Integrity Models and Hybrid Models

Slides:



Advertisements
Similar presentations
1 ISA 662 Information System Security Hybrid Policies Chapter 6 from Bishop ’ s book.
Advertisements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Lipner’s.
May 4, 2004ECS 235Slide #1 Biba Integrity Model Basis for all 3 models: Set of subjects S, objects O, integrity levels I, relation ≤  I  I holding when.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 7, 2004 Introduction to Computer Security Lecture.
1 Hybrid Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 23, 2004.
Computer Security Hybrid Policies
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Mandatory Security Policies CS461/ECE422 Spring 2012.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
Security Policy Models CSC 482/582: Computer Security.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Week 8 - Wednesday.  What did we talk about last time?  Authentication  Challenge response  Biometrics  Started Bell-La Padula model.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #4-1 Chapter 1: Introduction Components of computer security Threats Policies.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
12/3/2015Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Chapt. 7 – Hybrid Policies Dr. Wayne Summers Department of Computer Science Columbus State University
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
IS 2150 / TEL 2810 Introduction to Security
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 6 October 4, 2007 Integrity Models Role based Access Control.
Chapter 7. Hybrid Policies
TOPIC: Web Security Models
Verifiable Security Goals
Chapter 7: Hybrid Policies
Chapter 6 Integrity Policies
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Chapter 7: Hybrid Policies
Chapter 5: Confidentiality Policies
Computer Security Hybrid Policies
Basic Security Theorem
System state models.
Confidentiality Models
Computer Security: Art and Science, 2nd Edition
Clinical Information System Security Policy (CISS Policy)
Trust Models CS461/ECE422.
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Lecture 18: Mandatory Access Control
Integrity Policies Dr. Wayne Summers Department of Computer Science
Biba Integrity Model Basis for all 3 models:
Chapter 6: Integrity Policies
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 4: Security Policies
Computer Security Integrity Policies
Chapter 7: Hybrid Policies
Computer Security Hybrid Policies
Presentation transcript:

Integrity Models and Hybrid Models CSCI283-172 Fall 2008 GWU Draws extensively from: Memon’s notes, Brooklyn Poly Pfleeger Text, Chapter 5 Bishop’s text, Chapter 6 and 7, Bishop’s slides, Chapter 6 and 7

Types of Security Policies A military security policy (also called government security policy) is a security policy developed primarily to provide confidentiality. Not worrying about trusting the object as much as disclosing the object A commercial security policy is a security policy developed primarily to provide a combination of confidentiality and integrity. Focus on how much the object can be trusted. Also confidentiality policy and integrity policy. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Commercial Environments Commercial requirements differ from military requirements in their emphasis on preserving data integrity. For Example: Users will not write their own programs, but will use existing production programs and databases. Programmers will develop and test programs on a non-production system; if they need access to actual data, they will be given production data via a special process, but will use it on their development system. A special process must be followed to install a program from the development system onto the production system. The special process in 3, above, must be controlled and audited. The management and auditors must have access to both the system state and to the system logs that are generated. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Principles of Operation Separation of duty. If two or more steps are required to perform a critical function, at least two different people should perform the steps. Separation of function. Developers do not develop new programs on production systems because of the potential threat to production data. Auditing. Auditing is the process of analyzing systems to determine what actions took place and who performed them. Commercial systems emphasize recovery and account-ability. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Biba Integrity Model Biba integrity model is counterpart (dual) of BLP model. It identifies paths that could lead to inappropriate modification of data as opposed to inappropriate disclosure in the BLP model. A system consists of a set S of subjects, a set O of objects, and a set I of integrity levels. The levels are ordered. Subjects and Objects are ordered by the integrity classification scheme; denoted by I(s) and I(o). 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Intuition for Integrity Levels The higher the level, the more confidence That a program will execute correctly That data is accurate and/or reliable Note relationship between integrity and trustworthiness Important point: integrity levels are not security levels 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Biba Integrity Model The properties of the Biba Integrity Model are: Simple Integrity Property: Subject s can modify (have write access to) object o if and only if I(s) >= I(o). Integrity *-property: If subject S has read access to object o with integrity level I(o), S can have write access to p if and only if I(o) >= I(p). Why does this make sense? 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Lattice – Example, compare with BLP G Is B G? Is B E? E F D A B C H J 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Clark-Wilson Integrity Model In commercial environment we worry about the integrity of the data in the system and the actions performed upon that data. The data is said to be in a consistent state (or consistent) if it satisfies given properties. For example, let D be the amount of money deposited so far today, W the amount of money withdrawn so far today, YB be the amount of money in all accounts at the end of yesterday, and TB be the amount of money in all accounts so far today. Then the consistency property is: D + YB – W = TB 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Clark-Wilson Model A well-formed transaction is a series of operations that leave the data in a consistent state if the data is in a consistent state when the transaction begins. The principle of separation of duty requires the certifier and the implementers be different people. In order for the transaction to corrupt the data (either by illicitly changing data or by leaving the data in an inconsistent state), either two different people must make similar mistakes or collude to certify the well-formed transaction as correct. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Entities CDIs: constrained data items Data subject to integrity controls UDIs: unconstrained data items Data not subject to integrity controls IVPs: integrity verification procedures Procedures that test the CDIs conform to the integrity constraints TPs: transaction procedures Procedures that take the system from one valid state to another 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Chinese Wall Model Problem: Tony advises American Bank about investments He is asked to advise Toyland Bank about investments Conflict of interest to accept, because his advice for either bank would affect his advice to the other bank 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Organization Speaks equally to confidentiality and integrity Organize entities into “conflict of interest” classes Control subject accesses to each class Control writing to all classes to ensure information is not passed along in violation of rules Allow sanitized data to be viewed by everyone 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Chinese Wall Model Banks Gas Companies Amoco Texaco. Deutshce bank Bank of America Shell Mobil Citibank Anthony has access to the objects in the dataset of Bank of America. Anthony should not be able to gain access to the objects in Citibank’s dataset. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Chinese Wall Model Objects: items of information related to a company. Company dataset (CD) contains objects related to a single company. Conflict of interest class (COI) contains the datasets of companies in competition. COI(O): the conflict of interest class that contains object O. CD(O): the company dataset that contains object O. The model assumes that each object belongs to exactly one conflict of interest class. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Chinese Wall Model Bank COI Gas Company COI Amoco Texaco. Deutshce bank Bank of America Shell Mobil Citibank Anthony has access to the objects in the CD of Bank of America. Because the CD of Citibank is in the same COI as that of Bank of America, Anthony cannot gain access to the objects in Citibank’s CD. Thus, this structure of the database provides the required ability. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Compare to Bell-LaPadula Fundamentally different CW has no security labels, B-LP does CW has notion of past accesses, B-LP does not Bell-LaPadula can capture state at any time Each (COI, CD) pair gets security category Two clearances, S (sanitized) and U (unsanitized) S dom U Subjects assigned clearance for compartments without multiple categories corresponding to CDs in same COI class 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Compare to Bell-LaPadula Bell-LaPadula cannot track changes over time Susan becomes ill, Anna needs to take over C-W history lets Anna know if she can No way for Bell-LaPadula to capture this Access constraints change over time Initially, subjects in C-W can read any object Bell-LaPadula constrains set of objects that a subject can access Can’t clear all subjects for all categories, because this violates CW-simple security condition 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Clinical Information Systems Security Policy Intended for medical records Conflict of interest not critical problem Patient confidentiality, authentication of records and annotators, and integrity are Entities: Patient: subject of medical records (or agent) Personal health information: data about patient’s health or treatment enabling identification of patient Clinician: health-care professional with access to personal health information while doing job 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Assumptions and Principles Assumes health information involves 1 person at a time Not always true; OB/GYN involves father as well as mother Principles derived from medical ethics of various societies, and from practicing clinicians 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Access Principle 1 Each medical record has an access control list naming the individuals or groups who may read and append information to the record. The system must restrict access to those identified on the access control list. Idea is that clinicians need access, but no-one else. Auditors get access to copies, so they cannot alter records 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Access Principle 2 One of the clinicians on the access control list must have the right to add other clinicians to the access control list. Called the responsible clinician 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Access Principle 3 The responsible clinician must notify the patient of the names on the access control list whenever the patient’s medical record is opened. Except for situations given in statutes, or in cases of emergency, the responsible clinician must obtain the patient’s consent. Patient must consent to all treatment, and must know of violations of security 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Access Principle 4 The name of the clinician, the date, and the time of the access of a medical record must be recorded. Similar information must be kept for deletions. This is for auditing. Don’t delete information; update it (last part is for deletion of records after death, for example, or deletion of information when required by statute). Record information about all accesses. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Creation Principle 5 A clinician may open a record, with the clinician and the patient on the access control list. If a record is opened as a result of a referral, the referring clinician may also be on the access control list. Creating clinician needs access, and patient should get it. If created from a referral, referring clinician needs access to get results of referral. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Deletion Principle 6 Clinical information cannot be deleted from a medical record until the appropriate time has passed. This varies with circumstances. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Confinement Principle 7 Information from one medical record may be appended to a different medical record if and only if the access control list of the second record is a subset of the access control list of the first. This keeps information from leaking to unauthorized users. All users have to be on the access control list. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Aggregation Principle 8 Measures for preventing aggregation of patient data must be effective. In particular, a patient must be notified if anyone is to be added to the access control list for the patient’s record and if that person has access to a large number of medical records. Fear here is that a corrupt investigator may obtain access to a large number of records, correlate them, and discover private information about individuals which can then be used for nefarious purposes (such as blackmail) 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Enforcement Principle 9 Any computer system that handles medical records must have a subsystem that enforces the preceding principles. The effectiveness of this enforcement must be subject to evaluation by independent auditors. This policy has to be enforced, and the enforcement mechanisms must be auditable (and audited) 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Compare to Bell-LaPadula Confinement Principle imposes lattice structure on entities in model Similar to Bell-LaPadula CISS focuses on objects being accessed; B-LP on the subjects accessing the objects May matter when looking for insiders in the medical environment 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

Compare to Clark-Wilson CDIs are medical records TPs are functions updating records, access control lists IVPs certify: A person identified as a clinician is a clinician; A clinician validates, or has validated, information in the medical record; When someone is to be notified of an event, such notification occurs; and When someone must give consent, the operation cannot proceed until the consent is obtained Auditing (CR4) requirement: make all records append-only, notify patient when access control list changed 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set ORCON Problem: organization creating document wants to control its dissemination Example: Secretary of Agriculture writes a memo for distribution to her immediate subordinates, and she must give permission for it to be disseminated further. This is “originator controlled” (here, the “originator” is a person). 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Requirements Subject s  S marks object o  O as ORCON on behalf of organization X. X allows o to be disclosed to subjects acting on behalf of organization Y with the following restrictions: o cannot be released to subjects acting on behalf of other organizations without X’s permission; and Any copies of o must have the same restrictions placed on it. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set DAC Fails Owner can set any desired permissions This makes 2 unenforceable 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set MAC Fails First problem: category explosion Category C contains o, X, Y, and nothing else. If a subject y  Y wants to read o, x  X makes a copy o. Note o has category C. If y wants to give z  Z a copy, z must be in Y—by definition, it’s not. If x wants to let w  W see the document, need a new category C containing o, X, W. Second problem: abstraction MAC classification, categories centrally controlled, and access controlled by a centralized policy ORCON controlled locally 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Combine Them The owner of an object cannot change the access controls of the object. When an object is copied, the access control restrictions of that source are copied and bound to the target of the copy. These are MAC (owner can’t control them) The creator (originator) can alter the access control restrictions on a per-subject and per-object basis. This is DAC (owner can control it) 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set RBAC Access depends on function, not identity Example: Allison, bookkeeper for Math Dept, has access to financial records. She leaves. Betty hired as the new bookkeeper, so she now has access to those records The role of “bookkeeper” dictates access, not the identity of the individual. 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Definitions Role r: collection of job functions trans(r): set of authorized transactions for r Active role of subject s: role s is currently in actr(s) Authorized roles of a subject s: set of roles s is authorized to assume authr(s) canexec(s, t) iff subject s can execute transaction t at current time 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set

CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set Separation of Duty Let r be a role, and let s be a subject such that r  auth(s). Then the predicate meauth(r) (for mutually exclusive authorizations) is the set of roles that s cannot assume because of the separation of duty requirement. Separation of duty: (r1, r2  R) [ r2  meauth(r1)  [ (s  S) [ r1 authr(s)  r2  authr(s) ] ] ] 11/27/2018 CS283-172/Fall08/GWU/Vora Many slides from Bishop's slide set