SIST EN ISO/IEC 29146:2023
(Main)Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016, including Amd 1:2022)
Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016, including Amd 1:2022)
ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context.
This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments.
This International Standard also provides explanations about related architecture, components and management functions.
The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760.
The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.
Informationstechnologie - Sicherheitstechniken - Ein Rahmen für die Zugangsverwaltung (ISO/IEC 29146:2016, einschließlich Amd 1:2022)
Diese Internationale Norm legt ein Rahmenwerk für die Zugangsverwaltung(AM, en: access management) und die sichere Verwaltung des Prozesses für den Zugriff auf Ressourcen der Informations- und Kommunikations
technologie(IKT) im Zusammenhang mit der Rechenschaftspflicht eines Subjekts in einem gegebenen Kontext fest.
Diese Internationale Norm stellt Konzepte und Begriffe zur Verfügung, die auf verteilte Zugangsverwaltungs- techniken in Netzwerkumgebungen anwendbar sind.
Diese Internationale Norm enthält ferner Erläuterungen zu zugehörigen Architekturen, Komponenten und Ver
waltungsfunktionen.
Die an der Zugangsverwaltung beteiligten Subjekte könnten eindeutig als auf Informationssysteme wie in ISO/IEC24760 zugreifend angesehen werden.
Art und Eigenschaften der zu Zugangsverwaltungssystemen gehörenden physischen Zugangssteuerung liegen nicht im Anwendungsbereich dieser Internationalen Norm.
Technologies de l'information - Techniques de sécurité - Cadre pour gestion d'accès (ISO/IEC 29146:2016, y compris Amd 1:2022)
La présente Norme internationale définit et établit un cadre pour la gestion de l'accès (AM, access management) et la gestion sécurisée du processus d'accès à l'information et aux ressources des technologies de l'information et de la communication (TIC), associé à la responsabilité d'un sujet dans un certain contexte.
La présente Norme internationale fournit des concepts, des termes et des définitions applicables aux techniques de gestion d'accès distribuée dans des environnements en réseau.
La présente Norme internationale fournit également des explications concernant l'architecture, les composants et les fonctions de gestion associés.
Les sujets impliqués dans la gestion d'accès peuvent être reconnus de manière unique pour accéder aux systèmes d'information, tel que défini dans l'ISO/IEC 24760.
La nature et les qualités du contrôle d'accès physique intervenant dans les systèmes de gestion d'accès ne relèvent pas du domaine d'application de la présente Norme internationale.
Informacijska tehnologija - Varnostne tehnike - Ogrodje za upravljanje dostopa (ISO/IEC 29146:2016, vključno z dopolnilom 1:2022)
Standard ISO/IEC 29146 opredeljuje in vzpostavlja ogrodje za upravljanje dostopa (AM) in varno upravljanje procesa za dostop do virov informacijskih in komunikacijskih tehnologij (ICT), povezanih z odgovornostjo subjekta znotraj določenega konteksta. Vsebuje pojasnila o povezani arhitekturi, komponentah in funkcijah upravljanja ter zasnovah, pogojih in definicijah, ki se uporabljajo za porazdeljeno upravljanje dostopa. Subjekti, vključeni v upravljanje dostopa, so lahko edinstveno prepoznani za dostop do informacijskih sistemov, kot je opredeljeno v standardu ISO/IEC 24760.
General Information
- Status
- Published
- Public Enquiry End Date
- 09-Feb-2023
- Publication Date
- 11-Jun-2023
- Technical Committee
- ITC - Information technology
- Current Stage
- 6060 - National Implementation/Publication (Adopted Project)
- Start Date
- 26-May-2023
- Due Date
- 31-Jul-2023
- Completion Date
- 12-Jun-2023
Overview
EN ISO/IEC 29146:2023 (identical to ISO/IEC 29146:2016 with Amendment 1:2022) defines a comprehensive framework for access management (AM) for information and communications technology (ICT) environments. The standard provides common concepts, terms and definitions for distributed access control, explains a reference architecture, and describes components and management functions used to securely manage access to information resources. Physical access control is explicitly out of scope.
Keywords: ISO/IEC 29146, access management, access control framework, IAM, distributed access management
Key topics
- Concepts and terminology: Clear definitions for subjects, resources, contexts and accountability used across distributed network environments.
- Reference architecture: Core AMS components including:
- Authentication endpoint
- Policy Decision Point (PDP)
- Policy Enforcement Point (PEP)
- Policy Information Point (PIP)
- Policy Administration Point (PAP)
- Management functions: Policy administration, privilege management, policy-related attribute management, authorization, monitoring and alarm management.
- Operational concerns: Federated access control, relationships between identity management and access management, security characteristics of access methods, and legal/regulatory considerations.
- Practice and validation: Processes for authorization and privilege management, threat considerations, control objectives and validation of implemented AMS.
Keywords: PDP, PEP, PIP, PAP, authentication, authorization, federated access control
Applications
EN ISO/IEC 29146 is practical for organizations designing, implementing or evaluating access management systems:
- Building or procuring Access Management Systems (AMS) and IAM platforms for cloud, on‑premise and hybrid environments.
- Defining access control policies and privilege lifecycle processes (assignment, change, revocation).
- Implementing federated access across partner domains or multi‑tenant services.
- Structuring monitoring, logging and alarm management to support accountability and audits.
- Assessing AMS against control objectives and validating ongoing maintenance and compliance.
Keywords: access control policy, privilege management, IAM solutions, access management system
Who should use this standard
- Security architects and IAM engineers designing access control architectures
- CISOs and compliance officers aligning access controls with regulatory requirements
- System integrators and software vendors building authentication/authorization components
- Auditors and risk managers validating access management processes
Related standards
- ISO/IEC 24760 - identity management framework (closely related; identity management underpins access management defined in ISO/IEC 29146)
EN ISO/IEC 29146:2023 provides a vendor-neutral, standardized basis to design consistent, secure access management across distributed ICT environments, improving interoperability, accountability and governance of access to digital resources.
Frequently Asked Questions
SIST EN ISO/IEC 29146:2023 is a standard published by the Slovenian Institute for Standardization (SIST). Its full title is "Information technology - Security techniques - A framework for access management (ISO/IEC 29146:2016, including Amd 1:2022)". This standard covers: ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context. This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments. This International Standard also provides explanations about related architecture, components and management functions. The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760. The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.
ISO/IEC 29146:2016 defines and establishes a framework for access management (AM) and the secure management of the process to access information and Information and Communications Technologies (ICT) resources, associated with the accountability of a subject within some context. This International Standard provides concepts, terms and definitions applicable to distributed access management techniques in network environments. This International Standard also provides explanations about related architecture, components and management functions. The subjects involved in access management might be uniquely recognized to access information systems, as defined in ISO/IEC 24760. The nature and qualities of physical access control involved in access management systems are outside the scope of this International Standard.
SIST EN ISO/IEC 29146:2023 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase SIST EN ISO/IEC 29146:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of SIST standards.
Standards Content (Sample)
SLOVENSKI STANDARD
01-julij-2023
Informacijska tehnologija - Varnostne tehnike - Ogrodje za upravljanje dostopa
(ISO/IEC 29146:2016, vključno z dopolnilom 1:2022)
Information technology - Security techniques - A framework for access management
(ISO/IEC 29146:2016, including Amd 1:2022)
Informationstechnologie - Sicherheitstechniken - Ein Rahmen für die Zugangsverwaltung
(ISO/IEC 29146:2016, einschließlich Amd 1:2022)
Technologies de l'information - Techniques de sécurité - Cadre pour gestion d'accès
(ISO/IEC 29146:2016, y compris Amd 1:2022)
Ta slovenski standard je istoveten z: EN ISO/IEC 29146:2023
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EUROPEAN STANDARD EN ISO/IEC 29146
NORME EUROPÉENNE
EUROPÄISCHE NORM
April 2023
ICS 35.030
English version
Information technology - Security techniques - A
framework for access management (ISO/IEC 29146:2016,
including Amd 1:2022)
Technologies de l'information - Techniques de sécurité Informationstechnologie - Sicherheitstechniken - Ein
- Cadre pour la gestion de l'accès (ISO/IEC 29146:2016, Rahmen für die Zugangsverwaltung (ISO/IEC
y compris Amd 1:2022) 29146:2016, einschließlich Amd 1:2022)
This European Standard was approved by CEN on 24 March 2023.
CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.
CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2023 CEN/CENELEC All rights of exploitation in any form and by any means
Ref. No. EN ISO/IEC 29146:2023 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3
European foreword
The text of ISO/IEC 29146:2016, including Amd 1:2022 has been prepared by Technical Committee
ISO/IEC JTC 1 "Information technology” of the International Organization for Standardization (ISO) and
has been taken over as EN ISO/IEC 29146:2023 by Technical Committee CEN-CENELEC/JTC 13
“Cybersecurity and Data Protection” the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by October 2023, and conflicting national standards shall
be withdrawn at the latest by October 2023.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN-CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national standards body.
A complete listing of these bodies can be found on the CEN and CENELEC websites.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and the
United Kingdom.
Endorsement notice
The text of ISO/IEC 29146:2016, including Amd 1:2022 has been approved by CEN-CENELEC as
INTERNATIONAL ISO/IEC
STANDARD 29146
First edition
2016-06-01
Information technology — Security
techniques — A framework for access
management
Technologies de l’information — Techniques de sécurité — Cadre
pour gestion d’accès
Reference number
ISO/IEC 29146:2016(E)
©
ISO/IEC 2016
ISO/IEC 29146:2016(E)
© ISO/IEC 2016, Published in Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Ch. de Blandonnet 8 • CP 401
CH-1214 Vernier, Geneva, Switzerland
Tel. +41 22 749 01 11
Fax +41 22 749 09 47
copyright@iso.org
www.iso.org
ii © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 4
5 Concepts . 5
5.1 A model for controlling access to resources . 5
5.1.1 Overview . 5
5.1.2 Relationship between identity management system and access
management system . 6
5.1.3 Security characteristics of the access method. 7
5.2 Relationships between logical and physical access control . 8
5.3 Access management system functions and processes . 8
5.3.1 Overview . 8
5.3.2 Access control policy . 9
5.3.3 Privilege management .10
5.3.4 Policy-related attribute information management .11
5.3.5 Authorization .12
5.3.6 Monitoring management .12
5.3.7 Alarm management .13
5.3.8 Federated access control.13
6 Reference architecture .14
6.1 Overview .14
6.2 Basic components of an access management system .15
6.2.1 Authentication endpoint .15
6.2.2 Policy decision point (PDP) .15
6.2.3 Policy information point (PIP) .15
6.2.4 Policy administration point (PAP) .15
6.2.5 Policy enforcement point (PEP) .16
6.3 Additional service components .16
6.3.1 General.16
6.3.2 Subject centric implementation . .16
6.3.3 Enterprise centric implementation .18
7 Additional requirements and concerns .19
7.1 Access to administrative information .19
7.2 AMS models and policy issues .19
7.2.1 Access control models .19
7.2.2 Policies in access management .20
7.3 Legal and regulatory requirements .20
8 Practice .20
8.1 Processes .20
8.1.1 Authorization process .20
8.1.2 Privilege management process .21
8.2 Threats .21
8.3 Control objectives .22
8.3.1 General.22
8.3.2 Validating the access management framework .22
8.3.3 Validating the access management system .25
8.3.4 Validating the maintenance of an implemented AMS .29
Annex A (informative) Current access models .31
© ISO/IEC 2016 – All rights reserved iii
ISO/IEC 29146:2016(E)
Bibliography .35
iv © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical
Barriers to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/IEC JTC 1, Information technology, Subcommittee
SC 27, IT Security techniques.
© ISO/IEC 2016 – All rights reserved v
ISO/IEC 29146:2016(E)
Introduction
Management of information security is a complex task that is based primarily on risk-based approach
and that is supported by several security techniques. The complexity is handled by several supporting
systems that can automatically apply a set of rules or policies consistently.
Within the management of information security, access management plays a key role in the
administration of the relationships between the accessing party (subjects that can be human or non-
human entities) and the information technology resources. With the development of the Internet,
information technology resources can be located over distributed networks and the access to them
needs to be managed in conformity under a policy and is expected to have common terms and models
as a framework on access management.
Identity management is also an important part of access management. Access management is mediated
through the identification and authentication of subjects that seek to access information technology
resources. This International Standard depends on the existence of an underlying identity management
system or an identity management infrastructure (see references in Clause 2).
The framework for access management is one part of an overall identity and access management
framework. The other part is the framework for identity management, which is defined in ISO/IEC 24760.
This International Standard describes the concepts, actors, components, reference architecture,
functional requirements and practices for access control. Example access control models are included.
It focuses mainly on access control for a single organization, but adds other considerations for access
control in collaborative arrangements across multiple organizations.
vi © ISO/IEC 2016 – All rights reserved
INTERNATIONAL STANDARD ISO/IEC 29146:2016(E)
Information technology — Security techniques — A
framework for access management
1 Scope
This International Standard defines and establishes a framework for access management (AM) and
the secure management of the process to access information and Information and Communications
Technologies (ICT) resources, associated with the accountability of a subject within some context.
This International Standard provides concepts, terms and definitions applicable to distributed access
management techniques in network environments.
This International Standard also provides explanations about related architecture, components and
management functions.
The subjects involved in access management might be uniquely recognized to access information
systems, as defined in ISO/IEC 24760.
The nature and qualities of physical access control involved in access management systems are outside
the scope of this International Standard.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 24760-1:2011, Information technology — Security techniques — A framework for identity
management — Part 1: Terminology and concepts
ISO/IEC 24760-2:2015, Information technology — Security techniques — A framework for identity
management — Part 2: Reference architecture and requirements
ISO/IEC 29115:2013, Information technology — Security techniques — Entity authentication assurance
framework
ISO/IEC 27002:2013, Information technology — Security techniques — Code of practice for information
security controls
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 24760-1, ISO/IEC 29115,
and the following apply.
3.1
access control
granting or denying an operation to be performed on a resource (3.14)
Note 1 to entry: A primary purpose of access control is to prevent unauthorized access to information or use of
ICT resources based on the business and security requirements; that is, the application of authorization policies
to particular access requests.
Note 2 to entry: When an authenticated subject (3.15) makes a request, the resource owner will authorize (or
not) access in accordance with access policy and subject privileges.
© ISO/IEC 2016 – All rights reserved 1
ISO/IEC 29146:2016(E)
3.2
access management
set of processes to manage access control (3.1) for a set of resources (3.14)
3.3
access token
trusted object encapsulating the authority for a subject (3.15) to access a resource (3.14)
Note 1 to entry: An access token is issued by the policy decision point (PDP) and consumed by the policy
enforcement point (PEP) for the resource.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
3.4
attribute
characteristic or property used to describe and to control access to a resource (3.14)
Note 1 to entry: The rules for accessing a resource are defined in an access control (3.1) policy which specifies the
attributes required for the granting of access by a subject (3.15) to a resource for a specific operation.
Note 2 to entry: Attributes can include subject attributes, resource attributes, environmental attributes and
other attributes used to control access as specified in the access control policy.
3.5
endpoint
location in an access management (3.2) system where an access control (3.1) function is performed
Note 1 to entry: There can be the following different types of endpoints:
— authentication endpoint, where subject (3.15) authentication is performed;
— authorization endpoint, where subject authorization is performed;
— endpoint discovery service, that searches for and locates endpoints;
— initial endpoint discovery service, used at the start of subject interactions with an access management system.
Note 2 to entry: Endpoint discovery services are commonly used in distributed and networked systems.
3.6
enterprise centric implementation
access management (3.2) conducted under the control of a policy decision point
3.7
need-to-know
security objective of keeping the subject’s (3.15) access to data resources (3.14) to the minimum
necessary for a requesting user to perform their functions
Note 1 to entry: Need-to-know is authorized at the discretion of the resource owner.
Note 2 to entry: Need-to-have is the security objective of the requester for the fulfilment of specific tasks that
may be limited at the resource owner’s discretion.
2 © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
3.8
privilege
access right
permission
authorization to a subject (3.15) to access a resource (3.14)
Note 1 to entry: Privilege is a necessary but not sufficient condition for access. Access occurs when the access
request is granted according to its access control policy. The access control policy is based on privileges and may
include other environmental factors (e.g. time-of-day, location, etc.)
Note 2 to entry: Privileges take the form of data presented by a subject or obtained for a subject that is used by
a Policy Decision Point in order to grant or deny an operation that a subject is willing to perform on a resource.
Note 3 to entry: A resource may have multiple distinct privileges associated with it which correspond to various
defined levels of access. For example, a data resource could have read, write, execute and delete privileges
available for assignment to subjects. A request by a subject for access to the resource might be allowed for
some levels of access request but disallowed for other levels depending on the level of access requested and the
resource privileges that have been assigned to the subject.
3.9
role
name given to a defined set of system functions that may be performed by multiple entities
Note 1 to entry: The name is usually descriptive of the functionality.
Note 2 to entry: Entities can be but are not necessarily human subjects.
Note 3 to entry: Roles are implemented by a set of privilege (3.8) attributes to provide the necessary access to
data resources or objects.
Note 4 to entry: Subjects assigned to a role inherit the access privileges associated with the role. In operational
use, subjects will need to be authenticated as members of the role group before being allowed to perform the
functions of the role.
3.10
policy decision point
PDP
service that implements an access control policy to adjudicate requests from entities to access resources
(3.14) and provide authorization decisions for use by a policy enforcement point (3.11)
Note 1 to entry: Authorization decisions are used by a policy enforcement point to control access to a resource.
An authorization decision may be communicated through the use of an access token (3.3).
Note 2 to entry: PDP also audits the decisions in an audit trail and is able to trigger alarms.
Note 3 to entry: The term corresponds to Access Decision Function (ADF) in ISO 10181-3. It is presumed that
this function is located over a network from the subject (3.15), and may be located over a network from the
corresponding PEP (3.11).
3.11
policy enforcement point
PEP
service that enforces the access decision by the policy decision point (3.10)
Note 1 to entry: The PEP receives authorization decisions made by the PDP and implements them in order to
control access by entities to resources (3.14). An authorization decision may be received in the form of an access
token (3.3) presented by a subject (3.15) when an access request is made.
Note 2 to entry: The term corresponds to Access Enforcement Function (AEF) in ISO 10181-3. It is presumed
that this function is located over a network from the subject and may be located over a network from the
corresponding PDP (3.10).
© ISO/IEC 2016 – All rights reserved 3
ISO/IEC 29146:2016(E)
3.12
policy administration point
PAP
service that administers access authorization policy
3.13
policy information point
PIP
service that acts as the source of attributes (3.4) that are used by a policy decision point (3.10) to make
authorization decisions
Note 1 to entry: Attributes can include resource (3.14), subject (3.15) and environment privileges (3.8)/
permissions.
3.14
resource
object
physical, network, or any information asset that can be accessed for use by a subject (3.15)
3.15
subject
entity requesting access to a resource (3.14) controlled by an access control (3.1) system
3.16
security token service
STS
service that builds, signs, exchanges and issues access tokens (3.3) based on decision made by a policy
decision point (3.10)
Note 1 to entry: This service may be split into separate components.
3.17
subject centric implementation
access management (3.2) implemented as component services that are called by a subject (3.15) to
acquire the means recognized by the policy enforcement point (3.11) for accessing a resource (3.14)
Note 1 to entry: Component services may include policy decision point service, policy enforcement point service
and associated discovery services that enable the subject to locate and contact the access control (3.1) services.
4 Abbreviated terms
AA attribute authority
ABAC attribute-based access control
ACL access control list
AM access management
AMS access management system
CBAC capabilities-based access control
DAC discretionary access control
IBAC identity-based access control
ICT information and communication technology
IMS identity management system
4 © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
IT information technology
MAC mandatory access control
PBAC pseudonym-based access control
PAP policy administration point
PEP policy enforcement point
PDP policy decision point
PII personally identifiable information
PIP policy information point
RBAC role-based access control
REDS resource endpoint discovery service
STS security token service
TLS transport layer security
XACML extensible access control markup language
5 Concepts
5.1 A model for controlling access to resources
5.1.1 Overview
The conceptual sequence in giving access to a resource is as follows.
a) Subject authentication is needed before giving access to a resource. However, authentication is
a separate function that is typically implemented on a session basis rather than for each access
request.
b) Authorization decision to allow or deny access to the resource is made based on a policy, and an
access token is issued to convey the result of the decision.
c) Authorization enforcement is conducted on the resource based on the decision result and resource
access will be given.
Figure 1 shows this decision sequence.
Figure 1 — Access control model sequence
Subject and resource are depicted as balloons while conceptual functions are depicted as rectangles.
© ISO/IEC 2016 – All rights reserved 5
ISO/IEC 29146:2016(E)
For the purpose of being accessed, a resource is characterized by the following:
— an identifier, either for a specific resource or for a resource class;
— one or more modes of access;
— a set of attributes associated with the modes of access and other access criteria as specified in the
access control policy.
An access management system is responsible for the administration and operation of authorizations to
access. Authorizations are supported by administrative activity which assigns and maintains resource
attributes and subject privileges in accordance with the access management policy.
Resources in IT systems are typically dynamic. They run a lifecycle from creation to destruction and
this is a continuous process.
a) Resources have a life-cycle which runs from creation to destruction.
b) Resources are continually being created, updated and destroyed.
c) Resources need to be assigned access attributes (usually at the time of creation) which will be
used by the access management system to control access by subjects to the resources. [Typically
this is done by pre-defining recognized resource types with associated access attribute templates.
When a resource of a known type is created, it inherits the access attributes of the corresponding
template].
d) Resources are owned by a party which might be a person or an organization. The owner is often
the creator of the resource but not always and the ownership may change during the life of the
resource.
5.1.2 Relationship between identity management system and access management system
In the model described here, the subject is authenticated using an identity management system (IMS),
as described in ISO/IEC 24760-2. The authenticated subject then requests access using the access
management system (AMS). The access management system determines whether or not to authorize
the subject request to access the resource. Subject authorization comprises two distinct activities,
— the pre-assignment of resource access privileges to subjects, and
— the granting of access to resources by subjects in operational use.
Figure 2 shows the relationship between an identity management system (IMS) and an access
management system (AMS).
6 © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
Figure 2 — Identity management system and access management system relationship
Authentication is supported by an identity management system (IMS). In an access management system
using the IBAC model, identity is the basis for the assignment of resource access privileges to subjects
and for the authorization of resource access requests by subjects in operational use.
NOTE Granting access to a resource may require a minimum stated level of authentication assurance for
the subject which depends on the risk profile of resource. The required level depends on the identity-related
risk pertaining to the resource to be accessed. For further information on authentication level of assurance, see
ISO/IEC 29115.
Authorization is provided by the access management system (AMS) that supports access information
management.
Implementation practice for access management systems may vary according to the architecture and
the access control model used, e.g.
a) when an AMS is implemented as a Web service system, a subject may request access to a resource
without first being authenticated. In this case, the AMS will direct the subject to request the IMS to
provide authentication, and
b) when an ABAC model is adopted, there is a possibility for a subject not to require any authentication.
In this case, anonymous entity may be allowed to go directly to the AMS, and authorization decision
will be made based on a credential that can be validated to prove that the subject possesses the
asserted attributes.
5.1.3 Security characteristics of the access method
Consideration should be given to address the security aspects of access control systems implementation
and processes particularly where federated architectures are employed.
For security reasons, the integrity of the access request may first need to be validated before it is
further processed by the access management system.
Where communication channels can be trusted, such as for private connections within an organization,
additional protection may not be needed. However, where communication channels run across public
networks or other unprotected channels, measures to protect the integrity and confidentiality of
access requests and associated data should be provided for both the access request itself (privileges,
subject authentication data, resource, requested operation, etc.) and the data sent to or received from
the resource during the period of access.
© ISO/IEC 2016 – All rights reserved 7
ISO/IEC 29146:2016(E)
There are two approaches to establish a secure communication channel between the subject and
the access management system. The following approaches consider the time at which that secure
communication channel will be established:
a) a secure communication channel may be established before the transmission of the privileges or
of the data that will be used to obtain the privileges (e.g. by the construction of a Transport Layer
Security (TLS) session with the server supporting the resource);
b) a secure communication channel may be established after the successful transmission of the
privileges or of the data that has been used to authenticate an identifier of the subject.
In the latter case, the secure communication channel is established either after a successful
authentication exchange or after the successful acceptance of an access token; the integrity and the
confidentiality keys are derived from the authentication exchange or derived from information
contained in the access token or from information linked to the access token. Then, the transmission
of the operation requested on the resource can be made through that secure communication channel.
5.2 Relationships between logical and physical access control
This International Standard mainly focuses on logical access control. Logical access control is supported
by physical access control.
Logical access to a resource in an enterprise system should be supported by a secure physical
infrastructure which provides an effective set of controls and actions that cannot be subverted.
For logical access to a resource hosted by an outsourced service, the outsourced service should be
accountable for its physical and logical access control so that it can be trusted by the subject.
5.3 Access management system functions and processes
5.3.1 Overview
An access management system (AMS) enforces an access control policy and provides two core
operational functions:
a) to assign resource access privileges to subjects in advance of operational use; alternatively, to
assign access privileges to attributes (as in the ABAC model) and then assign attributes to subjects
who inherit the associated access privileges;
b) to use these privileges (together with other information where appropriate) to control subject
access to system resources in operational use.
In addition, an AMS provides administrative functions to support the core functions, including
— policy management,
— policy-related access attribute management, and
— monitoring and record keeping management.
Resource access policy should implement the following principles:
a) setting access attributes on a “need-to-know” basis;
b) minimalizing data access in order to restrict access to only strictly required data and minimize
data leakage and disclosure risk;
c) segregating and protecting of sensitive data;
d) protecting of PII;
8 © ISO/IEC 2016 – All rights reserved
ISO/IEC 29146:2016(E)
e) using multifactor authentication based on the criticality and sensitivity of resource accessed.
5.3.2 Access control policy
An access management system (AMS) enforces an access control policy. A number of access control
models exist (see Annex A). This International Standard focuses on the following models which are
sufficiently flexible to be suitable for use in both centralized and distributed network environments:
— Identity-based Access Control (IBAC);
— Role-based Access control (RBAC);
— Attribute-based Access Control (ABAC).
Access control policy should be described in natural language or another suitable representation, e.g.
a formal language, to express the objectives for the control of access to resources, the methods and
processes for exercising the control and any requirements for monitoring, auditing and other non-core
functions.
There may be multiple access control policies within an organization. Typically, a group of resources on
one technology may be accessed under the control of a decision point responding to one policy, while
access to another group of resources developed with a different technology will be managed under a
different decision point responding to a second access control policy. Both decision points may also
respond to the same access control policy and this is recommended.
Where multiple access control systems operate within an organization and they are to be integrated into
a single system, policy differences should be reconciled and a common access control policy developed
and documented. An alternate approach could be to integrate the systems as an intra-organization
federation, in which case, the considerations and requirements described in 5.3.8 shall be applicable.
Access control is provided through mechanisms for granting or denying operations to be performed on
resources based on an access control policy.
Authorization decisions are made based on the evaluation of subject privileges and attributes against
access rules set out for the relevant resource. Rules can also include environmental attributes such as
time of day and location from which the request is made. For example, no operation can be done on the
resource between 9:00 P.M. and 7:00 A.M.
If MAC applies, a rule will necessarily be global to a set of resources. For example, subjects should be
cleared to “Top Secret” for any operation that they would like to perform on a given set of resources.
NOTE As multiple rules may be applied sequentially, the order of application might affect the efficiency of
the decision process. However, the optimum ordering will depend on the relative likelihood of grant/deny access
decisions in operational use.
In general, individual rules may be implemented by means of an access control matrix associated with
each resource which contains one or more entries.
Each entry will indicate the condition(s) that a subject shall fulfil in order to perform one or more
operations on the resource. The major condition to fulfil is that the subject shall possess some
privilege(s).
ABAC is the most general case where access control is based on AMS defined attributes possessed by
subjects. IBAC, PBAC and RBAC are particular cases of ABAC where the attributes are, respectively,
identity, pseudonymous identity and role. These four models may be implemented using ACLs.
When the subject presents a capability ticket (in a CBAC model) for authorization, it is necessary to
verify that the capability ticket as an access token is effective for that operation.
In access management systems that embody more than one access model, care should be taken to ensure
that policies specifying access to resources by subjects do not result in conflicting access decisions for
© ISO/IEC 2016 – All rights reserved 9
ISO/IEC 29146:2016(E)
the same subject via different paths: A policy administration point should be able to manage various
models of PBAC, IBAC, RBAC, ABAC or CBAC.
An access control policy should have the following characteristics:
a) be based on policy requirements common to required models in place, to protect information to
meet business requirements and for reasons of legal and regulatory compliance and intellectual
property;
b) contain a policy hierarchy, based upon the common policy, from which access control rules applying
to individuals with same characteristics may be defined;
c) describe the attributes supporting a defined classification. This categorization will enable policy
interoperability and compliance across organizations;
d) describe procedures for the provisioning and management of privileges, the access control process
and exception handling.
5.3.3 Privilege management
The requirements for privilege management are defined by the access control policy as mentioned in 5.3.2.
Under identity-based access control policy, privilege management is conducted on the basis of subject
identity. IBAC policy employs mechanisms such as access control lists (ACLs) to specify the iden
...










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...