Data pro­tec­tion is an in­creas­ing­ly important topic. For companies in par­tic­u­lar it’s become ab­solute­ly necessary to have a com­pre­hen­sive security strategy in order to protect customer data and internal in­for­ma­tion from falling into the wrong hands. That’s why each user has limited access rights, which are checked each time data is requested.

There are a number of options available for im­ple­ment­ing and main­tain­ing access control, including Mandatory Access Control. This model is also used in the political and military branches, which require tamper-proof pro­tec­tion of data. Keep reading to find out how this rule-based access control works and what its pros and cons are.

What is Mandatory Access Control?

In order to protect data and system settings from unau­tho­rized access and changes, companies usually only give users the priv­i­leges that they require to do their jobs. The de­f­i­n­i­tion and al­lo­ca­tion of access priv­i­leges can get very complex, even for mid-sized busi­ness­es. Every company is divided into different de­part­ments, usually including finance, marketing, and HR de­part­ments. The employees in each of these different de­part­ments require different access rights to fulfill their jobs. And in­di­vid­ual employees sometimes also need special additions to their rights, depending on their exact role in the company. Various security strate­gies were developed to ef­fec­tive­ly implement and keep track of these differing access rights. Mandatory Access Control is one of these strate­gies. When using MAC, each user only has access to the resources that they ab­solute­ly need. The word “mandatory” already hints at the fact that access control is rule-based and must be complied with.

Fact

The above-mentioned “resources” include objects, files, and IT systems.

Or­ga­ni­za­tion of access with MAC

Access rights are usually granted by a system ad­min­is­tra­tor and assigned by someone in the company who has suf­fi­cient knowledge of the tasks of each user. This ensures that employees can do their jobs without hitting any walls. Im­ple­men­ta­tion and updates are usually carried out au­to­mat­i­cal­ly by the operating system or a security kernel. When a user tries to access data, the system will either grant them access or deny their request. This kind of automated im­ple­men­ta­tion is the best way to prevent tampering.

Decisions about access rights are usually made based on the following factors:

  • Users and processes
  • Objects: the resources that are being accessed
  • Rules and prop­er­ties: cat­e­go­riza­tions, labels, and code words

Mandatory Access Control uses a hi­er­ar­chi­cal approach: Each object in a file system is assigned a security level, based on the sen­si­tiv­i­ty of the data. Examples of security levels include “con­fi­den­tial” and “top secret”. Users and devices are ranked in the same way. When a user tries to access a resource, the system au­to­mat­i­cal­ly checks whether or not they are allowed access. Ad­di­tion­al­ly, all users and in­for­ma­tion are assigned a category, which is also checked when a user requests access. Users must fulfill both criteria – security level and category – in order to access data.

Note

Role Based Access Control (RBAC) is an al­ter­na­tive security model, which abstracts work processes into roles and assigns access re­stric­tions based on those roles.

Forms of Mandatory Access Control

There are two forms of Mandatory Access Control:

Mul­ti­level security systems

This model is the original, simpler form of MAC, which consists of a vertical structure of security levels. In­for­ma­tion can only move within these areas. Users are also assigned a security level, and they can only access in­for­ma­tion on the same or lower security levels.

Mul­ti­lat­er­al security systems

These systems are more complex and assign access based on segments, which form groups. These groups consist of security levels and code words. This gives rise to a hor­i­zon­tal security system, which contains ad­di­tion­al vertical security levels.

What are the pros and cons of MAC?

Mandatory Access Control is one of the most secure access systems, as it’s pretty much tamper-proof. Unlike with RBAC, users cannot make changes. The checking and enforcing of access priv­i­leges is com­plete­ly automated. This lends Mandatory Access Control a high level of con­fi­den­tial­i­ty. Fur­ther­more, the system boasts a high level of integrity: Data cannot be modified without proper au­tho­riza­tion and are thus protected from tampering.

However, MAC requires detailed planning and greater ad­min­is­tra­tive work. You’ll need to regularly check and update each as­sign­ment of access rights to objects and users. Main­te­nance work also includes adding new data or users and im­ple­ment­ing changes in cat­e­go­riza­tions and clas­si­fi­ca­tions. There is usually only a single person who is au­tho­rized to carry out these tasks. This ensures a high level of security but requires a lot of work from the ad­min­is­tra­tor.

Where is MAC im­ple­ment­ed?

The high levels of con­fi­den­tial­i­ty and integrity mean that Mandatory Access Control is used in areas that deal with sensitive data and require a high level of security. This typically includes the military, gov­ern­ment, politics, foreign trade, health­care, and in­tel­li­gence. But MAC also has uses for normal companies. The security system Security-Enhanced Linux (SELinux), for example, is based on an im­ple­men­ta­tion of MAC in the Linux kernel.

Note

SELinux has two further im­ple­men­ta­tions: Type en­force­ment (TE) and Role Based Access Control (RBAC).

Go to Main Menu