Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures
Abstract
:1. Introduction
2. Motivating Scenario
3. Background and Related Work
3.1. Identity Management
- Request: The user requests an account at an organization.
- Provisioning: The account is provisioned (attributes, roles, and permissions) and assigned to an entity after identification.
- Permissions: The permissions are set for the account.
- Authentication and Authorization: For accessing resources, such as services or data, the user must first be authenticated, using their identifier and the pre-defined authentication method(s). Then, the service checks the authorization of the user.
- Self-Service and Core Account Management: The user can access a self-service to change information, such as MFA methods. At the same time, the user makes use of identity management.
- De-Provisioning: In the end, the user account is de-provisioned.
3.1.1. Identification
3.1.2. Authentication
- Authenticator Binding: In the beginning, an association between a specific authenticator and a subscriber’s account is established. This enables the authenticator to be used to authenticate that account. The binding includes binding at enrolment, post-enrolment binding, and binding to a subscriber-provided authenticator.
- Renewal, Loss, Theft, Damage, and Unauthorized Duplication: Potentially compromised and malfunctioning authenticators need to be guarded against any possibility of extraction of the authenticator secret. For the following processes, the incident should be reported and a backup or an alternate authenticator should be used instead.
- Expiration: Authenticators may expire and should not be used for authentications. In consequence, a renewed authenticator should be issued if required.
- Revocation and Termination: At the end of the lifecycle, an authenticator is revoked, i.e., the binding between an authenticator and a credential is removed.
3.1.3. Authorization
3.2. Continuous Improvement Process Framework Vis4Sec
- Initiation: Information about the environment, requirements, stakeholders, and planned actions are gathered.
- Question Phase: The question is driven by the goal of the current iteration; for example, the result of a security incident or the goal to improve security.
- Data Management Phase: Required data and its sources are identified, and a data model is utilized. The data is then collected and analyzed. This step consists of the phases: (1) define data; (2) acquire data; (3) analyze data; (4) ensure data quality; and (5) dispose or reuse data (see Figure 3).
- Visualization Phase: The data is visualized to provide actionable information in an overview. This might be stakeholder-dependent.
- Interaction Phase: The data source quality and stakeholder-specific visualizations are presented, leading to communication between the stakeholders.
3.3. Enterprise Security Architecture SABSA
3.4. Summary
4. Process Framework IdMSecMan
- Initiation: Information about the environment, requirements, stakeholders, and planned actions are collected. One possible input for the process run are selected security controls.
- Question Phase: This phase is driven by the goal of the iteration; for example, a security incident or an asset. In order to improve the results in a managed and structured way, only one question per iteration is asked.
- Data Management Phase: Required data and relevant data sources are identified and the data model is utilized. If data is not needed anymore, it is disposed of, while the data sources are refined during the iteration runs.
- Visualization Phase: Overview representing the data, along with the quality of each source, for the process, entries, and metrics. The visualization provides a quick overview, helping to improve security by providing actionable information for the stakeholders.
- Interaction Phase: Postponed issues are reviewed and the questions, data sources visualizations, and interactions are refined. After the feedback from the stakeholders is received, a new iteration of the process can start.
4.1. Initiation
4.2. Question Phase
- Contextual: What is the business risk without proper IAA, governance, and management? What are the requirements for improved identity management? How should improved identity management be implemented and for which areas? What are the legal and regulatory restrictions?
- Conceptual: What goals and design does an improved identity management follow? What exactly does improved identity management look like and what is it supposed to achieve? How should it be integrated into the current infrastructure?
- Logical: Which logical components does an improved identity management (software, hardware, backup, …) have? What should improved identity management protect and how to protect identity management? How to make identity management with the central technical process activities of identification, authentication, and authorization usable for the users?
- Physical: What are the specifications and processes for improved identity management? What are the physical components? What is the content of the monitoring (identity management with its central technical process activities identification, authentication, and authorization with underlying management, governance, and policies, including their lifecycles) and how is it carried out? What are the necessary standards, procedures, baselines, interfaces, and process steps for improved identity management?
- Component: Which products, applications, tools, and people are being used to improve identity management? Are components required to provide the lifecycle?
- Management: How is improved identity management maintained, updated, and upgraded? What can be automated? What operational aspects, like the service desk and self-service portal, do we have to consider? How to ensure the security of improved identity management?
4.3. Data Management Phase
4.4. Visualization Phase
4.5. Interaction Phase
4.6. Next Iterations
5. Application of IdMSecMan
5.1. Process for Identification
5.1.1. Initiation
5.1.2. Question Phase
- Contextual: What is the business risk without the usage of a proper and usable identification proof, such as eID? What are the requirements for eID? How should eID be integrated and for which areas? What are the legal and regulatory restrictions? What are the consequences of eID in relation to the General Data Protection Regulation (GDPR) or other data protection regulations?
- Conceptual: Which concepts for identity proofing and verification are possible? What goals and design does the usage of eID follow? How should they be integrated into the current infrastructure?
- Logical: What level of trust in the identification is required? For which areas is a higher level of trust needed? Which identification methods provide which level of trust? Which logical components are necessary for the eID integration (software, hardware, backup, …)? What should eID protect and how to protect eID and its information? What are the threats?
- Physical: Which identification methods can and should be used? What are the specifications and processes for integrating eID? What are the physical components? What is the content of the monitoring and how is it carried out?
- Component: Which products, applications, tools, and people will be using eID? Are additional components required?
- Management: How is the eID integration maintained, updated, and upgraded? What operational aspects do we have to consider due to the integration of eID (service desk, cross-organizational processes, etc.)? How to ensure the security of the integration?
5.1.3. Data Management Phase
5.1.4. Visualization Phase
5.1.5. Interaction Phase
5.1.6. Next Iterations
- What: Security and usability related to identity proofing by deciding on the integration of eID.
- Why: Improve security and usability related to identification in a controlled way according to business needs.
- How: Controlled cycles with data based on business processes and identity proofing.
- Who: Stakeholders.
- Where: Anywhere.
- When: Business hours.
5.2. Process for MFA
5.2.1. Initiation
5.2.2. Question Phase
- Contextual: What is the business risk without MFA? What are the requirements for MFA? How should MFA be implemented and for which areas? What are the legal and regulatory restrictions?
- Conceptual: What goals and design does MFA follow? What exactly does MFA look like and what is it supposed to achieve? How should it be integrated into the current infrastructure?
- Logical: Which logical components has MFA (software, hardware, backup, …)? What should MFA protect and how to protect MFA? How to make MFA usable for users?
- Physical: What are the specifications and processes for MFA? What are the physical components? What is the content of the monitoring (MFA and normal authentication during the authentication lifecycle) and how is it carried out? What are the necessary standards, procedures, baselines, interfaces, and process steps for MFA including the lifecycle phases of authenticator binding; renewal, loss, theft, damage, and unauthorized duplication; expiration; and revocation and termination?
- Component: Which products, applications, tools, and people will be using MFA? Are components required to provide the lifecycle?
- Management: How is MFA maintained, updated, and upgraded? What can be automated? What operational aspects like the service desk and self-service portal do we have to consider? How to ensure the security of MFA?
5.2.3. Data Management Phase
5.2.4. Visualization Phase
5.2.5. Interaction Phase
5.2.6. Next Iterations
- What: Security related to authentication by deciding on and improving MFA.
- Why: Improve security related to authentication in a controlled way according to business needs.
- How: Controlled cycles with data based on identity management with a focus on authentication and risks.
- Who: Stakeholders.
- Where: Anywhere.
- When: Business hours (decision, authentication might be outside of business hours as well).
5.3. Process for Authorization
5.3.1. Initiation
5.3.2. Question Phase
- Contextual: What is the business risk without improving authorization? What are the requirements for RBA/ZTA? What are the consequences of integrating RBA or ZTA? What are the regulatory restrictions (e.g., GDPR and works council)?
- Conceptual: Which concepts for RBA and ZTA are possible and what are their pros and cons? What goals and design do the usage of RBA and ZTA follow? How should it be integrated into the current infrastructure?
- Logical: What are the trust requirements for each item? When is which trust requirement met? Which logical components are required for RBA or ZTA (software, algorithms, hardware, MFA, backup, …)? What should RBA resp. ZTA protect and how to protect RBA/ZTA and its information as more information is required?
- Physical: Which access control decisions based on trust requirements are necessary? What are the technical consequences due to the introduction of RBA or ZTA (such as further factors)? What are the specifications, processes, and required physical components for integrating either of them? What is the content of the monitoring, how is it carried out, and how are the regulations applied?
- Component: Which additional components are needed and which consequences do they have?
- Management: How is the integration maintained, updated, and upgraded? What operational aspects do we have to consider due to the integration (service desk, cross-organizational dependencies, processes, etc.)? How to ensure the security of the integration?
5.3.3. Data Management Phase
5.3.4. Visualization Phase
5.3.5. Interaction Phase
5.3.6. Next Iterations
- What: Security, data protection, and usability related to the RBA resp. ZTA. This includes the trust required by applications, the persons needing access to them (role concept), and the trust provided by users with different means (authentication, user setting).
- Why: Improve security and trust in the access decisions in a controlled way according to business needs.
- How: Controlled cycles with data based on business processes, role concepts, resources (such as projects with their requirements), and authorization policies.
- Who: Stakeholders.
- Where: Anywhere.
- When: Business hours (decision) and anytime (access).
6. Case Study
6.1. Case eID
- Contextual Layer: Stakeholders, policies, and further regulations, such as GDPR, processes, and security controls, were identified. In addition, costs with, and without, eID were gathered.
- Conceptual Layer: Different options of identity proofing and verification were compared, especially the current status with eID. Then, a way to integrate eID was searched for.
- Logical Layer: The assets for proper identity proofing relatec to the user data, internal data, and services resp. the access to it. In consequence, applications and areas with higher levels of trust were identified. In addition, logical components for the integration of eID were outlined.
- Physical Layer: Based on the research about the logical components, the specifications, processes, and physical components were analyzed. In addition, monitoring and actual requirements on the server and application were specified.
- Component Layer: Due to the evaluation steps beforehand, applications and people applying the eID integration were already known. Additional components were evaluated, but not found. Though the possibility of terminals was discussed.
- Management Layer: Maintenance, updates, upgrades, and the integration into current infrastructure (service desk, processes) was regarded. Whereas buying such a solution reduced the questions related to the logical, physical, and component layer in some ways, the management layer became more relevant as it was cross-organizational. In consequence, interfaces to the company had to be established and the service desk needed to be instructed.
6.2. Case MFA
- Contextual Layer: First, stakeholders, policies, and processes for authentication and MFA were identified. In addition, the role concept and required trust were outlined. The CS department had a role concept but it frequently changed with the different assignments to projects. As the role concept was not up-to-date, a hierarchical concept for updating and verifying it was introduced.
- Conceptual Layer: MFA exists in different variants (architectures, factors, vendors, etc.). Either way, additional factors should increase security, which is possible with appropriate monitoring and independency of factors. In order to decide on the actual implementation, the different variants were outlined and discussed.
- Logical Layer: The assets relate to the data, identities, and the relation between them. Privileges should be only granted if necessary for work. In consequence, trust in the users must be as high as required by the data. While most projects, courses, and theses only need a normal level, classified projects and specific servers are much more restricted with a high level of trust and a limited user group.
- Physical Layer: So far, a self-service portal exists, where users can edit their profiles, request certificates, and more. This self-service portal could be adapted to manage further devices required for MFA. In addition, a user interface, either per application or as a central element, is required. Here, usability is an important issue, as people try to bypass security measures if they feel these are a burden. Consequently, increasing security might even result in the opposite. Last, but not least, the security of each variant with its components was analyzed. TOTP seemed like a good variant of MFA as the users can decide between smartphone apps and password managers with the functionality, among others. On the other hand, the employees might request employer-provided smartphones, which, in consequence, need to be managed as well.
- Component Layer: Here, the functions and components were evaluated. Jira, for example, integrated with GitLab used for versioning. Both web applications can require MFA in form of TOTP. In contrast, using git on the command line does not enable it. In addition, with TOTP, smartphones for the corresponding employees and their management were discussed. The stakeholders came to the conclusion that only professors, project managers, and members of classified projects (see red color in Figure 6), as well as administrators, required MFA. The consequences of rolling it out on all employees would be higher costs and effort (service desk and device management among others). As all applications with classified projects were suitable for TOTP, this method was chosen due to low costs and maintenance. In addition, the usability was regarded as acceptable by the employees, which was in accordance with Das et al. [29]. For administration purposes, a security key, such as Yubikey [72], was a more suited method. In addition, it provided a higher level of assurance, according to NIST SP 800-63 B. As the number of persons administrating servers was limited, this option was chosen for them.
- Management Layer: Although the introduction of MFA was restricted to a limited amount of users, user support, backup, and rollback were outlined. Due to the limited amount of users, user support in its current form did not have to change. Nevertheless, MFA had to be regarding during the whole authentication lifecycle, from enrolment to de-provisioning. As a result of Section 2, proper monitoring was established.
- Authenticator Binding: In the beginning, the authenticator and the account are associated with each other. With TOTP and security key, this is (mostly) done on the application level. Hence, the self-service portal cannot be used to enrol MFA. Nevertheless, the loss of TOTP can be reported and processes in accordance with this are started. In addition, the handling of backup codes is described in the self-service portal and before the binding of new authenticators.
- Renewal, Loss, Theft, Damage, and Unauthorized Duplication: As explained above, the loss/theft/damage could be reported in the self-service portal, displayed in Figure 7. Depending on the problem, different actions were taken. Renewal was possible within the respective applications, while monitoring should notice the unauthorized duplication. In addition, duplication was forbidden by policy.
- Expiration: In the current setting, expiration was not enabled. This decision was made to reduce the overheads. The expiration might be introduced in future MFASecMan runs.
- Revocation and Termination: With the termination of the user account, the TOTP token was revoked. Thereby, the association between the authenticator and the account was deleted and the token removed.
6.3. Case ZTA
- Contextual: The business risks without ZTA and the requirements for ZTA were summarized. For ZTA, the employees had to accept the usage. In consequence, the documents before the employment started had to be adapted.
- Conceptual: Different concepts for ZTA were compared and their integration into the current infrastructure discussed. As the infrastructure was only partly centralized within CS and the central servers were better secured due to their purposes, the central part was chosen. Here, a logging and monitoring solution already operated, which could be extended to ZTA. In theory, a centralized architecture could be a consequence. In practice, due to the freedom of research and teaching, this was not likely.
- Logical: To establish ZTA, an inventory of applications, services, devices, and identities was taken for the central part. These items were evaluated towards their trust requirements, typical usage, and permissions. Next, the components for ZTA were identified and analyzed for their security. The core components needed to be properly secured, as they analyzed and enforced the policies. In addition, the policies were discussed for their elements. Since this was not entirely clear, a test bed would be set up beforehand. Last, but not least, emergency procedures were discussed.
- Physical: In order to introduce ZTA, further factors needed to be enrolled. Due to the case of MFA, experiences with TOTP and security keys were gained. Next, specifications, physical components (resp. extensions to the current solution), processes, and monitoring were outlined.
- Component: In relation to case MFA, mobile device management was brought up but declined, due to the research character of the university and the limited budget. This could be included in future iterations.
- Management: Last, but not least, the operational aspects of the integration were documented. As the service desk application was part of the central infrastructure, an email interface was favored if access to the application was restricted.
6.4. Summary
7. Discussion
8. Conclusions and Outlook
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
2FA | Two-Factor Authentication |
AuthNZ | Authentication and Authorization |
CS | Computer Science |
COBIT | Control Objectives for Information and Related Technology |
EA | Enterprise Architecture |
eID | electronic Identity |
eIDAS | electronic IDentification, Authentication and trust Services |
FTP | File Transfer Protocol |
GDPR | General Data Protection Regulation |
IAA | Identification, Authentication, and Authorization |
IAL | Identity Assurance Level |
ICT | Information and Communication Technology |
ID | Identity |
IdM | Identity Management |
IdMSecMan | Identity Management Security Management |
IEC | International Electrotechnical Commission |
IoT | Internet of Things |
IP | Internet Protocol |
ISM | Information Security Management |
ISO | International Organization for Standarization |
LoA | Level of Assurance |
MFA | Multi-Factor Authentication |
MFASecMan | MFA Security Management |
NAC | Network Access Control |
NCSC | National Cyber Security Centre |
NIST | National Institute of Standards and Technology |
OAuth | Open Authorization |
OSA | Open Security Architecture |
OWASP | Open Web Application Security Project |
PoCyMa | PotatoCyb0rMap |
RBA | Risk-Based Authentication |
SABSA | Sherwood Applied Business Security Architecture |
SAML | Security Assertion Markup Language |
SP | Special Publication |
TOGAF | The Open Group Architecture Framework |
TOTP | Time-based One-Time-Password |
Vis4Sec | Visualization for Security |
VPN | Virtual Private Network |
VR | Virtual Reality |
XACML | eXtensible Access Control Markup Language |
ZTA | Zero Trust Architecture |
References
- Wang, C.; Jan, S.T.; Hu, H.; Bossart, D.; Wang, G. The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, USA, 19–21 March 2018; pp. 196–203. [Google Scholar] [CrossRef]
- Henricks, A.; Kettani, H. On Data Protection Using Multi-Factor Authentication. In Proceedings of the 1st ACM International Conference on Information System and System Management (ISSM), Rabat, Morocco, 14–16 October 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Hanauer, T.; Hommel, W.; Metzger, S.; Pöhn, D. A Process Framework for Stakeholder-Specific Visualization of Security Metrics. In Proceedings of the 13th ACM International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27–30 August 2018. [Google Scholar] [CrossRef]
- Sherwood, J.; Clark, A.; Lynas, D. Enterprise Security Architecture; Whitepaper: Liverpool, UK, 1995. [Google Scholar]
- Sherwood, N. Enterprise Security Architecture: A Business-Driven Approach; CRC Press: Boca Raton, FL, USA, 2005. [Google Scholar]
- Pöhn, D.; Seeber, S.; Hanauer, T.; Ziegler, J.A.; Schmitz, D. Towards Improving Identity and Access Management with the IdMSecMan Process Framework. In Proceedings of the 16th ACM International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 17–20 August 2021. [Google Scholar] [CrossRef]
- MANDIANT. Assembling the Russian Nesting Doll: UNC2452 Merged into APT29. 2022. Available online: https://www.mandiant.com/resources/blog/unc2452-merged-into-apt29 (accessed on 28 December 2022).
- MANDIANT. FireEye Red Team Tool Countermeasures. 2021. Available online: https://github.com/mandiant/red_team_tool_countermeasures (accessed on 28 December 2022).
- Pöhn, D.; Hommel, W. IMC: A Classification of Identity Management Approaches. In Proceedings of the Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, 17–18 September 2020; Springer: Berlin/Heidelberg, Germany; pp. 3–20. [Google Scholar] [CrossRef]
- Milgram, L.; Spector, A.; Treger, M. Plan, Do, Check, Act: The Deming or Shewhart Cycle; Gulf Professional Publishing: Boston, MA, USA, 1999; Chapter 21. [Google Scholar]
- L’Amrani, H.; Berroukech, B.E.; El Bouzekri El Idrissi, Y.; Ajhoun, R. Identity management systems: Laws of identity for models7 evaluation. In Proceedings of the 4th IEEE International Colloquium on Information Science and Technology (CiSt), Tangier, Morocco, 24–26 October 2016; pp. 736–740. [Google Scholar] [CrossRef]
- Grassi, P.A.; Fenton, J.L.; Lefkovitz, N.B.; Danker, J.M.; Choong, Y.Y.C.; Greene, K.K.; Theofanos, M. Digital Identity Guidelines—Enrollment and Identity Proofing; Special Publication 800-63a; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. [CrossRef]
- Yang, Y.; Wang, Y.; Chen, Y.; Wang, C. EchoLock: Towards Low-Effort Mobile User Identification Leveraging Structure-Borne Echos. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (Asia CCS), Taipei, Taiwan, 5–9 October 2020; pp. 772–783. [Google Scholar] [CrossRef]
- Davarci, E.; Anarim, E. User Identification on Smartphones with Motion Sensors and Touching Behaviors. In Proceedings of the 30th IEEE Signal Processing and Communications Applications Conference (SIU), Safranbolu, Turkey, 15–18 May 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Lee, H.; Lee, S.H.; Kim, T.; Bahn, H. Secure user identification for consumer electronics devices. IEEE Trans. Consum. Electron. 2008, 54, 1798–1802. [Google Scholar] [CrossRef]
- Irfan, B.; Ortiz, M.G.; Lyubova, N.; Belpaeme, T. Multi-Modal Open World User Identification. J. Hum.-Robot Interact. 2021, 11, 6. [Google Scholar] [CrossRef]
- Shahzad, M.; Zhang, S. Augmenting User Identification with WiFi Based Gesture Recognition. Interact. Mob. Wearable Ubiquitous Technol. 2018, 2, 134. [Google Scholar] [CrossRef]
- He, Z.; Li, W. Research on User Identification across Multiple Social Networks Based on Preference. In Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), Nanjing, China, 23–25 November 2018; pp. 122–128. [Google Scholar] [CrossRef]
- Solanki, P.; Hui Lim, K.w.; Harwood, A. User Identification across Social Networking Sites using User Profiles and Posting Patterns. In Proceedings of the 31st IEEE International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 18–22 July 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Bonneau, J. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–23 May 2012; IEEE Computer Society: New York, NY, USA, 2012; pp. 538–552. [Google Scholar] [CrossRef]
- Bachmann, M. Passwords are Dead: Alternative Authentication Methods. In Proceedings of the 1st IEEE Joint Intelligence and Security Informatics Conference (JISIC), The Hague, The Netherlands, 24–26 September 2014; p. 322. [Google Scholar] [CrossRef]
- Miessler, D. The Consumer Authentication Strength Maturity Model (CASMM) v5. 2022. Available online: https://danielmiessler.com/blog/casmm-consumer-authentication-security-maturity-model/ (accessed on 28 December 2022).
- Grassi, P.A.; Fenton, J.L.; Newton, E.M.; Perler, R.A.; Regenscheid, A.R.; Burr, W.E.; Richer, J.P.; Lefkovitz, N.B.; Danker, J.M.; Choong, Y.Y.; et al. Digital Identity Guidelines—Authentication and Lifecycle Management; Special publication 800-63b; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. [CrossRef]
- Vegh, L. Cyber-physical systems security through multi-factor authentication and data analytics. In Proceedings of the IEEE International Conference on Industrial Technology (ICIT), Lyon, France, 20–22 February 2018; pp. 1369–1374. [Google Scholar] [CrossRef]
- Sciarretta, G.; Carbone, R.; Ranise, S.; Viganò, L. Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login. ACM Trans. Priv. Secur. 2020, 23, 13. [Google Scholar] [CrossRef]
- Realpe, P.C.; Collazos, C.A.; Hurtado, J.; Granollers, A. A Set of Heuristics for Usable Security and User Authentication. In Proceedings of the 17th ACM International Conference on Human Computer Interaction (Interacción), Salamanca, Spain, 13–16 September 2016. [Google Scholar] [CrossRef]
- Timón López, C.; Alamillo Alamillo Domingo, I.; Valero Valero Torrijos, J. Which Authentication Method to Choose. A Legal Perspective on User-Device Authentication in IoT Ecosystems. In Proceedings of the 16th ACM International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 17–20 August 2021. [Google Scholar] [CrossRef]
- Damon, F.; Coetzee, M. Towards a generic Identity and Access Assurance model by component analysis—A conceptual review. In Proceedings of the 1st IEEE International Conference on Enterprise Systems (ES), Cape Town, South Africa, 7–8 November 2013; pp. 1–11. [Google Scholar] [CrossRef]
- Das, S.; Kim, A.; Camp, L.J. Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption. In Proceedings of the Financial Cryptography and Data Security, Virtual, 1–5 March 2021; Borisov, N., Diaz, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2021; pp. 406–413. [Google Scholar] [CrossRef]
- Demchenko, Y.; Cristea, M.; de Laat, C. XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure. In Proceedings of the 10th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), London, UK, 20–22 July 2009; pp. 98–101. [Google Scholar] [CrossRef]
- Misbahuddin, M.; Bindhumadhava, B.S.; Dheeptha, B. Design of a risk based authentication system using machine learning techniques. In Proceedings of the 14th IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, USA, 4–8 August 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Wiefling, S.; Dürmuth, M.; Lo Iacono, L. More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-Based Authentication. In Proceedings of the 36th ACM Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, 7–11 December 2020; pp. 203–218. [Google Scholar] [CrossRef]
- Wiefling, S.; Jørgensen, P.R.; Thunem, S.; Iacono, L.L. Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Trans. Priv. Secur. 2022, 26, 6. [Google Scholar] [CrossRef]
- Wiefling, S.; Dürmuth, M.; Lo Iacono, L. Verify It’s You: How Users Perceive Risk-Based Authentication. IEEE Secur. Priv. 2021, 19, 47–57. [Google Scholar] [CrossRef]
- Papaioannou, M.; Mantas, G.; Essop, A.; Cox, P.; Otung, I.E.; Rodriguez, J. Risk-Based Adaptive User Authentication for Mobile Passenger ID Devices for Land/Sea Border Control. In Proceedings of the 26th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Porto, Portugal, 25–27 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Akiyama, T.; Otani, K.; Kakizaki, Y.; Sasaki, R. Evaluation of a Risk-Based Management Method for Online Accounts. In Proceedings of the 4th IEEE International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), Jakarta, Indonesia, 29–31 October 2015; pp. 52–57. [Google Scholar] [CrossRef]
- Ashibani, Y.; Mahmoud, Q.H. An Intelligent Risk-Based Authentication Approach for Smartphone Applications. In Proceedings of the 33rd IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020; pp. 3807–3812. [Google Scholar] [CrossRef]
- Leiba, B. OAuth Web Authorization Protocol. IEEE Internet Comput. 2012, 16, 74–77. [Google Scholar] [CrossRef]
- Nishioka, S.; Okabe, Y. Mutual Secrecy of Attributes and Authorization Policies in Identity Federation. In Proceedings of the 45th IEEE Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 12–16 July 2021; IEEE: New York, NY, USA, 2021; pp. 1202–1209. [Google Scholar] [CrossRef]
- Fujun, F.; Junshan, L. Trust Based Authorization and Access Control. In Proceedings of the 3rd IEEE International Forum on Information Technology and Applications (IFITA), Chengdu, China, 15–17 May 2009; pp. 162–165. [Google Scholar] [CrossRef]
- Kindervag, J. No More Chewy Centers: The Zero Trust Model Of Information Security. For Secur. Risk Prof. 2016, 23, 1–16. [Google Scholar]
- National Cyber Security Centre. 2021. Available online: https://www.ncsc.gov.uk/collection/zero-trust-architecture (accessed on 28 December 2022).
- Wylde, A. Zero trust: Never trust, always verify. In Proceedings of the 7th IEEE International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 14–18 June 2021; pp. 1–4. [Google Scholar] [CrossRef]
- Dimitrakos, T.; Dilshener, T.; Kravtsov, A.; La Marra, A.; Martinelli, F.; Rizos, A.; Rosetti, A.; Saracino, A. Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 1801–1812. [Google Scholar] [CrossRef]
- Hatakeyama, K.; Kotani, D.; Okabe, Y. Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation. In Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Kassel, Germany, 22–26 March 2021; pp. 514–519. [Google Scholar] [CrossRef]
- Bobbert, Y.; Scheerder, J. Zero Trust Validation: From Practice to Theory: An empirical research project to improve Zero Trust implementations. In Proceedings of the 29th IEEE Annual Software Technology Conference (STC), Gaithersburg, MD, USA, 3–6 October 2022; pp. 93–104. [Google Scholar] [CrossRef]
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection. Information Security Management System. Requirements. BSI: London, UK, 2022.
- Bilbao, A.; Bilbao, E. Measuring security. In Proceedings of the 47th IEEE International Carnahan Conference on Security Technology (ICCST), Medellin, Colombia, 8–11 October 2013; pp. 1–5. [Google Scholar] [CrossRef]
- Sun, Z.; Zhang, J.; Yang, H.; Li, J. Research on the Effectiveness Analysis of Information Security Controls. In Proceedings of the 4th IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chongqing, China, 12–14 June 2020; pp. 894–897. [Google Scholar] [CrossRef]
- Yang, Y.; Li, Z.; Shi, L. Continuous improvement actions: Moderating effects of the consciousness of employees. In Proceedings of the 3rd IEEE International Conference on Industrial Economics System and Industrial Security Engineering (IEIS), Sydney, NSW, Australia, 24–27 July 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Zeb, T.; Yousaf, M.; Afzal, H.; Mufti, M.R. A quantitative security metric model for security controls: Secure virtual machine migration protocol as target of assessment. China Comm. 2018, 15, 126–140. [Google Scholar] [CrossRef]
- Brunner, M.; Mussmann, A.; Breu, R. Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Lisbon, Portugal, 16–20 July 2018; pp. 483–490. [Google Scholar] [CrossRef]
- Sacher, D. Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring. Digit. Threat. 2020, 1, 7. [Google Scholar] [CrossRef]
- Hanauer, T. Visualization-Based Enhancement of IT Security Management and Operations. Ph.D. Thesis, Universität der Bundeswehr München, Neubiberg, Germany, 2021. [Google Scholar]
- Zachman, J.A. The Zachman Framework for Enterprise Architecture: Primer for Enterprise Engineering and Manufactoring; Zachman International: Monument, CO, USA, 2003. [Google Scholar]
- Pleinevaux, P. Towards a Metamodel for SABSA Conceptual Architecture Descriptions. In Proceedings of the 11th IEEE International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 187–194. [Google Scholar] [CrossRef]
- The SABSA Institute. SABSA Executive Summary. 2022. Available online: https://sabsa.org/sabsa-executive-summary/ (accessed on 28 December 2022).
- Al-Turkistani, H.F.; Aldobaian, S.; Latif, R. Enterprise Architecture Frameworks Assessment: Capabilities, Cyber Security and Resiliency Review. In Proceedings of the 1st IEEE International Conference on Artificial Intelligence and Data Analytics (CAIDA), Riyadh, Saudi Arabia, 6–7 April 2021; pp. 79–84. [Google Scholar] [CrossRef]
- Bulusu, S.T.; Laborde, R.; Wazan, A.S.; Barrère, F.; Benzekri, A. Which Security Requirements Engineering Methodology Should I Choose? Towards a Requirements Engineering-Based Evaluation Approach. In Proceedings of the 12th ACM International Conference on Availability, Reliability and Security (ARES), Reggio Calabria, Italy, 29 August–1 September 2017. [Google Scholar] [CrossRef]
- Rajba, P. Challenges and Mitigation Approaches for Getting Secured Applications in an Enterprise Company. In Proceedings of the 13th ACM International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, 27–30 August 2018. [Google Scholar] [CrossRef]
- Najib, W.; Sumaryono, S.; Nugroho, L.E.; Putra, G.D. Development of Enterprise Security Framework in SKK Migas Based on Integration of ISO 27000 and SABSA Model. In Proceedings of the 10th IEEE International Conference on Information Technology and Electrical Engineering (ICITEE), Bali, Indonesia, 24–26 July 2018; pp. 382–387. [Google Scholar] [CrossRef]
- Martynov, V.V.; Shiryaev, O.V. Ensuring integrated security as part of building digital architecture for energy companies. In Proceedings of the IEEE International Conference on Electrotechnical Complexes and Systems (ICOECS), Ufa, Russia, 16–18 November 2021; pp. 191–195. [Google Scholar] [CrossRef]
- Rubio, N.; Chavarria, L.; Mauricio, D. Security architecture for the protection of digital assets in SMEs. In Proceedings of the IEEE International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Istanbul, Turkey, 12–13 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Mayer, N.; Aubert, J.; Grandry, E.; Feltus, C.; Goettelmann, E.; Wieringa, R. An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 2019, 18, 2285–2312. [Google Scholar] [CrossRef]
- Sialm, G.; Knittl, S. Bring Your Own Identity—Case Study from the Swiss Government. In Proceedings of the Privacy Technologies and Policy, Frankfurt/Main, Germany, 7–8 September 2016; Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K., Eds.; Springer International Publishing: Cham, Switzerland, 2016; pp. 38–47. [Google Scholar] [CrossRef]
- Guimarães, V.T.; Freitas, C.M.D.S.; Sadre, R.; Tarouco, L.M.R.; Granville, L.Z. A Survey on Information Visualization for Network and Service Management. IEEE Commun. Surv. Tutor. 2016, 18, 285–323. [Google Scholar] [CrossRef]
- Deasy, D.; Sherman, J.; Hakun, M.; Dulany, K.; Romine, C.H.; Stine, K.; Scholl, M.; Ross, R.; Kozma, M.A.; Waschull, M.E.; et al. Security and Privacy Controls for Information Systems and Organizations; Special publication 800-53—Revision 5; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. [CrossRef]
- Grassi, P.A.; Richer, J.P.; Squire, S.K.; Fenton, J.L.; Newton, E.M.; Lefkovitz, N.B.; Danker, J.M.; Choong, Y.Y.; Greene, K.K.; Theofanos, M.F. Digital Identity Guidelines—Federation and Assertions; Special publication 800-63c; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. [CrossRef]
- DFN. DFN-AAI—Authentication and Authorization Infrastructure for Research and Education Communities in Germany. 2023. Available online: https://www.aai.dfn.de/index.en.html (accessed on 28 December 2022).
- eduGAIN. eduGAIN—Enabling Worldwide Access. 2023. Available online: https://edugain.org (accessed on 28 December 2022).
- ecsec. eID-Login. 2022. Available online: https://github.com/eid-login/ (accessed on 28 December 2022).
- Das, S.; Russo, G.; Dingman, A.C.; Dev, J.; Kenny, O.; Camp, L.J. A Qualitative Study on Usability and Acceptability of Yubico Security Key. In Proceedings of the 7th ACM Workshop on Socio-Technical Aspects in Security and Trust (STAST), Orlando, FL, USA, 5 December 2017; pp. 28–39. [Google Scholar] [CrossRef]
- NIST. NIST SP 800-63 Digital Identity Guidelines—Call for Comments on Initial Public Draft of Revision 4. 2022. Available online: https://pages.nist.gov/800-63-4/ (accessed on 28 December 2022).
- localos. PoCyMa. 2019. Available online: https://github.com/localos/PoCyMa (accessed on 28 December 2022).
- Husák, M.; Čermák, M. SoK: Applications and Challenges of Using Recommender Systems in Cybersecurity Incident Handling and Response. In Proceedings of the 17th ACM International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, 23–26 August 2022. [Google Scholar] [CrossRef]
- Jiang, L.; Jayatilaka, A.; Nasim, M.; Grobler, M.; Zahedi, M.; Babar, M.A. Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 2022, 10, 57525–57554. [Google Scholar] [CrossRef]
SABSA Layer | Assets (What) | Motivation (Why) | Process (How) | People (Who) | Location (Where) | Time (When) |
---|---|---|---|---|---|---|
Contextual | Business goals and decisions | Business risks | Business meta-processes | Business governance | Business geography | Business time dependence |
Conceptual | Business value and knowledge strategy | Risk management strategy and objectives | Strategies for process assurance | Security and risk governance; trust framework | Domain framework | Time management framework |
Logical | Information assets | Risk management policies | Process maps and services | Trust relationships | Domain maps | Calendar and timetable |
Physical | Data assets | Risk management practices | Process mechanisms | Human interface | Infrastructure | Processing schedule |
Component | Component assets | Risk management components and standards | Process components and standards | Human entities: components and standards | Locator components and standards | Step timing and sequencing components and standards |
Management | Delivery and continuity management | Operational risk management | Process delivery management | Governance, relationship and personal management | Environment management | Time and performance management |
SABSA Layer | Identity Management | Identification | Authentication | Authorization |
---|---|---|---|---|
Contextual | Organizational structure and regulations | GDPR | Costs of, e.g., incidents | |
Conceptual | Stakeholders, policies, processes | Concepts for identity proofing and verification | Authentication concept | Role concept |
Logical | Assets, logical components | Trust | Trust | Privileges, trust |
Physical | User interface, security | Identification methods | Authentication methods, physical components | Access control system |
Component | Functions, components for security | Identification | Authentication components | Access, roles |
Management | User support | Identification management | Authentication lifecycle | Control lists |
SABSA | What | Why | How | Who | Where | When |
---|---|---|---|---|---|---|
Identity Management | Management of identities | Security | Processes, policies, best practice | Stakeholders | Anywhere | Anytime |
Identification | Digital identity | Management of identity | Processes related to identities | Stakeholders | Anywhere | Anytime, business hours |
Authentication | Authentication of user | Verifying identities | Authentication lifecycle | Stakeholders | Anywhere | Anytime, business hours |
Authorization | Access to resources | Access protection | Access policies | Stakeholders | Anywhere | Anytime, business hours |
SABSA Layer | eID |
---|---|
Contextual Conceptual Logical | Processes, procedures, policies, GDPR, local regulations and law, trust, threats, contracts and liabilities |
Physical Component | Internal (Portal for identity proofing, which might be combined with the self-service portal, proxies, applications, etc.) and external (eID wallet/app/reader) technology with related security |
Management | Internal and cross-organizational governance, monitoring, and service management |
SABSA Layer | MFASecMan |
---|---|
Contextual Conceptual Logical | Processes, procedures, policies, regulations, law |
Physical Component | Technology (self-service portal, devices, proxies, applications, etc.) and related security |
Management | Governance, monitoring, service management |
SABSA Layer | RBA/ZTO |
---|---|
Contextual Conceptual Logical | Processes, procedures, policies, GDPR, local regulations and law, trust, role concept, threats, vendors, dependencies, and liabilities |
Physical Component | Portal for RBA/ZTA based on a central application with the decision engine and interfaces to monitoring, policies, etc. with related security |
Management | Interface for RBA/ZTA, monitoring, management of RBA/ZTA, and service management |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pöhn, D.; Seeber, S.; Hommel, W. Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures. Appl. Sci. 2023, 13, 2349. https://doi.org/10.3390/app13042349
Pöhn D, Seeber S, Hommel W. Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures. Applied Sciences. 2023; 13(4):2349. https://doi.org/10.3390/app13042349
Chicago/Turabian StylePöhn, Daniela, Sebastian Seeber, and Wolfgang Hommel. 2023. "Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures" Applied Sciences 13, no. 4: 2349. https://doi.org/10.3390/app13042349
APA StylePöhn, D., Seeber, S., & Hommel, W. (2023). Combining SABSA and Vis4Sec to the Process Framework IdMSecMan to Continuously Improve Identity Management Security in Heterogeneous ICT Infrastructures. Applied Sciences, 13(4), 2349. https://doi.org/10.3390/app13042349