Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

05/02/2022
by   Mikhail Kazdagli, et al.
0

Modern software systems rely on mining insights from business sensitive data stored in public clouds. A data breach usually incurs significant (monetary) loss for a commercial organization. Conceptually, cloud security heavily relies on Identity Access Management (IAM) policies that IT admins need to properly configure and periodically update. Security negligence and human errors often lead to misconfiguring IAM policies which may open a backdoor for attackers. To address these challenges, first, we develop a novel framework that encodes generating optimal IAM policies using constraint programming (CP). We identify reducing dark permissions of cloud users as an optimality criterion, which intuitively implies minimizing unnecessary datastore access permissions. Second, to make IAM policies interpretable, we use graph representation learning applied to historical access patterns of users to augment our CP model with similarity constraints: similar users should be grouped together and share common IAM policies. Third, we describe multiple attack models and show that our optimized IAM policies significantly reduce the impact of security attacks using real data from 8 commercial organizations, and synthetic instances.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 6

page 7

page 8

page 9

research
09/25/2018

Analyzing CDR/IPDR data to find People Network from Encrypted Messaging Services

Organizations maintaining personal details of their users have to adhere...
research
04/11/2020

A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

Role-Based Access Control (RBAC) is a popular model which maps roles to ...
research
04/30/2020

Cloud+: A safe and restrained data access control program for cloud

Secure distributed storage, which is a rising cloud administration, is p...
research
07/07/2023

CloudSec: An Extensible Automated Reasoning Framework for Cloud Security Policies

Users increasingly create, manage and share digital resources, including...
research
03/22/2022

Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing

While more organizations have been trying to move their infrastructure t...
research
02/13/2020

Dynamic Role-Based Access Control for Decentralized Applications

Access control management is an integral part of maintaining the securit...
research
01/17/2022

End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates

Data exchange among value chain partners provides them with a competitiv...

Please sign up or login with your details

Forgot password? Click here to reset