[go: up one dir, main page]

100% found this document useful (1 vote)
46 views10 pages

Mandatory Access Control Presentation

Uploaded by

rahul.nair0306
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
46 views10 pages

Mandatory Access Control Presentation

Uploaded by

rahul.nair0306
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Enhancing Security Through

Rigorous Access Policies

Mandatory
Access Control
(MAC)
Rahul Nair
Introduction to Access Control

 • What is Access Control?


- Mechanism to regulate access to resources.
- Ensures only authorized users perform
permitted actions.

 • Types of Access Control:


- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
What is Mandatory Access Control
(MAC)?

01 • Definition:
- A strict access control model where access
is based on rules defined by a central
authority.
- Users cannot change access permissions.

02 • Key Features:

- Centralized control.
- Policy-driven access.
- Based on classification levels (e.g.,
confidential, secret, top secret).
How MAC Works

- Subjects: Users, processes, or devices requesting access.


Components:
- Objects: Resources (files, databases, etc.) to be accessed.
- Labels: Security classification for both subjects and objects.

- Central authority assigns labels to subjects and objects.


Process - Access decisions are made by comparing subject and object labels .
Security Labels in MAC

• Examples of
Labels:
- Confidential, Secret, Top
Secret.
- Unclassified, Restricted.

• Rules for Access:


- A user must have an equal or
higher clearance level to access
the resource.
Advantages of MAC
• High Security
01
Prevents unauthorized
access through strict rules.

• Centralized Management
02
Easy to enforce policies
uniformly.

• Useful for Sensitive Data


03
Ideal for military, government,
and critical sectors.
Disadvantages of MAC

• Lack of Flexibility
01
Users cannot modify
permissions.

02 • Complexity
Requires careful planning and
maintenance.

03 • Usability Concerns
Can be overly restrictive for
collaborative environments.
Real-World
Applications
Military and Defense:

Classifies data based on sensitivity.

Healthcare
Protects patient records.

Finance

Secures financial transactions and


records.
Examples of MAC

• Operating Systems:
- SELinux (Security-Enhanced Linux).

- Windows Mandatory Integrity Control


(MIC).

• Database Systems:

- Enforcing read/write rules based on data


classification.
Conclusion
• Summary:
- MAC offers robust security at the cost of
flexibility.
- Essential for environments where data
sensitivity is critical.

• Final Thought:
- Balancing security and usability is key in
any access control system.

You might also like