Page 1026 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1026

subjects have access to resources through their membership in

                  roles. Roles are based on jobs or tasks, and administrators assign
                  privileges to the role. The RBAC model is useful for enforcing the
                  principle of least privilege because privileges can easily be revoked
                  by removing user accounts from a role.



               It’s easy to confuse DAC and RBAC because they can both use groups
               to organize users into manageable units, but they differ in their
               deployment and use. In the DAC model, objects have owners and the
               owner determines who has access. In the RBAC model, administrators
               determine subject privileges and assign appropriate privileges to roles

               or groups. In a strict RBAC model, administrators do not assign
               privileges to users directly but only grant privileges by adding user
               accounts to roles or groups.

               Another method related to RBAC is task-based access control (TBAC).
               TBAC is similar to RBAC, but instead of being assigned to one or more
               roles, each user is assigned an array of tasks. These items all relate to
               assigned work tasks for the person associated with a user account.

               Under TBAC, the focus is on controlling access by assigned tasks
               rather than by user identity.






                   Application Roles



                  Many applications use the RBAC model because the roles reduce
                  the overall labor cost of maintaining the application. As a simple
                  example, WordPress is a popular web-based application used for
                  blogging and as a content management system.

                  WordPress includes five roles organized in a hierarchy. The roles,
                  listed from least privileges to the most privileges, are subscriber,
                  contributor, author, editor, and administrator. Each higher-level

                  role includes all the privileges of the lower-level role.

                  Subscribers can modify some elements of the look and feel of the
                  pages within their user profile. Contributors can create, edit, and
                  delete their own unpublished posts. Authors can create, edit, and
   1021   1022   1023   1024   1025   1026   1027   1028   1029   1030   1031