NSA Security-Enhanced Linux (SELinux)

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
Operating System Security
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
JENNIS SHRESTHA CSC 345 April 22, Contents Introduction History Flux Advanced Security Kernel Mandatory Access Control Policies MAC Vs DAC Features.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
1 Flexible Mandatory Access Control (MAC) in Modern Operating Systems Jeffrey H. Jewell CS 591 December 7, 2009 Jeffrey H. Jewell CS 591 December 7, 2009.
Security and Policy Enforcement Mark Gibson Dave Northey
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
SELinux. 2SELinux Wikipedia says: Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM)
Linux Security.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security-Enhanced Linux & Linux Security Module The George Washington University CS297 Programming Language & Security YU-HAO HU.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
HIPAA COMPLIANCE WITH DELL
SELinux US/Fedora/13/html/Security-Enhanced_Linux/
Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
0 Penn State, NSRC Industry Day, Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems.
SELinux. The need for secure OS Increasing risk to valuable information Dependence on OS protection mechanisms Inadequacy of mainstream operating systems.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
1 Linux Security Module: General Security Support for the Linux Kernel Presented by Chao-Sheng Lin 2005/11/1.
Trusted Operating Systems
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
Privilege Escalation Two case studies. Privilege Escalation To better understand how privilege escalation can work, we will look at two relatively recent.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
5/7/2007CoreMcClug/SELinux 1 By: Corey McClurg. Outline A History of SELinux What is SELinux and how do I get it? Getting Started Mandatory Access Control.
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Module 7: Designing Security for Accounts and Services.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
Introduction to Barracuda IM Firewall
SE-1021 Software Engineering II
Access Control Model SAM-5.
Critical Security Controls
Module 8: Securing Network Traffic by Using IPSec and Certificates
Protecting the Enterprise while lowering the bottom line.
Capitalize on modern technology
NAAS 2.0 Features and Enhancements
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
SELinux (Security Enhanced Linux)
An Overview Rick Anderson Pat Demko
SECURITY IN THE LINUX OPERATING SYSTEM
How to Mitigate the Consequences What are the Countermeasures?
Module 8: Securing Network Traffic by Using IPSec and Certificates
SCONE: Secure Linux Containers Environments with Intel SGX
Shielding applications from an untrusted cloud with Haven
Designing IIS Security (IIS – Internet Information Service)
Convergence IT Services Pvt. Ltd
Server Management and Automation Windows Server 2012 R2
Preventing Privilege Escalation
Mandatory Access Control and the Real World
Security in the Real World – Plenary Day One
Presentation transcript:

NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Grant M. Wagner gmw@tycho.nsa.gov Information Assurance Research Group National Security Agency

The Need for Secure OS Increasing risk to valuable information Wide variety of application space security solutions Dependence on OS protection mechanisms Inadequacy of mainstream operating systems Discretionary access controls can't do the job Key missing feature: Mandatory Access Control (MAC) Administratively-set security policy Control over all processes and objects Decisions based on all security-relevant information

What can MAC offer? Strong separation of security domains Separate data based on confidentiality/integrity/purpose System, application, and data integrity Protect against unauthorized modifications Prevent ill-formed modifications Ability to limit program privileges Safely run code of uncertain trustworthiness Prevent exploit of flaw in program from escalating privilege Limit each program to only what is required for its purpose

What can MAC offer? Processing pipeline guarantees Ensure that data is processed as required Split processing into small, minimally trusted stages Encryption, sanitization, virus scanning Authorization limits for legitimate users Decompose administrator role Partition users into classes based on position, clearance, etc.

SELinux provides Flexible MAC Flexible comprehensive mandatory access controls for Linux implemented as a Linux security module Building on 12 years of NSA’s OS Security research Application of NSA’s Flask security architecture Cleanly separates policy from enforcement using well-defined policy interfaces Allows users to express policies naturally and supports changes Comprehensive fine-grained controls over kernel services Transparent to applications and users Role-Based Access Control, Type Enforcement, optional Multi-Level Security, easily extensible to other models Highly configurable (example configuration provided)

SELinux Security Impact Limits damage from virus/trojan horse infection Can inhibit virus propagation Eliminates most privilege elevation attacks Constrains damage from undiscovered exploits Servers need not be granted admin privileges Reduces need for immediate security patching Reduces dependence on all-powerful admin Critical services and data can be isolated Allows control over user actions

SELinux Research Success SELinux developed at NSA as research prototype Public release in Dec 2000 w/regular updates since Currently included as security module in 2.6 Kernels Continues to be excellent platform for security research

SELinux Acceptance SELinux was released as a reference implementation Direct benefit to Linux Other OS groups incorporating technology Direct User benefit Meeting real security needs Growing user/developer community is contributing back Open Source can be powerful technology transfer tool

Interest in SELinux Corporate Used or being used considered for use in products/solutions Wide variety of industries including OEMs, ISPs, Defense, Telecommunications, SCADA systems, PDAs and other consumer electronics Linux Distributors accepting technology Red Hat/Debian/Gentoo/Others??? SELinux deployments Corporate, government, universities

Research Direction Further user space integration Complete integration into networked environment Integrate with 2.6 IPSEC and NFSv4 implementations Security-Enhanced X Windows Policy specification and analysis tools Policy management service Platform for application security mechanisms

Want to learn more? Available at: http://www.nsa.gov/selinux Mailing list: Send 'subscribe selinux' to majordomo@tycho.nsa.gov e-mail: selinux-team@tycho.nsa.gov