A Foundation for System Security Invited talk at AISC 09 Clark Thomborson 21 February 2009.

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

Chapter 7 Management and Leadership
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 An Introduction to Corporate Governance. 2 What is it about? Corporate Corporate Governance Governance.
1 A Functional Taxonomy for Software Watermarking Jas Nagra, Clark Thomborson University of Auckland Christian Collberg University of Arizona.
Security Modelling: What is Security? for Tsinghua University Clark Thomborson 12 March 2010.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
BA 427 – Assurance and Attestation Services Lecture 18 The Types of Services Offered by Public Accounting Firms.
Access Control Intro, DAC and MAC System Security.
Chapter 15: Government at Work: The Bureaucracy Section 1
9.401 Auditing Chapter 1 Introduction. Definition of Auditing The accumulation and evaluation The accumulation and evaluation Of evidence about information.
A Gift of Fire Third edition Sara Baase
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 8: Developing an Effective Ethics Program.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Human Resources. To understand what are meant by effective communication and feedback Analyse the advantages and disadvantages of different communication.
The future shape of business is being redefined through outsourcing.
Internal Auditing and Outsourcing
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
CLU3M- Introduction Unit 1.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Electronic Content Management (in a De-Perimeterised Environment) Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 4 th April 2007.
Trusted Computing: Open, Closed, or Both? Computer Science Department Seminar Prof. Clark Thomborson 6 th April 2006.
FRAUD Students name: Professors name: Course: Date:
Designing Active Directory for Security
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
Identity, Management & Federation  Can you ever trust someone you don't manage?  John Arnold Chief Security Architect, Capgemini  Geoff Sweeney CTO,
What is Computer Security? for Professor Ruan’s Class at Nankai University Clark Thomborson 2 nd April 2007.
McGraw-Hill/Irwin©2007, The McGraw-Hill Companies, All Rights Reserved Essentials of Accounting for Governmental and Not-for-Profit Organizations Chapter.
The Jericho Forum’s Architecture for De-Perimeterised Security Presentation at CACS 2007 Auckland Prof. Clark Thomborson 10 th September 2007.
Jericho’s Architecture for De-Perimeterised Security Presentation at ISACA/IIA Wellington Prof. Clark Thomborson 27 th July 2007.
Essentials of Accounting for Governmental and Not-for-Profit Organizations Chapter 7 Fiduciary Funds McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill.
Copyright © Houghton Mifflin Company. All rights reserved.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Could Software Watermarks Express Both Rules and Assurances? Prof. Clark Thomborson Presentation to the ReTRUST Group Villach, Austria 11 th March 2008.
Government Policy on Trusted Computing and Digital Rights Management a view from New Zealand Prof. Clark Thomborson 7 th April 2007.
An Introduction to the Fundamentals of Dynamic Business Law
Chapter 01 An Introduction to Dynamic Business Law McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
How TPMs Can (and Should) Control Copyright Presentation to InternetNZ Copyright Workshop Prof. Clark Thomborson 13 th February 2007.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 7 th April 2007.
Computer Security: Principles and Practice
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 An Introduction to the Fundamentals of Dynamic Business.
A Foundation for System Security Clark Thomborson 5 August 2009 This presentation is based on “A Framework for System Security”, in Handbook of Computer.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Corporate Governance Week 10 BUSN9229D Saib Dianati.
1 Emerging Issues in Internal Audit Charles Ndegwa.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
The Legal Function – Starting a New Business: Getting the Legal Structure Right Enterprise and its Business Environment © Goodfellow Publishers 2016.
Chapter 5 ASX Guidelines for Listed Companies
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Slide Deck 1: Government and Decision-Making Processes
Chapter 1-REVIEW An Introduction to the Fundamentals of Dynamic Business Law and Business Ethics Chapter 1: An Introduction to the Fundamentals of Dynamic.
Copyright © Houghton Mifflin Company. All rights reserved.MGT437
The Application of Legal Principles in Business
Internal and Governmental Financial Auditing and Operational Auditing
Corporations and Trusts Law Chapter 3 Choosing a Business Structure
Survey-Document Examination-Observation-Benchmarking
Presentation transcript:

A Foundation for System Security Invited talk at AISC 09 Clark Thomborson 21 February 2009

Questions to be (Partially) Answered What is security? What is trust? “What would be the shape of an organisational theory applied to security?” [Anderson, 2008] What would be the shape of a security theory applied to an organisation? 2

What is Security? The first step in wisdom is to know the things themselves; this notion consists in having a true idea of the objects; objects are distinguished and known by classifying them methodically and giving them appropriate names. Therefore, classification and name-giving will be the foundation of our science. Carolus Linnæus, Systema Naturæ, 1735 (from Lindqvist and Jonsson, “How to Systematically Classify Computer Security Intrusions”, 1997.) 3

Security Properties (Traditional) 1.Confidentiality: no one is allowed to read, unless they are authorised. 2.Integrity: no one is allowed to write, unless they are authorised. 3.Availability: all authorised reads and writes will be performed by the system. Authorisation: giving someone the authority to do something. Authentication: being assured of someone’s identity. Identification: knowing someone’s name or ID#. Auditing: maintaining (and reviewing) records of security decisions. 4

Micro to Macro Security “Static security”: system properties (confidentiality, integrity, availability). “Dynamic security”: system processes (Authentication, Authorisation, Audit). Beware the “gold-plated” system design! “Security Governance”: human oversight Specification, or Policy (answering the question of what the system is supposed to do), Implementation (answering the question of how to make the system do what it is supposed to do), and Assurance (answering the question of whether the system is meeting its specifications). 5

Clarifying Static Security Confidentiality, Integrity, and Availability are appropriate for read/write data. What about security for executables? Unix directories have “rwx” permission bits: XXXity! What about security for directories, services,...? Each level of a taxonomy should have a few categories which cover all the possible cases. Each case should belong to one category. Confidentiality, Integrity, XXXity, “etc”ity are all Prohibitions. Availability is a Permission. SS Pro CIX Per A SS CIXA 6

Prohibitions and Permissions Prohibition: forbid something from happening. Permission: allow something to happen. There are two types of P-secure systems: In a prohibitive system, all operations are forbidden by default. Permissions are granted in special cases. In a permissive system, all operations are allowed by default. Prohibitions are special cases. Prohibitive systems have permissive subsystems. Permissive systems have prohibitive subsystems. Prohibitions and permissions are properties of hierarchies, such as a judicial system. Most legal controls (“laws”) are prohibitive. A few are permissive. 7

Extending our Taxonomy Contracts are non-hierarchical: agreed between peers. Obligations are promises to do something in the future. Exemptions are exceptions to an obligation. There are two types of O-secure systems. Obligatory systems have exemptive subsystems. Exemptive systems have obligatory subsystems. Can peerages be P-secure, and can hierarchies be O- secure? Yes, in general, peerages will have some prohibitions and permissions. Yes, superiors will often impose obligations on their inferiors. So... the type of organisation correlates with, but does not define, the type of requirement. We need a clearer criterion for our classification, if we want a clear taxonomy. 8

Four types of static security requirements: Obligations are forbidden inactions, e.g. “I.O.U. $1000.” Exemptions are allowed inactions, e.g. “You need not repay me if you have a tragic accident.” Prohibitions are forbidden actions. Permissions are allowed actions. Two classification criteria: Strictness = {forbidden, allowed}, Activity = {action, inaction}. “Natural habitat”: Peerages typically forbid and allow inactions, Hierarchies typically forbid and allow actions. Inactions and Actions 9

Lessig’s Taxonomy of Control EasyDifficult Inexpensive Expensive Computers make things easy or difficult. LegalIllegal Governments make things legal or illegal. The world’s economy makes things inexpensive or expensive. Moral Immoral Our culture makes things moral or immoral. 10

Temporal Classification Prospective controls: Architectural security (easy/hard) Economic security (inexpensive/expensive) Retrospective controls: Legal security (legal/illegal) Normative security (moral/immoral) Temporality = {prospective, retrospective}. Organisation = {hierarchy, peerage}. 11

Reviewing our Questions  What is security? Three layers: static, dynamic, governance. Static security requirements: (forbidden, allowed) x (action, inaction).  What is trust?  How do organisations provide security? Controls: (prospective, retrospective) x (hierarchy, peerage).  What is a secure organisation? 12

13 The Hierarchy Control is exerted by a superior power. Prospective controls are not easy to evade. Retrospective controls are punishments. The Hierarch grants allowances to inferiors. King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … The Hierarch can impose and enforce obligations. In the Bell-LaPadula model, the Hierarch is concerned with confidentiality. Inferiors are prohibited from reading superior’s data. Superiors are allowed to read their inferior’s data.

14 The Alias (in an use case) We use aliases every time we send personal from our work computer. We have a different alias in each organisation. We are prohibited from revealing “too much” about our organisations. We are prohibited from accepting dangerous goods and services. Agency X Gmail C, acting as a governmental agent C, acting as a Gmail client Each of our aliases is in a different security environment. Managing aliases is difficult, and our computer systems aren’t very helpful…

15 The Peerage The peers define the goals of their peerage. If a peer misbehaves, their peers may punish them (e.g. by expelling them). Peers can trade goods and services. The trusted servants of a peerage do not exert control over peers. The trusted servants may be aliases of peers, or they may be automata. Facilitator, Moderator, Democratic Leader, … Peers, Group members, Citizens of an ideal democracy, …

16 Example: A Peerage Exerting Audit Control on a Hierarchy Auditor IG2IG1 OS Root Administrator Users/ Peers Chair of User Assurance Group Inspector-General (an elected officer) Peers elect one or more Inspector-Generals. The OS Administrator makes a Trusting appointment when granting auditor-level Privilege to an alias of an Inspector-General. The Auditor discloses an audit report to their Inspector-General alias. The audit report can be read by any Peer. Peers may disclose the report to non-Peers.

Niklas Luhmann, on Trust A prominent, and controversial, sociologist. Thesis: Modern systems are so complex that we must use them, or avoid using them, without carefully examining all risks, benefits, and alternatives. Trust is a reliance without an assessment. We cannot control any risk we haven’t assessed  We trust any system which might harm us. (This is the usual definition.) Distrust is an avoidance without an assessment. 17

Security, Trust, Distrust,... Our fifth classification criterion is assessment, with three cases: Cognitive assessment (of security & functionality), Optimistic non-assessment (of trust & coolness), Pessimistic non-assessment (of distrust & uncoolness). 18

Security vs. Functionality Sixth criterion: Feedback (negative vs. positive) to the owner of the system. We treat security as a property right. Every system must have an owner, if it is to have any security or functionality. The owner reaps the benefits from functional behaviour, and pays the penalties for security faults. (Controls are applied to the owner, ultimately.) The analyst must understand the owner’s desires and fears. 19

Summary of our Taxonomy Requirements: Strictness = {forbidden, allowed}, Activity = {action, inaction}, Feedback = {negative, positive}, Assessment = {cognitive, optimistic, pessimistic}. Controls: Temporality = {prospective, retrospective}, Organisation = {hierarchy, peerage}. Layers = {static, dynamic, governance}. 20

Application: Access Control An owner may fear losses as a result of unauthorised use of their system. This fear induces an architectural requirement (prospective, hierarchical): Accesses are forbidden, with allowances for specified users. It also induces an economic requirement, if access rights are traded in a market economy. If the peers are highly trusted, then the architecture need not be very secure. 21

Access Control (cont.) Legal requirement (retrospective, hierarchical): Unauthorised users are prosecuted. Must collect evidence – this is another architectural requirement. Normative requirement (retrospective, peering): Unauthorised users are penalised. Must collect deposits and evidence, if peers are not trusted. 22

Functions of Access Control If an owner desires authorised accesses, then there will be functional requirements. Forbidden inaction, positive feedback (“reliability”) If an owner fears losses from downtime, then there are also security requirements. Forbidden inaction, negative feedback (“availability”) Security and functionality are intertwined! The analyst must understand the owner’s motivation, before writing the requirements. The analyst must understand the likely attackers’ motivation and resources, before prioritising the requirements. 23

Application: Corporate Communication Hierarchical communication is very inefficient. The King is a performance bottleneck. We want all our employees to share information freely – but without information overload! Contemporary ECM systems provide virtual “meeting spaces”, “notice boards”, and other information sharing opportunities within the corporate perimeter.

Intercorporate Communication Q: How do we manage between hierarchies? Answers:  Merge/Federate  Subsume  Bridge Company XAgency Y Emperor  Who will be the Emperor = King(X+Y)?  Note: a federation is similar to a merger, where the constitution of the system is its Emperor. The peers agree to abide by the constitution.  Merging won’t solve the problem, until there is one empire.

across Hierarchies Q: How do we manage between hierarchies? Agency X Company Y Answers:  Merge  Subsume  Bridge

Bridges Q: How do we communicate between empires? Answer: Bridge! Company X Agency Y Bridging connection: trusted in both directions. The person forming the bridge has a separate “persona” who is a low- privilege member of the other corporation. Bridges are a nightmare for security analysts! Employees will use hotmail, instant messaging, blogs, USB devices,...

Trustworthy Bridges Employees must be able to make trustworthy bridges to any trustworthy external organisation. Bridges must be subject to managerial oversight. Employees must be given guidance. There should be whitelists of corporations and bridge technologies, as well as some blacklists. Managers will require decision support from “reputation management systems” in order to maintain whitelists and blacklists. The ECM system must interoperate with reputation systems, workflow systems, customer relationship management systems, human resource management systems, key management systems, and many other systems. Standardized interfaces are essential! Will we have supplier-driven standards, or will the customers band together to express their own requirements?

The Jericho Forum: Structure User members are large corporations and a few governmental agencies, who Own the Forum; Vote on the deliverables; Run the Board of Managers. Vendor members Have no votes; Participate fully in discussions. We now have 12 vendor members, and want more. Academic members Offer our expertise in exchange for information of interest. (Academics trade in ideas, not $$.)

Some Members of Jericho

Summary What is security? What is trust? Four qualitative dimensions in requirements: Strictness, Activity, Feedback, and Assessment. Two qualitative dimensions in control: Temporality, and Power. Can security be organised? Can organisations be secured? Yes: Static, Dynamic, and Governance levels. Hybrids of peerages and hierarchies seem very important. Jericho’s Collaboration Oriented Architecture is an intriguing development. :31