Access Control Policy Enforcement for Zero-Trust-Networking

被引:0
|
作者
Vanickis, Romans [1 ]
Jacob, Paul [1 ]
Dehghanzadeh, Sohelia [1 ]
Lee, Brian [1 ]
机构
[1] Athlone Inst Technol, Software Res Inst, Athlone, Ireland
关键词
zero trust networking; risk-based access control; trust; policy enforcement; firewall; network zone; micro-segment;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal with challenges such as mobility, virtualized infrastructures, dynamic and heterogeneous user contexts and transaction-based interactions. The uncertainty introduced by such dynamicity introduces greater uncertainty into the access control process and motivates the need for risk-based access control decision making. Thus, the traditional perimeter-based security paradigm is increasingly being abandoned in favour of a so called "zero trust networking" (ZTN). In ZTN networks are partitioned into zones with different levels of trust required to access the zone resources depending on the assets protected by the zone. All accesses to sensitive information is subject to rigorous access control based on user and device profile and context. In this paper we outline a policy enforcement framework to address many of open challenges for risk-based access control for ZTN. We specify the design of required policy languages including a generic firewall policy language to express firewall rules. We design a mechanism to map these rules to specific firewall syntax and to install the rules on the firewall. We show the viability of our design with a small proof-ofconcept.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Efficient routing for middlebox policy enforcement in software-defined networking
    Li, Xin
    Wu, Haotian
    Gruenbacher, Don
    Scoglio, Caterina
    Anjali, Tricha
    [J]. COMPUTER NETWORKS, 2016, 110 : 243 - 252
  • [42] Privacy Policy Enforcement For Health Information Data Access
    Currim, Faiz
    Jung, Eunjin
    Xiao, Xin
    Jo, Insoon
    [J]. 1ST ACM INTERNATIONAL WORKSHOP ON MEDICAL-GRADE WIRELESS NETWORKS, 2009, : 39 - 44
  • [43] CAPE: Continuous Access Policy Enforcement for IoT Deployments
    Alkhresheh, Ashraf
    Elgazzar, Khalid
    Hassanein, Hossam S.
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1576 - 1581
  • [44] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [45] Blockaid: Data Access Policy Enforcement forWeb Applications
    Zhang, Wen
    Sheng, Eric
    Chang, Michael
    Panda, Aurojit
    Sagiv, Mooly
    Shenker, Scott
    [J]. PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2022, 2022, : 701 - 718
  • [46] An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine
    Bhatt, Smriti
    Patwa, Farhan
    Sandhu, Ravi
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 37 - 45
  • [47] Research on Zero Trust Access Control Model and Formalization Based on Rail Transit Data Platform
    Yu, Wenjuan
    Zhang, Lei
    [J]. 2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 689 - 695
  • [48] Trust Calculation and Delivery Control in Trust-Based Access Control
    LEI Jianyun1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 765 - 768
  • [49] Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
    Sudakshina Mandal
    Danish Ali Khan
    Sarika Jain
    [J]. New Generation Computing, 2021, 39 : 599 - 622
  • [50] Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic
    Mandal, Sudakshina
    Khan, Danish Ali
    Jain, Sarika
    [J]. NEW GENERATION COMPUTING, 2021, 39 (3-4) : 599 - 622