Code Access Security vs. Role-Based Security  RBS  Security identity attached to user accounts  Access to resources specified according to user’s group.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

Auditing Microsoft Active Directory
© 2003 School of Computing, University of Leeds SY32 Secure Computing, Lecture 17 Secure Coding in Java and.NET Part 2: Code Access Control.
Deploying and Managing Active Directory Certificate Services
Configuring Windows Internet Explorer 7 Security Lesson 5.
Windows Forms 2.0 – ClickOnce Stephen Turner Software Design Engineer
Security in.NET Jørgen Thyme Microsoft Denmark. Topics & non-topics  Cryptography  App domains  Impersonation / delegation  Authentication  Authorization.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
ASP.Net Security: Fundamentals Chapters 1-4 Freeman and Jones Book.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Fraser Technical Solutions, LLC
App development in SharePoint 2013 LIVE Introducing Cloud App Model Cloud-hosted Apps Experiences from the Field.
Chapter 7 WORKING WITH GROUPS.
.NET Code security including 4.0 & Tools Jon C. Arce
Create with SharePoint 2010 Jen Dodd Sr. Solutions Consultant
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Smart Client Applications for Developers Davin Mickelson, MCT, MCSD New Horizons of MN.
Deployment of web Site. Preparing the web site for deployment you now have two versions of web site 1 -one running in the production environment 2-one.
Software Licensing, Made Simple SELECT Server XM Edition
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
DEV290 Building Office Solutions with Visual Studio Eric Carter Lead Developer Developer Platform & Evangelism Microsoft Corporation.
Section 2: Using Group Policy Management Tools Local vs. Domain Policies Editing Local Policies Managing Domain Policies Understanding Group Policy Refresh.
ASSEMBLIES AND THE GAC CHAPTER 1, LESSONS 4-7 & LAB.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Java 2 security model Valentina Casola. Components of Java the development environment –development lifecycle –Java language features –class files and.
Module 7: Managing the User Environment by Using Group Policy.
.Net Security and performance
SECURITY ISSUES. Introduction The.NET Framework includes a comprehensive set of security tools –Low-level classes and an overall framework –Managing code.
Module 10 Administering and Configuring SharePoint Search.
Module 5: Configuring Internet Explorer and Supporting Applications.
Code Access Security CS 795. Terminology--CLR Common Language Runtime: –The.NET Framework provides a runtime environment which runs the code and provides.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
System.Security.Policy namespace Chinmay Lokesh.NET Security CS 795 Summer 2010.
Presented By: Ahmed ALSUM PhD Student CS 895:.Net Security Old Dominion University College of Science Department of Computer Science.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
GUDURU PRAVEEN REDDY.NET IMPERSONATION. Contents Introduction Impersonation Enabled Impersonation Disabled Impersonation Class Libraries Impersonation.
Multics CysecLab Graduate School of Information Security KAIST.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
IIS and.Net security -Vasudha Bhat. What is IIS? Why do we need IIS? Internet Information Services (IIS) is a Web server, its primary job is to accept.
DEV240 Fundamentals of Code Access Security Sebastian Lange Program Manager Common Language Runtime Microsoft Corporation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Implementing Security Using Group Policy.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Security E-Learning Chapter 08. Security Control access to your web site –3 Techinques for Identifying users Giving users access to your site Securing.
.Net Security By: Joe Schuldt. Introduction.Net Security.Net Security –“Developers want to build safe applications, but most developers don't want to.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
System.Security.policy Namespace By: Marepalli Gayathri.
Module 8 Implementing Security Using Group Policy.
Customizing.NET Security Permissions Nageswari Vallabhaneni.
Chapter 7. Permissions Programming.Net Security, O’Reilly Publishers.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
SE Linux Implementation Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework.
ClickOnce Deployment (One-click Deployment)
Subha Desikan CSE775 – Distributed Objects Spring 2003
Topic: Java Security Models
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Utilize Group Policy Terminal Server Settings
Chapter 29: Program Security
PLANNING A SECURE BASELINE INSTALLATION
Chapter 8: Security Policy
Designing IIS Security (IIS – Internet Information Service)
ClickOnce Deployment (One-click Deployment)
Presentation transcript:

Code Access Security vs. Role-Based Security  RBS  Security identity attached to user accounts  Access to resources specified according to user’s group membership and ACLs  Complete trust given to code  CAS  Security identity linked to code  Access to resources depends on permissions granted to code  Code trust has to be earned depending on “evidence” it presents

What can go wrong with RBS – A Scenario  Developer receives urgent request to build program for identifying prime numbers  Developer Google’s for a library that supply the requested functionality  Developer incorporates library into utility program  Weird things start happening to computers on which the program is installed  Why?

The Freebee.com Math Utility bool Function IsPrime(int aNumber) { //Randomly scramble user files. return realDeal(aNumber); } Role-based security can’t prevent this!

.NET Application Isolation  All code in a process runs in the context of one or more application “domains”  Application domains are isolated from each other and can have differing security permissions  Untrusted code can be loaded into a “sandboxed” domain in which very limited permissions are granted  Attempts to use un-granted permissions raise security exceptions

Resources Protected by Code Access Security Permissions  File I/O  Environment variables  Registry  Sockets  UI  More than 30 others

Administering Code Access Security Policy  Security policy established at multiple levels (Enterprise, Machine, User)  Identity of code established by the evidence attached to it (Host: site, url, zone; Assembly: publisher certificate, hash code)  Groups within a policy file map evidence to permission sets via membership conditions  Edited “Microsoft.NET Framework 2.0 Configuration” in Administrative Tools

Resources .NET Security, O’Reilly 2003  Improving Web Application Security – Threats and Countermeasures, Microsoft Corporation 2003  MSDN