Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Trusted System Elements and Examples CS461/ECE422 Fall 2011.
Operating System Security
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Chapter 6 Security Kernels.
IT Security Evaluation By Sandeep Joshi
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Security Models and Architecture
Secure Operating Systems Lesson 0x11h: Systems Assurance.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
1 Clark Wilson Implementation Shilpa Venkataramana.
Information Systems Security Security Architecture Domain #5.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Gurpreet Dhillon Virginia Commonwealth University
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 20 October 28, 2004.
Evaluating Systems Information Assurance Fall 2010.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
Trusted System? What are the characteristics of a trusted system?
ISA 562 Internet Security Theory & Practice
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 3: Operating Systems Computer Science: An Overview Tenth Edition.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Domain 6 Security Architecture and Models Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,
Operating Systems Security
ISA 400 Management of Information Security
Trusted Operating Systems
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
Chapter 1 Basic Concepts of Operating Systems Introduction Software A program is a sequence of instructions that enables the computer to carry.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
CS4315A. Berrached:CMS:UHD1 Introduction to Operating Systems Chapter 1.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Page 1 2P13 Week 1. Page 2 Page 3 Page 4 Page 5.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Information Security Principles and Practices
Security Models and Designing a Trusted Operating System
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
Chapter 2: System Structures
THE ORANGE BOOK Ravi Sandhu
Chapter 2: Operating-System Structures
Outline Chapter 2 (cont) OS Design OS structure
Chapter 29: Program Security
Chapter 2: Operating-System Structures
Access Control What’s New?
Presentation transcript:

Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models

Chapter 5: Security Architecture and Models © Pearson Education Information Security: Principles and Practices 2

3 Objectives Summarize the concept of a trusted computing base (TCB) Illustrate the concept of rings of trust Distinguish among the protection mechanisms used in a TCB Defend the purpose of security assurance testing Apply the Trusted Computer Security Evaluation Criteria (TCSEC) for software evaluations

© Pearson Education Information Security: Principles and Practices 4 Objectives cont. Apply the Trusted Network Interpretation of the TCSEC Categorize the role of the Federal Criteria for Information Technology Security Apply the Common Criteria for Information Security Evaluation Summarize the principles behind confidentiality and integrity models and their role in security architecture

© Pearson Education Information Security: Principles and Practices 5 Defining the Trusted Computing Base Trusted Computing Base  is the totality of protection mechanisms within a computer system including hardware, firmware, and software  consists of one or more components that together enforce a unified security policy over a product or system  describes the isolation of objects on which the protection is based, following the concept of the reference monitor

© Pearson Education Information Security: Principles and Practices 6 Defining the Trusted Computing Base cont. Reference Monitor  a software model or abstract machine that mediates all access from any subject (user or other device) to any object (resource, data, and so forth) and cannot be bypassed  security kernel is an implementation of a reference monitor for a specific hardware base such as Sun Solaris, Red Hat Linux, or Mac OS X

© Pearson Education Information Security: Principles and Practices 7 Rings of Trust Trust in a system moves from the outside to the inside in a unidirectional mode

© Pearson Education Information Security: Principles and Practices 8 Rings of Trust cont. Rings of trust in stand-alone systems

© Pearson Education Information Security: Principles and Practices 9 Rings of Trust cont. Rings of trust in networked environments

© Pearson Education Information Security: Principles and Practices 10 Protection Mechanisms in a Trusted Computing Base Process isolation  is a design objective in which each process has its own distinct address space for its application code and data  prevents data or information leakage and prevents modification of the data while it is memory Principle of least privilege  dictates that a process (program) has no more privilege than what it really needs in order to perform its functions Hardware segmentation  relates to the segmentation of memory into protected segments  prevents user processes from being able to access both another process’s allocated memory and system memory

© Pearson Education Information Security: Principles and Practices 11 Protection Mechanisms in a Trusted Computing Base cont. Layering  is a process operation that is divided into layers by function Abstraction  is a process that defines a specific set of permissible values for an object and the operations that are permissible on that object

© Pearson Education Information Security: Principles and Practices 12 Protection Mechanisms in a Trusted Computing Base cont. Data hiding (also known as information hiding)  is a mechanism to assure that information available at one processing level is not available in another, regardless of whether it is higher or lower Information storage  refers to the parts of a computer system that retain a physical state (information) for some interval of time, possibly even after electrical power to the computer is removed

© Pearson Education Information Security: Principles and Practices 13 Protection Mechanisms in a Trusted Computing Base cont. Closed System vs. Open System  Closed systems are of a proprietary nature use specific operating systems and hardware to perform the task and generally lack standard interfaces to allow connection to other systems  An open system is based on accepted standards and employs standard interfaces to allow connections between different systems promotes interoperability and allows the user to have full access to the total system capability

© Pearson Education Information Security: Principles and Practices 14 Protection Mechanisms in a Trusted Computing Base cont. Multitasking  is a technique used by a system that is capable of running two or more tasks in a concurrent performance or interleaved execution Multiprogramming system  allows for the interleaved execution of two or more programs on a processor

© Pearson Education Information Security: Principles and Practices 15 Protection Mechanisms in a Trusted Computing Base cont. Multiprocessing  provides for simultaneous execution of two or more programs by a processor (CPU) Finite-state machine  stores the status or state of something at a given time that can operate based on inputs to change the stored status and/or cause an action or output to take place

© Pearson Education Information Security: Principles and Practices 16 System Security Assurance Concepts Functional requirements  Describe what a system should do Assurance requirements  Describe how functional requirements should be implemented and tested

© Pearson Education Information Security: Principles and Practices 17 System Security Assurance Concepts cont. Security Testing  It verifies that the functions designed to meet a security requirement operate as expected  In addition, it validates that the implementation of the function is not flawed or haphazard

© Pearson Education Information Security: Principles and Practices 18 System Security Assurance Concepts cont. Formal Security Testing Models  Trusted Computer System Evaluation Criteria (TCSEC) United States in the early 1980s  Information Technology Security Evaluation Criteria (ITSEC) Europe in 1991 by the European Commission  Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) Canada in early 1993  Federal Criteria for Information Technology Security (FC) United States in early 1993  Common Criteria Today’s standard

© Pearson Education Information Security: Principles and Practices 19 Trusted Computer Security Evaluation Criteria Division D: Minimal Protection Division C: Discretionary Protection  Class C1: Discretionary Security Protection  Class C2: Controlled Access Protection

© Pearson Education Information Security: Principles and Practices 20 Trusted Computer Security Evaluation Criteria cont. Division B: Mandatory Protection  Class B1: Labeled Security Protection  Class B2: Structured Protection  Class B3: Security Domains Division A: Verified Protection  Class A1: Verified Design

© Pearson Education Information Security: Principles and Practices 21 Information Technology Security Evaluation Criteria (ITSEC) ITSEC introduces the concept of the target of evaluation (TOE), which refers to the product or system under evaluation It also introduces the security target (ST), a written document that contains  a system security policy  required security enforcing functions  required security mechanisms  claimed ratings of minimum strength  target evaluation levels, expressed as both functional and evaluation (F-xx and E-yy)

© Pearson Education Information Security: Principles and Practices 22 ITSEC cont.

© Pearson Education Information Security: Principles and Practices 23 Comparing ITSEC and TCSEC

© Pearson Education Information Security: Principles and Practices 24 Canadian Trusted Computer Product Evaluation Criteria It is somewhat more flexible than the TCSEC while maintaining fairly close compatibility with individual TCSEC requirements The CTCPEC and its approach to structure security functionality separate from assurance functionality influenced international standardization through the Common Criteria

© Pearson Education Information Security: Principles and Practices 25 Federal Criteria for Information Technology Security FC introduces the concept of a protection profile (PP) that empowers users or buyers of technology to specify their security requirements for hardware and software

© Pearson Education Information Security: Principles and Practices 26 Common Criteria CC provides a common language and structure to express IT security requirements CC enables the creation of catalogs of standards broken down into components and packages CC breaks apart the functional and assurance requirements into distinct elements that users can select for customized security device implementation

© Pearson Education Information Security: Principles and Practices 27 Common Criteria cont. Using the CC framework, users and developers of IT security products create protection profiles (PPs) as an implementation-independent collection of objectives and requirements for any given category of products or systems that must meet similar needs

© Pearson Education Information Security: Principles and Practices 28 Common Criteria cont. Protection Profile Organization  Introduction Section  Target of evaluation description  Security environment Assumptions Threats Organizational security policies

© Pearson Education Information Security: Principles and Practices 29 Common Criteria cont. Security Requirements and Classes  Classes of functional requirements  Classes of assurance requirements Evaluation Assurance Levels  define a scale for measuring the criteria for evaluating PPs and STs  provide an increasing scale that balances the levels of assurance claimed with the cost and feasibility of acquiring such assurance

© Pearson Education Information Security: Principles and Practices 30 Common Criteria cont. Common Evaluation Methodology (CEM)  is focused on the actions that evaluators must take to determine that CC requirements for a TOE are present  is a tool that is used by evaluation schemes to ensure consistent application of the requirements across multiple evaluations and multiple schemes

© Pearson Education Information Security: Principles and Practices 31 Security Criteria Compared

© Pearson Education Information Security: Principles and Practices 32 Confidentiality and Integrity Models Security models are mathematical representations of abstract machines that describe how a reference monitor is designed to operate Commonly used models:  Bell-LaPadula model  Biba integrity model  Clark and Wilson  Noninterference  State machine model  Access matrix model  Information flow model

© Pearson Education Information Security: Principles and Practices 33 Confidentiality and Integrity Models cont. Bell-LaPadula model  is a confidentiality model intended to preserve the principle of least privilege Biba integrity model  uses a read up, write down approach. Subjects cannot read objects of lesser integrity and subjects cannot write to objects of higher integrity

© Pearson Education Information Security: Principles and Practices 34 Confidentiality and Integrity Models cont. Clark and Wilson model  requires mathematical proof that steps are performed in order exactly as they are listed, authenticates the individuals who perform the steps, and defines separation of duties Noninterference model  covers ways to prevent subjects operating in one domain from affecting each other in violation of security policy State machine model  is an abstract mathematical model consisting of state variables and transition functions

© Pearson Education Information Security: Principles and Practices 35 Confidentiality and Integrity Models cont. Access matrix model  is a state machine model for a discretionary access control environment Information flow model  simplifies analysis of covert channels

© Pearson Education Information Security: Principles and Practices 36 Summary The trusted computing base is the portion of a computer system that contains all elements of the system responsible for supporting the security policy and supporting the isolation of objects on which the protection is based Several evolving models of evaluation and assurance cover various aspects of confidentiality, integrity, and availability Common Criteria harmonizes the work of the various international efforts into a unified evaluation methodology that replaces the former methods