Security Models and Designing a Trusted Operating System

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

Operating System Security
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Chapter 3 Multics. Chapter Overview Multics contribution to technology Multics History Multics System – Fundamentals – Security Fundamentals – Protection.
Chapter 6 Security Kernels.
Access Control Methodologies
Secure Operating Systems Lesson 0x11h: Systems Assurance.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Information Systems Security Security Architecture Domain #5.
User Domain Policies.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 20 October 28, 2004.
Trusted System? What are the characteristics of a trusted system?
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Chapter 5 Network Security
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
G53SEC 1 Reference Monitors Enforcement of Access Control.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Secure Operating Systems Lesson 4: Access Control.
Multics CysecLab Graduate School of Information Security KAIST.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 19 October 26, 2004.
Mandatory Access Control
Trusted Operating Systems
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Lecture9 Page 1 CS 236 Online Operating System Security, Con’t CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Computer Security: Chapter 5 Operating Systems Security.
9- 1 Last time ● User Authentication ● Beyond passwords ● Biometrics ● Security Policies and Models ● Trusted Operating Systems and Software ● Military.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Verifiable Security Goals
Protection and Security
Introduction to Operating System (OS)
Operating Systems Security
Protection in Operating Systems
CSE565: Computer Security Lectures 24, 25 OS Security
Chapter 2: System Structures
Information Security CS 526 Topic 17
Advanced System Security
Security Modeling Jagdish S. Gangolly School of Business
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Operating System Concepts
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Advanced System Security
Presentation transcript:

Security Models and Designing a Trusted Operating System ManikandaN subbu

Trusted Operating System Functional correctness. Enforcement of integrity. Limited privilege. Appropriate confidence level.

Secure Vs Trusted OS

Security Policies A security policy is a statement of the security we expect the system to enforce.

Military Security Policy Based on protecting classified information. Information access is limited by the need-to-know rule Each piece of classified information may be associated with one or more projects, called compartments, describing the subject matter of the information. In this Model, the key will be defined as <rank , Compartment >

Military Security Policy - 2 Introduce a relation ≤ , called dominance, on the sets of sensitive objects and subjects. For a subject s and an object o, s ≤ o , if and only if rank(s) ≤ rank (o) and compartment(s) is a subset compartment(o) A subject can read an object only if the clearance level of the subject is at least as high as that of the information and the subject has a need to know about all compartments for which the information is classified

Commercial Security Policy public, proprietary, or internal Not all employees need to know about new products! No Security Clearances or Dominance Functions.

Models of Security Multilevel Security Want to build a model to represent a range of sensitivities and to reflect the need to separate subjects rigorously from objects to which they should not have access. What is a Lattice ? A lattice is a mathematical structure of elements organized by a relation among them, represented by a relation The dominance relation ≤ defined in the military model is the relation for the lattice. The relation ≤ is transitive and antisymmetric. Transitive: If a ≤ b and b ≤ c, then a ≤ c Antisymmetric: If a ≤ b and b ≤ a, then a = b

Bell LaPadula Confidentiality Model Consider a security system with the following properties. The system covers a set of subjects S and a set of objects O. Each subject s in S and each object o in O has a fixed security class C(s) and C(o) (denoting clearance and classification level). The security classes are ordered by a relation ≤. Simple Security Property. A subject s may have read access to an object o only if C(o) ≤ C(s). *-Property (called the "star property") A subject s who has read access to an object o may have write access to an object p only if C(o) ≤ C(p).

Bell LaPadula Confidentiality Model - 2 The flow of information is generally horizontal (to and from the same level) and upward (from lower levels to higher). A downward flow is acceptable only if the highly cleared subject does not pass any high- sensitivity data to the lower-sensitivity object. For computing systems, downward flow of information is difficult because a computer program cannot readily distinguish between having read a piece of information and having read a piece of information that influenced what was later written.

Biba Integrity Model Biba defines "integrity levels," which are analogous to the sensitivity levels of the Bell LaPadula model. Subjects and objects are ordered by an integrity classification scheme, denoted I(s) and I(o). Simple Integrity Property. Subject s can modify (have write access to) object o only if I(s) ≥ I(o) Integrity *-Property. If subject s has read access to object o with integrity level I(o), s can have write access to object p only if I(o) ≥ I(p)

Design Elements First, an operating system controls the interaction between subjects and objects, so security must be considered in every aspect of its design. Second, because security appears in every part of an operating system, its design and implementation cannot be left fuzzy or vague until the rest of the system is working and being tested. Least privilege. Each user and each program should operate by using the fewest privileges possible. Economy of mechanism. The design of the protection system should be small, simple, and straightforward. Open design. An open design is available for extensive public scrutiny, thereby providing independent confirmation of the design security.

Design Elements Complete mediation. Every access attempt must be checked. Permission based. The default condition should be denial of access. A conservative designer identifies the items that should be accessible, rather than those that should not. Separation of privilege. Ideally, access to objects should depend on more than one condition, such as user authentication plus a cryptographic key. In this way, someone who defeats one protection system will not have complete access. Least common mechanism. Shared objects provide potential channels for information flow. Systems employing physical or logical separation reduce the risk from sharing. Ease of use. If a protection mechanism is easy to use, it is unlikely to be avoided.

Security features of Ordinary OS

Security features of Ordinary OS – 2 User authentication. Memory protection. File and I/O device access control. Allocation and access control to general objects. Enforced sharing. Guaranteed fair service. Interprocess communication and synchronization. Protected operating system protection data.

Security features of Trusted OS

Security features of Trusted OS - 2 Identification and Authentication Trusted operating systems require secure identification of individuals, and each individual must be uniquely identified. Mandatory and Discretionary Access Control Mandatory access control (MAC) means that access control policy decisions are made beyond the control of the individual owner of an object. Discretionary access control (DAC) leaves a certain amount of access control to the discretion of the object's owner or to anyone else who is authorized to control the object's access. Object Reuse Protection To prevent object reuse leakage, operating systems clear (that is, overwrite) all space to be reassigned before allowing the next user to have access to it. Complete Mediation All accesses must be controlled. Trusted Path Want an unmistakable communication, called a trusted path, to ensure that they are supplying protected information only to a legitimate receiver.

Security features of Trusted OS - 3 Accountability and Audit Accountability usually entails maintaining a log of security-relevant events that have occurred, listing each event and the person responsible for the addition, deletion, or change. This audit log must obviously be protected from outsiders, and every security-relevant event must be recorded. Audit Log Reduction Intrusion Detection Intrusion detection software builds patterns of normal system usage, triggering an alarm any time the usage seems abnormal.

Kernelized Design The security kernel provides the security interfaces among the hardware, operating system, and other parts of the computing system. Typically, the operating system is designed so that the security kernel is contained within the operating system kernel Coverage. Every access to a protected object must pass through the security kernel. Separation. Isolating security mechanisms both from the rest of the operating system and from the user space makes it easier to protect those mechanisms from penetration by the operating system or the users. Unity. All security functions are performed by a single set of code, so it is easier to trace the cause of any problems that arise with these functions.

Kernelized Design Modifiability. Changes to the security mechanisms are easier to make and easier to test. Compactness. Because it performs only security functions, the security kernel is likely to be relatively small. Verifiability. Being relatively small, the security kernel can be analyzed rigorously.

Reference Monitor

Reference Monitor - 2 Tamperproof. Impossible to weaken or disable Unbypassable. Always invoked when access to any object is required Analyzable. Small enough to be subjected to analysis and testing, the completeness of which can be ensured

Trusted Computing Base (TCB) The trusted computing base, or TCB, is the name we give to everything in the trusted operating system necessary to enforce the security policy. Process activation. Execution domain switching. Processes running in one domain often invoke processes in other domains to obtain more sensitive data or services. Memory protection. Because each domain includes code and data stored in memory, the TCB must monitor memory references to ensure secrecy and integrity for each domain. I/O operation.

Separation/Isolation Memory physical separation, two different processes use two different hardware facilities. Temporal separation occurs when different processes are run at different times. Encryption is used for cryptographic separation Logical separation, also called isolation, is provided when a process such as a reference monitor separates one user's objects from those of another user. OS Space User 1 space User 2 space . User n space

Virtualization The operating system emulates or simulates a collection of a computer system's resources. A virtual machine is a collection of real or simulated hardware facilities

Layered Design

Secure File System Data must be kept secret Data integrity must be preserved Data must be kept available

Finally !!! Testing

Any Questions ???

Thank You!!!