【24h】

Verification of Cloud Security Policies

机译:核实云安全策略

获取原文

摘要

Companies like Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with other companies, and can be modeled as workflows where the owner of the data at risk interacts with contractors to realize a sequence of tasks on the data to be secured.In practice, access control is an essential building block to deploy these secured workflows. This component is generally managed by administrators using high-level policies meant to represent the requirements and restrictions put on the workflow. Handling access control with a high-level scheme comes with the benefit of separating the problem of specification, i.e. defining the desired behavior of the system, from the problem of implementation, i.e. enforcing this desired behavior. However, translating such high-level policies into a deployed implementation can be error-prone.Even though semi-automatic and automatic tools have been proposed to assist this translation, policy verification remains highly challenging in practice. In this paper, our aim is to define and propose structures assisting the checking and correction of potential errors introduced on the ground due to a faulty translation or corrupted deployments. In particular, we investigate structures with formal foundations able to naturally model policies. Metagraphs, a generalized graph theoretic structure, fulfill those requirements: their usage enables to compare high-level policies to their implementation. In practice, we consider Rego, a language used by companies like Netflix and Plex for their release process, as a valuable representative of most common policy languages. We propose a suite of tools transforming and checking policies as metagraphs, and use them in a global framework to show how policy verification can be achieved with such structures. Finally, we evaluate the performance of our verification method.
机译:Netflix等公司越来越使用云部署其业务流程。这些流程通常涉及与其他公司的伙伴关系,并且可以以风险数据的所有者与承包商相互作用的工作流程,以实现要保护数据的任务序列。在实践中,访问控制是一个基本的构建块部署这些安全的工作流程。此组件通常由管理员管理,使用高级策略意味着代表工作流程的要求和限制。使用高级方案处理访问控制具有分离规范问题的益处,即定义系统的所需行为,从实现问题中,即实施这种所需的行为。但是,将这种高级策略转换为部署的实现可能是错误的。虽然已经提出了半自动和自动工具来协助这种翻译,但在实践中仍然具有高度挑战性。在本文中,我们的宗旨是定义和提出由于损坏的翻译或损坏的部署而致力于检查和校正地面上引入的潜在误差。特别是,我们调查具有能够自然模型政策的正式基础的结构。 Metabraphs,一种广义图形理论结构,满足这些要求:它们的用法可以使高级政策与其实施进行比较。在实践中,我们考虑了Netflix和Plex等公司用于其发布过程的公司使用的语言,作为最常见的政策语言的有价值代表。我们提出了一套工具转换和检查策略作为metagraphes,并在全球框架中使用它们来展示如何通过这种结构实现策略验证。最后,我们评估了验证方法的表现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号