Security Policy Tool

Network, System, IoT, and Cloud data breach often occur due to the presence of unintended access control holes that leave online resources unprotected:

  • Did you verify your XACML rules/policies in terms of security (NIST SP 800-192) before operations?
  • Do you know if there are any hidden privilege leaks (see Access Control Error Types) in your access control rules/policies?
  • Do you want to save time and cost in development of XACML policies?
  • Do you want to acquire more customers to improve their access control security?

Security Policy Tool is a leading access control solution that equips you to answer “Yes” to all the above capabilities. It allows you to easily develop highly secure access control rules/policies, to extinguish the threat of cyber-attacks and insiders exploiting access control security vulnerabilities.


Security Policy Tool enables powerful, thoughtful, and convenient access control policy editing, testing and analyzing functions such that the policy authors can validate and fix the faulty, unintended, misconfigured policies. This ensures there are no security leaks when the policies are deployed in a system. The access control policies can be effectively analyzed via user-friendly GUI (graph user interface) to find unintended accessibility. With the identification of the faulty and unintended policies, the policy author can revise the rules in policies to exclude the access control vulnerabilities. For such a purpose, Security Policy Tool has many analyzing functions for the policy author to find the correlations among the rules and the access control accessibility. In addition, it offers the functions to conveniently compose access control models with a large number of rules and policies. It also contains an XACML editor for policy editing.

Policy Development


Security Policy Tool saves you valuable time during the policy design phase all while giving you the power to eliminate disastrous access control flaws. Security Policy Tool allows a policy author to conveniently compose a large number of rules and apply them to access control polices and models, such as ABAC (Attribute-based Access Control). Security Policy Tool provides XACML-compatible policy composition and policy development which in turn makes it easier to use the policy editing functions, such as:

  • Attributed-based Access Control (ABAC), Multilevel Security, and Workflow access control templates all included in our tool
  • Verify, Review, Search, and Manage a number of rules and policies effectively
  • Update and compose Subject, Resource, Action, Environment, and Condition via Graphic User Interfaces
  • Update and compose inheritance relations for hierarchical organizations to effectively manage a number of Subjects and Resources in a large-scale access control system
  • Automatically detect and prevent an inheritance loop before they occur
  • Export the attributes and policies, giving you full power of your own system

Figure 1: GUI to Create an ABAC Policy Rule



Figure 2: GUI to Create a Multilevel Security Policy

Policy Tests and Verifications


Due to the complex nature of designing access control policies, errors commonly come up. Before deploying your access control policy, Security Policy Tool can verify the effectiveness (i.e., Permit or Deny) of your composed policy in comparison to your organization’s security requirements. Using our testing engine, a policy author can analyze the results to verify if the access control decisions from the tests are working as planned. If all the results are matched with the intended results, the policies including the rules and the algorithms in the access control models can be deployed into your access control system. In the circumstance there are access control errors the policy author will need to revise their policies or algorithms and test for new results using Security Policy Tool. Once the expected results are achieved, your organization will have the peace-of-mind knowing that your intended level security is being reached. The policy tests support all XACML 3.0 rule-combining algorithms that include First Applicable, Deny Override, Permit Override, etc. It also supports rule enforcement algorithms that are Deny Based and Permit Based.

Figure 3: Single Policy Verification and Results



Figure 4: Policy Verification Approach 1: Merged Rules



Figure 5: Policy Verification Approach 2: Combined Policies



Security Policy Tool specifically enables the following policy testing and verification functions for policy error detection.

  • Policy Verification: Security Policy Tool can test one or multiple policies against specific security requirements. In the case of multiple policies, it can test/verify the policies through a merging or a combining policy process. The detailed testing results allow you to check if there are access control leaks against each rule.
  • Exhaustive Policy Verification: Security Policy Tool can automatically generate a number of Security Requirements by pairwise or all-pairs attribute combinatorial algorithms. The collection of these requirements is called a testing suite. Similar to software testing, the testing suite allows a policy author to achieve a certain testing coverage, which reaches an access control flaw detection probability. Pairwise testing is commonly suggested as its testing coverage can find 50% - 90% access control flaw detection probability. 4-way combinatorial testing can discover most complex access control flaws and its testing coverage can discover very close to 100% AC flaw detection probability.
  • Separation of Duty: Security Policy Tool can also test Separation of Duty. This tests if there are conflicts among two or more security requirements.

Security Policy Tool allows the policy author to test and verify all security requirements for the policies in an access control model.

Policy Analysis, Access Control Flaw Inspection and Correction


Security Policy Tool presents the testing results to the policy author for analysis, inspection, and correction. Our comprehensive results allow the policy author to view:

  • Individual security requirements vs. actual policy rules
  • Separation of Duty to verify no conflicts of interest among rules
  • Resource accessibility for a given Subject and the rule combining algorithms
  • Subject accessibility for a given Resource and the rule combining algorithms

Security Policy Tool has powerful analyzing functions to help policy authors to inspect and correct the following access control errors:

Error Types Error Name
Error type 1 Block Privilege
Error type 2 Leak Privilege
Error type 3 Not Protected Resource
Error type 4 Rule Conflict
Error type 5 Inconsistent Assignment
Error type 6 Privilege Inheritance Loop
Error type 7 Undecided Rules
Error type 8 Separation of Duty Error

Security Policy Tool correlates the decision between the security requirement and the rule. This allows the policy author to revise the rules until the intended security requirements are achieved.

XACML Editor, Checker, and Converter


Figure 6: XACML GUI-enabled Editing

Security Policy Tool has an XACML 3.0 policy editor with GUIs for policy editing, verification, and inputting/outputting functions. At first, XACML 2.0/3.0 policy can be inputted into Security Policy Tool and then automatically convert XACML 2.0 policy to 3.0. It has policy editing, grammar checking, and verification functions for policy authors to define or modify policies easily. Meanwhile, it can automatically convert the composed and tested policies in the access control models (ABAC, Multilevel Security, and Workflow) into XACML 3.0 policies, which cuts down on labor time, by avoiding manual editing where errors are common.