Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

TCSEC: The Orange Book. TCSEC Trusted Computer System Evaluation Criteria.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
Trusted vs. secure software
Security Models and Architecture
Secure Operating Systems Lesson 0x11h: Systems Assurance.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Verifiable Security Goals
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Information Systems Security Security Architecture Domain #5.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Principles of Information System Security: Text and Cases
Trusted System? What are the characteristics of a trusted system?
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
J Carpenter & lecture & Information Security 2008 Lecture 5 Access Control, Security Models.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Dr. Bhavani Thuraisingham Cyber Security Lecture for July 2, 2010 Security Architecture and Design.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
Chapter 6: Integrity Policies  Overview  Requirements  Biba’s models  Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
Policy, Models, and Trust
Mandatory Access Control
Chapter 5 – Designing Trusted Operating Systems
Materials credits: M. Bishop, UC Davis T. Jaeger, Penn State U.
Security Architecture and Design: Part II
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TOPIC: Web Security Models
TCSEC: The Orange Book.
Verifiable Security Goals
Security Models and Designing a Trusted Operating System
Chapter 6 Integrity Policies
Official levels of Computer Security
THE ORANGE BOOK Ravi Sandhu
Advanced System Security
Security Modeling Jagdish S. Gangolly School of Business
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Chapter 6: Integrity Policies
Computer Security Integrity Policies
Advanced System Security
Presentation transcript:

Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University

Section Overview Security Policies and Models Security Policies and Models Trust design elements and features Trust design elements and features Orange Book Certification Levels Orange Book Certification Levels Common Criteria Common Criteria False Guaranties of Trust False Guaranties of Trust

References Security in Computing, 4 th Ed. Security in Computing, 4 th Ed. Chapter 5 (pgs , ) Chapter 5 (pgs , )

Military Policy Classification Classification Rank (Hierarchical) Rank (Hierarchical) Compartments (Non-Hierarchical) Compartments (Non-Hierarchical) Can only read object if Can only read object if Subject clearance ≥ Required clearance for object Subject clearance ≥ Required clearance for object Subject has need to know about all compartments for with the object is classified Subject has need to know about all compartments for with the object is classified Who controls access? Who controls access?

Commercial Security Policy Project and/or department based Project and/or department based No formal notion of clearances No formal notion of clearances Rules less consistent Rules less consistent Typical classifications: Typical classifications: Public Public Proprietary Proprietary Internal Internal

Clark-Wilson Policy Integrity is of prime importance Integrity is of prime importance Well formed transactions Well formed transactions Handled via access triples Handled via access triples User Identifier (userID) User Identifier (userID) Transformation procedures (TP) Transformation procedures (TP) Constrained data items (CDI) Constrained data items (CDI)

Separation of Duty Prevent possibility of abuse Prevent possibility of abuse Keeps track of various operations (state) Keeps track of various operations (state) Prevent same person from handling multiple transactions on same objects (even if authorized to) Prevent same person from handling multiple transactions on same objects (even if authorized to)

Chinese Wall Policy Goal is to prevent conflicts of interest Goal is to prevent conflicts of interest Levels of abstraction Levels of abstraction Objects Objects Company groups Company groups Conflict classes Conflict classes Can’t access objects from two company groups within same conflict class Can’t access objects from two company groups within same conflict class

Models of Security Mechanism to enforce policy Mechanism to enforce policy Lattice – Visualization of relationships Lattice – Visualization of relationships Bell-La Padula Bell-La Padula Biba Integrity model Biba Integrity model

Bell La Padula Model Military Policy based Military Policy based Secures the flow of information Secures the flow of information Properties Properties Simple Security Property: Subject s can read object o only if C(o) ≤ C(s) Simple Security Property: Subject s can read object o only if C(o) ≤ C(s) *-Property: Subject with read access to object o may write to object p if C(o) ≤ C(p) *-Property: Subject with read access to object o may write to object p if C(o) ≤ C(p) Read down / Write Up Read down / Write Up

Bell La Padula Read-Down Top Secret Secret Unclassified Top Secret Secret Unclassified Subject (s) Object (o)

Bell La Padula Write-Up Top Secret Secret Unclassified Top Secret Secret Unclassified Read Object (o) Write Object (p)

Bell La Padula Lattice Example TS {A, B} TS {A} TS {B} S {A, B} S {A} S {B} U {}

Biba Model Dual of Bell-La Padula model Dual of Bell-La Padula model Focus is on integrity (trustworthiness) Focus is on integrity (trustworthiness) Properties Properties Simple Integrity Property: Subject s can modify object o only if I(s) ≥ I(o) Simple Integrity Property: Subject s can modify object o only if I(s) ≥ I(o) *-Property: If subject s has read access to object o with integrity level I(o), s can write to object p only if I(o) ≥ I(p) *-Property: If subject s has read access to object o with integrity level I(o), s can write to object p only if I(o) ≥ I(p) Read up / Write down Read up / Write down

Biba Read-Up High Integrity Medium Integrity Low Integrity High Integrity Medium Integrity Low Integrity Subject (s) Object (o)

Biba Write-Down Read Object (o) Write Object (p) High Integrity Medium Integrity Low Integrity High Integrity Medium Integrity Low Integrity

Design Elements Least Privilege Least Privilege Economy of Mechanism Economy of Mechanism Open Design Open Design Complete Mediation Complete Mediation Permission-Based Permission-Based Separation of Privilege Separation of Privilege Least Common Mechanism Least Common Mechanism Ease of Use Ease of Use

Security Features User Identification and Authentication User Identification and Authentication Complete Mediation Complete Mediation Discretionary Access Control Discretionary Access Control Mandatory Access Control Mandatory Access Control Object Reuse Protection Object Reuse Protection Audit Audit Audit Reduction Audit Reduction Trusted Path Trusted Path Intrusion Detection Intrusion Detection

Trusted Computer Base (TCB) ReferenceModel SecurityKernel Trusted Computer Base

Assurance Methods Testing Testing Pentesting Pentesting Formal Verification Formal Verification Validation Validation

A1 B3 B2 B1 C2 Orange Book Evaluation C1 D - Minimal Protection - Discretionary Security Protection - Controlled Access Protection - Labeled Security Protection - Structured Protection - Security Domains - Verified Design

Discretionary Security Protection User Authentication User Authentication Object Access Control Object Access Control Discretionary Access Control Discretionary Access Control Memory Protection Memory Protection Penetration Testing Penetration Testing C1 D

Controlled Access Protection C2 C1 D  Single User Access Control  Object Reuse  Audit Logs

Labeled Security Protection B1 C2 C1 D  Mandatory Access Control  Labeled Objects  Need to Know Access Policy  Hierarchical  Nonhierarchical

Structured Protection B2 B1 C2 C1 D  Test and review of design  Principle of Least Privilege  Trusted Paths  Covert Channel Analysis

Security Domains  Extensive Testing  Full Access Control  Active Audits and Alerts  Resistant to Penetration B3 B2 B1 C2 C1 D

Verified Design A1 B3 B2 B1 C2 C1 D  Formally Verifiable Design  Formal Top-Down Spec.  Informal demonstration that spec. is consistent with design  Formal Analysis of Covert Channels

Orange Book Weaknesses All or Nothing for Level Certification All or Nothing for Level Certification Local software can invalidate Local software can invalidate OS Patches can invalidate OS Patches can invalidate Mandatory Access Control can be difficult to set up Mandatory Access Control can be difficult to set up Viruses not taken into consideration Viruses not taken into consideration Common Criteria Common Criteria Common Criteria Common Criteria Class-family-component based Class-family-component based International system International system

Common Criteria Classes Functionality Functionality Identification and Authentication Identification and Authentication Trusted Path Trusted Path Security Audit Security Audit Invocation of Security Functions Invocation of Security Functions User Data Protection User Data Protection Resource Utilization Resource Utilization Protection of the Trusted Security Functions Protection of the Trusted Security Functions Privacy Privacy Communication Communication Assurance Assurance Development Testing Vulnerability Assessment Configuration Management Life-cycle Support Guidance Documents Delivery and Operation

Common Criteria ClassClass FamilyFamily ComponentComponent ComponentComponent ComponentComponent PackagePackage PackagePackage PackagePackage Protection Profile Security Target Protection Profile Security Target ComponentComponent

False Guaranties of Trust Emphatic Assertions Emphatic Assertions Security through Obscurity Security through Obscurity I couldn’t find any flaws I couldn’t find any flaws Challenges Challenges