Authentication, Authorization, and Accountability (AAA)
Authentication, Authorization, and Accountability (AAA)
Authentication
Verifying the identity of a user or system.
- Goal: Confirm that an entity is who or what it claims to be.
- Techniques:
- Passwords, PINs
- Biometric verification (e.g., fingerprint, facial recognition)
- Token-based authentication (e.g., OTPs, smart cards)
- Certificate-based authentication
- Example: Logging into an online banking system using a username and password.
Authorization
Granting or denying permission to access resources based on identity and access rights.
- Goal: Ensure users can only perform actions or access data they are allowed to.
- Techniques:
- Access control lists (ACLs)
- Role-Based Access Control (RBAC)
- Policy-Based Access Control (PBAC)
- Example: A customer can view their own bank account details but cannot access another customer’s account.
Accountability (or Auditing)
Tracking and recording user activities and ensuring actions are attributable to specific entities.
- Goal: Provide traceability, detect anomalies, and ensure compliance.
- Techniques:
- Logging and monitoring user activities
- Security Information and Event Management (SIEM) systems
- Audit trails and reports
- Example: Recording all admin actions on a database to detect and investigate unauthorized changes.