# Access control kinds

## Context-Based Access Control (CBAC)

Access rights have a **historical context**.

* The access rights **cannot be determined without reasoning** about past access operations.
* Example:
  * Stateful packet filter firewall.

### Chinese Wall policy

* **Conflict groups.**
* Access control policies **need to address past access to objects in different members of conflict groups**.

## Attribute-Based Access Control (ABAC)

Access control decisions are made **based on attributes associated with relevant entities**.

OASIS XACML architecture.

* Policy Administration Point (PAP).
  * Where **policies are managed**.
* Policy Decision Point (PDP).
  * Where **authorization decisions are evaluated and issued**.
* Policy Enforcement Point (PEP).
  * Where **access requests** to a resource are **intercepted and confronted with PDP’s decisions**.
* Policy Information Point (PIP).
  * Provides **external information to a PDP**.

## XACML

### Access control with PEP and PDP

A subject sends a request, which is **intercepted by the Policy Enforcement Point (PEP)**.

The **PEP sends the authorization request** to the Policy Decision Point (PDP).

The PDP **evaluates the request against its policies** and **reaches a decision**.

* Which is returned to the PEP.
* Policies are retrieved from a Policy Retrieval Point (PRP).
* Useful attributes are fetched from Policy Information Points (PIP).
* Policies are managed by the Policy Administration Point (PAP).

### Big picture

<figure><img src="https://3490214077-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAHT7avzIVwxfPJ4pkhhO%2Fuploads%2FRxa4PAfwJNy3icR5P0sQ%2FScreenshot%20from%202024-02-22%2010-25-56.png?alt=media&#x26;token=7ab184aa-310c-4fda-90a2-12acdc28dfa9" alt=""><figcaption></figcaption></figure>

## Break-the-glass access control model

It may be required to **overcome the established access limitations.**

* e.g. in a life-threatening situation.

The subject may be presented with a break-the-glass decision upon a denial.

* Can overcome the denial of their responsibility.
* Logging is fundamental to prevent abuses.
  * Subject may have to justify action, after using the elevated right.
