Lecture 18: Mandatory Access Control

Slides:



Advertisements
Similar presentations
TOPIC CLARK-WILSON MODEL Ravi Sandhu.
Advertisements

1 cs691 chow Hybrid Policies CS691 – Chapter 7 of Matt Bishop.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Security Models and Architecture
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
May 4, 2004ECS 235Slide #1 Biba Integrity Model Basis for all 3 models: Set of subjects S, objects O, integrity levels I, relation ≤  I  I holding when.
Verifiable Security Goals
1 Clark Wilson Implementation Shilpa Venkataramana.
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Li Xiong CS573 Data Privacy and Security Access Control.
Mandatory Security Policies CS461/ECE422 Spring 2012.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Week 8 - Wednesday.  What did we talk about last time?  Authentication  Challenge response  Biometrics  Started Bell-La Padula model.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
Li Xiong CS573 Data Privacy and Security Access Control.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Lattice-based Access Control Models 2 Daniel Trivellato.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
12/3/2015Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Policy, Models, and Trust
Computer Security: Principles and Practice
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
IS 2150 / TEL 2810 Introduction to Security
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 6 October 4, 2007 Integrity Models Role based Access Control.
Chapter 7. Hybrid Policies
TOPIC: Web Security Models
Banking and Bookkeeping
Access Control Model SAM-5.
Verifiable Security Goals
Access control models and policies
Chapter 7: Hybrid Policies
Chapter 6 Integrity Policies
Chapter 6: Integrity Policies
Chapter 5: Confidentiality Policies
Computer Security Hybrid Policies
Mandatory Access Control (MAC)
Integrity Models and Hybrid Models
System state models.
Trust Models CS461/ECE422.
Chapter 6: Integrity Policies
Lecture 17: Mandatory Access Control
Integrity Policies Dr. Wayne Summers Department of Computer Science
Biba Integrity Model Basis for all 3 models:
CS703 - Advanced Operating Systems
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Chapter 7: Hybrid Policies
Computer Security Hybrid Policies
Presentation transcript:

Lecture 18: Mandatory Access Control CS 5430 3/28/2018

Review: Access control Subject: principal to which execution can be attributed Object: data or resource Operation: performed by subject on object Right: entitlement to perform operation

Mandatory Access Control Mandatory access control (MAC) not Message Authentication Code (applied crypto), nor Media Access Control (networking) philosophy: central authority mandates policy information belongs to the authority, not to the individual users Examples: Multi-level security (confidentiality, military) Biba model (integrity, military) Clark-Wilson (integrity, business) Role-based access control (hybrid, organization) Brewer-Nash (hybrid, consulting firm)

Multi-Level Security/Bell-LaPadula Objects and principals have labels 𝐿=(𝑆,𝐶) Unclassified ≤ Confidential ≤ Secret ≤ Top Secret {} ⊆ {crypto} ⊆ {crypto, U.S.} (Unclassified,{}) ⊑ (Secret,{}) ⊑ (Top Secret, {crypto, U.S.}) P may read O iff L(O) ⊑ L(P) object's classification must be below (or equal to) subject's clearance, eg., "no read up" P may write O iff L(P) ⊑ L(O) object's classification must be above (or equal to) subject's clearance "no write down" L1 ⊑ L2 means “L1 may flow to L2”

MLS for Integrity (Biba Model) Objects and principals have integrity labels Trusted ⊑ Untrusted P may read O iff L(O) ⊑ L(P) object's classification must be below (or equal to) subject's clearance, eg., "no read up" P may write O iff L(P) ⊑ L(O) object's classification must be above (or equal to) subject's clearance "no write down" L1 ⊑ L2 means “L1 may flow to L2”

Mandatory Integrity for Business Applications [Clark and Wilson 1987] Studied commercial systems rather than military Primary goal is integrity, not confidentiality Prevent fraud Prevent error

Clark-Wilson model Two levels of security: Constrained: high integrity information, crucial to business, e.g., bank account balances Unconstrained: low integrity information, nonessential to business, e.g., gift selected by customer when account opened Constrained data items (CDIs) are meant to satisfy integrity constraints, e.g. teller balance constraint Valid state: all CDIs satisfy their constraints Otherwise invalid Unconstrained data items (UDIs) don't have integrity constraints

Clark-Wilson model Transformation procedures (TPs): change system from one valid state to another valid state operate on associated CDIs implement well-formed transactions e.g., deposit, withdraw, transfer Integrity verification procedures (IVPs): test whether CDIs satisfy constraints, hence state is valid e.g. teller balancing drawer at opening and closing of window

Clark-Wilson rules Enforcement rules (ERs): Certification rules (CRs): Followed by system Goal is to enforce the integrity policy Online checking Certification rules (CRs): Followed by security officer of business Goal is to certify that system will obey integrity policy Offline checking

Commercial systems Well-formed transactions: Transition system from one state to another Maintain invariants over state e.g. bank teller Trained to perform only certain kinds of transactions from their drawer Maintain invariant: (yesterday's balance) + (today's deposits) – (today's withdrawals) = (today's balance) Implemented by transformation procedures (TPs)

Clark-Wilson rules Rules for well-formed transactions: CR: IVPs must ensure that CDIs are in a valid state CR: TPs must maintain validity as invariant ER: A TP may modify only its associated CDIs CR: A TP that accepts UDIs as input must validate them as part of transforming them into CDIs

Commercial systems Separation of duty: Transactions require multiple principals Principals mutually certify that transaction performed properly e.g. purchasing: Purchasing agent creates order, sends order to supplier, receiving agent, and accounting Supplier ships goods to receiving Receiving clerk checks goods against original order and updates inventory Supplier sends invoice to accounting Accountant checks invoice against original order All four principals work together to detect fraud and error

Clark-Wilson rules Rules for separation of duty: CR: Users must be authorized to invoke TPs part of what security officer is meant to check as part of this certification is that separation of duty is actually part of the authorization policy ER: Only the security officer may change the authorization policy, and the security officer may not invoke TPs ER: The system must check that authorization policy before performing TPs on behalf of a user ER: The system must authenticate users CR: All TPs must append enough audit information to reconstruct the operation to an append-only CDI

Clark-Wilson rules Gold standard Rules for separation of duty: CR: Users must be authorized to invoke TPs part of what security officer is meant to check as part of this certification is that separation of duty is actually part of the authorization policy ER: Only the security officer may change the authorization policy, and the security officer may not invoke TPs ER: The system must check that authorization policy before performing TPs on behalf of a user ER: The system must authenticate users CR: All TPs must append enough audit information to reconstruct the operation to an append-only CDI Gold standard

Contributions of Clark-Wilson Difference of concerns between commercial and military security models Authorized programs Certification as distinct from enforcement

Role-based access control

Jobs Your access rights depend on job you are performing Student in one class TA in another class Prof in another class? Existence of jobs is relatively stable in organization Even if over time the people who perform them change jobs Better not to directly assign rights to user Instead, associate rights with the job...

Roles and rights Role: job function or title Users are assigned to roles Subjects executing on behalf of users can activate a role to indicate it is now performing that job Least Privilege Amplification of Privilege

Roles and rights Roles can be hierarchical e.g. TA, prof Hierarchy is a partial order Multiple roles may be active simultaneously Can be constraints on which roles users can simultaneously be assigned e.g. cannot be both Student and TA in same course provides possibility for Separation of Duty

Roles and rights Rights: Rights are assigned to roles, not directly to users Relation on (role, obj, rights) Role-based access control (RBAC) policy: role assignment plus rights assignment

Roles vs. groups Group: Role: Differences? set of users can be assigned rights Role: Differences? Roles are hierarchical and can inherit rights Roles can be activated and deactivated

RBAC, DAC, MAC Is RBAC a DAC or MAC policy? Role assignments typically dictated by organization: MAC Right assignments might come from organization or from owners of objects: MAC or DAC

Brewer-Nash

Conflict of interest Setting: consulting firm e.g., stock exchange, investment bank, law firm Consultant represents two clients Best interest of those clients conflict Consultant could help one at expense of the other Consultant has a conflict of interest (COI) Norms (laws, regulations, ethics) prohibit consultant from exploiting COI After some time (days, years, never), COI might expire

Conflict of interest Typical paper implementation: Consultant maintains public CV Entry in CV for each client Entry has been sanitized and approved by client, e.g., "Sep 2015-Apr 2016: consulted on security requirements for a new branch accounting system for a major US retail bank" Manager checks CV before assigning consultant to new client Client receives CV to double-check from their perspective Brewer and Nash [1989] invented a MAC policy for this setting Often known as Chinese Wall (CW) Other names: ethics wall, screen

Brewer-Nash model Object: contains sensitive information about companies a file about Bank of America's trade secrets but not its addresses, phone numbers, etc. Company dataset (CD): all the objects related to a single company all the files about Bank of America Conflict of interest class (COI): all the company datasets for which the companies compete all the files about banks

Brewer-Nash model Bank of America file 1 file 2 file 3

Brewer-Nash model Bank of America Exxon Mobil Citibank BP CD COI

Breaches Prevent two kinds of breaches of the wall: One consultant works on more than one CD inside a COI Two consultants each work on their own CD inside COI but cooperate to write that information to a shared object

Access control with Brewer-Nash When may a subject read an object? S may read O iff S has never read any O' such that COI(O) = COI(O') and CD(O) != CD(O') Subject may not read from two CDs inside same COI When may a subject write an object? S may write O iff S has never read any O' such that CD(O) != CD(O') Subject may not write to any other CD after reading from one

Reading with Brewer-Nash S may read O iff S has never read any O' such that COI(O) = COI(O') and CD(O) != CD(O') If S has never read anything, S has free choice of what to read next Once S does read object from CD1 in COI1, a wall is erected around S Cannot read other CDs from same COI But can read from different COI If S does read from CD2 in COI2, wall changes shape CD1 and CD2 inside wall All other CDs from COI1 and COI2 outside the wall Requires tracking history of objects read by subject

Writing with Brewer-Nash S may write O iff S has never read any O' such that CD(O) != CD(O') If S has never read anything, S has free choice of what to write If S has read from CD1, S may write only to CD1 Requires tracking history of objects read by subject If S has read from CD1 and CD2, S may not write at all e.g. read from Bank of America and Exxon Mobil: Now cannot write anywhere Writing to Bank of America could leak info about Exxon Mobil and vv. Seems overly prohibitive...

Users with Brewer-Nash A subject who has read two CDs may not write But that need not be true of a user Track read objects for: user over its lifetime subject over its lifetime (which is shorter than user) distinguish what user has learned vs. what subject has learned As with MLS, user can choose to login at lower security level Attenuation of privilege: give up the subject's right to read from CDs that have previously been read by user Subject assigned that security level So user could have multiple subjects with different security levels

Users with Brewer-Nash Example: Alice has read CD1 from COI1 and nothing from COI2 Alice could login with right to read CD1 or without that right Then subject on behalf of Alice reads CD2 from COI2: that is recorded for Alice as well and influences future subjects of hers Can Alice's subject write? With right to read CD1: no Without right: yes Alice's subject always prohibited from reading CD1' from COI1, regardless of whether right to read CD1 is enabled So if user wants to work with different CDs, they can! Just disable access to the rest.

Mandatory Access Control Mandatory access control (MAC) not Message Authentication Code (applied crypto), nor Media Access Control (networking) philosophy: central authority mandates policy information belongs to the authority, not to the individual users Examples: Multi-level security (confidentiality, military) Biba model (integrity, military) Clark-Wilson (integrity, business) Role-based access control (hybrid, organization) Brewer-Nash (hybrid, consulting firm)