Overview of NSA Security Enhanced Linux Russell Coker.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Chapter 3 Multics. Chapter Overview Multics contribution to technology Multics History Multics System – Fundamentals – Security Fundamentals – Protection.
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Access Control Methodologies
Access Control Intro, DAC and MAC System Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Linux Security.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Module 8: Implementing Administrative Templates and Audit Policy.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Computer Security & OS Lab. DKU May 26 Younsik Jeong Ph.D. Student.
Secure Operating Systems
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Switch off your Mobiles Phones or Change Profile to Silent Mode.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Web Server Administration Chapter 7 Installing and Testing a Programming Environment.
1 Implementation of Security-Enhanced Linux Yue Cui Xiang Sha Li Song CMSC 691X Project 2—Summer 02.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Microsoft Management Seminar Series SMS 2003 Change Management.
SELinux. The need for secure OS Increasing risk to valuable information Dependence on OS protection mechanisms Inadequacy of mainstream operating systems.
Multics CysecLab Graduate School of Information Security KAIST.
Wireless and Mobile Security
1 Isolating Web Programs in Modern Browser Architectures CS6204: Cloud Environment Spring 2011.
Module 10: Implementing Administrative Templates and Audit Policy.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Trusted Operating Systems
The SELinux of First Look. Prologue After many discussions with a lot of Linux users, I’ve come to realize that most of them seem to disable SELinux rather.
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
- World Class, Industry Leading Customer Support.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
MLS/MCS on SE Linux Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework Uses.
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
Developing a Secure Internet Service SE Linux in Production Russell Coker Linux Consultant.
SE Linux Implementation Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
HTCondor Security Basics
Demystifying SELinux: WTF is it saying?
Computer Data Security & Privacy
SE Linux Implementation
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 27: System Security
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
An Overview Rick Anderson Pat Demko
DATABASE SECURITY For CSCL (BIM).
Operating System Hardening
Chapter 8: Security Policy
Mandatory Access Control and the Real World
Access Control and Audit
Presentation transcript:

Overview of NSA Security Enhanced Linux Russell Coker

Features of SE Linux Mandatory Access Control (MAC). Administrator fully controls access granted to user resources. The user can not grant more access to their files than the administrator desires. Fully configurable by policy – no need to recompile programs to change the access granted to resources. All access is controlled by SE Linux, a root user with low SE Linux privileges can not do anything exciting – I have run machines on the Internet with an open root password to demonstrate this.

Isolation of Security Domains

Strict vs Targeted Policy Strict policy aims to restrict all access as much as possible. Restricts all daemons and all user login sessions. Usually requires some configuration and customisation. Often requires custom policy for daemons or setuid programs for which there is currently no policy. Targeted policy aims to restrict only programs that can be restricted without much risk. No restrictions on user login sessions and some daemons are not restricted. In most situations it will work with no customisation. Daemons which lack policy run with no restrictions.

Security Policy Kernel stores a database which for each combination of domain and type specifies what access is to be granted and whether it is to be logged Security policy database is loaded into the kernel by init early in the boot process Policy database can be re-loaded at any time to change the security policy (if permitted) Every file/directory on disk must be labeled with a security context in accordance with the policy (the policy package includes a file which lists the default contexts for files)

Domain Type The core of SE Linux access control is the “Domain Type” model (DT) Every process has a security domain Every object a process may access has a type Domains and types not strongly differentiated, a domain is a type that applies to a process

MLS SE Linux also includes support for Multi-Level Security (MLS) Implemented in a flexible manner which is under the control of policy Expected that the DT model protects the system integrity while MLS protects data secrecy MLS support includes levels (equivalent to Top Secret, Secret, Classified, and Unclassified), there may be an arbitrary number of levels which are numbered Also includes categories such as for departments, projects, etc Support for preventing “read-up” and “write-down”

MCS Multi Category Security (MCS) meets the needs of commercial organizations Provides a set of categories to determine access to each file Process can access a file if it's categories are a super-set of the categories of the file MCS is a variant of MLS

Q/A Main SE Linux web site My SE Linux web pages (includes notes from this talk