Simplifying Access Control in Enterprise Networks
نویسندگان
چکیده
Today, access control configuration in large enterprise environments is a highly complex process that involves the manual configuration of a wide range of network devices including routers, VLANs and firewalls. Much of this complexity arises from the asynchrony between routing and access control that often requires contorted network topologies that lack redundant paths, have tight pinning of routes, and physical placement of firewalls along the data path to achieve access control. In this paper, we propose Access Control Routing (ACR), a clean-slate and flexible approach to simplify access control configuration in large-scale enterprise networks. ACR uses a single parameter, class, to couple access control and routing. It requires that each endhost specify its access control policies at the granularity of a class. On the network side, the control plane establishes logical reachability networks for every class, and the data plane explicitly labels each packet with a class based on the source. Unlike traditional access control configuration approaches, ACR can easily adapt to network topology or routing changes and is better suited to handle network failures. ACR eliminates the need for VLANs and also provides the flexibility of automatically routing traffic through arbitrary middle-boxes without physical topology manipulation. Using a software-based router implementation of ACR and access control policies gathered from four large commercial enterprise networks, we show that ACR can easily be adopted in large enterprise environments with little additional performance overhead.
منابع مشابه
Sapheniea: Simplifying Configuration Using Classes
This paper describes the design of Sapheniea, a framework that enables network administrators to easily implement policies in large-scale networks. The goal of Sapheniea is to capture as much configuration information as possible into a single parameter, which we define as class. The key idea is to categorize network traffic into different classes and embed the same class parameter as a configu...
متن کاملAdvanced Features for Enterprise-Wide Role-Based Access Control
The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implementation is normally restricted to single systems and applications. In this article we define Enterprise Roles capable of spanning all IT systems in an organisation. We show how the Enterprise Role-Based Access Control...
متن کاملUsing Secure Coprocessors to Protect Access to Enterprise Networks
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters’ computers, or by attackers exploiting rogue access points or modems. Techniques that prevent connection to enterprise networks of nodes whose configuration does not conform to enterprise policies could greatly reduce such vulnerabilities. Network Admission Control (NAC) and ...
متن کاملSANE: A Protection Architecture for Enterprise Networks
Connectivity in today’s enterprise networks is regulated by a combination of complex routing and bridging policies, along with various interdiction mechanisms such as ACLs, packet filters, and other middleboxes that attempt to retrofit access control onto an otherwise permissive network architecture. This leads to enterprise networks that are inflexible, fragile, and difficult to manage. To add...
متن کاملSimplifying Enterprise Wide Authorization Management Through Distribution of Concerns and Responsibilities
Authentication lets a system know who you are, while authorization controls your resources access rights and what operations you are allow to perform. Resources have owners to whom the resources belong to. The owner knows best who is allowed to access her resources at any one time. Distribution of concerns and responsibilities can be effectively used for efficient management of enterprise wide ...
متن کامل