Manage Access Control Playbook

Edit this page

Step 7 - Establish the Data Management Life Cycle


The Data Management Life Cycle focuses on identifying, obtaining, and maintaining data elements that enable access control decisions. Maintaining current data is essential to effective access management. Using incorrect or out of date data can lead to unauthorized access that put an agency’s resources in jeopardy. The Data Management Life Cycle defines the phases agencies can follow to maintain current data.

What is data and what types of data exist?

NIST defines data as “a subset of information in an electronic format that allows it to be retrieved or transmitted.” The data components in the Framework provide the information necessary to make access control decisions. There are three main types of data:

Data Type
Description
Subject/Identity Data Information about a subject and the available details about their identity. A subject is an individual, process, or device causing information to flow among objects or changes to the system state. Subject/identity data is a product of the Data Management Life Cycle and is used to uniquely identify a subject, which allows an access control model to map the subject to their appropriate access permissions. The Policy Execution part of the Framework then uses this information to grant access accordingly. Subject/identity data includes attributes and their associated metadata about a specific subject.
Protected Resource Data The details about a protected resource relevant to making an access control decision. Protected resource data is a product of the Data Management Life Cycle and is used to identify characteristics of a protected resource. This information can include elements such as the security clearance level required for access to a resource or specified emergency situations during which access can be restricted even further with increased requirements.
Environmental/Contextual Data Data about situational elements that can affect access control decisions. Environmental/contextual data is the product of the Data Management Life Cycle and allows for more flexibility in access control decisions and policy. Environmental data can include information such as the time of day or current security threat level. This data provides the Policy Execution part of the Framework with more data elements to consider when making a decision. For instance, access to a resource may need to be limited to a smaller number of subjects if the security threat level is raised. If that information is available, it can be incorporated into the decision to automatically restrict access to only those authorized during a period when the security threat level is elevated.

Checklist

 Requirements and data gathering. Data is required by your access control model and includes attributes and their associated metadata about subjects, resources, and the contextual environment. Once you’ve identified what data is required, you’ll need to determine where it’s located, how to obtain access to it, and establish the authoritative source for required attributes.

 Define Enterprise Data and Attribute Format Standards. Leverage guidance provided in the Streamline Identity Management Playbook to define standard data formats for identity and entitlement attributes.

 Process and integrate data. Processing data can include entering data, verifying its authenticity, extracting data into a usable form, or simply importing it from the data source so that it can be appropriately consumed during an access control decision.

 Analyze data. This can involve tagging data to make it more useful to a wider array of resources, performing quality assurance practices, or even detecting patterns that can be used in the development of policies that advance access security.

 Preserve data. The preservation of data minimizes the amount of duplicative work performed because it eliminates the need to acquire data that’s already stored and/or archived. It also provides additional opportunities to share the stored data with business partners to exercise in their own access control processes, including the real-time retrieval of subject/identity data from authoritative sources.

 Use data to make decisions. Data is used during the Policy Execution part of the Framework to determine if the subject is authorized to access the protected resource. The access control model components in the Framework diagram reference the data necessary to render an access control decision in the Policy Execution part.