CMSC 414 Computer (and Network) Security Lecture 12 Jonathan Katz.

Slides:



Advertisements
Similar presentations
CS691 – Chapter 6 of Matt Bishop
Advertisements

CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
Access Control Intro, DAC and MAC System Security.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Lipner’s.
Verifiable Security Goals
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
1 Clark Wilson Implementation Shilpa Venkataramana.
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 10 Jonathan Katz.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
NS-H /11041 System Security. NS-H /11042 Authentication Verifying the identity of another entity Two interesting cases (for this class): –Computer.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Lecture 7 Access Control
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CS-550 (M.Soneru): Protection and Security - 2 [SaS] 1 Protection and Security - 2.
1 ISA 562 Internet Security Theory and Practice Integrity Policies Chapter 6 of Bishop ’ s book.
Mandatory Security Policies CS461/ECE422 Spring 2012.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
G53SEC 1 Reference Monitors Enforcement of Access Control.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
G53SEC 1 Reference Monitors Enforcement of Access Control.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Confidentiality Policies and Integrity Policies by Stefanie Wilcox.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Materials credits: M. Bishop, UC Davis T. Jaeger, Penn State U.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Computer Security: Principles and Practice
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Access Control. Assignment Review  Current –You decide what categories you want to include. Just provide the required justification.  Next  Detailed.
Access Control Model SAM-5.
Protection and Security
Chapter 14: System Protection
Integrity policies.
Chapter 6 Integrity Policies
Chapter 6: Integrity Policies
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 6: Integrity Policies
Integrity Policies Dr. Wayne Summers Department of Computer Science
CS703 - Advanced Operating Systems
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Presentation transcript:

CMSC 414 Computer (and Network) Security Lecture 12 Jonathan Katz

Midterm?  Will be held Oct 21, in class  Will cover everything up to and including the preceding lecture (Oct 16)  Includes all reading posted on the class syllabus!

Homework review?  Questions on HWs 1 or 2??

Integrity policies (Chapter 6)

Some requirements/assumptions  Users will not write their own programs –Will use existing programs and databases  Programs will be written/tested on a nonproduction system  Special process must be followed to install new program on production system

Requirements, continued…  The special installation process is controlled and audited  Auditors must have access to both system state and system logs

Some corollaries…  “Separation of duty” –Basically, have multiple people check any critical functions (e.g., software installation)  “Separation of function” –Develop new programs on a separate system  Auditing –Recovery/accountability

Biba integrity model  Ordered integrity levels –The higher the level, the more confidence More confidence that a program will act correctly More confidence that a subject will act appropriately More confidence that data is trustworthy –Note that integrity levels may be independent of security labels Confidentiality vs. trustworthiness Information flow vs. information modification

Information transfer  An information transfer path is a sequence of objects o 1, …, o n and subjects s 1, …, s n-1, such that, for all i, s i can read o i and write to o i+1  Information can be transferred from o 1 to o n via a sequence of read-write operations

“Low-water-mark” policy  s can write to o if and only if the integrity level of s is higher than that of o –The information obtained from a subject cannot be more trustworthy than the subject itself  If s reads o, then the integrity level of s is changed to min(i(o), i(s)) –The subject may be relying on data less trustworthy than itself

Continued…  s 1 can execute s 2 iff the integrity level of s 1 is higher than the integrity level of s 2 –Note that, e.g., s 1 provides inputs to s 2 so s 2 cannot be more trustworthy than s 1

Security theorem  If there is an information transfer path from o 1 to o n, then i(o n )  i(o 1 ) –Informally: information transfer does not increase the trustworthiness of the data

Drawbacks of this approach  The integrity level of a subject is non- increasing –A subject will soon be unable to access objects at high integrity levels  Does not help if integrity levels of objects are lowered instead –Downgrades the integrity level of trustworthy information

Ring policy  Only deals with direct modification –Any subject may read any object –s can write to o iff i(o)  i(s) –s 1 can execute s 2 iff i(s 2 )  i(s 1 )  The difference is that integrity levels of subjects do not change…  Security theorem holds here as well

Strict integrity policy  “Biba’s model” –s can read o iff i(s)  i(o) –s can write o iff i(o)  i(s) –s 1 can execute s 2 iff i(s 2 )  i(s 1 )  Note that read/write are both allowed only if i(s) = i(o)  Security theorem holds here as well

Lipner’s basic model  Based loosely on Bell-LaPadula –Two security levels Audit manager (AM) System low (SL) –Five categories Development (D) - production programs under development Production code (PC) - processes/programs Production data (PD) System development (SD) - system programs under development Software tools (T) - programs unrelated to protected data

Lipner’s model, continued  Assign users to levels/categories; e.g.: –Regular users: (SL, {PC, PD}) –Developers: (SL, {D, T}) –System auditors (AM, {D, PC, PD, SD, T}) –Etc.

Lipner’s model, continued  Objects assigned levels/categories based on who should access them; e.g.: –Ordinary users should be able to read production code, so this is labeled (SL, {PC}) –Ordinary users should be able to write production data, so this is labeled (SL, {PC, PD}) –Follows Bell-LaPadula methodology…

Properties  This satisfies the initial requirements: –Users cannot execute category T, so they cannot write their own programs –Developers do not have read/write access to PD, so cannot access production data If they need production data, the data must first be downgraded to D (this requires sys admins) –Etc.

Lipner’s full model  Augment security classifications with integrity classifications  Now, a subject’s access rights to an object depend on both its security classification and its integrity classification –E.g., subject can read an object only if subject’s security class is higher and subject’s integrity class is lower

Clark-Wilson model (highlights)  Transactions are the basic operation –Not subjects/objects  The system should always remain in a “consistent state” –A well-formed transaction leaves the system in a consistent state  Must also verify the integrity of the transactions themselves

Access control mechanisms (Chapter 15)

The problem  Drawbacks of access control matrices… –In practice, number of subjects/objects is large –Most entries blank/default –Matrix is modified every time subjects/objects are created/deleted

Access control lists (ACLs)  Instead of storing central matrix, store each column with the object it represents –Stored as pairs (s, r)  Subjects not in list have no rights –Can use wildcards to give default rights

Example: Unix  Unix divides users into three classes: –Owner of the file –Group owner of the file –All other users  Note that this leaves little flexibility…  Some systems have been extended to allow for more flexibility –Abbrev. ACLs overridden by explicit ACLs

Modifying ACLs  Only processes which “own” the object can modify the ACL of the object –Sometimes, there is a special “grant” right (possibly per right)

Privileged user?  How do ACLs apply to privileged user? –E.g., in Solaris both abbreviations of ACLs and “full” ACLs are used Abbreviated ACLs ignored for root, but full ACLs apply even to root

Groups/wildcards?  Groups and wildcards reduce the size and complexity of ACLs –E.g., user : group : r * : group : r user : * : r