Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Policies. Information Warfare - Farkas2 Reading For this class: – Information Security Policy - A Development Guide for Large and Small Companies,

Similar presentations


Presentation on theme: "Security Policies. Information Warfare - Farkas2 Reading For this class: – Information Security Policy - A Development Guide for Large and Small Companies,"— Presentation transcript:

1 Security Policies

2 Information Warfare - Farkas2 Reading For this class: – Information Security Policy - A Development Guide for Large and Small Companies, http://www.sans.org/reading_room/whitepapers/policyissues /information-security-policy-development-guide-large- small-companies_1331 http://www.sans.org/reading_room/whitepapers/policyissues /information-security-policy-development-guide-large- small-companies_1331 – S. De Capitani di Vimercati, P. Samarati, S. Jajodia: Policies, Models, and Languages for Access Control, http://seclab.dti.unimi.it/Papers/2005-DNIS.pdf http://seclab.dti.unimi.it/Papers/2005-DNIS.pdf Look at the Information Security Program - USC, http://uts.sc.edu/itsecurity/program/index.shtml http://uts.sc.edu/itsecurity/program/index.shtml

3 Why Do We Need Security Policies? Basic Purpose of Policy Policy and Legislative Compliance Policies as Catalysts for Change Policies Must be Workable Information Warfare - Farkas3

4 Purpose Protect people and information Set the rules for expected behaviour by users, system administrators, management, and security personnel Authorize security personnel to monitor, probe, and investigate Define and authorize the consequences of violation1 Define the company consensus baseline stance on security Help minimize risk Help track compliance with regulations and legislation Information Warfare - Farkas4

5 Legislative Compliance Showing what the company’s stance Common legislations: HIPAA (Health Insurance Accountability and Portability Act), GLB (Gramm-Leach-Bliley Act) and Sarbanes Oxley, Family Educational Rights and Privacy Act (FERPA) Mapping policy statements to legislative requirements Information Warfare - Farkas5

6 Catalysts for Change Drive forward new company initiatives Move towards better security and general practices Must be read and known by everyone Information Warfare - Farkas6

7 Must be Workable Security policy is useful, useable, realistic Fits the company’s existing policy Involve and get buy-in from major players Information Warfare - Farkas7

8 Who Will Use the Policy? Audience groups – Management – Technical staff – End users Audience and policy content – Include relevant information only – Multiple ways of using the policy Information Warfare - Farkas8

9 Policy Type Policy Hierarchy Governing Policy (single document) Technical Policies (multiple documents) Job Aids / Guidelines (support to apply technical policies) Information Warfare - Farkas9

10 Policy Development Development Process Maturity Top-Down Versus Bottom-Up Current Practice Versus Preferred Future Consider All Threat Types Policy Development Life Cycle Information Warfare - Farkas10

11 Governing Policy Cover information security concepts at a high level – Define, describe, explain Mainly for managers and end users Aligned with existing and future organizational requirements Supported by the technical policies Information Warfare - Farkas11

12 Technical Policies Used by technical custodians carrying out technical responsibilities More detailed than the governing policy System and issue specific Describe what must be done NOT how to do it Address: what, who, when, where to secure Information Warfare - Farkas12

13 Job Aid/Guidelines Procedural, step-by-step directions Addresses: How? Support particular technical policies Not required for all policies Information Warfare - Farkas13

14 Prioritizing Policy Topics Legally obliged to protect Critical decision-making by your organization or your customers Supports organizational goals Information Warfare - Farkas14

15 Governing Policy Outline Appendix 1 http://www.sans.org/reading- room/whitepapers/policyissues/information- security-policy-development-guide-large- small-companies-1331?show=information- security-policy-development-guide-large- small-companies-1331&cat=policyissues http://www.sans.org/reading- room/whitepapers/policyissues/information- security-policy-development-guide-large- small-companies-1331?show=information- security-policy-development-guide-large- small-companies-1331&cat=policyissues Information Warfare - Farkas15

16 Technical Policy Outline Appendix 2 http://www.sans.org/reading- room/whitepapers/policyissues/information- security-policy-development-guide-large- small-companies-1331?show=information- security-policy-development-guide-large- small-companies-1331&cat=policyissues http://www.sans.org/reading- room/whitepapers/policyissues/information- security-policy-development-guide-large- small-companies-1331?show=information- security-policy-development-guide-large- small-companies-1331&cat=policyissues Information Warfare - Farkas16

17 Policy Development Team Primary Involvement – Information Security Team – Technical Writer(s) Secondary Involvement – Technical Personnel – Legal Counsel – Human Resources – Audit and Compliance – User Groups Information Warfare - Farkas17

18 Security Policy Research Information Warfare - Farkas18

19 Information Warfare - Farkas19 Policy, Model, Mechanism Policy: High-level rules (governing policy) Model: formal representation – proof of properties (governing policy) Mechanism: low-level specifications (technical policy) Separation of policy from the implementation!

20 Information Warfare - Farkas20 System Architecture and Policy Simple monolithic system Distributed homogeneous system under centralized control Distributed autonomous systems homogeneous domain Distributed heterogeneous system Complexity Of Policy

21 Information Warfare - Farkas21 Traditional Access Control Protection objects: system resources for which protection is desirable – Memory, file, directory, hardware resource, software resources, etc. Subjects: active entities requesting accesses to resources – User, owner, program, etc. Access mode: type of access – Read, write, execute

22 Information Warfare - Farkas22 Access Control Models See CSCE 522 for details Been around for a while: – Discretionary Access Control – Mandatory Access Control – Role-Based Access Control Relatively new: – Usage-Based Access Control – Capabilities-Based Access Control

23 Information Warfare - Farkas23 Closed vs. Open Systems Closed systemOpen System Access req. Exists Rule? Access permitted Access denied Access denied Access permitted Allowed accesses Disallowed accesses yesno yesno (minimum privilege)(maximum privilege)

24 Information Warfare - Farkas24 Negative Authorization Traditional systems: Mutual exclusion New systems: combined use of positive and negative authorizations – Support exceptions – Problems: How to deal with Incompleteness – Default policy Inconsistencies – Conflict resolution

25 Negative Authorization Information Warfare - Farkas25 What is the effect of adding new access control rules to the policy? Positive authorizations only Negative and positive authorizations

26 What is the effect of adding new access control rules to the policy? Positive authorizations only –(John, +read, 727-materials), (John, +write, 727-exams) –Add: (John, +write, 727-final) Negative and positive authorizations – (John, +read, 727-materials), (John, +write, 727-exams) – Add: (John, -write, 727-midterm) Information Warfare - Farkas26

27 Information Warfare - Farkas27 Conflict Resolution Denial takes precedence Most specific takes precedence Most specific along a path takes precedence Priority-based Positional Grantor and Time-dependent Single strategy vs. combination of strategies Any new suggestions???

28 Information Warfare - Farkas28 Policy Specification Language Express policy concepts Required properties of policy languages: – Support access control, delegation, and obligation – Provide structuring constructs to handle large systems – Support composite policies – Must be able to analyze policies for conflicts and inconsistencies – Extensible – Comprehensible and easy to use

29 What are the trade offs between the authorization language requirements? Information Warfare - Farkas29

30 Information Warfare - Farkas30 Policy Specification Language Approaches Logic-based approach – Adv: Precise and expressive – Disadv: not intuitive, difficulty and complexity of implementation – e.g., Jojodia et al., A logical language for expressing authorizations, 1997 Graphical approach – Adv: supports visual understanding – Disadv: Scope is limited – E.g., Hoagland et al., Security Policy Specification using a Graphical Approach, 1998 Event-Based language – Adv: clear semantics and architecture – Disadv: limited scope – E.g.,Lobo et al., A Policy Description Language, 1999 Object-Oriented, declarative language – Adv: clear semantics, expressiveness, easy to use – Disadv: support of domain specific semantics – E.g., Damianou et al., The Ponder Policy Specification Language, 2000

31 Information Warfare - Farkas31 Provisions and Obligations Yes/no response to every request is just not enough Provisions: Conditions to be satisfied before permission is considered Obligations: Conditions to be fulfilled as a consequence of accesses Author: D. Wijesekera

32 Information Warfare - Farkas32 Delegation Policies Supports temporary transfer of access rights Must be tightly controlled by security policy Always associated with authorization policy Not intended for security administrators Constraints! New area: delegation of obligations

33 Information Warfare - Farkas33 Policy Development Policy maker: – Start with high-level policies – Refine high-level policies to low-level policy specification determine resources required to satisfy the policy translate high-level policies into enforceable versions support analysis that verifies that lower level policies actually meet the needs of higher level ones.

34 Information Warfare - Farkas34 Policy Refinement “If there exists a set of policies P rs : P 1, P 2.. P n, such that the enforcement of a combination of these policies results in a system behaving in an identical manner to a system that is enforcing some base policy P b, it can be said that P rs is a refinement of P b. The set of policies P rs : P 1, P 2.. P n is called the refined policy set.” (Bandra) Modified from slides of A. K Bandara

35 Information Warfare - Farkas35 Policy Refinement Properties A policy refinement is complete iff: – Correct: there is a subset of the refined policy set such that a conjunction of the subset is also a refinement of the base policy – Consistent: there are no conflicts between any of the policies in the refined policy set – Minimal: if removing any policy from the refined policy set causes the refinement to be incorrect Modified from slides of A. K Bandara

36 Information Warfare - Farkas36 Policies for Integrated, Heterogeneous Systems Providing Security and Interoperation of Heterogeneous Systems” by S. Dawson, S. Qian, and P. Samarati; in Distributed and Parallel Databases, vol. 8, no 1, January 2000 (http://homes.dsi.unimi.it/~samarati)http://homes.dsi.unimi.it/~samarati Demand for information sharing – Heterogeneous systems – Local access control – Need interoperation

37 Information Warfare - Farkas37 Automated Policy Translation Architecture Automated Translation Modules Other ATM Unified Security Policy in ASL Security Policy 1 Security Policy 2 Security Policy n ACL ATM BLP ATM

38 Information Warfare - Farkas38 Federated Databases Set of autonomous and (possibly) heterogeneous databases participating together Loosely coupled Tightly coupled Logical data storage Federated schema, data model, and federated users Access control Full authorization autonomy Medium authorization autonomy Low authorization autonomy

39 Information Warfare - Farkas39 Mediation-based Databases Mediator provides controlled accesses to local databases (resources) No need for federated schema and multi- database language

40 Information Warfare - Farkas40 Need – Transparent access – Autonomy – Security

41 Information Warfare - Farkas41 Mediation-based Interoperation Architecture Security policy specifications – Application and source security lattices – Correctness of specifications: consistency, non- ambiguity, non-redundancy Access control – Mediator: accesses on virtual relation – limiting the number of applicable rules – Local sources: on local data (labeled) and translated application user label

42 Next Class Insider’s threat Information Warfare - Farkas42


Download ppt "Security Policies. Information Warfare - Farkas2 Reading For this class: – Information Security Policy - A Development Guide for Large and Small Companies,"

Similar presentations


Ads by Google