How Role-Based Access Control Works

In the NetWitness Platform, roles determine what users can do. A role has permissions assigned to it and you must assign a role to each user. The user then has permission to do what the role allows. Role-bsed access control (RBAC) is established when there is a trusted connection between NetWitness Server and a Core service.

Preconfigured Roles

To simplify the process of creating roles and assigning permissions, there are preconfigured roles in NetWitness. You can also add roles customized for your organization.

The following table lists each preconfigured role and the permissions assigned to it. All permissions are assigned to the Administrators role. A subset of permissions is assigned to each of the other roles.

Role Permission

Administrators

Full system access. The System Administrators persona is granted all permissions by default.

Analysts

Access to meta and session content but not to configurations. The Security Operation Center (SOC) Analysts persona is centered around investigation, ESA Alerting, Reporting, and Respond, but not system configuration.

Reporting_Engine_Content_Administrators

Access to manage the Live content. Users with the Reporting Engine Content Administrator role can deploy Reporting Engine content (rules, reports, charts, and lists) from Live Content, view and manage permissions to the deployed content in Reporting Engine.

Data_Privacy_Officers

The Data Privacy Officer (DPO) persona is similar to Administrators with additional focus on configuration options that manage obfuscation and viewing of sensitive data within the system (see the Data Privacy Management Guide). Users with the DPO role can see which meta keys are flagged for obfuscation, and they also see obfuscated meta keys and values created for the flagged meta keys.

Malware_Analysts

Access to investigations and malware events. The only access granted to the Malware Analysts persona is the Malware Analysis module.

Operators

Access to configurations but not to meta and session content. The System Operators persona is focused on system configuration, but not investigation, ESA, Alerting, Reporting, and Respond.

Respond_Administrator

Access to all Respond permissions. The Respond Administrator persona is focused on system configuration of Respond.

SOC_Managers

Same access as Analysts plus additional permission to handle incidents. The SOC Managers persona is identical to Analysts, but with permissions necessary to configure Respond.

UEBA_Analysts

Access to the NetWitness UEBA service in the Investigate > Users view. NetWitness UEBA is an advanced analytics solution for discovering, investigating, and monitoring risky behaviors across all entities in your network environment.

Note: You do not need to set up specific permissions for this role. You only need to assign this role to a user, and that user will have access to NetWitness UEBA.

Trusted Connections Between Server and Service

In a trusted connection, a service explicitly trusts NetWitness Server to manage and authenticate users. This reduces administration on each service because authenticated users do not have to be defined locally in each Core service.

As the following table shows, you perform all user management tasks on the server.

Task Location
Add a user Server
Maintain usernames Server
Maintain passwords Server
Authenticate internal NetWitness users Server
(Optional) Authenticate external users with:
- Active Directory
- PAM

Server
Server
Install and configure PAM Server

 

The benefits of a trusted connection and centralized user management are that:

  • You perform all user administration tasks once, on NetWitness Server only.
  • You control access to services but do not have to set up and authenticate users on the services.
  • Users enter passwords once at NetWitness logon and are authenticated by the server.
  • Users, already authenticated by the server, access every Core service in netwitness_adminicon_25x22.png (Admin) > Services without entering a password.

How Trusted Connections Are Established

When you install or upgrade to 11.x, trusted connections are established by default with two settings:

  • SSL is enabled.
  • The Core service is connected to an encrypted SSL port.

Common Role Names on the Server and Services

Trusted connections rely on common role names on the server and service. On a fresh installation, NetWitness installs the five preconfigured roles on the server and each Core service.

netwitness_trustsecuritymodel_1_545x272.png

If you add a custom role, such as JuniorAnalysts, you must add the role to each service, such as ArchiverA and BrokerB. Role names are case-senstive, cannot contain spaces and must be identical. For example, JuniorAnalyst (singular) and JuniorAnalysts (plural) do not meet the requirements for common role names.

End-to-End Workflow for User Setup and Service Access 

This workflow shows how role-based access control works when there is a trusted connection between NetWitness Server and the service BrokerB.​

netwitness_trustsecuritymodel_2_558x359.png

  1. On NetWitness Server, create an account for a new user:
    Name: Chris Jones
    Username: CAJ
    Password: practice123
  2. Determine if you want to assign a preconfigured or custom role to Chris Jones:

    • Preconfigured role

      1. Keep or modify the default permissions assigned to the Analysts role, which include permissions such as access to the Alerting, Investigation and Malware modules,
      2. Assign the Analysts role to Chris Jones.
    • Custom role

      1. Create the custom role, such as JuniorAnalysts.
      2. Assign permissions to the JuniorAnalysts role.
      3. Assign the JuniorAnalysts role to Chris Jones.
      4. Add the JuniorAnalysts role to the service, such as BrokerB.
  3. The user, Chris Jones, logs on to NetWitness Server:

    • Username: CAJ​
    • Password: practice123
  4. The server authenticates Chris.
  5. The trusted connection allows the authenticated user, Chris, to access BrokerB without entering another password.

For more detailed descriptions and procedures, see Manage Users with Roles and Permissions.