prEN ISO/IEC 29146
(Main)Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016)
Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016)
ISO/IEC 29146 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context. ISO/IEC 29146 provides explanations about related architecture, components and management functions and concepts, terms and definitions applicable to distributed access management. The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760.
Informationstechnologie - Sicherheitstechniken - Ein Rahmen für die Zugangsverwaltung (ISO/IEC 29146:2016)
Technologies de l'information - Techniques de sécurité - Cadre pour gestion d'accès (ISO/IEC 29146:2016)
Informacijska tehnologija - Varnostne tehnike - Ogrodje za upravljanje dostopa (ISO/IEC 29146:2016)
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
oSIST prEN ISO/IEC 29146:2023
01-februar-2023
Informacijska tehnologija - Varnostne tehnike - Ogrodje za upravljanje dostopa
(ISO/IEC 29146:2016)
Information technology - Security techniques - A framework for access management
(ISO/IEC 29146:2016)
Informationstechnologie - Sicherheitstechniken - Ein Rahmen für die Zugangsverwaltung
(ISO/IEC 29146:2016)Technologies de l'information - Techniques de sécurité - Cadre pour gestion d'accès
(ISO/IEC 29146:2016)Ta slovenski standard je istoveten z: prEN ISO/IEC 29146
ICS:
35.030 Informacijska varnost IT Security
oSIST prEN ISO/IEC 29146:2023 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
---------------------- Page: 1 ----------------------oSIST prEN ISO/IEC 29146:2023
---------------------- Page: 2 ----------------------
oSIST prEN ISO/IEC 29146:2023
INTERNATIONAL ISO/IEC
STANDARD 29146
First edition
2016-06-01
Information technology — Security
techniques — A framework for access
management
Technologies de l’information — Techniques de sécurité — Cadre
pour gestion d’accès
Reference number
ISO/IEC 29146:2016(E)
ISO/IEC 2016
---------------------- Page: 3 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved
---------------------- Page: 4 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
Contents Page
Foreword ..........................................................................................................................................................................................................................................v
Introduction ................................................................................................................................................................................................................................vi
1 Scope ................................................................................................................................................................................................................................. 1
2 Normative references ...................................................................................................................................................................................... 1
3 Terms and definitions ..................................................................................................................................................................................... 1
4 Abbreviated terms .............................................................................................................................................................................................. 4
5 Concepts ........................................................................................................................................................................................................................ 5
5.1 A model for controlling access to resources .................................................................................................................. 5
5.1.1 Overview ................................................................................................................................................................................. 5
5.1.2 Relationship between identity management system and accessmanagement system ..................................................................................................................................................... 6
5.1.3 Security characteristics of the access method........................................................................................ 7
5.2 Relationships between logical and physical access control ............................................................................. 8
5.3 Access management system functions and processes .......................................................................................... 8
5.3.1 Overview ................................................................................................................................................................................. 8
5.3.2 Access control policy .................................................................................................................................................... 9
5.3.3 Privilege management .............................................................................................................................................10
5.3.4 Policy-related attribute information management .........................................................................11
5.3.5 Authorization ...................................................................................................................................................................12
5.3.6 Monitoring management .......................................................................................................................................12
5.3.7 Alarm management ....................................................................................................................................................13
5.3.8 Federated access control........................................................................................................................................13
6 Reference architecture ................................................................................................................................................................................14
6.1 Overview ...................................................................................................................................................................................................14
6.2 Basic components of an access management system .........................................................................................15
6.2.1 Authentication endpoint ........................................................................................................................................15
6.2.2 Policy decision point (PDP) .................................................................................................................................15
6.2.3 Policy information point (PIP) ..........................................................................................................................15
6.2.4 Policy administration point (PAP) .................................................................................................................15
6.2.5 Policy enforcement point (PEP) ......................................................................................................................16
6.3 Additional service components .............................................................................................................................................16
6.3.1 General...................................................................................................................................................................................16
6.3.2 Subject centric implementation .................. .....................................................................................................16
6.3.3 Enterprise centric implementation ..............................................................................................................18
7 Additional requirements and concerns .....................................................................................................................................19
7.1 Access to administrative information ..............................................................................................................................19
7.2 AMS models and policy issues ................................................................................................................................................19
7.2.1 Access control models ..............................................................................................................................................19
7.2.2 Policies in access management ........................................................................................................................20
7.3 Legal and regulatory requirements ...................................................................................................................................20
8 Practice ........................................................................................................................................................................................................................20
8.1 Processes ...................................................................................................................................................................................................20
8.1.1 Authorization process ..............................................................................................................................................20
8.1.2 Privilege management process ........................................................................................................................21
8.2 Threats ........................................................................................................................................................................................................21
8.3 Control objectives ..............................................................................................................................................................................22
8.3.1 General...................................................................................................................................................................................22
8.3.2 Validating the access management framework ..................................................................................22
8.3.3 Validating the access management system ............................................................................................25
8.3.4 Validating the maintenance of an implemented AMS ...................................................................29
Annex A (informative) Current access models ........................................................................................................................................31
© ISO/IEC 2016 – All rights reserved iii---------------------- Page: 5 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
Bibliography .............................................................................................................................................................................................................................35
iv © ISO/IEC 2016 – All rights reserved---------------------- Page: 6 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical
Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/IEC JTC 1, Information technology, Subcommittee
SC 27, IT Security techniques.© ISO/IEC 2016 – All rights reserved v
---------------------- Page: 7 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
Introduction
Management of information security is a complex task that is based primarily on risk-based approach
and that is supported by several security techniques. The complexity is handled by several supporting
systems that can automatically apply a set of rules or policies consistently.Within the management of information security, access management plays a key role in the
administration of the relationships between the accessing party (subjects that can be human or non-
human entities) and the information technology resources. With the development of the Internet,
information technology resources can be located over distributed networks and the access to them
needs to be managed in conformity under a policy and is expected to have common terms and models
as a framework on access management.Identity management is also an important part of access management. Access management is mediated
through the identification and authentication of subjects that seek to access information technology
resources. This International Standard depends on the existence of an underlying identity management
system or an identity management infrastructure (see references in Clause 2).The framework for access management is one part of an overall identity and access management
framework. The other part is the framework for identity management, which is defined in ISO/IEC 24760.
This International Standard describes the concepts, actors, components, reference architecture,
functional requirements and practices for access control. Example access control models are included.
It focuses mainly on access control for a single organization, but adds other considerations for access
control in collaborative arrangements across multiple organizations.vi © ISO/IEC 2016 – All rights reserved
---------------------- Page: 8 ----------------------
oSIST prEN ISO/IEC 29146:2023
INTERNATIONAL STANDARD ISO/IEC 29146:2016(E)
Information technology — Security techniques — A
framework for access management
1 Scope
This International Standard defines and establishes a framework for access management (AM) and
the secure management of the process to access information and Information and Communications
Technologies (ICT) resources, associated with the accountability of a subject within some context.
This International Standard provides concepts, terms and definitions applicable to distributed access
management techniques in network environments.This International Standard also provides explanations about related architecture, components and
management functions.The subjects involved in access management might be uniquely recognized to access information
systems, as defined in ISO/IEC 24760.The nature and qualities of physical access control involved in access management systems are outside
the scope of this International Standard.2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 24760-1:2011, Information technology — Security techniques — A framework for identity
management — Part 1: Terminology and conceptsISO/IEC 24760-2:2015, Information technology — Security techniques — A framework for identity
management — Part 2: Reference architecture and requirementsISO/IEC 29115:2013, Information technology — Security techniques — Entity authentication assurance
frameworkISO/IEC 27002:2013, Information technology — Security techniques — Code of practice for information
security controls3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 24760-1, ISO/IEC 29115,
and the following apply.3.1
access control
granting or denying an operation to be performed on a resource (3.14)
Note 1 to entry: A primary purpose of access control is to prevent unauthorized access to information or use of
ICT resources based on the business and security requirements; that is, the application of authorization policies
to particular access requests.Note 2 to entry: When an authenticated subject (3.15) makes a request, the resource owner will authorize (or
not) access in accordance with access policy and subject privileges.© ISO/IEC 2016 – All rights reserved 1
---------------------- Page: 9 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
3.2
access management
set of processes to manage access control (3.1) for a set of resources (3.14)
3.3
access token
trusted object encapsulating the authority for a subject (3.15) to access a resource (3.14)
Note 1 to entry: An access token is issued by the policy decision point (PDP) and consumed by the policy
enforcement point (PEP) for the resource.Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.3.4
attribute
characteristic or property used to describe and to control access to a resource (3.14)
Note 1 to entry: The rules for accessing a resource are defined in an access control (3.1) policy which specifies the
attributes required for the granting of access by a subject (3.15) to a resource for a specific operation.
Note 2 to entry: Attributes can include subject attributes, resource attributes, environmental attributes and
other attributes used to control access as specified in the access control policy.
3.5endpoint
location in an access management (3.2) system where an access control (3.1) function is performed
Note 1 to entry: There can be the following different types of endpoints:— authentication endpoint, where subject (3.15) authentication is performed;
— authorization endpoint, where subject authorization is performed;
— endpoint discovery service, that searches for and locates endpoints;
— initial endpoint discovery service, used at the start of subject interactions with an access management system.
Note 2 to entry: Endpoint discovery services are commonly used in distributed and networked systems.
3.6enterprise centric implementation
access management (3.2) conducted under the control of a policy decision point
3.7
need-to-know
security objective of keeping the subject’s (3.15) access to data resources (3.14) to the minimum
necessary for a requesting user to perform their functionsNote 1 to entry: Need-to-know is authorized at the discretion of the resource owner.
Note 2 to entry: Need-to-have is the security objective of the requester for the fulfilment of specific tasks that
may be limited at the resource owner’s discretion.2 © ISO/IEC 2016 – All rights reserved
---------------------- Page: 10 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
3.8
privilege
access right
permission
authorization to a subject (3.15) to access a resource (3.14)
Note 1 to entry: Privilege is a necessary but not sufficient condition for access. Access occurs when the access
request is granted according to its access control policy. The access control policy is based on privileges and may
include other environmental factors (e.g. time-of-day, location, etc.)Note 2 to entry: Privileges take the form of data presented by a subject or obtained for a subject that is used by
a Policy Decision Point in order to grant or deny an operation that a subject is willing to perform on a resource.
Note 3 to entry: A resource may have multiple distinct privileges associated with it which correspond to various
defined levels of access. For example, a data resource could have read, write, execute and delete privileges
available for assignment to subjects. A request by a subject for access to the resource might be allowed for
some levels of access request but disallowed for other levels depending on the level of access requested and the
resource privileges that have been assigned to the subject.3.9
role
name given to a defined set of system functions that may be performed by multiple entities
Note 1 to entry: The name is usually descriptive of the functionality.Note 2 to entry: Entities can be but are not necessarily human subjects.
Note 3 to entry: Roles are implemented by a set of privilege (3.8) attributes to provide the necessary access to
data resources or objects.Note 4 to entry: Subjects assigned to a role inherit the access privileges associated with the role. In operational
use, subjects will need to be authenticated as members of the role group before being allowed to perform the
functions of the role.3.10
policy decision point
PDP
service that implements an access control policy to adjudicate requests from entities to access resources
(3.14) and provide authorization decisions for use by a policy enforcement point (3.11)
Note 1 to entry: Authorization decisions are used by a policy enforcement point to control access to a resource.
An authorization decision may be communicated through the use of an access token (3.3).
Note 2 to entry: PDP also audits the decisions in an audit trail and is able to trigger alarms.
Note 3 to entry: The term corresponds to Access Decision Function (ADF) in ISO 10181-3. It is presumed that
this function is located over a network from the subject (3.15), and may be located over a network from the
corresponding PEP (3.11).3.11
policy enforcement point
PEP
service that enforces the access decision by the policy decision point (3.10)
Note 1 to entry: The PEP receives authorization decisions made by the PDP and implements them in order to
control access by entities to resources (3.14). An authorization decision may be received in the form of an access
token (3.3) presented by a subject (3.15) when an access request is made.Note 2 to entry: The term corresponds to Access Enforcement Function (AEF) in ISO 10181-3. It is presumed
that this function is located over a network from the subject and may be located over a network from the
corresponding PDP (3.10).© ISO/IEC 2016 – All rights reserved 3
---------------------- Page: 11 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
3.12
policy administration point
PAP
service that administers access authorization policy
3.13
policy information point
PIP
service that acts as the source of attributes (3.4) that are used by a policy decision point (3.10) to make
authorization decisionsNote 1 to entry: Attributes can include resource (3.14), subject (3.15) and environment privileges (3.8)/
permissions.3.14
resource
object
physical, network, or any information asset that can be accessed for use by a subject (3.15)
3.15subject
entity requesting access to a resource (3.14) controlled by an access control (3.1) system
3.16security token service
STS
service that builds, signs, exchanges and issues access tokens (3.3) based on decision made by a policy
decision point (3.10)Note 1 to entry: This service may be split into separate components.
3.17
subject centric implementation
access management (3.2) implemented as component services that are called by a subject (3.15) to
acquire the means recognized by the policy enforcement point (3.11) for accessing a resource (3.14)
Note 1 to entry: Component services may include policy decision point service, policy enforcement point service
and associated discovery services that enable the subject to locate and contact the access control (3.1) services.
4 Abbreviated termsAA attribute authority
ABAC attribute-based access control
ACL access control list
AM access management
AMS access management system
CBAC capabilities-based access control
DAC discretionary access control
IBAC identity-based access control
ICT information and communication technology
IMS identity management system
4 © ISO/IEC 2016 – All rights reserved
---------------------- Page: 12 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
IT information technology
MAC mandatory access control
PBAC pseudonym-based access control
PAP policy administration point
PEP policy enforcement point
PDP policy decision point
PII personally identifiable information
PIP policy information point
RBAC role-based access control
REDS resource endpoint discovery service
STS security token service
TLS transport layer security
XACML extensible access control markup language
5 Concepts
5.1 A model for controlling access to resources
5.1.1 Overview
The conceptual sequence in giving access to a resource is as follows.
a) Subject authentication is needed before giving access to a resource. However, authentication is
a separate function that is typically implemented on a session basis rather than for each access
request.b) Authorization decision to allow or deny access to the resource is made based on a policy, and an
access token is issued to convey the result of the decision.c) Authorization enforcement is conducted on the resource based on the decision result and resource
access will be given.Figure 1 shows this decision sequence.
Figure 1 — Access control model sequence
Subject and resource are depicted as balloons while conceptual functions are depicted as rectangles.
© ISO/IEC 2016 – All rights reserved 5---------------------- Page: 13 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
For the purpose of being accessed, a resource is characterized by the following:
— an identifier, either for a specific resource or for a resource class;
— one or more modes of access;
— a set of attributes associated with the modes of access and other access criteria as specified in the
access control policy.An access management system is responsible for the administration and operation of authorizations to
access. Authorizations are supported by administrative activity which assigns and maintains resource
attributes and subject privileges in accordance with the access management policy.
Resources in IT systems are typically dynamic. They run a lifecycle from creation to destruction and
this is a continuous process.a) Resources have a life-cycle which runs from creation to destruction.
b) Resources are continually being created, updated and destroyed.
c) Resources need to be assigned access attributes (usually at the time of creation) which will be
used by the access management system to control access by subjects to the resources. [Typically
this is done by pre-defining recognized resource types with associated access attribute templates.
When a resource of a known type is created, it inherits the access attributes of the corresponding
template].d) Resources are owned by a party which might be a person or an organization. The owner is often
the creator of the resource but not always and the ownership may change during the life of the
resource.5.1.2 Relationship between identity management system and access management system
In the model described here, the subject is authenticated using an identity management system (IMS),
as described in ISO/IEC 24760-2. The authenticated subject then requests access using the access
management system (AMS). The access management system determines whether or not to authorize
the subject request to access the resource. Subject authorization comprises two distinct activities,
— the pre-assignment of resource access privileges to subjects, and— the granting of access to resources by subjects in operational use.
Figure 2 shows the relationship between an identity management system (IMS) and an access
management system (AMS).6 © ISO/IEC 2016 – All rights reserved
---------------------- Page: 14 ----------------------
oSIST prEN ISO/IEC 29146:2023
ISO/IEC 29146:2016(E)
Figure 2 — Identity management system and access management system relationship
Authentication is supported by an identity management system (IM
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.