scholarly journals Access Control Conflicts in Information Technology and Operational Technology

Author(s):  
Robert Kemp ◽  
Richard Smith

Access controls are a key area for any security program. However, the recommended access controls cannot always be implemented across the entire organisations. This is the case within critical infrastructure organisations that have both Information Technology and Operational Technology assets where many of the controls cannot be implemented on Operational Technology. Also, safety is a key concern for critical infrastructure organisations which is not always the case with many standard commercial organisations. This means the access controls while maintaining security must not impact safety which can occur if considerations are not given to Operational Technology and safety objectives. This paper will provide ways to manage the conflicts and issues that can occur and provide a process to allow critical infrastructure organisations to implement the required controls without impacting safety and security.

2021 ◽  
Vol 11 (5) ◽  
pp. 529-535
Author(s):  
Jihane El Mokhtari ◽  
Anas Abou El Kalam ◽  
Siham Benhaddou ◽  
Jean-Philippe Leroy

This article is devoted to the topic of coupling access and inference controls into security policies. The coupling of these two mechanisms is necessary to strengthen the protection of the privacy of complex systems users. Although the PrivOrBAC access control model covers several privacy protection requirements, the risk of inferring sensitive data may exist. Indeed, the accumulation of several pieces of data to which access is authorized can create an inference. This work proposes an inference control mechanism implemented through multidimensional analysis. This analysis will take into account several elements such as the history of access to the data that may create an inference, as well as their influence on the inference. The idea is that this mechanism delivers metrics that reflect the level of risk. These measures will be considered in the access control rules and will participate in the refusal or authorization decision with or without obligation. This is how the coupling of access and inference controls will be applied. The implementation of this coupling will be done via the multidimensional OLAP databases which will be requested by the Policy Information Point, the gateway brick of XACML to the various external data sources, which will route the inference measurements to the decision-making point.


Sign in / Sign up

Export Citation Format

Share Document