Chapter 8: Security Policy

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

© 2003 School of Computing, University of Leeds SY32 Secure Computing, Lecture 17 Secure Coding in Java and.NET Part 2: Code Access Control.
The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Auditing Active Directory Presented to the National State Auditors Association 2014 Information Technology Conference.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
11 WORKING WITH GROUPS Chapter 7. Chapter 7: WORKING WITH GROUPS2 CHAPTER OVERVIEW  Understand the functions of groups and how to use them.  Understand.
Security in.NET Jørgen Thyme Microsoft Denmark. Topics & non-topics  Cryptography  App domains  Impersonation / delegation  Authentication  Authorization.
Code Access Security vs. Role-Based Security  RBS  Security identity attached to user accounts  Access to resources specified according to user’s group.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
Chapter 13 – Site Security. Internet Information Server ASP.NET Applications.NET Framework Windows NT/2000 Operating System Forms Passport Windows Certificates.
Lesson 18: Configuring Application Restriction Policies
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Chapter 7 WORKING WITH GROUPS.
Security Aspects Of Directory Enabled Applications Praerit Garg Program Manager Windows NT Security Microsoft Corporation.
Central Online Grading System COGS Dec15-21 dec1521.sd.ece.iastate.edu.
Chapter 7: WORKING WITH GROUPS
ASSEMBLIES AND THE GAC CHAPTER 1, LESSONS 4-7 & LAB.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Basic Security: Java vs.NET Master Seminar Advanced Software Engineering Topics Prof. Jacques Pasquier-Rocha Software Engineering Group Department of Informatics.
MindMajix.com TIBCO BUSINESSWORKS Introducing TIBCO ActiveMatrix BusinessWorks.
Database Administration COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, VEHARI.
Creating competitive advantage Copyright © 2003 Enterprise Java Beans Presenter: Wickramanayake HMKSK Version:0.1 Last Updated:
.Net Security and performance
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
SECURE WEB APPLICATIONS VIA AUTOMATIC PARTITIONING S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, X. Zheng Cornell University.
System.Security.Policy namespace Chinmay Lokesh.NET Security CS 795 Summer 2010.
Presented By: Ahmed ALSUM PhD Student CS 895:.Net Security Old Dominion University College of Science Department of Computer Science.
Chapter 8 Configuring and Managing Shared Folder Security.
Comparing Java and.Net Security: Lessons Learned and Missed - Nathanael Paul, David Evans Presented by Dan Frohlich.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Security Summit West 2004 Redmond, WA Darren Canavor Longhorn Security.
System.Security.Permissions namespace By Venkata Krishna Date: Instructor 06/19/2007 Dr. Ravi Mukkamala.
DEV240 Fundamentals of Code Access Security Sebastian Lange Program Manager Common Language Runtime Microsoft Corporation.
User Management. User Registration Policy The issues of creation and management often clash in distributed organisations Central creation and management.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Access The L Line The Express Line to Learning 2007 L Line L © Wiley Publishing All Rights Reserved.
System.Security.policy Namespace By: Marepalli Gayathri.
Understanding.NET Framework Security David LeBlanc Microsoft Office.
The Execution System1. 2 Introduction Managed code and managed data qualify code or data that executes in cooperation with the execution engine The execution.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
Customizing.NET Security Permissions Nageswari Vallabhaneni.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Designing Group Policy Planning Deployment of Group Policy Troubleshooting Group Policy.
Chapter 7. Permissions Programming.Net Security, O’Reilly Publishers.
Pranav Ainavolu VSTO Developer, Conrep Solutions |
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Overview of NSA Security Enhanced Linux Russell Coker.
By Kirby R. Solomon Jr..  Security Management is a user-access management system to be used in a medical research or clinical laboratory by knowledgeable,
SE Linux Implementation Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework.
The Palantir Platform… …Changes in 2.3
ClickOnce Deployment (One-click Deployment)
Institute for Cyber Security
Using Application Domains Effectively
DQS: Business Logic Meets Enterprise Integration
HARDENING CLIENT COMPUTERS
Visual Studio Tools for Office 2005
مراجعه النظم Information Systems Audit
Net431:advanced net services
DSM Language Design Group discussion.
NSA Security-Enhanced Linux (SELinux)
ClickOnce Deployment (One-click Deployment)
System Administration (LTAT )
Presentation transcript:

Chapter 8: Security Policy .Net Security, O’Reilly

Security Policy? Set of configurable rules that provide a mapping between evidence and permissions It is flexible and extensible It provides administrators and users fine-grained control over the operations and resources to which code has access With these, users can confidently run managed code from any source, knowing that the runtime takes care preventing undesirable actions by the code

Security Policy Levels Enterprise policy Machine policy User policy Application domain policy Runtime intersects the sets of permissions granted by each policy level to determine the final code-access permissions set for assembly or application domain Each policy can further restrict previous level but can never grant additional ones

Policy level contains Code groups: Hierarchy of code groups based on evidence presented Named permission sets Fully trusted assemblies

Policy Resolution Runtime uses enterprise, machine, and user policy levels when resolving the grant set for application domains