CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.

Slides:



Advertisements
Similar presentations
TOPIC CLARK-WILSON MODEL Ravi Sandhu.
Advertisements

CSC 405 Introduction to Computer Security
Operating System Security
Access Control Methodologies
CMSC 414 Computer (and Network) Security Lecture 12 Jonathan Katz.
Security Models and Architecture
Access Control Intro, DAC and MAC System Security.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Lipner’s.
May 4, 2004ECS 235Slide #1 Biba Integrity Model Basis for all 3 models: Set of subjects S, objects O, integrity levels I, relation ≤  I  I holding when.
Chinese wall model in the internet Environment
Verifiable Security Goals
1 Clark Wilson Implementation Shilpa Venkataramana.
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Mandatory Security Policies CS461/ECE422 Spring 2012.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
Computer Security 3e Dieter Gollmann
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Dr. Bhavani Thuraisingham Cyber Security Lecture for July 2, 2010 Security Architecture and Design.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 5 Network Security
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
Lattice-based Access Control Models 2 Daniel Trivellato.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Policy, Models, and Trust
Information Security CS 526 Topic 17
Chapter 5 – Designing Trusted Operating Systems
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
IS 2150 / TEL 2810 Introduction to Security
Chapter 8: Principles of Security Models, Design, and Capabilities
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
TOPIC: Web Security Models
Verifiable Security Goals
Chapter 6 Integrity Policies
Chapter 6: Integrity Policies
Chapter 5: Confidentiality Policies
Mandatory Access Control (MAC)
System state models.
Dr. Bhavani Thuraisingham Cyber Security Lecture for July 2, 2010 Security Architecture and Design.
Trust Models CS461/ECE422.
Chinese wall model in the internet Environment
Chapter 6: Integrity Policies
Lecture 18: Mandatory Access Control
Integrity Policies Dr. Wayne Summers Department of Computer Science
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Presentation transcript:

CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall

CS426Fall 2010/Lecture 252 Plan for this lecture Biba Clark-Wilson Chinese Wall

CS426Fall 2010/Lecture 253 What is integrity? Attempt 1: Critical data do not change. Attempt 2: Critical data changed only in “correct ways” –E.g., in DB, integrity constraints are used for consistency Attempt 3: Critical data changed only through certain “trusted programs” Attempt 4: Critical data changed only as intended by authorized users.

The Biba Model Kenneth J. Biba: "Integrity Considerations for Secure Computer Systems", MTR-3153, The Mitre Corporation, April Motivated by the fact that BLP does not deal with integrity CS426Fall 2010/Lecture 254

CS426Fall 2010/Lecture 255 Biba: Integrity Levels Each subject (program) has an integrity level Each object has an integrity level Integrity levels are totally ordered Integrity levels different from security levels in confidentiality protection –a highly sensitive data may have low integrity –What is an example of a piece of data that needs high integrity, but no confidentiality?

CS426Fall 2010/Lecture 256 Five Mandatory Policies in Biba Strict integrity policy Subject low-water mark policy Object low-water mark policy Low-water mark Integrity audit policy Ring policy

CS426Fall 2010/Lecture 257 Strict Integrity Policy (BLP reversed) Rules: s can read o iff i(s)  i(o) no read down stops indirect sabotage by contaminated data s can write to o iffi(s)  i(o) no write up stops directly malicious modification Fixed integrity levels No information path from low object/subject to high object/subject

CS426Fall 2010/Lecture 258 Subject Low-Water Policy Rules –s can always read o;after reading i(s)  min[i(s), i(o)] –s can write to o iff i(s)  i(o) Subject’s integrity level decreases as reading lower integrity data No information path from low-object to high- object

CS426Fall 2010/Lecture 259 Object Low-Water Mark Policy Rules –s can read o;iffi(s)  i(o) –s can always write to o; after writing i(o)  min[i(s), i(o)] Object’s integrity level decreases as it is contaminated by subjects Objects with high labels are not contaminated

CS426Fall 2010/Lecture 2510 Low-Water Mark Integrity Audit Policy Rules –s can always read o;after reading i(s)  min[i(s), i(o)] –s can always write to o; after writing i(o)  min[i(s), i(o)] Tracing, but not preventing contamination Similar to the notion of tainting

CS426Fall 2010/Lecture 2511 The Ring Policy Rules –Any subject can read any object –s can write to o iff i(s)  i(o) Integrity levels of subjects and objects are fixed. Intuitions: –subjects are trusted to process low-level inputs correctly

CS426Fall 2010/Lecture 2512 Object Integrity Levels The integrity level of an object may be based on –Quality of information (levels may change) Degree of trustworthiness Contamination level: –Importance of the object (levels do not change) degree of being trusted Protection level: writing to the objects should be protected What should the relation between the two meanings, which one should be higher?

CS426Fall 2010/Lecture 2513 Integrity vs. Confidentiality ConfidentialityIntegrity Control reading preserved if confidential info is not read Control writing preserved if important obj is not changed For subjects who need to read, control writing after reading is sufficient, no need to trust them For subjects who need to write, has to trust them, control reading before writing is not sufficient Integrity requires trust in subjects!

CS426Fall 2010/Lecture 2514 Key Difference between Confidentiality and Integrity For confidentiality, controlling reading & writing is sufficient –theoretically, no subject needs to be trusted for confidentiality; however, one does need trusted subjects in BLP to make system realistic For integrity, controlling reading and writing is insufficient –one has to trust all subjects who can write to critical data

Impacts of The Need to Trust Subjects A small security kernel is no longer possible No need to worry about covert channels for integrity protection How to establish trust in subjects becomes a challenge. CS426Fall 2010/Lecture 2515

CS426Fall 2010/Lecture 2516 The Clark-Wilson Model David D. Clark and David R. Wilson. “A Comparison of Commercial and Military Computer Security Policies.” In IEEE SSP Military policies focus on preventing disclosure In commercial environment, integrity is paramount –no user of the system, even if authorized, may be permitted to modify data items in such a way that assets or accounting records of the company are lost or corrupted

CS426Fall 2010/Lecture 2517 Two High-level Mechanisms for Enforcing Data Integrity Well-formed transaction –a user should not manipulate data arbitrarily, but only in constrained ways that preserve or ensure data integrity e.g., use a write-only log to record all transactions e.g., double-entry bookkeeping e.g., passwd Can manipulate data only through trusted code!

CS426Fall 2010/Lecture 2518 Two High-level Mechanisms for Enforcing Data Integrity Separation of duty –ensure external consistency: data objects correspond to the real world objects –separating all operations into several subparts and requiring that each subpart be executed by a different person –e.g., the two-man rule

CS426Fall 2010/Lecture 2519 Implementing the Two High-level Mechanisms Mechanisms are needed to ensure –control access to data: a data item can be manipulated only by a specific set of programs –program certification: programs must be inspected for proper construction, controls must be provided on the ability to install and modify these programs –control access to programs: each user must be permitted to use only certain sets of programs –control administration: assignment of people to programs must be controlled and inspected

CS426Fall 2010/Lecture 2520 The Clarke-Wilson Model for Integrity Unconstrained Data Items (UDIs) –data with low integrity Constrained Data Items (CDIs) –data items within the system to which the integrity model must apply Integrity Verification Procedures (IVPs) –confirm that all of the CDIs in the system conform to the integrity specification Transformation Procedures (TPs) –well-formed transactions

CS426Fall 2010/Lecture 2521 Differences from MAC A data item is not associated with a particular security level, but rather with a set of TPs A user is not given read/write access to data items, but rather permissions to execute certain programs

CS426Fall 2010/Lecture 2522 Comparison with Biba Biba lacks the procedures and requirements on identifying subjects as trusted Clark-Wilson focuses on how to ensure that programs can be trusted

CS426Fall 2010/Lecture 2523 The Chinese Wall Security Policy Goal: Avoid Conflict of Interest Data are stored in a hierarchical arranged system –the lowest level consists of individual data items –the intermediate level group data items into company data sets –the highest level group company datasets whose corporation are in competition

CS426Fall 2010/Lecture 2524 From

CS426Fall 2010/Lecture 2525 Simple Security Rule in Chinese Wall Policy Access is only granted if the object requested: –is in the same company dataset as an object already accessed by that subject, i.e., within the Wall, or –belongs to an entirely different conflict of interest class.

CS426Fall 2010/Lecture 2526 Readings for This Lecture Required Readings: –David D. Clark and David R. Wilson. “A Comparison of Commercial and Military Computer Security Policies.” In IEEE SSP Optional Readings: –David FC. Brewer and Michael J. Nash. “The Chinese Wall Security Policy.” in IEEE SSP 1989.

CS426Fall 2010/Lecture 2527 Coming Attractions … Integrity protection in operating systems