What is Attribute Based Access Control (ABAC)?
Attribute based access control (ABAC) is a different approach to access control in which access rights are granted through the use of policies made up of attributes working together. ABAC [...]
ObjectSecurity awarded membership of CyberTECH’s Entrepreneur in Residence (EIR) emerging tech program
(September 7, 2016, San Diego, CA) – ObjectSecurity, the security policy automation company, today announced that it has been awarded membership of CyberTECH’s Entrepreneur in Residence (EIR) emerging tech program. [...]
ObjectSecurity presents OpenPMF at TC3 Telecom Conference
(San Diego, September 13, 2016) - ObjectSecurity, the security policy automation company, will present OpenPMF center stage at TC3 Telecom Council Carrier Connections Conference (28/29 September, Computer History Museum, Mountain [...]
IAM Meetup: Access Control in 2017 – What you need to know to stay ahead
Hello IAM Meetup members! Happy to announce another meetup on October 6, 2016, 5-7 PM at Stone Brewery at Liberty Station. The format will be a little different this time: [...]
IAM Meetup: Best Practices for IAM Assessments, Blueprints & Roadmaps
Hello IAM Meetup members! Happy to announce another meetup on September 8, 2016, 5-7 PM at Stone Brewery at Liberty Station. The format will be a little different this time: [...]
AuthoriZation Based Access Control (ZBAC) and model-driven security
Today I would like to share my views about authoriZation Based Access Control (ZBAC) and how it relates to model-driven security (MDS) policy automation. There are numerous incarnations of the [...]
ObjectSecurity® wins NIST SBIR Phase II Award
San Diego, CA, USA – 18 July 2016 – ObjectSecurity®, The Security Policy Automation Company™, today announced that it has won a second award phase to commercialize National Institute [...]
Resource-Based Access Control (ResBAC) vs. Identity-Based Access Control (IBAC)
Most technical access control policies today are specified "identity-centric", a term I use for policies that are specified with the accessor (= the requestor's identity) in mind. This is the "who?", [...]
Model-driven security (MDS) for Privacy by Design (PbD)
I have blogged for years that model-driven security is an ideal approach for the management of policies that are relatively intuitive for humans, but cumbersome to technically implement across large, [...]
Access Control in 2016 – What you Need to Know
Access control is one of those topics that often means different things to different people. In its most basic form, it is simply the “restriction of access to a resource.” [...]
Implementing NIST 800-53 AC with OpenPMF™
NIST Special Publication 800-53 (Rev. 4), "Security and Privacy Controls for Federal Information Systems and Organizations," provides a catalog of security controls for U.S. federal information systems. Its 18 families of [...]
Implementing Proximity-Based Access Control (PBAC) using Model-Driven Security
A particularly advanced and highly useful access control approach we have designed and implemented using Model-Driven Security (MDS) is Proximity-Based Access Control (PBAC) . The PABC approach is a highly innovative [...]
Cybersecurity in 2016: Manage Impact!
Today I want to share my thoughts about the recurring discussions we all as security professionals often have about where to focus our efforts. One camp says "continuous monitoring is [...]
Internet of Things (IoT) and Model-Driven Security – a perfect match!
In this unusually lengthy blog post I discuss how model-driven security is (and has always been) a perfect match for the Internet of Things. We are just wrapping up an [...]
Managing Identities and Access Will Be Critical to the Success of the Internet of Things
Managing identities and access is critical to the success of the Internet of Things (IoT), but in its current form identity and access management (IAM) cannot provide the scale or [...]