Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Break-Glass : handling exceptional situations in access control
Petritsch H., Springer Vieweg, Wiesbaden, Germany, 2014. 220 pp. Type: Book (978-3-658073-64-0)
Date Reviewed: Jan 29 2015

Although there are many different models available for expressing access control in information technology (IT) environments, emergency situations are usually handled in a way that is either complex to manage for the policy designer or adds additional tasks for the users who are facing the emergency situation. As the title suggests, this book tackles the problem of handling emergency situations that most IT systems have to face.

Almost all policy models existing today are written in a machine-readable format and remain mostly static at runtime. This places a lot of responsibility on the policy designer, since he/she needs to provision beforehand all the possible normal and emergency situations that may arise in the lifetime of the IT system under analysis. However, even a talented IT policy designer can define a “sufficiently faithful approximation” of the future contexts that may trigger the emergency situation. This is particularly true for the healthcare domain, where healthcare information exchange (HIE) software is used to manage patient data, which is often classified as private healthcare information. When there is an emergency situation, the healthcare professionals and patients are usually under stressful conditions; HIE software will not interfere with the work yet preserve patient consent (for example, avoid too many security rules).

The healthcare domain is highly regulated: legislation and rules exist that must be fulfilled in order to operate, for example, the Healthcare Insurance Portability and Accountability Act (HIPAA) in the US or the epSOS guidelines in Europe. This fact imposes on the HIE software usage of consolidated libraries and procedures whose lifetime spans more than ten years.

The authors present a HIPAA-compliant model, Break-Glass, using electronic healthcare as a motivation. Break-Glass aims at providing a framework where the access control decision and enforcement are made at the pre-access, at-access, and post-access stages. The author explains: “The generic idea of Break-Glass is to empower users to decide if a denied access should be overridden, e.g., can be legitimized by an exceptional situation.”

Break-Glass enhances the security and the usability of a system: the access control engine is set up by the policy designer to filter access in normal operations, while the model manages emergency access. The principles of Break-Glass are governance of the model, accessibility (there should be no complicated procedure to override access control), awareness (the user must be warned that an investigation process will occur), and accountability. The model for the policy decision is defined by a policy lattice and a corresponding evaluation algorithm, to define at which level a user can escalate privileges. Policy obligations are used to notify the evaluation context of the occurred override of permissions.

Although the model is generic enough, all of the examples use Extensible Access Control Markup Language (XACML) 2.0 standard. Implementation of the model uses off-the-shelf components, and the source code is provided in the book’s appendix. It integrates well with existing deployments.

The book is well structured and self-contained. The reader is not required to master any policy model in order to enjoy reading it. The necessary background is presented in the introductory material and the core of the model is shown in the central chapters. In the very exhaustive “Related Work” chapter Break-Glass is compared to other approaches.

Reviewer:  Massimiliano Masi Review #: CR143126 (1505-0388)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Access Controls (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy