DZone
Security Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Security Zone > The ABCs of ABAC: Multidimensional Security in the Digital Age

The ABCs of ABAC: Multidimensional Security in the Digital Age

In this article, we discuss the benefits that using a Attribute-Based Access Control (ABAC) security system can bring to enterprise security solutions.

Gerry Gebel user avatar by
Gerry Gebel
·
Apr. 20, 17 · Security Zone · Opinion
Like (5)
Save
Tweet
3.05K Views

Join the DZone community and get the full member experience.

Join For Free

The digital age is continuously bringing us new security challenges. Cyberattacks are happening every day, throughout every industry, and hackers are continuously learning new techniques, becoming smarter and smarter. Meanwhile, our data becomes more and more vulnerable.

As new technologies continually emerge, enterprises are always looking for the best ways to secure their most critical business assets. Whether an organization needs to secure data stored in the cloud, secure data stored in Hadoop, or secure access to applications, an Attribute-Based Access Control (ABAC) model is the way to go for the digital age.

ABAC meets ever-evolving security challenges in the digital age and enforces enterprise-wide access based on business policies and regulations. ABAC moves beyond Role-Based Access Control (RBAC) models and succeeds where RBAC falls short.

Why the Role-Based Access Control (RBAC) Model Fails

With RBAC, access control is based on user roles and the permissions associated with those roles. But the RBAC model starts to fail when the number of access control use cases grows beyond a given point and becomes unmanageable. This leads to a problem in the IT world known as “role explosion.”

The other issue with RBAC involves Segregation of Duties (SoD). RBAC models are only two-dimensional and don’t allow for complex relationships. For example, within a hospital, we may want to give a nurse the ability to access some patients records, but not others. Unfortunately, RBAC doesn’t have a mechanism for implementing SoD in this example. We would have to rely on the application developer to implement the checks within the source code. This, in turn, leads to poor audit visibility and access review capabilities.

ABAC moves beyond Role-Based Access Control (RBAC) models to a truly context-aware multidimensional model.

The Future of Data Security: Attribute-Based Access Control (ABAC)

Unlike RBAC, ABAC has the ability to employ user attributes, action attributes, context attributes (such as time, device, and location), resource attributes (a record’s sensitivity), and much more. The fact that we can use attributes that describe virtually any scenario makes ABAC multi-dimensional.

With attributes in place, policies can be built to govern access in a way that’s dynamic, scalable and centralized. Let’s use the hospital example again. Say you are a nurse in the intensive care unit, how do we implement your authorization requirements based on those attributes? We need a medium that will allow us to do that. ABAC uses a policy language called the eXtensible Access Control Markup Language (XACML). Using this language, we can combine attributes in order to implement our policy requirements.

Say, for example, we have the requirement: “nurses can view and update records for patients assigned to the same department as the nurse.” XACML allows us to take the attributes used in this sentence (nurse, view, update, records, patients, and department) and translate it directly into machine language used to enforce the natural language policy. In our example, users with the role of “Nurse” within department “Intensive Care Unit” can do the action “view” and “update” on objects of type “patient records” in the department “Intensive Care Unit.” Because we can use variables in the policy language, a single policy can be applied to any department in the hospital - greatly simplifying ongoing maintenance and operations.

Using XACML, policies can be written to satisfy extremely complex requirements. XACML policies help to make ABAC extremely flexible and expressive to both share and limit access as conditions dictate.

ABAC provides a multi-dimensional system that through its use of attributes and policies prevents role explosion, increases scalability, enables relationships, eliminates SoD conflicts, and externalizes authorization for ease of management control.

In addition, ABAC allows organizations to comply with an ever-growing body of regulations in demanding regulatory environments across industries. Lastly, ABAC bridges the gap between business and IT. Where RBAC led to opaque and complex configurations that were hard to understand and audit, ABAC uses human-readable policies that can be quickly analyzed and shared with auditors and compliance managers, thereby closing the loop on access reviews.

Access control has evolved to meet the changing security challenges organizations face in the digital age. Attribute Based Access Control is now the standard model for organizations confronted by the need for a robust and flexible solution to today’s complex security threats.

security Role-based access control Attribute (computing)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • What Is Data Analytics? Understanding Data Analytics Techniques
  • How to Translate Value to Executives Using an Outcome-Driven Mindset
  • Top ALM Tools and Solutions Providers
  • Change Data Capture to Accelerate Real-Time Analytics

Comments

Security Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo