Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ZTA-inspired countermeasures #166

Open
netfl0 opened this issue May 11, 2023 · 1 comment
Open

ZTA-inspired countermeasures #166

netfl0 opened this issue May 11, 2023 · 1 comment
Assignees
Milestone

Comments

@netfl0
Copy link
Contributor

netfl0 commented May 11, 2023

  • Access Mediation
    • Network Access Mediation
      • LAN Access Mediation
      • Routing Access Mediation
    • Network Resource Access Mediation
      • Web Server Access Mediation
        • Proxy-based Web Server Access Mediation (potentially future technique)
        • Endpoint-based Web Server Access Mediation (potentially future technique)
      • Remote File Access Mediation
    • System Call Mediation
    • Subroutine Access Mediation
    • Physical Access Mediation
    • Access Reduction (?)
    • Access Confirmation (engage user)

Remaining decisions:

  • Should we use Authorization instead of Mediation
  • Determine what existing techniques to deprecate
@netfl0 netfl0 changed the title ZTA-inspired capability functions ZTA-inspired countermeasures May 12, 2023
@BlueNTheFaceSSE
Copy link

To the question of mediation or authorization.

In a tutorial and course taught, we've spoken to mediation as having four parts.

  • Identification: name, label, or designation attached to an entity to distinguish from other like entities
  • Authentication: Confirming the identify claimed
  • Authorization: the operations allowed by a entity
  • Entity-to-Authorization Binding: unambiguous association of entity to authorizations.

Flipping this to capability functions/"countermeasures":
Identification -> need means to manage identities - such as for humans account management stuff. Bleeding a bit into authentication is credential issuance, but this is more probably on identification. Both hardware, software, and wetware can/will have credentials if you interpret credential broadly. Hardware, and even software may have embedded unique credentials - such as a hardware MAC address, but then that needs to be registered with the system - like if one uses a fingerprint or faceID for credential on human, that need to be registered with the system.

Authentication -> so an entity claims an identity - must verify that. Logging in is one such example. The various functions for authenticating go here. Anything with credential checking.

Authorization - for the functional context - there is:

  • authorizing: assigning authorities to an entity
  • validating: the entity requests. Depending on criticality and other factors either verify the entity is authenticated or if resource accessed is especially sensitive require re-authenticating before validating.
  • enforcing authorization.

Entity to authorization binding - this goes to creating the policy that permits, and the integrity of how that policy (how is the policy file or database protected).

So should authorization be used instead of mediation? That wouldn't be standard language if done, at least not standard in certain circles. But it is just label otherwise so it's a call ...

@netfl0 netfl0 self-assigned this Dec 19, 2023
@netfl0 netfl0 added this to the 0.15.0 milestone Feb 5, 2024
@netfl0 netfl0 modified the milestones: 0.15.0, 0.17.0 Apr 26, 2024
@hack-sentinel hack-sentinel self-assigned this Nov 14, 2024
@hack-sentinel hack-sentinel modified the milestones: 0.17.0, 1.0.0 Nov 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

When branches are created from issues, their pull requests are automatically linked.

3 participants