Chapter 7: Hybrid Policies

Slides:



Advertisements
Similar presentations
Multilevel Security (MLS) Database Security and Auditing.
Advertisements

1 cs691 chow Hybrid Policies CS691 – Chapter 7 of Matt Bishop.
1 ISA 662 Information System Security Hybrid Policies Chapter 6 from Bishop ’ s book.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Access Control Intro, DAC and MAC System Security.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC Introduction to Computer Security ©2004 Matt Bishop.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
May 4, 2004ECS 235Slide #1 Biba Integrity Model Basis for all 3 models: Set of subjects S, objects O, integrity levels I, relation ≤  I  I holding when.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 7, 2004 Introduction to Computer Security Lecture.
1 Hybrid Policies CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 23, 2004.
Computer Security Hybrid Policies
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
User Domain Policies.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Security Policy Models CSC 482/582: Computer Security.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 6 Oct 2-9, 2013 Security Policies Confidentiality Policies.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Week 8 - Wednesday.  What did we talk about last time?  Authentication  Challenge response  Biometrics  Started Bell-La Padula model.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #4-1 Chapter 1: Introduction Components of computer security Threats Policies.
12/3/2015Slide #7-1 Chapter 7: Hybrid Policies Overview Chinese Wall Model Clinical Information Systems Security Policy ORCON RBAC.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
12/13/20151 Computer Security Security Policies...
Chapt. 7 – Hybrid Policies Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Computer Security: Principles and Practice
A security policy defines what needs to be done. A security mechanism defines how to do it. All passwords must be updated on a regular basis and every.
IS 2150 / TEL 2810 Introduction to Security
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 6 October 4, 2007 Integrity Models Role based Access Control.
Chapter 7. Hybrid Policies
TOPIC: Web Security Models
Access Control Model SAM-5.
Verifiable Security Goals
Chapter 6 Integrity Policies
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Chapter 7: Hybrid Policies
Chapter 5: Confidentiality Policies
Computer Security Hybrid Policies
Basic Security Theorem
Integrity Models and Hybrid Models
Computer Security: Art and Science, 2nd Edition
Clinical Information System Security Policy (CISS Policy)
Trust Models CS461/ECE422.
Chapter 5: Confidentiality Policies
Chapter 7: Hybrid Policies
Chapter 6: Integrity Policies
Lecture 18: Mandatory Access Control
Biba Integrity Model Basis for all 3 models:
Chapter 6: Integrity Policies
IS 2150 / TEL 2810 Information Security & Privacy
Computer Security Security Policies
Chapter 4: Security Policies
Computer Security Integrity Policies
Chapter 7: Hybrid Policies
Computer Security Hybrid Policies
Presentation transcript:

Chapter 7: Hybrid Policies Introduction to Computer Security ©2004 Matt Bishop

Overview Chinese Wall Model Focuses on conflict of interest Clinical Information Systems Security Policy Combines integrity and confidentiality Originator Controlled (ORCON) Access Control Combines mandatory, discretionary access controls Role Based (RBAC) Access Control Base controls on job function Introduction to Computer Security ©2004 Matt Bishop

Chinese Wall (CW) Model Focus is on Conflict of Interest in business situations Example problem: Tony advises American Bank about investments He is asked to advise Toyland Bank about investments Conflict of interest to accept, because his advice for either bank would affect his advice to the other bank Conflict of Interest are policy driven Example: Airline frequent flyer miles; Fly America rules Introduction to Computer Security ©2004 Matt Bishop

Organization Organize entities into “conflict of interest” classes Control subject accesses to each class Control writing to all classes to ensure information is not passed along in violation of rules Allow sanitized data to be viewed by everyone Introduction to Computer Security ©2004 Matt Bishop

Definitions Objects: items of information related to a company Company dataset (CD): contains objects related to a single company Written CD(O): Company dataset that contains object O Conflict of interest class (COI): contains datasets of companies in competition Written COI(O): Conflict of interest class that contains object O Assume: each object belongs to exactly one COI class Introduction to Computer Security ©2004 Matt Bishop

Example Should Tom have access to 2 CDs in one COI Class say a and c? Bank of America Citibank Cardinal Bank Bank COI Class Shell Oil Union ’76 Sunoco ARCO Gasoline Company COI Class a b c s e u n Should Tom have access to 2 CDs in one COI Class say a and c? Can Alice access b and e? Introduction to Computer Security ©2004 Matt Bishop

Temporal Element If Anthony reads any Company Dataset(CD) in a COI class, he can never read another CD in that COI Example: Anthony worked for BoA thus gaining access to a. Next he moves to Citibank – should he have access to b? Possible that information learned earlier may allow him to use that info to make decisions later Let PR(S) be set of objects that S has already read Introduction to Computer Security ©2004 Matt Bishop

CW-Simple Security Condition s can read o iff either condition holds: There is an o such that s has accessed o and CD(o) = CD(o) Meaning s has read something in o’s dataset For all o  O, o  PR(s)  COI(o) ≠ COI(o) Meaning s has not read any objects in o’s conflict of interest class Ignores sanitized data (see below) Initially, PR(s) = , so initial read request granted Introduction to Computer Security ©2004 Matt Bishop

Sanitization Public information may belong to a CD As o is publicly available, no conflicts of interest arise So, should not affect ability of analysts to read Typically, all sensitive data removed from such information before it is released publicly (called sanitization) Add third condition to CW-Simple Security Condition: There is an o such that s has accessed o and CD(o) = CD(o) For all o  O, o  PR(s)  COI(o) ≠ COI(o) o is a sanitized object Introduction to Computer Security ©2004 Matt Bishop

Writing Anthony, Susan work in same trading house Anthony can read Bank 1’s CD, Gas’ CD Susan can read Bank 2’s CD, Gas’ CD If Anthony could write to Gas’ CD, Susan can read it Hence, indirectly, she can read information from Bank 1’s CD, a clear conflict of interest Introduction to Computer Security ©2004 Matt Bishop

CW-*-Property s can write to o iff both of the following hold: The CW-simple security condition permits s to read o; and For all unsanitized objects o, if s can read o, then CD(o) = CD(o) Says that s can write to an object if all the (unsanitized) objects it can read are in the same dataset Introduction to Computer Security ©2004 Matt Bishop

Compare to Bell-LaPadula Fundamentally different CW has no security labels, B-LP does CW has notion of past accesses, B-LP does not Bell-LaPadula can capture state at any time Each (COI, CD) pair gets security category Two clearances, S (sanitized) and U (unsanitized) S dom U Subjects assigned clearance for compartments without multiple categories corresponding to CDs in same COI class Introduction to Computer Security ©2004 Matt Bishop

Compare to Bell-LaPadula Bell-LaPadula cannot track changes over time Susan becomes ill, Anna needs to take over C-W history lets Anna know if she can No way for Bell-LaPadula to capture this Access constraints change over time Initially, subjects in C-W can read any object Bell-LaPadula constrains set of objects that a subject can access Can’t clear all subjects for all categories, because this violates CW-simple security condition Introduction to Computer Security ©2004 Matt Bishop

Compare to Clark-Wilson Clark-Wilson Model covers integrity, so consider only access control aspects If “subjects” and “processes” are interchangeable, a single person could use multiple processes to violate CW- simple security condition Would still comply with Clark-Wilson Model If “subject” is a specific person and includes all processes the subject executes, then consistent with Clark-Wilson Model Introduction to Computer Security ©2004 Matt Bishop

Clinical Information Systems Security Policy Intended for medical records Conflict of interest not critical problem Patient confidentiality, authentication of records and annotators, and integrity are Entities: Patient: subject of medical records (or agent) Personal health information: data about patient’s health or treatment enabling identification of patient Clinician: health-care professional with access to personal health information while doing job Introduction to Computer Security ©2004 Matt Bishop

Assumptions and Principles Assumes health information involves 1 person at a time Not always true; OB/GYN involves father as well as mother Principles derived from medical ethics of various societies, and from practicing clinicians Introduction to Computer Security ©2004 Matt Bishop

Access Principle 1: Each medical record has an access control list naming the individuals or groups who may read and append information to the record. The system must restrict access to those identified on the access control list. Idea is that clinicians need access, but no-one else. Auditors get access to copies, so they cannot alter records Introduction to Computer Security ©2004 Matt Bishop

Access Principle 2: One of the clinicians on the access control list must have the right to add other clinicians to the access control list. Called the responsible clinician Introduction to Computer Security ©2004 Matt Bishop

Access Principle 3: The responsible clinician must notify the patient of the names on the access control list whenever the patient’s medical record is opened. Except for situations given in statutes, or in cases of emergency, the responsible clinician must obtain the patient’s consent. Patient must consent to all treatment, and must know of violations of security Introduction to Computer Security ©2004 Matt Bishop

Access Principle 4: The name of the clinician, the date, and the time of the access of a medical record must be recorded. Similar information must be kept for deletions. This is for auditing. Don’t delete information; update it (last part is for deletion of records after death, for example, or deletion of information when required by statute). Record information about all accesses. Introduction to Computer Security ©2004 Matt Bishop

Creation Principle: A clinician may open a record, with the clinician and the patient on the access control list. If a record is opened as a result of a referral, the referring clinician may also be on the access control list. Creating clinician needs access, and patient should get it. If created from a referral, referring clinician needs access to get results of referral. Introduction to Computer Security ©2004 Matt Bishop

Deletion Principle: Clinical information cannot be deleted from a medical record until the appropriate time has passed. This varies with circumstances. Introduction to Computer Security ©2004 Matt Bishop

Confinement Principle: Information from one medical record may be appended to a different medical record if and only if the access control list of the second record is a subset of the access control list of the first. This keeps information from leaking to unauthorized users. All users have to be on the access control list. Introduction to Computer Security ©2004 Matt Bishop

Aggregation Principle: Measures for preventing aggregation of patient data must be effective. In particular, a patient must be notified if anyone is to be added to the access control list for the patient’s record and if that person has access to a large number of medical records. Fear here is that a corrupt investigator may obtain access to a large number of records, correlate them, and discover private information about individuals which can then be used for nefarious purposes (such as blackmail) Introduction to Computer Security ©2004 Matt Bishop

Enforcement Principle: Any computer system that handles medical records must have a subsystem that enforces the preceding principles. The effectiveness of this enforcement must be subject to evaluation by independent auditors. This policy has to be enforced, and the enforcement mechanisms must be auditable (and audited) Introduction to Computer Security ©2004 Matt Bishop

Compare to Bell-LaPadula Confinement Principle imposes lattice structure on entities in model Similar to Bell-LaPadula CISS focuses on objects being accessed; B-LP on the subjects accessing the objects May matter when looking for insiders in the medical environment Introduction to Computer Security ©2004 Matt Bishop

Compare to Clark-Wilson CDIs (Constrained Data Items) are medical records TPs (Transformation Procedures) are functions updating records, access control lists IVPs (Integrity Verification Procedures) certify: A person identified as a clinician is a clinician; A clinician validates, or has validated, information in the medical record; When someone is to be notified of an event, such notification occurs; and When someone must give consent, the operation cannot proceed until the consent is obtained Auditing (CR4) requirement: make all records append-only, notify patient when access control list changed Introduction to Computer Security ©2004 Matt Bishop

ORCON Originator Controlled Access Control Problem: organization creating document wants to control its dissemination Example: Secretary of Agriculture writes a memo for distribution to her immediate subordinates, and she must give permission for it to be disseminated further. This is “originator controlled” (here, the “originator” is a person). Introduction to Computer Security ©2004 Matt Bishop

Req uirements Subject s  S marks object o  O as ORCON on behalf of organization X. X allows o to be disclosed to subjects acting on behalf of organization Y with the following restrictions: o cannot be released to subjects acting on behalf of other organizations without X’s permission; and Any copies of o must have the same restrictions placed on it. Introduction to Computer Security ©2004 Matt Bishop

DAC Fails Discretionary Access Control Owner can set any desired permissions This makes 2 unenforceable Introduction to Computer Security ©2004 Matt Bishop

MAC Fails Mandatory Access Control First problem: category explosion Category C contains o, X, Y, and nothing else. If a subject y  Y wants to read o, x  X makes a copy o. Note o has category C. If y wants to give z  Z a copy, z must be in Y—by definition, it’s not. If x wants to let w  W see the document, need a new category C containing o, X, W. Second problem: abstraction MAC classification, categories centrally controlled, and access controlled by a centralized policy ORCON controlled locally Introduction to Computer Security ©2004 Matt Bishop

Combine Them The owner of an object cannot change the access controls of the object. When an object is copied, the access control restrictions of that source are copied and bound to the target of the copy. These are MAC (owner can’t control them) The creator (originator) can alter the access control restrictions on a per-subject and per-object basis. This is DAC (owner can control it) Introduction to Computer Security ©2004 Matt Bishop

RBAC Role Based Access Control Access depends on function, not identity Example: Allison, bookkeeper for Math Dept, has access to financial records. She leaves. Betty hired as the new bookkeeper, so she now has access to those records The role of “bookkeeper” dictates access, not the identity of the individual. Introduction to Computer Security ©2004 Matt Bishop

Definitions Role r: collection of job functions trans(r): set of authorized transactions for r Active role of subject s: role s is currently in actr(s) Authorized roles of a subject s: set of roles s is authorized to assume authr(s) canexec(s, t) iff subject s can execute transaction t at current time Introduction to Computer Security ©2004 Matt Bishop

Axioms Let S be the set of subjects and T the set of transactions. Rule of role assignment: (s  S)(t  T) [canexec(s, t)  actr(s) ≠ ]. If s can execute a transaction, it has a role This ties transactions to roles Rule of role authorization: (s  S) [actr(s)  authr(s)]. Subject must be authorized to assume an active role (otherwise, any subject could assume any role) canexec(s,t)=true if subject s can execute transaction t at current time actr=active role; authr=authorized role Introduction to Computer Security ©2004 Matt Bishop

Axiom Rule of transaction authorization: (s  S)(t  T) [canexec(s, t)  t  trans(actr(s))]. If a subject s can execute a transaction, then the transaction is an authorized one for the role s has assumed Introduction to Computer Security ©2004 Matt Bishop

Containment of Roles Trainer can do all transactions that trainee can do (and then some). This means role r contains role r (r > r). So: (s  S)[ r  authr(s)  r > r  r  authr(s) ] Introduction to Computer Security ©2004 Matt Bishop

Separation of Duty Let r be a role, and let s be a subject such that r  auth(s). Then the predicate meauth(r) (for mutually exclusive authorizations) is the set of roles that s cannot assume because of the separation of duty requirement. Separation of duty: (r1, r2  R) [ r2  meauth(r1)  [ (s  S) [ r1 authr(s)  r2  authr(s) ] ] ] Introduction to Computer Security ©2004 Matt Bishop

Key Points Hybrid policies deal with both confidentiality and integrity Different combinations of these ORCON model neither MAC nor DAC Actually, a combination RBAC model controls access based on functionality Introduction to Computer Security ©2004 Matt Bishop