-
-
Notifications
You must be signed in to change notification settings - Fork 668
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
1.4.7 - Access Control Documentation #2065
Comments
This is a requirement we need to have. I wrote related comment to other issue (#2058 (comment)) - we just need to analyze, that the documentation covers the need for all V4 implementation requirements. Comment from Josh (#2033 (comment)):
@tghosth - any direction or proposal what should be improved? |
When it is PR time, note that I moved away added 1.4.6, so the requirement can have a number 1.4.6 with the label |
Note, documenting access control policy is so fundamental to good access control that I would like to keep it in the access control section. I do not want developers to have to hop to a variety of different sections to get access control right. |
If we have structure to keep all documentation requirements in V1, then we do that. The point is to point out questions for the analysis step and to provide a separate set of requirements (without going through entire ASVS). If this requirement should be located somewhere else, most likely it will be missed/skipped at that step. What we going to do with current V1 content is up to separate discussion #1063 / #1831 |
My point is, if developers are building access control then the most important thing - since its business logic - is to implement what was documented and to maintain that documentation. I worry this will be missed if it's only in v1. |
I think my challenge with this requirement is that I am not sure that I understand exactly what it is talking about:
That seems clear enough
Are we talking about the different dimensions where access control has to be enforced? For example:
(If I have understood this correctly, does the 4th bullet this solve Problem 1 in this comment @elarlang?)
We talk about environmental in the context of where the user is located somewhere else, is that what we are talking about here?
Not sure what we are adding here. |
@tghosth The term "attributes" (whether they are user, resource, action, or environmental) references attribute based access control (ABAC) where attributes describe the user (user ID, group membership, etc.), resource (file type, creation date, some other metadata, etc), action (read, write, edit), and environment (contextual information, this can even include the type of encryption used). Meanwhile, it is the policy that actually sets the rule (i.e. users in the "admins" group can read/write/edit/delete all folders). Would it be helpful if I clarified this in the requirement? |
I think it would be helpful to add some clarification in the requirements but I don't think the requirement should be too long. It may best to make a slightly clearer requirement and back it up with some explanatory text at the beginning of the section. Does that sound ok? @EnigmaRosa |
Makes sense. How about something along the lines of "Verify the documentation and definition of the application's access control system, including access control policies and any relevant information that is used to determine access" |
How do you feel about the following @EnigmaRosa, it is a little longer but I have tried to make it a little clearer.
We could then potentially include a little more info in the section header text and then reference the NIST ABAC standard. |
I like this direction @tghosth - if you want it a bit more brief I would go with something like: Verify that access control documentation clearly defines the rules for access control decision-making, specifying user/subject attributes, resource attributes, and relevant environmental factors involved in the process. |
Few notes for last comments:
|
That is helpful, @elarlang How about: Verify that access control documentation defines the rules for access control decision-making, specifying user attributes, subject attributes, resource attributes, and relevant environmental factors involved in the process. |
I think user and subject are interchangable. Whilst user is more understandable I think subject is more correct. I would suggest:
I think some explanation in the section heading would still be needed. Any further comments? |
Let's get it in. If someone has ideas for improvements we can do it later. Would @EnigmaRosa like to handle the PR or we do? |
I’ll handle the PR
…On Sat, Sep 28, 2024 at 12:07 Elar Lang ***@***.***> wrote:
Let's get it in. If someone has ideas for improvements we can do it later.
Would @EnigmaRosa <https://github.com/EnigmaRosa> like to handle the PR
or we do?
—
Reply to this email directly, view it on GitHub
<#2065 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/ALLXUAH7MNWUL62N63O76ATZY3H2LAVCNFSM6AAAAABNVI326WVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGOBQG4ZDCMRVGE>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Added to V1.4 Access Control Architecture via #2123
|
Note: This is referred to as 4.1.6 in #2033 but it was determined that it belonged in v1 instead.
Proposing a documentation requirement for the access control system design, as it is currently missing from v1.
The text was updated successfully, but these errors were encountered: