ANALYZING ACCESS CONTROL CONFIGURATIONS
2 Assignments
0 Petitions
Accused Products
Abstract
A facility is described for analyzing access control configurations. In various embodiments, the facility comprises an operating system having resources and identifications of principals, the principals having access control privileges relating to the resources, the access control privileges described by access control metadata; an access control scanner component that receives the access control metadata, determines relationships between the principals and the resources, and emits access control relations information; and an access control inference engine that receives the emitted access control relations information and an access control policy model, analyzes the received information and model, and emits a vulnerability report. In various embodiments, the facility generates an information flow based on access control relations, an access control mechanism model, and an access control policy model; determines, based on the generated information flow, whether privilege escalation is possible; and when privilege escalation is possible, indicates in a vulnerability report that the privilege escalation is possible.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A system for analyzing access control, the system comprising:
-
at least one memory; at least one processor; an operating system having resources and principals; an information flow module configured to generate an information flow comprising inferred read, write, and execute relations between one or more of the principals and one or more of the resources; an escalation checking module configured to determine, based on applying an access control policy model to the inferred read, write, and execute relations of the generated information flow, that one or more privilege escalations are possible; and a vulnerability report generation module configured to indicate in a vulnerability report that one or more privilege escalations are possible; wherein the vulnerability report comprises one or more hierarchical structures, and wherein each hierarchical structure comprises; a root element identifying a privilege escalation of the one or more privilege escalations; and a derivation comprising one or more non-root elements that are descendants of the root element and identify the source of each of the privilege escalations. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for analyzing access control, the method comprising:
-
generating an information flow comprising inferred read, write, and execute relations between one or more principals and one or more resources; determining, based on applying an access control policy model to the inferred read, write, and execute relations of the generated information flow, that one or more privilege escalations are possible; and indicating in a vulnerability report that one or more privilege escalations are possible; wherein the vulnerability report comprises one or more hierarchical structures, and wherein each hierarchical structure comprises; a root element identifying a privilege escalation of the one or more privilege escalations; and a derivation comprising one or more non-root elements that are descendants of the root element and identify the source of the privilege escalation. - View Dependent Claims (31, 32, 33, 34)
-
-
35. A computer-readable memory device encoded with computer-executable instructions that, when executed by a computing system, cause the computing system to perform operations for analyzing access control, the operations comprising:
-
generating an information flow comprising inferred read, write, and execute relations between one or more principals and one or more resources; determining, based on applying an access control policy model to the inferred read, write, and execute relations of the generated information flow, that one or more privilege escalations are possible; and indicating in a vulnerability report that one or more privilege escalations are possible; wherein the vulnerability report comprises one or more hierarchical structures, and wherein each hierarchical structure comprises; a root element identifying a privilege escalation of the one or more privilege escalations; and a derivation comprising one or more non-root elements that are descendants of the root element and identify the source of the privilege escalation. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification