1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 6 October 4, 2007 Integrity Models Role based Access Control.

Slides:



Advertisements
Similar presentations
1 cs691 chow Hybrid Policies CS691 – Chapter 7 of Matt Bishop.
Advertisements

1 ISA 662 Information System Security Hybrid Policies Chapter 6 from Bishop ’ s book.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Access Control Discretionary Access Control Lecture 4 1.
Information Security Principles & Applications Topic 6: Security Policy Models 虞慧群
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Lipner’s.
May 4, 2004ECS 235Slide #1 Biba Integrity Model Basis for all 3 models: Set of subjects S, objects O, integrity levels I, relation ≤  I  I holding when.
Verifiable Security Goals
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 September 18, 2003 Introduction to Computer Security.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 7, 2004 Introduction to Computer Security Lecture.
1 Hybrid Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 23, 2004.
Computer Security Hybrid Policies
1 Integrity Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 22, 2004.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Role Based Access control By Ganesh Godavari. Outline of the talk Motivation Terms and Definitions Current Access Control Mechanism Role Based Access.
Role-Based Access Control Standard
Mandatory Security Policies CS461/ECE422 Spring 2012.
Slide #6-1 Integrity Policies CS461/ECE422 – Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Computer Security: Art.
Security Policy Models CSC 482/582: Computer Security.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
Week 8 - Wednesday.  What did we talk about last time?  Authentication  Challenge response  Biometrics  Started Bell-La Padula model.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 14, 2003 Introduction to Computer Security Lecture.
12/3/2015Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Chapt. 7 – Hybrid Policies Dr. Wayne Summers Department of Computer Science Columbus State University
IS 2150 / TEL 2810 Introduction to Security
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 4, 2005 Introduction to Computer Security Lecture.
Chapter 7. Hybrid Policies
TOPIC: Web Security Models
Verifiable Security Goals
Chapter 7: Hybrid Policies
Chapter 6 Integrity Policies
Access Control Role-based models RBAC
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Chapter 7: Hybrid Policies
Chapter 5: Confidentiality Policies
Computer Security Hybrid Policies
Integrity Models and Hybrid Models
Trust Models CS461/ECE422.
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Lecture 18: Mandatory Access Control
Integrity Policies Dr. Wayne Summers Department of Computer Science
Biba Integrity Model Basis for all 3 models:
Chapter 6: Integrity Policies
IS 2150 / TEL 2810 Information Security & Privacy
Computer Security Integrity Policies
Chapter 7: Hybrid Policies
Computer Security Hybrid Policies
Presentation transcript:

1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 6 October 4, 2007 Integrity Models Role based Access Control

2 Objective Define/Understand various Integrity models Biba’s Clark-Wilson Define/Understand Chinese Wall Model Role-based Access Control model Overview the secure interoperation issue

3 Biba’s Integrity Policy Model Based on Bell-LaPadula Subject, Objects have Integrity Levels with dominance relation Higher levels more reliable/trustworthy More accurate

4 Biba’s model Strict Integrity Policy (dual of Bell- LaPadula) s can read o  i(s) ≤ i(o) (no read-down) Why? s can write o  i(o) ≤ i(s) (no write-up) Why? s 1 can execute s 2  i(s 2 ) ≤ i(s 1 ) Why?

5 Low-water-mark Low-Water-Mark Policy s can write o  i(o) ≤ i(s) Why? s reads o  i ’ (s) = min(i(s), i(o)) Why? s 1 can execute s 2  i(s 2 ) ≤ i(s 1 )

6 Clark-Wilson Integrity Model Transactions as the basic operation Integrity defined by a set of constraints Data in a consistent or valid state when it satisfies these Example: Bank D today’s deposits, W withdrawals, YB yesterday’s balance, TB today’s balance Integrity constraint: D + YB –W Well-formed transaction A series of operations that move system from one consistent state to another State before transaction consistent  state after transaction consistent Issue: who examines, certifies transactions done correctly? Separation of duty is crucial

7 Clark/Wilson Model Entities Constrained Data Items (CDI) : data subject to Integrity Control Eg. Account balances Unconstrained Data Items (UDI): data not subject to IC Eg. Gifts given to the account holders Integrity Verification Procedures (IVP) Test CDIs’ conformance to integrity constraints at the time IVPs are run (checking that accounts balance) Transformation Procedures (TP); Examples?

8 Clark/Wilson: Certification/Enforcement Rules C1: When any IVP is run, it must ensure all CDIs are in valid state C2: A TP must transform a set of CDIs from a valid state to another valid state TR must not be used on CDIs it is not certified for E1: System must maintain certified relations TP/CDI sets enforced

9 Clark-Wilson: Certification/Enforcement Rules E2: System must control users user/TP/CDI mappings enforced C3: Relations between (user, TP, {CDI}) must support separation of duty E3: Users must be authenticated to execute TP Note, unauthenticated users may manipulate UDIs

10 Clark-Wilson: Certification/Enforcement Rules C4: All TPs must log undo information to append-only CDI (to reconstruct an operation) C5: A TP taking a UDI as input must either reject it or transform it to a CDI E4: Only certifier of a TP may change the list of entities associated with that TP Enforces separation of duty: (HOW?)

11 Summary Integrity policies deal with trust Biba based on multilevel integrity Clark-Wilson introduce new ideas Commercial firms do not classify data using multilevel scheme they enforce separation of duty Notion of certification is different from enforcement; enforcement rules can be enforced, certification rules need outside intervention, and process of certification is complex and error prone

12 Hybrid Policies

13 Chinese Wall Model Supports confidentiality and integrity Information flow between items in a Conflict of Interest set Applicable to environment of stock exchange or investment house Models conflict of interest Objects: items of information related to a company Company dataset (CD): contains objects related to a single company Written CD(O) Conflict of interest class (COI): contains datasets of companies in competition Written COI(O) Assume: each object belongs to exactly one COI class

14 Example Bank COI Class Bank of America Citizens Bank PNC Bank Gasoline Company COI Class Shell Oil Union’76 Standard Oil ARCO

15 CW-Simple Security Property (Read rule) CW-Simple Security Property s can read o iff any of the following holds  o ’  PR(s) such that CD( o ’) = CD( o )  o ’, o ’  PR(s)  COI( o ’)  COI( o ), or o has been “sanitized” ( o ’  PR(s) indicates o ’ has been previously read by s) Public information may belong to a CD no conflicts of interest arise Sensitive data sanitized

16 Writing Alice, Bob work in same trading house Alice can read BankOfAmercia’s CD, Bob can read CitizensBanks’s CD, Both can read ARCO’s CD If Alice could write to ARCO’s CD, Bob can read it Hence, indirectly, she can read information from BankOfAmercia’s CD

17 CW-*-Property (Write rule) CW-*- Property s can write o iff the following holds The CW-simple security condition permits S to read O. For all unsanitized objects o’, s can read o’  CD( o ’) = CD( o ) Alice can read both CDs hence condition 1 is met She can read unsanitized objects of BankOfAmercia, hence condition 2 is false Hence Alice can’t write to objects in ARCO’s CD.

18 Role Based Access Control (RBAC) Access control in organizations is based on “roles that individual users take on as part of the organization” A role is “is a collection of permissions”

19 RBAC Access depends on function, not identity Example: Allison is bookkeeper for Math Dept. She has access to financial records. If she leaves and Betty is hired as the new bookkeeper, Betty now has access to those records. The role of “bookkeeper” dictates access, not the identity of the individual.

20 RBAC Total number Of assignments Possible? Total number Of assignments Possible?

21 Permissions RBAC (NIST Standard) UsersRolesOperationsObjects Sessions UA user_sessions (one-to-many) role_sessions (many-to-many) PA An important difference from classical models is that Subject in other models corresponds to a Session in RBAC Total number of subjects possible?

22 Core RBAC (relations) Permissions = 2 Operations x Objects UA ⊆ Users x Roles PA ⊆ Permissions x Roles assigned_users: Roles  2 Users assigned_permissions: Roles  2 Permissions Op(p): set of operations associated with permission p Ob(p): set of objects associated with permission p user_sessions: Users  2 Sessions session_user: Sessions  Users session_roles: Sessions  2 Roles session_roles(s) = {r | (session_user(s), r)  UA)} avail_session_perms: Sessions  2 Permissions

23 Permissions RBAC with Role Hierarchy UsersRolesOperationsObjects Sessions UA user_sessions (one-to-many) role_sessions (many-to-many) PA RH (role hierarchy)

24 RBAC with General Role Hierarchy RH ⊆ Roles x Roles is a partial order called the inheritance relation written as ≥. (r 1 ≥ r 2 )  authorized_users(r 1 ) ⊆ authorized_users(r 2 ) & authorized_permisssions(r 2 ) ⊆ authorized_permisssions(r 1 ) authorized_users: Roles  2 Users authorized_users(r) = {u | r’ ≥ r &(r’, u)  UA} authorized_permissions: Roles  2 Permissions authorized_permissions(r) = {p | r ≥ r’ &(p, r’)  PA}

25 Example p x, p y p 1, p 2 p a, p b p x, p y e 1, e 2 p x, p y e 3, e 4 p x, p y e5e5 e 6, e 7 p x, p y e 8, e 9 p x, p y e 10 p m, p n popo p authorized_users(Employee)? authorized_users(Administrator)? authorized_permissions(Employee)? authorized_permissions(Administrator)?

26 Constrained RBAC Permissions UsersRolesOperationsObjects Sessions UA user_sessions (one-to-many) PA RH (role hierarchy) Static Separation of Duty Dynamic Separation of Duty

27 Static Separation of Duty SSD ⊆ 2 Roles x N In absence of hierarchy Collection of pairs (RS, n) where RS is a role set, n ≥ 2 for all (RS, n)  SSD, for all t ⊆ RS: |t| ≥ n  ∩ r  t assigned_users(r)=  In presence of hierarchy Collection of pairs (RS, n) where RS is a role set, n ≥ 2; for all (RS, n)  SSD, for all t ⊆ RS: |t| ≥ n  ∩ r  t authorized_uers(r)= 

28 Dynamic Separation of Duty DSD ⊆ 2 Roles x N Collection of pairs (RS, n) where RS is a role set, n ≥ 2; A user cannot activate n or more roles from RS What if both SSD and DSD contains (RS, n)? Consider (RS, n) = ({r 1, r 2, r 3 }, 2)? If SSD – can r 1, r 2 and r 3 be assigned to u? If DSD – can r 1, r 2 and r 3 be assigned to u?

29 Advantages of RBAC Allows Efficient Security Management Administrative roles, Role hierarchy Principle of least privilege allows minimizing damage Separation of Duty constraints to prevent fraud Allows grouping of objects Policy-neutral - Provides generality Encompasses DAC and MAC policies

30 MAC using RBAC L M1 H M2 LR M1R HR M2R H M1W LW M2W Read Roles (same lattice) Write Roles (inverse lattice) Transformation rules R = {L 1 R, L 2 R,…, L n R, L 1 W, L 2 W,…, L n W} Two separate hierarchies for {L 1 R, L 2 R,…, L n R} and { L 1 W, L 2 W,…, L n W} Each user is assigned to exactly two roles: xR and LW Each session has exactly two roles yR and yW Permission (o, r) is assigned to xR iff (o, w) is assigned to xW) Transformation rules R = {L 1 R, L 2 R,…, L n R, L 1 W, L 2 W,…, L n W} Two separate hierarchies for {L 1 R, L 2 R,…, L n R} and { L 1 W, L 2 W,…, L n W} Each user is assigned to exactly two roles: xR and LW Each session has exactly two roles yR and yW Permission (o, r) is assigned to xR iff (o, w) is assigned to xW) BLP

31 RBAC’s Benefits

32 Cost Benefits Saves about 7.01 minutes per employee, per year in administrative functions Average IT admin salary - $59.27 per hour The annual cost saving is: $6,924/1000; $692,471/100,000 How do we get this?

33 Cost Benefits Reduced Employee downtime if new transitioning employees receive their system privileges faster, their productivity is increased 26.4 hours for non-RBAC; 14.7 hours for RBAC For average employee wage of $39.29/hour, the annual productivity cost savings yielded by an RBAC system: $75000/1000; $7.4M/100,000 (Considering employee turnover of 13% and annual growth rate of 3%)

34 Policy Composition

35 Problem: Consistent Policies Policies defined by different organizations Different needs But sometimes subjects/objects overlap Can all policies be met? Different categories Build lattice combining them Different security levels Need to be levels – thus must be able to order What if different DAC and MAC policies need to be integrated?

36 Secure Interoperability Principles of secure interoperation [Gong, 96] Principle of autonomy If an access is permitted within an individual system, it must also be permitted under secure interoperation Principle of security If an access is not permitted within an individual system, it must not be permitted under secure interoperation Interoperation of secure systems can create new security breaches

37 a b c a b Secure Interoperability (Example) X Y Z A BC D X Y Z A BC D d F 12 = {a, b} F 12 = {a, b, c, d} (1) F 12 = {a, b, d} Direct access (2) F 12 = {c} Indirect access F 12 - permitted access between systems 1 and 2

38 Summary Integrity polices Level based and non-level based Chinese wall is a dynamic policy Conflict classes RBAC – several advantages based on duty/responsibility/function Economic benefits as well as diversified