Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.

Slides:



Advertisements
Similar presentations
Trusted System Elements and Examples CS461/ECE422 Fall 2011.
Advertisements

Information Flow and Covert Channels November, 2006.
Operating System Security
TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
Chapter 6 Security Kernels.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Access Control Intro, DAC and MAC System Security.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Trusted System? What are the characteristics of a trusted system?
J Carpenter & lecture & Information Security 2008 Lecture 5 Access Control, Security Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
CMSC 414 Computer (and Network) Security Lecture 11 Jonathan Katz.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
Information Security CS 526 Topic 17
Mandatory Access Control
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Chapter 5 – Designing Trusted Operating Systems
Trusted Operating Systems
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Chapter 8: Principles of Security Models, Design, and Capabilities
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TCSEC: The Orange Book.
Access Control Model SAM-5.
Security Models and Designing a Trusted Operating System
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Operating Systems Security
Official levels of Computer Security
CSE565: Computer Security Lectures 24, 25 OS Security
Advanced System Security
Security Modeling Jagdish S. Gangolly School of Business
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Chapter 6: Integrity Policies
Access Control What’s New?
Computer Security Integrity Policies
Advanced System Security
Presentation transcript:

Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which of those design principles carry over naturally to other program development tasks?  How do we develop “assurance” of the correctness of a trusted operating systems?

Designing Trusted Operating Systems  Primitive security services Memory protectionMemory protection File protectionFile protection General object access controlGeneral object access control User authenticationUser authentication  OS is trusted if we have confidence that it provides these four services in a consistent and effective way.

What is a trusted system? SecureTrusted Either-or: something either is or is not secure Graded: There are degrees of “trustworthiness Property of presenter Property of receiver Asserted based on product characteristics Judged based on evidence and analysis Absolute: not qualified as to how, where, when, or by whom used Relative: viewed in context of use A goal A characteristic

What is a trusted system?  Trusted process – process that can affect system security  Trusted product – evaluated and approved product  Trusted software- software portion of system that can be relied upon to enforce security policy  Trusted computing base – set of all protection mechanisms within a computing system that enforce a nified security policy  Trusted system – system that employs sufficient hardware and software integrity measures to allow its use for processing sensitive information

Security Policies  security policy – statement of security we expect the system to enforce  Military Security Policy based on protecting classified informationbased on protecting classified information Information access is limited by need- to-know ruleInformation access is limited by need- to-know rule Each piece of classified info is associated with a compartmentEach piece of classified info is associated with a compartment

Military Security Policy  Class (classification) -  Class (classification) -  Clearance - indication that person is trusted to access info up to a certain level of sensitivity  Dominance –  s <= O iff rank s <= rank o  and compartments s <= compartments o  Clearance level of subject is at least as high as that of the information  Subject has a need to know about all compartments for which the information is classified.

Commercial Security Policies  Data items at any level may have different degrees of sensitivity (public, proprietary, internal)  No formalized notion of clearances  No dominance function for most commercial information access

Clark-Wilson Commercial Security Policy  Well-formed transactions – perform steps in order, exactly as listed & authenticating the individuals who perform the steps  Goal – maintain consistency between internal data and external expectations of the data  Process constrained data items by transformation procedures

Commercial Security Policy  Separation of duty – division of responsibilities (manual system)  Chinese Wall Security Policy – Confidentiality PolicyConfidentiality Policy Objects (e.g. files)Objects (e.g. files) Company Groups (all objects concerning a particular company)Company Groups (all objects concerning a particular company) Conflict classes (cluster competing companies)Conflict classes (cluster competing companies)

Models of Security  Security models are used to Test a particular policy for completeness and consistencyTest a particular policy for completeness and consistency Document a policyDocument a policy Help conceptualize and design an implementationHelp conceptualize and design an implementation Check whether an implementation meets its requirementsCheck whether an implementation meets its requirements

Multilevel Security  Want to build a model to represent a range of sensitivities and to reflect need to separate subjects from objects to which they should not have access.  Use the lattice model of security military security model where <= in the model is the relation operator in the lattice (transitive, antisymmetric)military security model where <= in the model is the relation operator in the lattice (transitive, antisymmetric) Commercial security model (public, proprietary, internal)Commercial security model (public, proprietary, internal)

Bell-La Padula Confidentiality Model  Formal description of allowable paths of information flow in a secure system Simple Security Property. A subject s may have read access to an object o only if C(o) <= C(s)Simple Security Property. A subject s may have read access to an object o only if C(o) <= C(s) *-Property – A subject s who has read access to an object o may have write access to an object p only if C(o) <= C(p)*-Property – A subject s who has read access to an object o may have write access to an object p only if C(o) <= C(p)  The *-property is used to prevent write-down (subject with access to high-level data transfers that data by writing it to a low-level object.

Bibb Integrity Model  Simple Integrity Property. Subject s can modify (have write access to) object o only if I(s) >= I(o)  Integrity *-Property. If subject s has read access to object o with integrity level I(o), s can have write access to object p only if I(o) >= I(p)

Models Proving Theoretical Limitations of Security Systems  Graham-Denning Model – introduced concept of a formal system of protection rules; constructs a model having generic protection properties  Harrison-Ruzzo-Ullman Model – uses commands involving conditions and primitive operations where a protection system is a set of subjects, objects, rights, and commands

Take-Grant Systems  Four operations performed by subjects on objects with rights Create(o,r) subject creates an object with certain rightsCreate(o,r) subject creates an object with certain rights Revoke(o,r) subject removes rights from objectRevoke(o,r) subject removes rights from object Grant(o,p,r) subject grants to o access rights on pGrant(o,p,r) subject grants to o access rights on p Take (o,p,r) subject removes from o access rights on pTake (o,p,r) subject removes from o access rights on p

Trusted System Design Elements  Least privilege  Economy of mechanism  Open design  Complete mediation  Permission based  Separation of privilege  Least common mechanism  Ease of use

Security Features of Ordinary Operating Systems  Authentication of users  Protection of memory  File and I/O device access control  Allocation and access control to general objects  Enforcement of sharing  Guarantee of fair service  Interprocess communications and synchronization  Protection of operating system protection data

Security Features of Trusted Operating Systems  Trusted systems incorporate technology to address both features and assurance  Objects are accompanied (surrounded) by an access control mechanism  Memory is separated by user, and data and program libraries have controlled sharing and separation

Security Features of Trusted Operating Systems  Identification and Authentication Require secure id of individuals, each individual must be uniquely identifiedRequire secure id of individuals, each individual must be uniquely identified  Mandatory and Discretionary Access Control MAC – access control policy decisions are made beyond the control of the individual owner of the objectMAC – access control policy decisions are made beyond the control of the individual owner of the object DAC – leaves access control to the discretion of the object’s ownerDAC – leaves access control to the discretion of the object’s owner MAC has precedence over DACMAC has precedence over DAC

Security Features of Trusted Operating Systems  Object Reuse Protection Prevent object reuse leakagePrevent object reuse leakage OS clears (overwrites) all space to be reassignedOS clears (overwrites) all space to be reassigned Problem of magnetic remanenceProblem of magnetic remanence  Complete Mediation All accesses must be controledAll accesses must be controled  Trusted Path For critical operations (setting password, etc.), users want unmistakable communicationsFor critical operations (setting password, etc.), users want unmistakable communications

Security Features of Trusted Operating Systems  Accountability and Audit Maintain a log of security relevant eventsMaintain a log of security relevant events Audit log must be protected from outsidersAudit log must be protected from outsiders  Audit Log Reduction Audit only open and close of files/objectsAudit only open and close of files/objects  Intrusion detection Build patterns of normal system usage, triggering an alarm any time usage seems abnormalBuild patterns of normal system usage, triggering an alarm any time usage seems abnormal Intrusion preventionIntrusion prevention

Kernelized Design  Kernel – part of OS that performs lowest-level functions Synchronization, interprocess communications, message passing, interrupt handlingSynchronization, interprocess communications, message passing, interrupt handling Security kernel – responsible for enforcing security mechanism for entire OS; provides interface among the hardware, OS, and other parts of computer systemSecurity kernel – responsible for enforcing security mechanism for entire OS; provides interface among the hardware, OS, and other parts of computer system