At 12:26 PM -0500 11/25/08, Mark Rockman wrote: > It be difficult to determine a priori the settings for all the access >control lists and other security parameters that one must establish for >CAS to work. Perhaps a software assist would work according to the >following scenario. Run the program in the environment in which it will >actually be used. Assume minimal permissions. Each time the program >would fail due to violation of some permission, notate the event and plow >on. Assuming this is repeated for every use case, the resulting reports >would be a very good guide to how CAS settings should be established for >production. Of course, everytime the program is changed in any way, the >process would have to be repeated.
The approach my company recommends is intended to minimize any possible impact on existing operations (we deal exclusively with existing installations). 1) Enable auditing for use of privilege. 2) Wait for a period of normal operation (time period depends on the nature of the business). 3) Remove privileges from any user who never used a particular privilege. Of course that must be accompanied by an aggressive policy of requiring justification of every assignment of privilege to an individual. In many cases, permissions have been given for an individual to modify particular data when in fact they should only be authorized to do that when using a particular program. Tightening that up uses a mechanism whose name will vary depending on the operating system in use, but it is bound to require modification and security analysis of applications. The context in which we are recommending this is typically where external security requirements are suddenly raised, e.g. 800-53a, PCI DSS, 8500.2. -- Larry Kilgallen _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. _______________________________________________