Skip to content
Home Β» Subjects

Subjects

Subjects in Access Control

Introduction

In Access Control, a subject is any active entity that requests access to a resource (object). Understanding subjects is essential because every access decision starts with a subject trying to perform an action.

πŸ‘‰ Subject = Who is requesting access

Subjects work together with:

  • Objects β†’ What is being accessed (files, database, system)
  • Access Rights β†’ What action is allowed (read, write, execute)

Meaning of Subject

A subject is an active entity (user or process) that:

  • Initiates a request
  • Performs actions on system resources
  • Operates on behalf of a user or system

πŸ“Œ Subjects are always β€œactive” components in a system.


Types of Subjects in Access Control


1. Human Users

Description

Real individuals who interact with the system.

Examples

  • Students
  • Employees
  • System administrators

Characteristics

  • Identified using user IDs
  • Authenticated via passwords, biometrics, etc.

2. Processes

Description

Programs or applications running on behalf of a user.

Examples

  • Web browser
  • Database management system
  • Background services

πŸ“Œ A process inherits permissions of the user who started it.


3. Devices

Description

Hardware entities that request access to network or system resources.

Examples

  • Computers
  • Smartphones
  • IoT devices

Use Case

Device authentication in network security


4. Programs / Applications

Description

Software entities that perform tasks and access data.

Examples

  • ERP software
  • Email applications
  • Banking apps

πŸ“Œ Programs act as subjects when accessing system resources.


5. System-Level Subjects

Description

Internal system components with special privileges.

Examples

  • Operating system kernel
  • System services (daemon processes)

πŸ“Œ These usually have higher privileges.


Subjects vs Objects

FeatureSubjectObject
NatureActivePassive
RoleRequests accessResource being accessed
ExampleUser, ProcessFile, Database

πŸ“Œ Subjects act on objects.


Access Rights Associated with Subjects

Subjects can perform different actions on objects:

  • Read (R) β†’ View data
  • Write (W) β†’ Modify data
  • Execute (X) β†’ Run programs
  • Delete (D) β†’ Remove data

Subject Attributes

Each subject has attributes that define access control decisions:

  • User ID
  • Role (Admin, User, Guest)
  • Clearance level
  • Group membership
  • Authentication status

πŸ“Œ Used in Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC).


Role of Subjects in Access Control Models

1. DAC (Discretionary Access Control)

  • Owner decides access for subjects

2. MAC (Mandatory Access Control)

  • Access based on security labels (clearance level)

3. RBAC (Role-Based Access Control)

  • Subjects assigned roles (e.g., Manager, Student)

Subjects and Security Principles

  • Least Privilege β†’ Subjects get minimum access
  • Need-to-Know β†’ Subjects access only required data
  • Accountability β†’ Actions traced to subjects

Subjects and CIA Triad

  • Confidentiality β†’ Only authorized subjects access data
  • Integrity β†’ Subjects cannot modify data illegally
  • Availability β†’ Authorized subjects get timely access

Real-Life Example

In a college system:

  • Subject β†’ Student
  • Object β†’ Result database
  • Access β†’ Read only

In a banking system:

  • Subject β†’ Teller
  • Object β†’ Customer account
  • Access β†’ Read/Write

Subjects in Cyber Law (India)

Under IT Act, 2000:

  • Unauthorized subject access β†’ Section 43
  • Identity misuse β†’ Section 66

πŸ“Œ Proper subject identification and authentication are legally important.


Advantages of Proper Subject Management

  • Prevents unauthorized access
  • Enhances accountability
  • Improves system security
  • Supports audit and compliance

Conclusion

Subjects are the core entities in access control systems, as they initiate all access requests. Proper identification, authentication, and authorization of subjects ensure secure interaction with system resources. Understanding subjects is essential for implementing effective access control models and maintaining information security.