Copyright © 1995-2003 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.

Slides:



Advertisements
Similar presentations
Akshat Sharma Samarth Shah
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Internet of Things Security Architecture
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Access Control Methodologies
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Grid Security. Typical Grid Scenario Users Resources.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
Information Security Policies and Standards
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci555: Advanced Operating Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CS582: Distributed Systems Lecture 10, 11 –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Chapter 8 Web Security.
Stephen S. Yau CSE , Fall Security Strategies.
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Authentication and Identity Management. Ideally – Who you are Practically – Something you know (e.g., password) – Something you have (e.g., badge) – Something.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Adaptive Trust Negotiation and Access Control Tatyana Ryutov, et.al. Presented by: Carlos Caicedo.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture notes Dr.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Cryptography and Network Security
Grid Security.
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization 29 October 2003 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Administrative Plan to have mid-terms available next Wednesday. Most proposals replied to. If you do not have a response by tomorrow morning, send a follow-up message to

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Authorization Final goal of security –Determine whether to allow an operation. Depends upon ▪Policy ▪Possibly authentication ▪Other characteristics

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The role of policy in security architecture Policy – Defines what is allowed and how the system and security mechanisms should act. Enforced By Mechanism – Provides protection interprets/evaluates (firewalls, ID, access control, confidentiality, integrity) Implemented as: Software: which must be implemented correctly and according to sound software engineering principles. 2

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Policy: Review – The Access Matrix Policy represented by an Access Matrix –Also called Access Control Matrix –One row per object –One column per subject –Tabulates permissions –But implemented by: ▪Row – Capability list ▪Column – Access Control List

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Policy models: Bell-LaPadula Discretionary Policy –Based on Access Matrix Mandatory Policy –Top Secret, Secret, Confidential, Unclassified –* Property: S can write O if and only if Level S <= Level O ▪Write UP, Read DOWN –Categories treated as levels ▪Form a matrix (more models later in the course)

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Security is more than mix of point solutions Today’s security tools work with no coordinated policy –Firewalls and Virtual Private Networks –Authentication and Public Key Infrastructure –Intrusion Detection and limited response We need better coordination –Intrusion response affected at firewalls, VPN’s and Applications –Not just who can access what, but policy says what kind of encryption to use, when to notify ID systems. Tools should implement coordinated policies –Policies originate from multiple sources –Policies should adapt to dynamic threat conditions –Policies should adapt to dynamic policy changes triggered by activities like September 11 th response. 4

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE GAA-API: Integration through Authorization Focus integration efforts on authorization and the management of policies used in the authorization decision. –Not really new - this is a reference monitor. –Applications shouldn’t care about authentication or identity. ▪Separate policy from mechanism –Authorization may be easier to integrate with applications. –Hide the calls to individual security services ▪E.g. key management, authentication, encryption, audit 6

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE SECURITY AUDIT RECORDS Authorization and Integrated Security Services INTRUSION DETECTION UNDER ATTACK POLICY GAA API EACL... Authentication Integration of dynamic security services creates feedback path enabling effective response to attacks Databases Web Servers Firewalls IPSec … 7

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Generic Authorization and Access-control API Allows applications to use the security infrastructure to implement security policies. gaa_get_object_policy_info function called before other GAA API routines which require a handle to object EACL to identify EACLs on which to operate. Can interpret existing policy databases. gaa_check_authorization function tells application whether requested operation is authorized, or if additional application specific checks are required Application GAA API input output gaa_get_ object_eacl gaa_check_ authorization Yes,no,maybe SC,obj_id,op 9

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Three Phases of Condition Evaluation 10 GAA-API a.isi.edu, connect, Tom gaa_check_authorization() T/F/U System State EACL gaa_get_object_policy_info() gaa_post_execution_actions() T/F/U gaa_execution_control() T/F/U

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE GAA-API Policies originate from multiple sources –Discretionary policies associated with objects –Read from existing applications or EACLs –Local system policies merged with object policies –Broadening or narrowing allowed access –Policies imported from policy/state issuers –ID system issues state credentials, These credentials may embed policy as well. –Policies embedded in credentials –These policies attach to user/process credentials and apply to access by only specific processes. –Policies evaluated remotely –Credential issuers (e.g. authentication and authorization servers) evaluate policies to decide which credentials to issue. 8

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Communicating threat conditions Threat Conditions and New Policies carried in signed certificates –Added info in authentication credentials –Threat condition credential signed by ID system Base conditions require presentation or availability of credential –Matching the condition brings in additional policy elements. 11

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Integrating security services The API calls must be made by applications. –This is a major undertaking, but one which must be done no matter how one chooses to do authorization. These calls are at the control points in the app –They occur at auditable events, and this is where records should be generated for ID systems –They occur at the places where one needs to consider dynamic network threat conditions. –Adaptive policies use such information from ID systems. –They occur at the right point for billable events. 12

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advances Needed in Policy Ability to merge & apply policies from many sources –Legislated policies –Organizational policies –Agreed upon constraints Integration of Policy Evaluation with Applications –So that policies can be uniformly enforced Support for Adaptive Policies is Critical –Allows response to attack or suspicion Policies must manage use of security services –What to encrypt, when to sign, what to audit. –Hide these details from the application developer.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE GAA - Applications and other integration –Web servers - apache –Grid services - globus –Network control – IPsec and firewalls –Remote login applications – ssh –Trust management –Can call BYU code to negotiate credentials –Will eventually guide the negotiation steps 13

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What dynamic policies enable Dynamic policy evaluation enables response to attacks: –Lockdown system if attack is detected –Establish quarantines by changing policy to establish isolated virtual networks dynamically. –Allow increased access between coalition members as new coalitions are formed or membership changes to respond to unexpected events. 14

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Demo Scenario - LockDown  You have an isolated local area network with mixed access to web services (some clients authenticated, some not). 15a

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Demo Scenario - LockDown  You have an isolated local area network with mixed access to web services (some clients authenticated, some not).  You need to allow incoming authenticated SSH or IPSec connections. 15b

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Demo Scenario - LockDown  You have an isolated local area network with mixed access to web services (some clients authenticated, some not).  You need to allow incoming authenticated SSH or IPSec connections.  When such connections are active, you want to lock down your servers and require stronger authentication and confidentiality protection on all accesses within the network. 15c

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Proxies A proxy allows a second principal to operate with the rights and privileges of the principal that issued the proxy –Existing authentication credentials –Too much privilege and too easily propagated Restricted Proxies –By placing conditions on the use of proxies, they form the basis of a flexible authorization mechanism

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Restricted Proxies Two Kinds of proxies –Proxy key needed to exercise bearer proxy –Restrictions limit use of a delegate proxy Restrictions limit authorized operations –Individual objects –Additional conditions + Proxy Conditions: Use between 9AM and 5PM Grantee is user X, Netmask is x.x, must be able to read this fine print, can you PROXY CERTIFICATE Grantor

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Policies HIPAA, other legislation Privacy statements Discretionary policies Mandatory policies (e.g. classification) Business policies 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Mechanisms Access Matrix –Access Control List –Capability list Unix file system Andrew file system SSH authorized key files Restricted proxies, extended certificates Group membership Payment 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Summary Policies naturally originate in multiple places. Deployment of secure systems requires coordination of policy across countermeasures. Effective response requires support for dynamic policy evaluation. Such policies can coordinated the collection of data used as input for subsequent attack analysis. 16