Data security mechanisms
Unified system of authentication and authorization
The Unified Authentication and Authorization System is a key component of data protection that provides secure access to system resources. It allows you to manage users, their permissions and access to data at the system-wide level.
Reminder:
- Authentication is the process of verifying the authenticity of a user (e.g., using a username and password).
- Authorization is the process of verifying a user’s permissions to perform certain actions (e.g., access data or system functions).
A unified authentication and authorization system provides the following benefits:
- Centralized management: Simplifies the management of users and their permissions.
- Security: Protects data from unauthorized access.
- Consistency: All applications and systems use the same authentication and authorization mechanism.
- Scalability: Easily add new applications and users.
System Components
Authentication
- Login and Password: The traditional method of authentication. Initially, when logging in, the user must identify themselves with a username and password.
- Multifactor Authentication (MFA): The use of multiple factors (e.g., a dynamically updated program token for the WEB API).
Token-based authentication simplifies the process for established users. To get started, the user sends a request to the server with a username and password. The server then validates them based on the values registered in its identity database. If the identities are confirmed, the server returns an authentication token (which is also stored in the database).
When the same user later sends requests for access to protected resources, these requests can be authorized using an authentication token instead of a username and password. The server checks the token against the token registered in the database and grants access.
Authorization
- Roles and Permissions: Users are assigned roles (e.g., access administrator, user) that define their permissions.
- ACL (Access Control Lists): Access control lists that define who has access to what resources.
- RBAC (Role-Based Access Control): Role-Based Access Control.
- ABAC (Attribute-Based Access Control): Attribute-based access control (e.g., time of day, location).
User Data Storage
- User Database: Storing information about users, their roles and permissions in a single database.
Security
- Encryption: Protects data during transmission and storage.
- Access Tokens: Using dynamically updated software tokens for session management.
- Auditing: Logging of all user actions for later analysis.
System Implementation
The user enters a login and password, the system validates them and returns an access token. The user’s e-mail address is used as the login.
Example of a request in Curl
format:
|
|
In response, we will receive the following message:
|
|
In this response, we are interested in the access_token
parameter. The value of this header is used as the password for each request. The value changes with each request.
Here is an example of a request using the token from the previous response:
|
|
In response, we will receive the following message:
|
|
To terminate, you can use the SignOut
procedure, or save the necessary headers from the last request and if the token lifetime has not expired, use them next time. Remember, without terminating the session, the last token will be valid for some time, depending on the system settings of the server.
Advantages of the system
A unified authentication and authorization system is a powerful tool for data protection and access control. It provides the following benefits:
- Centralized management: Simplifies the management of users and their permissions.
- Security: Protects data from unauthorized access.
- Consistency: All applications and systems use the same authentication and authorization mechanism.
- Scalability: Easily add new applications and users.
Data Encryption
In order to protect critical information, the system uses encryption (the process of converting information into a form that cannot be read without the appropriate key) and hashing (converting data into a unique fixed length string - hash) of data. This is one of the key data protection mechanisms that ensures confidentiality, integrity and security of information both during storage and transmission.
The system uses various data encryption and hashing algorithms.
Application of encryption in the system
Storage Encryption
- Databases: Encrypting individual database fields.
- Files: Encrypting files before saving them to disk.
Encrypting data in transit
- HTTPS: Using SSL/TLS to encrypt data during network transmission.
- VPN: Creating a secure tunnel for data transmission.
Password Encryption
Storing password hashes instead of passwords.
Examples of data encryption/decryption
Let’s look at examples of data encryption/decryption of system configuration files:
Data encryption
|
|
Data interpretation
|
|
Benefits of data encryption
- Confidentiality: Protecting data from unauthorized access.
- Celestity: Ensuring that data has not been altered.
- Authenticity: Confirming the source of the data.
- Compliance Requirements: Meeting regulatory requirements.
Audit and Monitoring
A number of subsystems have been developed and connected to monitor user and system activity, identify suspicious activity, and ensure compliance with security requirements.
To this end:
- The system is organized to collect, analyze, and store information about user and system activities to ensure accountability and compliance.
- Organized continuous real-time monitoring of the system and equipment to identify and respond to incidents.
Objectives
- Accountability: Ensuring that all user and system activities are recorded.
- Security: Detecting and preventing unauthorized activities.
- Problem Detection: Identify hardware problems and anomalies and take action to correct them.
- Performance Optimization: Analyze system performance and find bottlenecks that require optimization.
- Prediction and Planning: Collect data to forecast future workloads and plan resources.
- Compliance: Ensuring compliance with regulatory requirements.
- Incident Analysis: Ability to analyze incidents that have occurred and prevent future incidents.
Audit and Monitoring Components
Data Collection
- Logs: Records of user and system actions at all levels.
- Metrics: System performance data (e.g., CPU utilization, memory usage).
Data Storage
- Log Storage: Collecting data from various sources, organized distributed storage of logs and metrics by topic area .
- Log Rotation: Automatic deletion of old logs to save space.
Data Analysis
- Search & Filter: Ability to search and filter logs by various criteria.
- Analytics: Use of data analysis tools (e.g. Zabbix).
Alerts
- Alerts: Sending notifications about suspicious activity, emergencies (e.g. email, Telegram chat).
- Automatic Actions: Automatically responding to incidents (e.g., blocking a user).
Example implementation
Logging
Using a library for logging in the application.
|
|
Collection of errors in data from meters
|
|
Log Storage
Using centralized storage for logs.
Table audits
.
This table stores data logging information.
Field | Type | Description |
---|---|---|
id |
integer |
Unique identifier of the record (primary key). |
auditable_id |
integer |
Reference to the audited object (equipment.id , stations.id …). |
auditable_type |
character varying |
Auditable object (equipment , stations …). |
user_id |
integer |
Reference to the user identifier (users.id ) |
action |
character varying |
Action |
audited_changes |
jsonb |
Audited changes |
version |
integer |
Version of changes |
remote_address |
character varying |
Deleted address |
request_uuid |
character varying |
The identifier of the event. |
created_at |
timestamp(6) without time zone |
Date/time of the change. |
Table error_logs
.
This table stores information about errors in the data coming from the meters.
Field | Type | Description |
---|---|---|
id |
integer |
Unique identifier of the record (primary key). |
loggable_id |
integer |
Reference to the registered object (equipment.id …). |
loggable_type |
character varying |
Registered object (equipment …). |
message |
integer |
Reference to the error identifier. |
params |
jsonb |
Characteristics of the error. |
created_at |
timestamp(6) without time zone |
Date/time of the change. |
Log Analysis
Tools used to analyze logs:
- Setting up Web Forms for visualizing and analyzing logs.
- Creating dashboards to monitor user activity.
Alerts
Customized alerts for suspicious activity:
- Configuring alerts in Zabbix to monitor metrics.
- Sending notifications via email or Telegram chat for alarm events.
Benefits of auditing and monitoring
Auditing and monitoring are powerful data protection tools that allow you to track user and system activity, identify suspicious activity, and ensure security compliance. They allow you to:
- Ensure data accountability and security.
- Identify and prevent incidents.
- Meet regulatory requirements.