Читать книгу The Official (ISC)2 SSCP CBK Reference - Mike Wills - Страница 122

Subjects and Objects

Оглавление

The first notion you have to come to grips with is just how many millions of objects can exist within even a small office/home office (SOHO) local area network (LAN) environment; scale this up to a large cloud-hosted data center operation and you could be dealing with billions and billions of objects. Even at the small end of this scale, the sheer number of objects involved dictates the need for efficient processes and effective, automated solutions to carry out most of the work that an access control system has to perform. For example, a typical SOHO LAN environment with an ISP-provided modem, a Wi-Fi router, and peer-to-peer file and resource sharing across a half-dozen devices on that LAN might have the following types of objects as part of that LAN system:

 Each hardware device; its onboard firmware, configuration parameters, or device settings; and its external physical connections to other devices

 Power conditioning and distribution equipment and cabling, such as a UPS

 The file systems on each storage device, on each computer, and on each subtree and each file within each subtree

 All of the removable storage devices and media, such as USB drives, DVDs, or CDs used for backup or working storage

 Each installed application on each device

 Each defined user identity on each device and the authentication information that goes with that user identity, such as username and password

 Each person who is a user or is attempting to be a user (whether as guest or otherwise)

 Accounts at all online resources used by people in this organization and the access information associated with those accounts

 The random access memory (RAM) in each computer, as free memory

 The RAM in each computer allocated to each running application, process, process thread, or other software element

 The communications interfaces to the ISP, plain old telephone service, or other media

Wi-Fi is a registered trademark of the Wi-Fi Alliance, the nonprofit organization that promotes wireless connectivity, certifies products as conforming to their standards for interoperability. The name does not stand for anything; in particular, it does not mean “wireless fidelity,” even though a number of websites say that it does.

Note that third item: on a typical Windows 10 laptop with 330GB of files and installed software on a 500GB drive, that's only half a million files—and each of those, as well as each of the 100,000 or so folders in that directory space, is an object. Those USB drives, and any cloud-based file storage, could add similar amounts of objects for each computer; mobile phones using the Wi-Fi might not have quite so many objects on them to worry about. A conservative upper bound might be 10 million objects.

What might the population of subjects be, in this same SOHO office?

 Each human, including visitors, clients, family, or even the janitorial crew

 Each user ID for each human

 Each hardware device, including each removable disk

 Each mobile device each human might bring into the SOHO physical location with them

 Each executing application, process, process thread, or other software element that the operating system (of the device it's on) can grant CPU time to

 Any software processes running elsewhere on the Internet, which establish or can establish connections to objects on any of the SOHO LAN systems

That same Windows 10 laptop, by the way, shows 8 apps, 107 background processes, 101 Windows processes, and 305 services currently able to run—loaded in memory, available to Windows to dispatch to execute, and almost every one of them connected by Windows to events so that hardware actions (such as moving a mouse) or software actions (such as an Internet Control Message Protocol packet) hitting a system's network interface card will wake them up and let them run. That's 521 pieces of executing code. And as if to add insult to injury, the one live human who is using that laptop has caused 90 user identities to be currently active. Many of these are associated with installed services, but each is yet another subject in its own right.

Subjects and objects have identities by which they are known to the systems that they participate in. For identity management and access control to work effectively, these identities need to be unique—that there is a one-to-one correspondence between a subject and its identity (or identifying information). Human names fail this uniqueness need more often than not; thus, we have to end up assigning some kind of identification key or value to each new human entity that comes into our identity management system's purview. Hardware identities, such as the media access control (MAC) addresses, are reasonably unique, but they can be locally altered and spoofed. You'll look at this identity proofing problem in more detail later in the “Proofing” section.

The Official (ISC)2 SSCP CBK Reference

Подняться наверх