Evaluation, Assurance, Classified Systems Dr. William Hery CS 996 Spring 2004.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.2: Evaluation of Secure Information Systems.
Special systems: MLS Multilevel security [“Red book” US-DOD 1987] Considers the assurance risk when composing multilevel secure systems evaluated under.
4/28/20151 Computer Security Security Evaluation.
CSE331: Introduction to Networks and Security Lecture 34 Fall 2002.
IT Security Evaluation By Sandeep Joshi
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Secure Operating Systems Lesson 0x11h: Systems Assurance.
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Evaluation, Assurance, Classified Systems Dr. William Hery CS 996 Spring 2005.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
S.S. Yau CSE Fall Classified Systems.
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
Chapter 12 Network Security.
Term Project Teams of ~3 students Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Term Project Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and server side) Submit a.
Information Systems Security Security Architecture Domain #5.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
SEC835 Database and Web application security Information Security Architecture.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Evaluating Systems Information Assurance Fall 2010.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
S-vector for Web Application Security Assessment Review of Term Project Requirements and PDR Results CS996 ISM Spring 2005 Dr. William Hery.
Lecture 15 Page 1 CS 236 Online Evaluating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Additional Security Tools Lesson 15. Skills Matrix.
Chapter 5 Network Security
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Certification and Accreditation CS Syllabus Ms Jocelyne Farah Mr Clinton Campbell.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Trusted Operating Systems
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
ECE Prof. John A. Copeland fax Offices: Klaus 3362.
Chapter 8: Principles of Security Models, Design, and Capabilities
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
CSCE 727 Awareness and Training Secure System Development and Monitoring.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Chapter 7. Identifying Assets and Activities to Be Protected
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Partnerships for VoIP Security VoIP Protection Profiles
or call for office visit,
IS4550 Security Policies and Implementation
Official levels of Computer Security
THE ORANGE BOOK Ravi Sandhu
Computer Security Access Control
Presentation transcript:

Evaluation, Assurance, Classified Systems Dr. William Hery CS 996 Spring 2004

Terminology Security Capabilities are what a product is supposed to do for security Assurance is the level of trust that it really does  Assurance is the hard problem! Evaluation is the process of determining the assurance level of a product Certification and Accreditation is the process of deciding that an entire system is secure enough to process a given class of data (this is in a later talk)

The NSA on Assurance "A lot of you are making security products that are an attractive nuisance.... Shame on you. [...] I want you to grow up. I want functions and assurances in security devices. We do not beta test on customers. If my product fails, someone might die." --Brian Snow, INFOSEC Technical Director at the National Security Agency, speaking to commercial security product vendors and users at the Black Hat Briefings security conference. (As quoted by Bruce Schneier.)

Recent History Early 1980s: DoD is concerned about the confidentiality of classified information on computers with multiple users (time sharing systems) 1985: DOD STD (Orange Book, or TCSEC): standard reference for computer security for DoD Mid 80s-mid 90s:  The Red Book (Trusted Network Interpretation (TNI) of the Orange Book)  The whole “rainbow series” FIPS-140 for commercial/civilian government cryptographic modules (DES, AES) Canada, UK, European Community develop standards similar to and beyond the Orange Book Mid 90s onward: Common Criteria

The Rainbow Series Available for download at:  Downloads are monochrome, not with rainbow colors

CS 996 Information Security Management 6

DoD Classification Scheme Data classification is based on need for confidentiality Levels are based on potential damage if compromised, and defines treatment rules  Top Secret  Secret  Confidential  Unclassified Unclassified includes  Sensitive But Unclassified (SBU); e. g., medical, salary, performance review data  For Official Use Only (FOUO). Not subject to release under the Freedom of Information Act (FOIA). May include company proprietary information.

DoD Classification Scheme (continued) “Codewords” restrict access to persons with “need to know” and are only used with a security level; e.g., TS/UMBRA  Codewords can be project specific or based on nationality; e. g., NATO, Coalition, NOFORN (no foreign nationals)  Multiple codewords may be part of a security label; e. g., a document that combined information from a TS/UMBRA and a TS/OXCART would have a label TS/UMBRA/OXCART. Clearance of an individual is a level of trust in that individual and is also at the S or TS level Access to information is based on clearance, information classification (<= clearance), and “need to know” The “owner” of information is the final arbiter of who gets access. This may get very fine grained with very sensitive information.

Orange Book Background Defined by NSA for DoD and Intelligence community use. Primary goal is to maintain confidentiality by restricting read access to those with the appropriate clearance and “need to know” Assumes multiple system users (computer or network of computers)  Also used on single user workstation with a separate windows for different classifications Uses the Bell LaPadula (BLP) model for higher security ratings  No read up  No write down Also supports codewords to determine access rules The set of all labels with level and codewords forms a lattice to which BLP can be applied

Orange book rating methodology Rating combines both security capabilities and assurance level--both go up as the rating goes up. Levels:  Class D: Minimal Protection  Class C1: Discretionary Security Protection  Class C2: Controlled Access Protection  Class B1: Labeled Security Protection  Class B2: Structured Protection  Class B3: Security Domains  Class A1: Verified Design

Core Concepts in the Orange Book Methodology for High Assurance Systems A reference monitor (RM) that controls all access to data objects A trusted computer base (TCB) (including the reference monitor) that does all security critical tasks  TCB includes user authentication, control of credentials Labels:  used for all (mandatory) access control  TCB includes labeling, and ensures the label on a data object cannot be modified  Labels on a new object are automatically created by the system based on the user level and any other data objects used to create the new one.

Core (continued) For high assurance, the RM and TCB are subject to rigorous inspection. In some cases, development of the TCB and RM is done by cleared personnel in a classified environment under rigid control, to include independent code reviews for correctness, safety in case of failure, and to ensure that no back doors or cover channels are included. When applied to networked systems, the TCB will include parts of routers, etc. The methodology was applied to Government Off the Shelf (GOTS) products and custom systems Its very hard to build a TCB on modern complex, multithreaded, caching CPUs.

TCSEC Evaluation Evaluations only performed by NSA Time consuming, expensive process; worse for higher levels of assurance Products placed on the NSA Evaluated Product List (EPL)  B level required for shared data Secret and above Approved B level products:  Multi-level Secure (MLS) Operating Systems with hardware  MLS Network Elements  MLS DB software (running on B level OS) Officially superceded by Common Criteria evaluations

MLS Workstation Screenshot

Common Criteria Intended for both commercial and government use Process can be applied to the security characteristics of any IT product. Evaluations can be performed by any certified lab & accepted by all countries Security Capabilities stated in a “Protection Profile” (PP) (User view of needs)  Usually defined as a generic for a product class  May be modified for a specific product into a “Security Target” (ST) (Vendor view of what they sell) Product to evaluate is the “Target of Evaluation” (TOE) Assurance rating is the “Evaluated Assurance Level” (EAL)  CC calls this a “grounds for confidence”  EAL rating is 1 to 7 (high) CC Slides at

EALs Basic Assurance  EAL1: Functional Test  EAL2: Structural Test  EAL3: Methodical Test and Check  EAL4: Methodical Design, Test, and Review Medium Assurance  EAL5: Semiformal Design and Test High Assurance  EAL6: Semiformally Verified Design and Test  EAL7: Formally Verified Design and Tested ed

US Canada UK Germany France Netherlands National Institute of Standards and Technology, National Security Agency Common Criteria Developer s Communications Security Establishment Communications-Electronic Security Group Bundesamt fur Sicherbeit in der Informationstechnik Service Central de la Securite des Systemes d’Information National Institute of Standards and Technology National Security Agency

Uses of the Common Criteria EvaluationPrograms ProductDevelopment ProcurementSpecifications Certification&Accreditations CommonCriteria

Security Objectives ~ The “Focal” Point Threats Policies Security Objectives Assumptions IT Environment Requirements Non-IT Environment Requirements TOE Requirements

Protection Profiles and Evaluated Products US Government Protection profiles at   23 categories of profiles  Within firewalls, 4 profiles Evaluated Products List at:   28 categories of products???  ~30 firewalls evaluated, EALs 1-4 Windows 2000 Professional  OS rated at EAL 4

Issues with Common Criteria Time and cost of evaluation Re-evaluations for patches, new versions, etc. Does the PP really match the user requirements? Environment, policies enforced by people not included Configuration is not part of the evaluation  Impact of weak default configurations International acceptance of rating can be rejected in any country for “national security” reasons. Effectively, NSA still evaluates products for classified use, and they want EAL 5 or better.

DoD Architectures for AIS with Classified Data

Modes of Operation for AIS with Classified Data Terms defined in the Orange Book AIS may be a processor or a collection of processors on a network Dedicated--all users have clearance and need to know for all data System High--all users have clearance, but not necessarily need to know for all data Compartmented--All users have the clearance, but not approval for access to all data Multilevel--Not all users have clearance to access all data

MLS System Architectures In principle, systems could be built from MLS workstations, MLS network elements, etc. But:  MLS components are much more expensive  Long evaluation time means they are often not state of the art  Use and management of MLS systems is less convenient Systems that are not connected by physically secure connections could be linked using MLS crypto equipment This used to be the goal of NSA for classified systems

Multiple System Level Architectures Instead, systems are sometimes built from enclaves of workstations and network elements  Within the enclave everything is at one level  Commercial Off The Shelf (COTS) products (workstations, network elements) can be used  C2 (Orange book) or lower EAL (common criteria) is OK  Enclaves can be linked to enclaves of other levels through “guards” that enforce BLP: information moves only from low to high. This is used to bring data into a classified environment.  An MLS network backbone can also be used to connect many enclaves in a “multi level” location to other enclaves at the same level  Enclaves that are not connected by physically secure connections could be linked using single level NSA approved crypto equipment This cuts back the need for costly MLS/NSA equipment to the boundaries of enclaves

Example I: Multiple enclaves SCI LAN Unclassified NetworksSecret Networks F H Host L LAN F Firewall G GuardNode

Example II: enclaves to crypto Unclass Router IP to IP/ATM UNCLASS UNENCRYPTED SECRET UNENCRYPTED TS Multiple Enclaves Secret Router TS Router ATM SW KG75 Fastlane KG75 Fastlane Public Network

Example III: MLS network to MLS crypto MLS Router (user net) IP to IP/ATM UNCLASS UNENCRYPTED SECRET UNENCRYPTED TS ATM SW KG75 Fastlane MLS ATM MUX Public Network

Stovepipes Data Collection Report Gen. Data Analysis Data Processing Data Collection Report Gen. Data Analysis Data Processing Data Collection Report Gen. Data Analysis Data Processing

Sample desktops For accessing Secret and below, people often have two desktop computers: one on a secret network, and one on an unclassifies network that may bee linked to the Internet (e. g., thru NIPRNET)  Both may be only C2 or EAL 3-4  The Secret computer may not have an capability to write to removable media  But it may be able to read removable media from the unclassified computer for a “sneakernet” one way link (BLP model) Higher level classified work is done in very secure, locked rooms or areas with strict physical access control, such as a “Secure Compartmentalized Information Facility” (SCIF).  The SCIF will have only secure or encrypted network links to other top secret locations.  Removable media can only be removed under very controlled circumstances.

Term Project Teams of ~3 students Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and server side) Submit a 1-2 page proposal to management (Dr. Hery) Assess risks, threats, vulnerabilities Develop a security policy Do a high level system security design Present a “preliminary design review” (PDR) to management (include risk analysis, policies, system architecture) Iterate on risk assessment, policy, design Present a final “critical design review” (CDR) to management and the class Write a final report to management on above

Example Project System should have at least 2 elements that communicate to perform a function  e. g., client server, peer to peer Pick a useful system, not an underlying technology Start with a “mission need statement”  e. g., “Provide a remote credit card verification service” State assumptions about environment  e. g., remote site is on a wired LAN connected to the Internet; verification data is on a well protected server connected to the Internet through a firewall

Example Project (continued) State the basic system functions; e. g.:  Read card magnetic strip  Send card data, transaction data to verification server  Server verifies card is valid, not reported lost/stolen  If invalid, send back reject message  Server verifies sufficient credit for transaction  If invalid, send back reject message  If sufficient  Send authorization message  Post transaction to account (debits account) The above steps should all be in the initial project proposal

Example Project (continued) Your project should be somewhat more complex than this Make explicit (and probably realistic) assumptions about infrastructure Major project steps:  Thorough risk analysis  Develop security policies  Perform security system engineering. Use the policy to determine the security functions needed, and then to develop an architecture that has all the security functions and hardware, software components to enforce the security policies Major project deliverables:  Proposal  Preliminary design review  Critical design review to class  Final report on the design