{"id":385,"date":"2019-03-28T08:25:24","date_gmt":"2019-03-28T12:25:24","guid":{"rendered":"https:\/\/blogs.plm.automation.siemens.com\/t5\/Digital-Transformations\/Attribute-Based-Access-Control-ABAC-Encryption-on-Steroids\/ba-p\/580836"},"modified":"2026-03-26T12:08:06","modified_gmt":"2026-03-26T16:08:06","slug":"attribute-based-access-control-abac-encryption-on-steroids","status":"publish","type":"post","link":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/attribute-based-access-control-abac-encryption-on-steroids\/","title":{"rendered":"Encryption on Steroids &#8211; Attribute Based Access Control (ABAC)"},"content":{"rendered":"\n<p>How many data breaches\nneed to occur before companies take real preventative action? While hotel\nchains, retail stores, and Facebook are likely to grab headlines, companies of\nall sizes, across all industries, face the same threats. If you work with\nintellectual property, handle sensitive materials, or are subject to regulatory\ncompliance, you need to safeguard your digital assets.<\/p>\n\n\n\n<p>Pernicious attacks\ndon\u2019t always come from the outside. According to <a href=\"https:\/\/www.healthcaredive.com\/news\/data-breaches-compromised-151m-patient-records-last-year\/548307\/\" target=\"_blank\" rel=\"noreferrer noopener\">JAMA Internal Medicine<\/a>, 53 percent of the 1,138 instances of a data\nbreach at medical facilities they analyzed originated from inside the\norganization. Overall, 15.1 million patient records were compromised in 2018, a\nnear three-fold uptick from 2017.<\/p>\n\n\n\n<p>Unprepared companies\nfind themselves on newsfeeds for both negligence in combatting a breach and the\nresulting punishment levied by regulating bodies. Despite this, most companies\ntrying to manage their data are using increasingly unreliable methods such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Putting up a firewall around the application. Despite amazing progress with firewalls and network security, a malicious attack or internal leak (whether intentional or inadvertent) will result in compromised data.<\/li><li>Using an Access Control List (ACL). Sadly, this static method of protecting who can touch data doesn\u2019t work in today\u2019s modern, dynamic, and globally distributed environment.<\/li><li>Applying Role-Based Access Control (RBAC). Using authentication schemes, location, network, risk, and individual characteristics can work for one-time access, but today\u2019s environment is dynamic, making RBAC impossible to keep updated.<\/li><\/ul>\n\n\n\n<p>Chasing\ndynamic data with static security models will not support a fast-moving\ncompany. As more data becomes available for sharing across a variety of\nnetworks, these security measures are proving ineffective at stopping data\nbreaches. Using a network, an ACL, or RBAC simply can\u2019t stop malicious attacks\nor internal threats. <\/p>\n\n\n\n<p>The\nparadigm is shifting to Attribute-Based Access Control (ABAC) to redefine data\nprotection. ABAC has been developed to address the most stringent security\nrequirements of the most important government entities on the planet. ABAC is\nthe platform of choice for the US DoD, the UK MoD, and has quickly become a\nNIST standard.<\/p>\n\n\n\n<p>At its basic level,\nABAC uses an \u2018IF\/THEN\/AND\u2019 model to protect the data itself. This model is then\napplied to data via policy, checking attributes and applying the appropriate\npermissions (aka \u201cdigital rights\u201d).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Starbucks in Slovakia<\/h2>\n\n\n\n<p>Imagine a US State Department official carrying a laptop into a\nforeign country notorious for its ability to hack and steal data from the open\nweb. This official heads into a Starbucks, opens his or her laptop, and\nconnects to the public WiFi. It\u2019s hard to argue that this may be one of the\neasiest ways for data to be compromised, but if this official\u2019s data is\nencrypted via ABAC, data safety is assured regardless of how open the network\nmay be. Regardless of the location, encrypted data is protected by an ABAC\nschema that guarantees appropriate access or denial of access.<\/p>\n\n\n\n<p>ABAC puts the\nencryption and safety measures inside the data itself, ensuring that even if\nhacked or flat-out stolen (e.g. a thumb drive stuck into the side of a laptop),\nthe encryption prevents the data from being compromised and utilized outside of\nits intended use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Live inside the data itself<\/h2>\n\n\n\n<p>Attributes are the\nfoundation of ABAC. Factors such as program, citizenship, location, clearance\nlevel, even time of day, can be used to protect the data. If the user violates\nany parameter, the ability to access is lost.<\/p>\n\n\n\n<p>Continuing from the\nabove example about an official opening his or her files in a Starbucks in\nSlovakia, the policy may allow this user to access the data based on multi-factor\nauthentication, United States location, and clearance level. The fact that the\nofficial is trying to access the data in another country violates the policy,\nwhich then denies access to the data and reports the attempted use to the\npolicy management system. All elements of the policy must be met. This official\ncould copy\/paste the information into a separate application or right into\ntheir personal email address, but the encryption inside the data itself prevents\ntheir ability to access it and protects the information.<\/p>\n\n\n\n<p>Moving information\naround the globe on a second-by-second basis while maintaining control of the\nintellectual property or sensitive data is more important than ever. An ABAC\nsystem can be set up as a centrally located security measure, independent of\npeople, geography, and network perimeter security, and provide a single data\nsafety infrastructure around multiple applications. Users will have persistent rights\nmanagement regardless of the application they use to access ABAC-encrypted\ndata.<\/p>\n\n\n\n<p>When you put the encryption inside the data and metadata itself, companies can seize control of their data and prevent a breach from internal or external threats. The Department of Commerce has made this a mandatory practice and the adoption is spreading throughout several governmental and military agencies. There isn\u2019t an industry that couldn\u2019t benefit from implementing an ABAC solution, especially in a world where data is dynamic, information moves across the world in real-time, and breaches can ruin company reputation and trust. <\/p>\n\n\n\n<p>To learn more about securing your data with digital rights management, <a href=\"https:\/\/www.plm.automation.siemens.com\/global\/en\/products\/collaboration\/plm-digital-rights-management.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"please visit our Teamcenter DRM site (opens in a new tab)\">please visit our Teamcenter DRM site<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>About the Author<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/jim-sanford-0423328\/\" target=\"_blank\" rel=\"noopener\">Jim Sanford<\/a> leads the sales and delivery of NextLabs products through Siemens in all markets and all customers.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How many more data breaches need to occur before companies take real preventative action? While hotel chains, retail stores and Facebook are likely to grab headlines, companies of all sizes, working &#8230;<\/p>\n","protected":false},"author":69683,"featured_media":391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spanish_translation":"","french_translation":"","german_translation":"","italian_translation":"","polish_translation":"","japanese_translation":"","chinese_translation":"","footnotes":""},"categories":[1],"tags":[31,2,207,224,32,214],"industry":[],"product":[],"coauthors":[],"class_list":["post-385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-data-security","tag-digitalization","tag-partners","tag-plm","tag-supplier-collaboration","tag-teamcenter"],"featured_image_url":"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/19\/2019\/09\/coffee-shop-1.jpg","_links":{"self":[{"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/users\/69683"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":5,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"predecessor-version":[{"id":3425,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/posts\/385\/revisions\/3425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/media\/391"}],"wp:attachment":[{"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/tags?post=385"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/industry?post=385"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/product?post=385"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/thought-leadership\/wp-json\/wp\/v2\/coauthors?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}