Model Checking Access Control Policies: A Case Study using Google Cloud IAM

03/29/2023
by   Antonios Gouglidis, et al.
0

Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles. This paper aims to demonstrate how to formally verify access control policies. Model checking is used to verify access control properties against policies supported by an access control model. The authors consider Google's Cloud Identity and Access Management (IAM) as a case study and follow NIST's guidelines to verify access control policies automatically. Automated verification using model checking can serve as a valuable tool and assist administrators in assessing the correctness of access control policies. This enables checking violations against security principles and performing security assessments of policies for compliance purposes. The authors demonstrate how to define Google's IAM underlying role-based access control (RBAC) model, specify its supported policies, and formally verify a set of properties through three examples.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2020

N-PAT: A Nested Model-Checker

N-PAT is a new model-checking tool that supports the verification of nes...
research
05/15/2018

Towards Integrated Modelling of Dynamic Access Control with UML and Event-B

Role-Based Access Control (RBAC) is a popular authorization model used t...
research
07/01/2020

Query Based Access Control for Linked Data

In recent years we have seen significant advances in the technology used...
research
01/22/2018

ACGreGate: A Framework for Practical Access Control for Applications using Weakly Consistent Databases

Scalable and highly available systems often require data stores that off...
research
10/31/2021

A Graphical Framework for the Category-Based Metamodel for Access Control and Obligations

We design a graph-based framework for the visualisation and analysis of ...
research
12/19/2018

Using the decision support algorithms combining different security policies

During the development of the security subsystem of modern information s...
research
12/23/2019

The TLA+ Toolbox

We discuss the workflows supported by the TLA+ Toolbox to write and veri...

Please sign up or login with your details

Forgot password? Click here to reset