Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description.

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Lecture 8 Access Control (cont)
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 13: Trusted Computing and Multilevel.
Access Control Methodologies
I NFORMATION S ECURITY : C ONFIDENTIALITY P OLICIES (C HAPTER 4) Dr. Shahriar Bijani Shahed University.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula Model –General idea –Informal description of rules.
Access Control Intro, DAC and MAC System Security.
Information Security Principles & Applications Topic 6: Security Policy Models 虞慧群
1 Confidentiality Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 18, 2004.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Chapter 5: Confidentiality Policies Overview –What is a confidentiality.
Sicurezza Informatica Prof. Stefano Bistarelli
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
April 15, 2004ECS 235Slide #1 Policy Languages Express security policies in a precise way High-level languages –Policy constraints expressed abstractly.
7/15/2015 5:04 PM Lecture 4: Bell LaPadula James Hook CS 591: Introduction to Computer Security.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 5 September 27, 2007 Security Policies Confidentiality Policies.
Mandatory Security Policies CS461/ECE422 Spring 2012.
Security Policy Models CSC 482/582: Computer Security.
1 Confidentiality Policies September 21, 2006 Lecture 4 IS 2150 / TEL 2810 Introduction to Security.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 Announcement: End of Campaign Celebration When: Wednesday, October 1, 15:30 Where: New building site (NW corner 3 rd & University) Please attend and.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Confidentiality Policies and Integrity Policies by Stefanie Wilcox.
Slide #5-1 Confidentiality Policies CS461/ECE422 Computer Security I Fall 2010 Based on slides provided by Matt Bishop for use with Computer Security:
Outline Overview – Mandatory versus discretionary controls – What is a confidentiality model Bell-LaPadula Model – General idea – Description of rules.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Information Security CS 526 Topic 17
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 5 September 29, 2009 Security Policies Confidentiality Policies.
1/15/20161 Computer Security Confidentiality Policies.
Mandatory Access Control and SE Linux CS 460 Cyber Security Lab Spring ‘10.
Access Control: Policies and Mechanisms Vinod Ganapathy.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #5-1 Confidentiality Policies Overview –What is a confidentiality model Bell-LaPadula.
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Security Models Xinming Ou. Security Policy vs. Security Goals In a mandatory access control system, the system defines security policy to achieve security.
IS 2150/TEL 2810: Introduction of Computer Security1 September 27, 2003 Introduction to Computer Security Lecture 4 Security Policies, Confidentiality.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter 5: Confidentiality Policies
Computer Security Confidentiality Policies
IS 2150 / TEL 2810 Introduction to Security
Information Security CS 526 Topic 17
Advanced System Security
Chapter 5: Confidentiality Policies
Confidentiality Models
Confidentiality Policies
Policy Languages Express security policies in a precise way
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Trust Models CS461/ECE422.
Chapter 5: Confidentiality Policies
Lecture 17: Mandatory Access Control
Chapter 5: Confidentiality Policies
Computer Security Confidentiality Policies
Chapter 6: Integrity Policies
IS 2150 / TEL 2810 Information Security & Privacy
Chapter 5: Confidentiality Policies
Advanced System Security
Presentation transcript:

Confidentiality Policies  Overview  What is a confidentiality model  Bell-LaPadula Model  General idea  Informal description of rules  Formal description of rules Computer Security: Art and Science © Matt Bishop

Confidentiality Policy  Goal: prevent the unauthorized disclosure of information  Deals with information flow  Integrity incidental  Multi-level security models are best-known examples  Bell-LaPadula Model basis for many, or most, of these Computer Security: Art and Science © Matt Bishop

“Governmental” policies  US Privacy Act  Income tax returns are confidential  Executive privilege  People working in the government must limit the distribution of certain docs and info. Computer Security: Art and Science © Matt Bishop

Bell-LaPadula Model, Step 1  Security levels arranged in linear ordering  Top Secret: highest  Secret  Confidential  Unclassified: lowest  Levels consist of security clearance L(s)  Objects have security classification L(o)  Subjects have security clearance L(s) Computer Security: Art and Science © Matt Bishop

Example security levelsubjectobject Top SecretTamaraPersonnel Files SecretSamuel Files ConfidentialClaireActivity Logs UnclassifiedAndrewTelephone Lists Computer Security: Art and Science © Matt Bishop Tamara can read all files Claire cannot read Personnel or Files Andrew can only read Telephone Lists

Reading Information  Information flows up, not down  “Reads up” disallowed, “reads down” allowed  Simple Security Condition (Step 1)  Subject s can read object o iff, L(o) ≤ L(s) and s has permission to read o  Note: combines mandatory control (relationship of security levels) and discretionary control (the required permission)  Sometimes called “no reads up” rule Computer Security: Art and Science © Matt Bishop

Writing Information  Information flows up, not down  “Writes up” allowed, “writes down” disallowed  *-Property (Step 1)  Subject s can write object o iff L(s) ≤ L(o) and s has permission to write o  Note: combines mandatory control (relationship of security levels) and discretionary control (the required permission)  Sometimes called “no writes down” rule  If Tamara copies from the Personnel file to an Activity log, then Claire and Samuel can see the data from the Personnel file. Computer Security: Art and Science © Matt Bishop

Basic Security Theorem, Step 1  If a system is initially in a secure state,  and every transition of the system satisfies  the simple security condition, step 1(i.e. “no reads up”,  and the *-property, step 1(i.e. “no writes down”,  then every state of the system is secure Computer Security: Art and Science © Matt Bishop

Bell-LaPadula Model, Step 2  Expand notion of security level to include categories  Security level is (clearance, category set)  Examples  ( Top Secret, { NUC, EUR, ASI } )  ( Confidential, { EUR, ASI } )  ( Secret, { NUC, ASI } ) Computer Security: Art and Science © Matt Bishop

Lattice Computer Security: Art and Science © Matt Bishop

Levels and Lattices  (A, C) dom (A, C) iff A ≤ A and C  C  A – clearance or classification  C – category (also called compartment)  Examples  (Top Secret, {NUC, ASI}) dom (Secret, {NUC})  (Secret, {NUC, EUR}) dom (Confidential,{NUC, EUR})  (Top Secret, {NUC})  dom (Confidential, {EUR}) Computer Security: Art and Science © Matt Bishop

Levels and Ordering  Security levels partially ordered  Any pair of security levels may (or may not) be related by dom  “dominates” serves the role of “greater than” in step 1  “greater than” is a total ordering, though Computer Security: Art and Science © Matt Bishop

Reading Information  Information flows up, not down  “Reads up” disallowed, “reads down” allowed  Simple Security Condition (Step 2)  Subject s can read object o iff L(s) dom L(o) and s has permission to read o  Note: combines mandatory control (relationship of security levels) and discretionary control (the required permission)  Sometimes called “no reads up” rule Computer Security: Art and Science © Matt Bishop

Writing Information  Information flows up, not down  “Writes up” allowed, “writes down” disallowed  *-Property (Step 2)  Subject s can write object o iff L(o) dom L(s) and s has permission to write o  Note: combines mandatory control (relationship of security levels) and discretionary control (the required permission)  Sometimes called “no writes down” rule Computer Security: Art and Science © Matt Bishop

Basic Security Theorem, Step 2  If a system is initially in a secure state, and every transition of the system satisfies the simple security condition, step 2, and the *-property, step 2, then every state of the system is secure Computer Security: Art and Science © Matt Bishop

Problem  Colonel has (Secret, {NUC, EUR}) clearance  Major has (Secret, {EUR}) clearance  Major can talk to colonel (“write up” or “read down”)  Colonel cannot talk to major (“read up” or “write down”)  Clearly absurd! Computer Security: Art and Science © Matt Bishop

Solution  Define maximum, current levels for subjects  maxlevel(s) dom curlevel(s)  Example  Treat Major as an object (Colonel is writing to him/her)  Colonel has maxlevel (Secret, { NUC, EUR })  Colonel sets curlevel to (Secret, { EUR })  Now L(Major) dom curlevel(Colonel)  Colonel can write to Major without violating “no writes down” Computer Security: Art and Science © Matt Bishop