Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Putting Trust into the Network: Securing.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Vpn-info.com.
Operating-System Structures
Access Control Methodologies
TCG Confidential Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 TNC EAP IETF EAP.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Network Access Protection Platform Architecture Joseph Davies Technical writer Windows Networking and Device Technologies Microsoft Corporation.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Enforcement of Security Policy Compliance in Virtual Private Networks Prof. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Figure 1.1 Interaction between applications and the operating system.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Trusted Network Connect: Open.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Chapter 7: Using Windows Servers to Share Information.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
Network Access Control for Education
Copyright © 2008 Juniper Networks, Inc. 1 Network Access Control and Beyond By Steve Hanna, Distinguished Engineer, Juniper Co-Chair, Trusted.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Trusted Network Connect Briefing.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Secure Credential Manager Claes Nilsson - Sony Ericsson
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Compatibility and Interoperability Requirements
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 IF-MAP: Open Standards for Coordinating Security Presentation for SAAG IETF 72, July 31, 2008 Steve Hanna
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Module 7: Implementing Security Using Group Policy.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Network Access Control
Module 8 Implementing Security Using Group Policy.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Continuous Assessment Protocols for SACM draft-hanna-sacm-assessment-protocols-00.txt November 5, 20121IETF 85 - SACM Meeting.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Configuring and Troubleshooting Routing and Remote Access
Trusted Computing and the Trusted Platform Module
Chapter 2: System Structures
Mutual Attestation of IoT Devices and TPM 2
THE STEPS TO MANAGE THE GRID
To Join the Teleconference
draft-fitzgeraldmckay-sacm-endpointcompliance-00
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
Chapter 2: Operating-System Structures
IS4680 Security Auditing for Compliance
AAA: A Survey and a Policy- Based Architecture and Framework
PLANNING A SECURE BASELINE INSTALLATION
Chapter 2: Operating-System Structures
Presentation transcript:

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Putting Trust into the Network: Securing Your Network through Trusted Access Control Ned Smith Intel NCAC April 27 th, 2005

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #2 Agenda TCG Model for Trusted Computing Establishing Endpoint Integrity / Identity Access Control Decisions Based on TPM Relating XACML with TCG Integrity Schema

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #3 Challenges of Trusted Computing Assurance of safe computing environments –Viruses, Worms, Rootkits, Spyware, Adware etc… –Identifying the endpoint is ambiguous The endpoint has a distinct boundary –Controllers, busses, networks and peripherals associated with a platform Authentication protocols presume authorization tokens are bound to the endpoint Control of resources in foreign environments –Infosec policy associated with data as it moves through different computing environments –The environment must follow the policy

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #4 TCG Model of a Trusted Computing Platform Layer Resources Measurement Engine Layer Services Provided Services Storage Engine Verification Engine Reporting Engine Enforcement Engine Policies Protection Domain Metrics Dependent Services Trusted Engine

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #5 Examples Secure Boot –A secure boot service implements Measurement and Reporting engines integrated with a Verification engine –The Verification engine evaluates measurements according to a policy to determine proper boot sequence –If the sequence is in error, an Enforcement engine is employed to terminate the boot process Trusted Boot –Trusted boot service implements Measurement and Storage engines following the boot sequence –A Verification engine on a remote node (network server) evaluates the boot sequence at a later time

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #6 PEP Domain PDP Domain Decomposition for Network Access Control Access Requestor Domain Measurement Engine Measurement Attestation Storage Engine Verification Engine Reporting Engine Policies Metrics Access Request Network Connect 5 Enforcement Engine Apply Access 3 Access Control

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #7 How to Define the Endpoint? Authentication tokens –Keys, pass-phrases, certificates etc… Boot sequence Device enumeration Software install / load Running processes / threads Manufacturer intrinsic attributes –Model, version, quality metrics

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #8 Three Vectors of Endpoint Integrity / Identity Measurement –Hash of software/firmware captures platform state Controllers and processors are enumerated and measured Executing code may be scanned to determine its present state Cryptographic Identity –Authentication keys Reporting Engines use cryptographic keys to authenticate the reporting engine that by extension identifies the platform. Origin Identity –MMV Each component (device, platform, software package) can be identified by its Manufacturer, Model and Version (MMV) Credentials issued by manufacturers contain MMV intrinsic assertions –Reference Measurements Manufacturer provided signatures

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #9 Log of Extended Values Example: Pre-Boot Integrity Measurement Collection TPM TPM Hash of Extended Values Measure = Hash of code or data Execute = Code is loaded into CPU

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #10 Platform Configuration Registers (PCRs) Stores cumulative configuration Update is an Extend operation: –[PCR] = SHA-1 {[PCR] + Extend value} –Value: It is infeasible to calculate the value A such that: –PCRdesiredValue = Extend (A) PCRs re-initialized at system reset –TPM_Init Measurement Log contains

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #11 Collecting Measurements After System Boot A Platform Trust Service (PTS) can be used to Measure Applications –Files Read files from disk; compute a measurement –Processes Ring 3 - DLL injection to read another processes memory Ring 0 – Access pages in memory / DMA accesses

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #12 Example Platform Trust Service Integrity of the PTS is established –Pre-boot by measuring PTS drivers included in OS image –Post-boot by measuring PTS process memory pages PTS may measure processes and files –Determined by policy – e.g. protect integrity reporting infrastructure –Triggered by request – e.g. measure before connecting to the network Pre-boot

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #13 Policy Decision PointAccess Requestor TCG Model for Exchanging Integrity Data IF-IMC & IF-IMV exchange messages containing posture information –Messages are batched for delivery by TNCC / TNCS –Either side may start a batched exchange –IMCs and IMVs may subscribe to multiple message types –Follow-on exchanges may continue indefinitely But may be gated by the underlying transport TNC Client TNC Server Tunnel Batch Anti-Virus Collector Firewall Collector Patch Mgmt Collector TNC Integrity Collector Anti-Virus Verifier Firewall Verifier Patch Mgmt Verifier TNC Integrity Verifier Status OK !OK OK !OK OK OK OK The TNC Server Makes the Final Decision

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #14 Evaluation of Integrity Reports Integrity Reports ought to be shadowed by a Reference Value –Reference values “Normal” boot sequence will have repeatable PCR values Versioning “freezes” code changes so hash values don’t change –Authentication keys have trust anchors –Watchdogs have a schedule of expected events Reference Values Should Come from an Authoritative Source –Manufacturer – to detect modification due to stolen source –Evaluation labs – who make assertions of quality and conformance –Platform Owner – the entity taking the risk!

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #15 Integrity Measurement Harvesters Integrity Signature Database Value-Added Provider Reference Integrity Measurements Harvesting Mechanism Submission Mechanism = Anticipated TCG specification Integrity Harvesting Model Harvesting gathers Assertions and Values from a trustworthy source TCG Integrity Schema defined structure TCG Certificates Evaluation Mechanism Policies / Rules Verifier (PDP) Policy Authoring Mechanism TCG Integrity Schema Policy Authors

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #16 TCG Integrity Schema Consists of a tree of Assertions and hash Values –Reference measurements –Quality assertions –Development / Manufacturing processes –Trust related operations E.g. Creation of platform endorsement key Associated with a Target “Component” – Composite attributes form its “Identity” Manufacture name / vendor ID Model number / name Version information –Patch level –Component Identity is unique with respect to a release Not necessarily a particular copy or instance

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #17 Integrity Schema and XACML Evaluation correlates reference and actual values with appropriate consequences –A policy structure such as XACML may be helpful An XACML Policy is a tree of –PolicySet Contains multiple Policies and policy references –Policy Contains multiple Rules –Rule Contains decision logic expressed in terms of Conditions and Effect TCG Assertions may be mapped to XACML as Condition Attributes

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #18 A Conceptual Model Reference Integrity Measurements TCG Certificates XACML Context PDP Policy Authoring Mechanism Policy Authors PEPAR Policy Database Policy Sources Integrity Signature Database Attribute Sources XACML Response XACML Request XACML Policy or Attribute References

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #19 XACML Condition Attribute Integrity Signature Database Attribute Sources

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #20 Summary TCG model for Trusted Computing is centered around collection and verification of trust attributes Trust attributes can be applied to network access control The TCG is developing infrastructure for collecting reference trust attributes XACML may be a viable framework for making access decisions involving TCG trust attributes

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #21 Questions? Contact Information –The Trusted Computing Group –Infrastructure Working Group Co-Chairs Ned Smith / Intel Thomas Hardjono / Verisign

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #22 Backup

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #23 Steps of a Trusted Network Connection Find out the condition of the platform Communicate platform state when connecting Decide what level of access is acceptable Restrict the environment in accordance with access rights Remediation may be required to reconcile denied access Collection Enforcement Decision Making Reporting Remediation

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #24 TCG Trusted Network Connect Architecture ARPEP IF-IMCIF-IMV Network Access Requestor Policy Enforcement Point Network Access Authority TNC Server IF-TNCCS PDP Supplicant/ VPN Client, etc. Switch/ Firewall/ VPN Gateway IF-Transport RTM / TPM Platform Trust Service TNC Client Verifiers Collector Integrity Measurement Collectors Integrity Measurement Verifiers IF-V Remediation Layer Integrity Measurement Layer Integrity Evaluation Layer Network Access Layer Verifiers Collector Remediation Applications Remediation Resources Integrity Log IF-PTS IF-PEP PTS protects the integrity of TNC components RTM protects PTS TPM protects measurements and keys Enforcement mechanisms Control of network boundary Reporting and transfer of integrity information Access decision making Collection of integrity information Authoring of rules Automated response and provisioning Trust Layer

Copyright© 2004 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #25 TNC with 802.1X at Link Layer RequestorSwitch / Access Point EAP Peer 802.1x Access Agent 802.1x PAE RADIUS Client RADIUS Server EAP Peer Verifier 802.1x RADIUS* AR PDP PEP Verifier & Collector exchange posture information over EAP tunnel using EAP inner methods, AVPs or TLVs AR – Access Requester AVP – Attribute Value Pair EAP – Extensible Authentication Protocol PAE – Port Access Entity PDP – Policy Decision Point PEP – Policy Enforcement Point NAC – Network Access Control TLV – Tag Length Value CollectorVerifier NAC Extensions EAP Network Boundary 802.1X TNC