ANALYZING ACCESS CONTROL CONFIGURATIONS
1 Assignment
0 Petitions
Accused Products
Abstract
A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between principals and resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that privilege escalation is possible.
13 Citations
37 Claims
-
1-17. -17. (canceled)
-
18. A computer-readable storage medium encoded with computer-executable instructions that, when executed, perform a method of analyzing access control configurations, the method comprising:
-
generating an information flow based on access control relations, an access control mechanism model, and an access control policy model; determining, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicating in a vulnerability report that the privilege escalation is possible. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of analyzing access control configurations, the method comprising:
-
generating an information flow based on access control relations, an access control mechanism model, and an access control policy model; determining, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicating in a vulnerability report that privilege escalation is possible. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A system for analyzing access control configurations, the system comprising:
-
at least one memory and at least one processor; an operating system having resources and identifications of principals; an information flow component configured to generate an information flow based on access control relations, an access control mechanism model, and an access control policy model; an escalation checking component configured to determine, based on the generated information flow, whether privilege escalation is possible; and a vulnerability report generator configured to, when privilege escalation is possible, generate a vulnerability report indicating that privilege escalation is possible. - View Dependent Claims (33, 34, 35, 36, 37)
-
Specification