,
     context is not: perf & scalability challenge

     No more caching 

     Pre-fetching context helps performance,
     bad for scalability

26     XACML pilot - context-enhanced authorization
Centralization - take authz out of the application (cf
                  authn)
 Key take-aways

                  Use attributes (ABAC), XACML is the standard to do
                  this multi-vendor and across domains

                  Our pilot: use dynamic attributes (i.e., context)

                  Yes it is useful, yes it is feasible

                  But w.r.t. context: authenticity, quality & privacy

                  But w.r.t. dyn attributes / XACML: complexity of
                  policies & scalability/performance

27                  XACML pilot - context-enhanced authorization
More information
     • Project page @Novay
        • http://www.novay.nl/okb/projects/context-enhanced-authorization/12435
        • Whitepaper: Feasibility of Context-enhanced Authorization , in the banking
          sector
     • Blogposts with more technical XACML experiences
        • http://martijno.blogspot.com/2012/02/xacml-with-tivoli-security-policy.html
     • Ack: Martijn Oostdijk, Bob Hulsebosch, Jaap Reitsma, Ruud
       Kosman & other Novay colleagues, IBM, Rabobank

       www.novay.nl | maarten.wegdam@novay.nl
       | +31 53 4850414 | @maartenwegdam |
       http://maarten.wegdam.name (blog) |
       http://www.linkedin.com/in/wegdam

28            XACML pilot - context-enhanced authorization

Mais conteúdo relacionado

Semelhante a XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations

Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesAl Sabawi
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumJonas Bonér
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropIBM Danmark
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote addressthreesixty
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcasttervela
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationMartijn Oostdijk
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019Stavros Zervoudakis
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013Bill Burns
 

Semelhante a XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations (20)

Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge Continuum
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat Wardrop
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcast
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced Authorization
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 

Mais de wegdam

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...wegdam
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studywegdam
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...wegdam
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemwegdam
 
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)wegdam
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen datawegdam
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielwegdam
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenwegdam
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...wegdam
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...wegdam
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)wegdam
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...wegdam
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatiewegdam
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventwegdam
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29wegdam
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)wegdam
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)wegdam
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...wegdam
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)wegdam
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010wegdam
 

Mais de wegdam (20)

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case study
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystem
 
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en technieken
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatie
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA event
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations

  • 1. XACML pilot at a large Dutch bank Using XACML to implement context- enhanced authorizations Maarten Wegdam, Novay With contributions of Martijn Oostdijk, Novay XACML seminar, 26 April 2012 www.novay.nl | maarten.wegdam@novay.nl | +31 53 4850414 | @maartenwegdam | http://maarten.wegdam.name (blog) | http://www.linkedin.com/in/wegdam
  • 2. formerly Telematica research & advice Instituut innovation projects multi-disciplinairy, ~50 (government, financial, health) researchers/advisors 2
  • 3. digital identity, Managing Advisor privacy, trust Maarten Maarten Wegdam Wegdam PhD in computer CV: KPN Research, science (RuG, UT) Bell Labs, UD@UT 3 XACML pilot - context-enhanced authorization
  • 4. Authorization & Context? (Attribute Based Access Control) 4 XACML pilot - context-enhanced authorization
  • 5. Context-enhanced authz • XACML pilot at a large Dutch bank • Context = location and more • DYNAMIC!! policies • Usefulness through use cases + feasibility study through demonstrator • Scope: employees 5 XACML pilot - context-enhanced authorization
  • 6. CEA – the movie http://youtu.be/lGUprbxJNvE 6 XACML pilot - context-enhanced authorization
  • 7. I will NOT discuss • ABAC • XACML So I have MORE TIME FOR • Context-enhanced authz • Use case + demonstrator • Lessons learned 7 XACML pilot - context-enhanced authorization
  • 8. Context and examples Environment Social Physiological • security • SN friends incidents • heart rate • activity twitter Location • cell-id, GPS Time Mental • country • office hours • stressed • proximity Activities Network Device • travelling • VPN • type • meeting • Wifi • ownership • sleeping 8 XACML pilot - context-enhanced authorization
  • 9. Use-cases – a high level … Read-only outside the office for transactions Used device User proximity Data loss prevention when travelling 9 XACML pilot - context-enhanced authorization
  • 10. Demonstrator Proximity dongle User Application NFC reader Context client Google Latitude Policies Outlook Policy Engine Google Calendar Policies incl. ctxt variables Context Device Mgmt server 10 XACML pilot - context-enhanced authorization
  • 11. 11 XACML pilot - context-enhanced authorization
  • 12. 12 XACML pilot - context-enhanced authorization
  • 13. 13 XACML pilot - context-enhanced authorization
  • 14. Our approach: authZ levels All • @office, proximity, IT-dept. mngd laptop A lot • @home, proximity, IT-dept. mngd laptop, 6.00-23.00 Some • @office, user mngd (registered) iPad, agenda, 06.00-23.00 • IT-dept. mngd laptop, proximity, agenda, time in 6.00-23.00 A little • Proximity, registered device Nothing 14 XACML pilot - context-enhanced authorization
  • 15. 15 XACML pilot - context-enhanced authorization
  • 16. 16 XACML pilot - context-enhanced authorization
  • 17. 17 XACML pilot - context-enhanced authorization
  • 18. LESSONS LEARNED 18 XACML pilot - context-enhanced authorization
  • 19. Main lesson YES we can  It is useful It is feasible using XACML tooling BUT … (next slides) 19 XACML pilot - context-enhanced authorization
  • 20. Context – low-hanging fruit Location, location, location Stuff derived from location Used device (BYOD, enterprise mobility etc) Used network (VPN/local, access point etc) Time-of-day Security incidents / events And of course normal usage patterns Please note: context is just an attribute 20 for XACML, but then dynamic XACML pilot - context-enhanced authorization
  • 21. Quality of context Sensors have limitations Context is vague (probability, accuracy, outdated) Requires knowing how vague, and combining context: not trivial! 21 XACML pilot - context-enhanced authorization
  • 22. Authenticity of context Attack by faking or disabling context sources We need verification • Rely on trusted sources, e.g., company owned • Combining multiple sources (cf. quality of context) • Context history Depends very much on specific scenario 22 XACML pilot - context-enhanced authorization
  • 23. Trust in context vs usefullness needed trust in authenticity of context 23 XACML pilot - context-enhanced authorization
  • 24. Context is privacy sensitive Minimize privacy consequences • Limit (centralized) storage • Minimize sensing • Privacy-by-design, PETs etc Acceptance • Ensure sufficient benefit for the users!!! • Transparency & consent 24 XACML pilot - context-enhanced authorization
  • 25. Complexity of policies Context will increase complexity • Complete and conflict free Expressing context at high abstraction helps Not too high: lose quality and authenticity We defined discrete ‘authz levels’ 25 XACML pilot - context-enhanced authorization
  • 26. Scalability & performance Typical XACML attribute are static, context is not: perf & scalability challenge No more caching  Pre-fetching context helps performance, bad for scalability 26 XACML pilot - context-enhanced authorization
  • 27. Centralization - take authz out of the application (cf authn) Key take-aways Use attributes (ABAC), XACML is the standard to do this multi-vendor and across domains Our pilot: use dynamic attributes (i.e., context) Yes it is useful, yes it is feasible But w.r.t. context: authenticity, quality & privacy But w.r.t. dyn attributes / XACML: complexity of policies & scalability/performance 27 XACML pilot - context-enhanced authorization
  • 28. More information • Project page @Novay • http://www.novay.nl/okb/projects/context-enhanced-authorization/12435 • Whitepaper: Feasibility of Context-enhanced Authorization , in the banking sector • Blogposts with more technical XACML experiences • http://martijno.blogspot.com/2012/02/xacml-with-tivoli-security-policy.html • Ack: Martijn Oostdijk, Bob Hulsebosch, Jaap Reitsma, Ruud Kosman & other Novay colleagues, IBM, Rabobank www.novay.nl | maarten.wegdam@novay.nl | +31 53 4850414 | @maartenwegdam | http://maarten.wegdam.name (blog) | http://www.linkedin.com/in/wegdam 28 XACML pilot - context-enhanced authorization