PreviousNext

Example of Using Filter Rules

The use of overridable filters is described in the following scenario:

Alice in Company (cell) X is responsible for activating some operations (event class critical_transactions). Other principals in the company are also authorized to activate the same operations, but only under certain conditions; for example, when Alice is not available. The system administrator wants to log an audit record regardless of the event outcome (that is, audit conditions = all) or who activates these operations. The administrator also wants to generate an alarm if the activator is not Alice. This specification is implemented by the following two filters:

Filter 1:

filter type: principal
key: Alice
guide 1:
audit conditions - all
audit actions - log
event classes - critical_transactions

Filter 2:

filter type: cell_overridable
key: X
guide 1:
audit conditions - all
audit actions - log, alarm
event classes - critical_transactions

When Alice invokes events in the critical_transactions event class, the principal filter (filter 1) is applicable because its key matches Alice's identity. The principal filter is more specific than the cell filter. Although the cell filter (filter 2) is also applicable to Alice (Alice belongs to cell X), it is overridden by the principal filter because the cell filter is overridable. For other principals in Company (cell) X, the only applicable filter is the cell filter (filter 2). Thus, these same events will cause an audit record to be logged and also raise an alarm.

Nonoverridable world and cell filters are also useful. Without them, an administrator, for example, would have to delete all filters for groups and principals of a cell in order to make a cell-wide filter effective to the whole cell. (System administrators may want to introduce a temporary nonoverridable cell filter when a cell is suspected to be the source of a security problem.)

The following figure illustrates the override relations between different types of filters. An arrow from filter type X to filter type Y means that X overrides Y.


Override Relations Between Filter Types

DCE groups are generally defined for the purpose of granting access permissions. A group filter specifies auditing the intent to use the group's privileges, instead of specifying auditing the principals that belong to the group. That is, a group filter would not have auditing effects on a member principal of the group unless the principal has the intent to use the group's privileges (by including the group in the PAC). Because group filters are defined to audit the intention of using a group's privileges, they are independent of other filters and are not overridable.