Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 13: Trusted Computing and Multilevel.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Lecture 19 Trusted Computing and Multilevel Security
IT Security Evaluation By Sandeep Joshi
Computer Security: Principles and Practice Chapter 10 – Trusted Computing and Multilevel Security.
The Common Criteria Cs5493(7493). CC: Background The need for independently evaluated IT security products and systems led to the TCSEC Rainbow series.
Access Control Methodologies
Security Models and Architecture
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
1 Evaluating Systems CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 6, 2004.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Information Systems Security Security Architecture Domain #5.
User Domain Policies.
Policy, Models, and Trust 1. Security Policy A security policy is a well-defined set of rules that include the following: Subjects: the agents who interact.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Trusted System? What are the characteristics of a trusted system?
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Additional Security Tools Lesson 15. Skills Matrix.
Computer Security: Principles and Practice
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Chapter 5 Network Security
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 13 “Trusted Computing and.
CMSC : Common Criteria for Computer/IT Systems
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
Trusted Operating Systems
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
Computer Security: Principles and Practice
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
ECE Prof. John A. Copeland fax Offices: Klaus 3362.
Chapter 8: Principles of Security Models, Design, and Capabilities
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Cryptography and Network Security
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Lecture 20 Trusted Computing and Multilevel Security modified from slides of Lawrie Brown and Hesham El-Rewini.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TOPIC: Web Security Models
Trusted Computing and Multilevel Security
Computer Data Security & Privacy
or call for office visit,
Computer Security: Principles and Practice
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 10 – Trusted Computing and Multilevel Security

Trusted Computing and Multilevel Security  present some interrelated topics: formal models for computer security formal models for computer security multilevel security multilevel security trusted systems trusted systems mandatory access control mandatory access control security evaluation security evaluation

Formal Models for Computer Security  two fundamental computer security facts: all complex software systems have flaw/bugs all complex software systems have flaw/bugs is extraordinarily difficult to build computer hardware/software not vulnerable to attack is extraordinarily difficult to build computer hardware/software not vulnerable to attack  hence desire to prove design and implementation satisfy security requirements  led to development of formal security models initially funded by US DoD initially funded by US DoD  Bell-LaPadula (BLP) model very influential

Bell-LaPadula (BLP) Model  developed in 1970s  as a formal access control model  subjects and objects have a security class top secret > secret > confidential > unclassified top secret > secret > confidential > unclassified subject has a security clearance level subject has a security clearance level object has a security classification level object has a security classification level class control how subject may access an object class control how subject may access an object  applicable if have info and user categories

Multi-Level Security

BLP Formal Description  based on current state of system (b, M, f, H): (current access set b, access matrix M, level function f, hierarchy H)  three BLP properties: ss-property:(S i, O j, read) has f c (S i ) ≥ f o (O j ). *-property:(S i, O j, append) has f c (S i ) ≤ f o (O j ) and (S i, O j, write) has f c (S i ) = f o (O j ) ds-property:(S i, O j, A x ) implies A x  M[S i  BLP give formal theorems theoretically possible to prove system is secure theoretically possible to prove system is secure in practice usually not possible in practice usually not possible

BLP Rules 1. get access 2. release access 3. change object level 4. change current level 5. give access permission 6. rescind access permission 7. create an object 8. delete a group of objects

BLP Example

BLP Example cont.

MULTICS Example

Biba Integrity Model  various models dealing with integrity  strict integrity policy: simple integrity: I(S) ≥ I(O) simple integrity: I(S) ≥ I(O) integrity confinement:I(S) ≤ I(O) integrity confinement:I(S) ≤ I(O) invocation property:I(S 1 ) ≥ I(S 2 ) invocation property:I(S 1 ) ≥ I(S 2 )

Clark-Wilson Integrity Model

Chinese Wall Model

Reference Monitors

Trojan Horse Defence

Multilevel Security (MLS)  a class of system that has system resources (particularly stored information) at more than one security level (i.e., has different types of sensitive resources) and that permits concurrent access by users who differ in security clearance and need- to-know, but is able to prevent each user from accessing resources for which the user lacks authorization.

MLS Security for Role-Based Access Control  rule based access control (RBAC) can implement BLP MLS rules given: security constraints on users security constraints on users constraints on read/write permissions constraints on read/write permissions read and write level role access definitions read and write level role access definitions constraint on user-role assignments constraint on user-role assignments

RBAC MLS Example

MLS Database Security

MLS Database Security Read Access  DBMS enforces simple security rule (no read up)  easy if granularity entire database / table level  inference problems if have column granularity if can query on restricted data can infer its existence if can query on restricted data can infer its existence SELECT Ename FROM Employee WHERE Salary > 50KSELECT Ename FROM Employee WHERE Salary > 50K solution is to check access to all query data solution is to check access to all query data  also have problems if have row granularity null response indictes restricted/empty result null response indictes restricted/empty result  no extra concerns if have element granularity

MLS Database Security Write Access  enforce *-security rule (no write down)  have problem if a low clearance user wants to insert a row with a primary key that already exists in a higher level row: can reject, but user knows row exists can reject, but user knows row exists can replace, compromises data integrity can replace, compromises data integrity can polyinstantiation and insert multiple rows with same key, creates conflicting entries can polyinstantiation and insert multiple rows with same key, creates conflicting entries  same alternatives occur on update  avoid problem if use database / table granularity

Trusted Platform Module (TPM)  concept from Trusted Computing Group  hardware module at heart of hardware / software approach to trusted computing  uses a TPM chip on motherboard, smart card, processor motherboard, smart card, processor working with approved hardware / software working with approved hardware / software generating and using crypto keys generating and using crypto keys  has 3 basic services: authenticated boot, certification, and encryption

Authenticated Boot Service  responsible for booting entire O/S in stages  ensuring each is valid and approved for use verifying digital signature associated with code verifying digital signature associated with code keeping a tamper-evident log keeping a tamper-evident log  log records versions of all code running  can then expand trust boundary TPM verifies any additional software requested TPM verifies any additional software requested confirms signed and not revokedconfirms signed and not revoked  hence know resulting configuration is well- defined with approved components

Certification Service  once have authenticated boot  TPM can certify configuration to others with a digital certificate of configuration info with a digital certificate of configuration info giving another user confidence in it giving another user confidence in it  include challenge value in certificate to also ensure it is timely  provides hierarchical certification approach trust TPM then O/S then applications trust TPM then O/S then applications

Encryption Service  encrypts data so it can be decrypted by a certain machine in given configuration by a certain machine in given configuration  depends on master secret key unique to machine master secret key unique to machine used to generate secret encryption key for every possible configuration only usable in it used to generate secret encryption key for every possible configuration only usable in it  can also extend this scheme upward create application key for desired application version running on desired system version create application key for desired application version running on desired system version

TPM Functions

Protected Storage Function

Trusted Systems  security models aimed at enhancing trust  work started in early 1970’s leading to: Trusted Computer System Evaluation Criteria (TCSEC), Orange Book, in early 1980s Trusted Computer System Evaluation Criteria (TCSEC), Orange Book, in early 1980s further work by other countries further work by other countries resulting in Common Criteria in late 1990s resulting in Common Criteria in late 1990s  also Computer Security Center in NSA with Commercial Product Evaluation Program with Commercial Product Evaluation Program evaluates commercially available products evaluates commercially available products required for Defense use, freely published required for Defense use, freely published

Common Criteria (CC)  ISO standards for security requirements and defining evaluation criteria to give: greater confidence in IT product security greater confidence in IT product security from formal actions during process of: from formal actions during process of: development using secure requirements development using secure requirements evaluation confirming meets requirements evaluation confirming meets requirements operation in accordance with requirements operation in accordance with requirements  evaluated products are listed for use

CC Requirements  have a common set of potential security requirements for use in evaluation  target of evaluation (TOE) refers product / system subject to evaluation  functional requirements define desired security behavior define desired security behavior  assurance requirements that security measures effective correct that security measures effective correct  have classes of families of components

CC Profiles and Targets

CC Security Paradigm

Smartcard PP  simple PP example  describes IT security requirements for smart card use by sensitive applications  lists threats  PP requirements: 42 TOE security functional requirements 42 TOE security functional requirements 24 TOE security assurance requirements 24 TOE security assurance requirements IT environment security requirements IT environment security requirements  with rationale for selection

Assurance  “degree of confidence that the security controls operate correctly and protect the system as intended”  applies to: product security requirements, security policy, product design, implementation, operation product security requirements, security policy, product design, implementation, operation  various approaches analyzing, checking, testing various aspects

CC Assurance Levels  EAL 1 - functionally tested  EAL 2: structurally tested  EAL 3: methodically tested and checked  EAL 4: methodically designed, tested, and reviewed  EAL 5: semiformally designed and tested  EAL 6: semiformally verified design and tested  EAL 7: formally verified design and tested

Evaluation  ensure security features correct & effective  performed during / after TOE development  higher levels need greater rigor and cost  input: security target, evidence, actual TOE  result: confirm security target satisfied for TOE  process relates security target to some of TOE: high-level design, low-level design, functional spec, source code, object code, hardware realization high-level design, low-level design, functional spec, source code, object code, hardware realization  higher levels need semiformal / formal models

Evaluation Parties & Phases  evaluation parties: sponsor - customer or vendor sponsor - customer or vendor developer - provides evidence for evaluation developer - provides evidence for evaluation evaluator - confirms requirements satisfied) evaluator - confirms requirements satisfied) certifier - agency monitoring evaluation process certifier - agency monitoring evaluation process  phases: preparation, conduct of evaluation, conclusion preparation, conduct of evaluation, conclusion  government agency regulates, e.g. US CCEVS  have peering agreements between countries saving time / expense by sharing results saving time / expense by sharing results

Summary  Bell-Lapadula security model  other models  reference monitors & trojan horse defence  multilevel secure RBAC and databases  trusted platform module  common criteria  assurance and evaluation