Access Control Implementation
Table of Contents
- ABSTRACT 1
Introduction
- Project objectives
- Project spins
- Demonstration on access control implementedType chapter title (level 1) 4
- Generating an access control list
- Solving self-selected script
- Withdrawal of departing employees’ digital rights
- Adapting access control
- Verifying operational mechanism of the access control
- Conclusion
- References
6
Access Control Implementation
Abstract
This project covers the access control in Amazon Company and how these tools are implemented to enhance more security of data. During the implementation of these access controls, the company should consider; access control policies, models, and their mechanism. The highlights of the advantages and disadvantages of the tools, based on their positive impact on the firm, were explained. Access control involves all the measures put in place to secure data in an organization and curb cyber-crimes. Initials used in this report include; R-reading permission for the user- user can execute the program, w-user has the permission to write in the system resources.
Introduction
According to (NEEDHAM, Access control, 2020), access control involves computer security, which there is control of principles such as machines and workers have access to some system resources. These accesses are granting permission to read some files or execute some programs. Currently, there are advanced tools of access control, such As Linux and Microsoft tools. Amazon Company composes of a complex system since it is a worldwide organization. Due to its complexity, this firm needs access controls towards the client’s information and individual accounting data.
- Project objectives;
- The main objects of the project were to implement access control measures in Amazon’s system successfully.
- Enhancing the security of the client’s information, and programs executed in the system.
- Clear demonstration of the implementation of these security control measures
- Finding out how these access controls would improve the efficiency of Amazon’s systems
- Project spins;
The equipment used during the projects includes Tough Microsoft application, Linux program, cursor, and relevant software that assisted with the project.
Demonstration of access control implemented
- Generation of access control list
According to Javed (2020), the implementation of these controls can be either physical or technical. During the implementation, the user’s rights for applications, databases, and content are manually included in the access control list. The access control list is a list of permission attached to an object. Amazon uses the RBAC system because it has more than 500 employees. The first stage of implementation is coming up with the access control list.
USER
| Amazon accounting data |
System administrator
| RW |
Manager
| RW |
Clients | R |
The access control list above shows that the amazon system administrator has the permission of reading and writing in files or resources in context, which is the same as the manager of the firm. The client only has permission to read the data display.
- The next step is solving the self-selected script.
The self-selected script is unreliable; therefore, the system should have an automated process of granting access. This gives rise to operating system access control. Access control authenticates principles of granting access through some mechanisms such as passwords. This effect is represented by the matrix of access permissions with columns and rows for users as follows,
Users | Operating system | Accounting program | Accounting data | Audit trails |
System administrator Manager client
| RWX RX | RW X | R RW R R | _ _ |
The system administrator has permission to access all the processes in the system, except audit trials. The manager executes accounting programs and operating systems. He cannot access audit trials. The manager also has permission to read and writing accounting data. The client can access accounted data on the company’s websites. The above tables demonstrate the application of access control in operating the Amazons system. Amazon, the access control matrix, has a million entries; therefore, the simple table above was used.
- Withdrawal of departing employee’s digital rights.
This is done by the cancellation of their passwords or IP –addresses. It can be a contract database or interlocked systems.
- Adapting access control
Most companies apply a limited set of parameters in their systems. The limited parameter includes, user A is assigned permission to read document P; user B is an administrator assigned a specific application. For companies such as Amazon, they should use flexible access parameters such as geo-fencing. The firm must have the right management system that automatically adapts to the current updates in real-time to implement this kind of control.
- Verifying the operation mechanism of the access controls.
Additionally, this level entails full verifications of self-documents. Confirmation of whether the script is reliable is at this stage. Besides, access control of a system should provide all information for successful auditing.
Conclusion
Recently cybercrimes have grown rapidly due to vast advancement in technology. Access controls ensure that the companies’ data is secured. Access controls are not 100% secure, but the enhanced security of data it the right physical and logical procedures are followed. A policy-based access control system enhances security as it automatically identifies insecurity loopholes. For enhanced security, users should not influence these controls. These access tools have advantages in the sense that there is avoidance in the creation of too many different definitions of roles. There is an organization of staff since each user knows what they are permitted to access. Also, it establishes clear definitions of individual users. In a system, access controls are essential since each user is assigned a specific access role; hence there is less violation of the user’s resources.
References
Javed, A. (2020, May 14). 6 Tips For Implementing Access Control Authentication System With Security. Retrieved from XoLogics: http://www.xorlogics.com/2018/10/01/6-tips-for-implementing-access-control-authentication-system-with-security/
NEEDHAM, R. (2020, May Thursday). Access control. Retrieved from www.cl.cam.ac.uk: https://www.cl.cam.ac.uk/~rja14/Papers/SE-04.pdf