Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Chapter 3 Multics. Chapter Overview Multics contribution to technology Multics History Multics System – Fundamentals – Security Fundamentals – Protection.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
Chapter 6 Security Kernels.
Security Models and Architecture
Access Control Intro, DAC and MAC System Security.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Verifiable Security Goals
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
1 Clark Wilson Implementation Shilpa Venkataramana.
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Information Systems Security Security Architecture Domain #5.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
Trusted System? What are the characteristics of a trusted system?
ISA 562 Internet Security Theory & Practice
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
G53SEC 1 Reference Monitors Enforcement of Access Control.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Dr. Bhavani Thuraisingham Cyber Security Lecture for July 2, 2010 Security Architecture and Design.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
G53SEC 1 Reference Monitors Enforcement of Access Control.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Domain 6 Security Architecture and Models Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,
ISA 400 Management of Information Security
Chapter 5 – Designing Trusted Operating Systems
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Security Architecture and Design: Part II
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
IS 2150/TEL 2810: Introduction of Computer Security1 September 27, 2003 Introduction to Computer Security Lecture 4 Security Policies, Confidentiality.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
Chapter 8: Principles of Security Models, Design, and Capabilities
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TOPIC: Web Security Models
Access Control Model SAM-5.
Verifiable Security Goals
Security Models and Designing a Trusted Operating System
Chapter 6 Integrity Policies
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
THE ORANGE BOOK Ravi Sandhu
System state models.
Dr. Bhavani Thuraisingham Cyber Security Lecture for July 2, 2010 Security Architecture and Design.
Security Modeling Jagdish S. Gangolly School of Business
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Presentation transcript:

Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377

System Security Architecture How to build a “secure” system Security Policy – Goals for the system – How sensitive information and resources are managed and protected – Used to specify the system

Trusted Computer System Evaluation Criteria US Government Requirement for a security architecture

Trusted Computing Base (TCB) Collection of hardware, operating system, software and firmware Must behave properly according to the security policy and not violate the trust of the system Trusted path of communications between the user and the programs and the TCB

TCB Always act in a safe and predictable manner Cannot be compromised or tampered with The OS ensures non-TCB processes and TCB processes interact in a secure manner

TCB System goes through an evaluation process – Example: Orange Book evaluation criteria

Security Perimeter Boundary between processes and resources outside the TCB and the TCB Divides untrusted from trusted Precise communication standards (interface)

Reference Monitor Mediates all accesses for subjects to objects Ensures subjects have necessary access rights Protects objects from unauthorized access All access decision should be made by a trusted, tamperproof component of the OS which works with the system kernel

Security Kernel Hardware, software, firmware that implements the Reference Monitor Invoked for every access Tamperproof, tested and verified

Security Models Bell-LaPadula Biba Clark-Wilson

Security Models Start with security policy Model is a framework that implements and enforces the security policy Mathematics proof that programming code

State Machine Model System state is secure Only allowable state transitions into a secure state Verified by formal mathematics models Boots into a secure state Shuts down or fails into a secure state

Basic Security Theorem If a system is initialized in a secure state and allowed state transitions are secure, then every subsequent state will be secure no matter what inputs occur.

Formal Models Not popular for software development Vendors are under pressure to get the product to market Used to develop systems that cannot allow errors or security breaches – Air traffic control, spacecraft, military classified systems, medical control systems

Bell-LaPadula 1970s by U.S. Military Mathematical model of multilevel security policy Secure state Rules of access Only covers confidentiality

Bell-LaPadula Subject-object model Subjects are assigned security labels (confidential, secret, top-secret) and by domain (Iraq, Fighter Jet Contract, etc.) Objects are assigned security labels (confidential, secret, top-secret) and by domain (Iraq, Fighter Jet Contract, etc.)

Simple Security Rule A subject at a given security level cannot read data that resides at a higher security level. “No read up”

*-property Subject in a given security level cannot write information to a lower security level. “No write down”

Strong Star Property A subject that has read and write capabilities can only perform these capabilities at the same security level.

Mandatory Access Control All MAC systems are based on Bell-LaPadula

Biba Model Like Bell-LaPadula but for integrity Prevents data from flowing to a higher integrity level

*-integrity “no write up” Can write data to an object at a higher integrity level Dirty data cannot be mixed with clean data

Simple integrity axiom “no read down” A subject cannot read data from a lower integrity level Cannot be corrupted by lower integrity data New York Times needs high quality sources of information

Invocation Property A subject cannot request service (invoke) of higher integrity

Integrity Business need data integrity – Account balances Governments need confidentiality

Clark-Wilson Model Formal (mathematical) integrity model Figure 4-23 on page 375 UDI – unconstrained data item – Does not require a high level of protection

Clark-Wilson Model CDI – constrained data item – User cannot modify directly TP – Transformation Procedure – User authenticates – Carries out procedure for the user IVP – Integrity verification procedures – Ensure integrity rules are being carried out

Clark-Wilson Model Well-formed transaction = series of operation which maintains the integrity Separation of duties – part of the model for certain transactions

Model Mathematical framework for integrity The vendor provides the integrity rules to fit the product requirements

Goals of Integrity Models 1.Prevent unauthorized users from making modifications 2.Prevent authorized users from making improper modifications (separation of duties) 3.Maintain internal and external consistency Biba only addresses them first goal Clark-Wilson addresses all three