Policy chains: the PoSecCo approach to policy management in Future Internet Cataldo Basile Politecnico di Torino Pisa - June 9, 2011.

Slides:



Advertisements
Similar presentations
Automotive Embedded System Development in AUTOSAR
Advertisements

1 Aspects of IEEE P1471 Viewpoints in Unified Modeling Language (UML) Manzur Ashraf, BRAC University Humayra Binte Ali, Dhaka University Md.Mahfuz Ashraf,
European Commission DG Information Society Info Day Brussels, 2 June 2005 Focal points: 1. Concepts, methods and core services 2. Tools in Rich Environments.
THE CORE PROJECT Jose Jimenez (project manager). What is the Core platform?
Network Security Essentials Chapter 11
I2NSF Use Cases in Access Networks Diego Lopez Telefónica I+D IETF91, Honolulu, 9-14 Nov.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
IEC Substation Configuration Language and Its Impact on the Engineering of Distribution Substation Systems Notes Dr. Alexander Apostolov.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
OASIS Reference Model for Service Oriented Architecture 1.0
L4-1-S1 UML Overview © M.E. Fayad SJSU -- CmpE Software Architectures Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I.
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Protocols and the TCP/IP Suite
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
1 Objective of today’s lesson S oftware engineering occurs as a consequence of a process called system engineering. Instead of concentrating solely on.
Course Instructor: Aisha Azeem
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
International Telecommunication Union ITU-T Study Group 17, Moscow, 30 March – 8 April 2005 New Recommendations on ODP Arve Meisingset Rapporteur Q15.
Basic Concepts The Unified Modeling Language (UML) SYSC System Analysis and Design.
Architectural Design.
What is Business Analysis Planning & Monitoring?
February Semantion Privately owned, founded in 2000 First commercial implementation of OASIS ebXML Registry and Repository.
Intranet, Extranet, Firewall. Intranet and Extranet.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
ISA 562 Internet Security Theory & Practice
Lecture 9: Chapter 9 Architectural Design
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
Ocean Observatories Initiative Data Management (DM) Subsystem Overview Michael Meisinger September 29, 2009.
Page 1 Road map for e-business implementation in Extended Enterprise Project funded by the European Community under the ‘Competitive and Sustainable Growth’
Enterprise Systems Architectures EGN 5621 Enterprise Systems Collaboration (Professional MSEM) Fall, 2012.
Covilhã, 30 June Atílio Gameiro Page 1 The information in this document is provided as is and no guarantee or warranty is given that the information is.
Unified Modeling Language* Keng Siau University of Nebraska-Lincoln *Adapted from “Software Architecture and the UML” by Grady Booch.
Database Systems DBMS Environment Data Abstraction.
L6-S1 UML Overview 2003 SJSU -- CmpE Advanced Object-Oriented Analysis & Design Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I College.
Computing Ontology Part II. So far, We have seen the history of the ACM computing classification system – What have you observed? – What topics from CS2013.
Building a real-world, Internet- scale stock trading application Naveen Prabhu Quadwave Consulting Pvt. Ltd.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 system architecture 1 after designing to meet functional requirements, design the system.
Database Administration
Chapter 6 – Architectural Design Lecture 1 1Chapter 6 Architectural design.
Promoting excellence in social security Building on sector wide commonalities to enhance the benefits of Information.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Application Ontology Manager for Hydra IST Ján Hreňo Martin Sarnovský Peter Kostelník TU Košice.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Analysis Yaodong Bi. Introduction to Analysis Purposes of Analysis – Resolve issues related to interference, concurrency, and conflicts among use cases.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
June California Investor Owned Utilities (IOU) HAN vision statement development 15 June 2007.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
25/02/2016 SW Development Process - SW Architecture/Stefan L. Meier/Electronic Product Development SW Architecture EPD Software Development Process 1.
OUTCOMES OBJECTIVES FUNCTIONS ACTIONS TERRITORIES LOCATIONS MARKET SEGMENTS TIME LINESCHALLENGE IMPACT RESOURCESACTIVITIESCHANNELS RELATIONS PARTNERS CUSTOMERS.
CPSC 872 John D. McGregor Session 31 This is it..
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 6 Slide 1 Software Requirements (utvalgte foiler fra Kap 6 og 7 i Sommerville)
Unit 3 Virtualization.
Protocols and the TCP/IP Suite
Ebusiness Infrastructure Platform
Policy chains: the PoSecCo approach to policy management in Future Internet Cataldo Basile Politecnico di Torino
Protocols and the TCP/IP Suite
Access Control What’s New?
System architecture, Def.
Software Development Process Using UML Recap
From Use Cases to Implementation
Presentation transcript:

Policy chains: the PoSecCo approach to policy management in Future Internet Cataldo Basile Politecnico di Torino Pisa - June 9, 2011

2 Posecco scenario: Future Internet seen from a Service Provider (SP) Service service application system DB network Service Provider security reqs from customers Supplier SP-customers sec reqs from mgmt SP-staff security reqs from suppliers security reqs from laws and regulations

PoSecCoEnterprise Architecture 3 Abstraction layers: PoSecCo vs. Enterprise Architecture product services, market segment, strategic goals, strategic projects, interactions with customers, interactions with suppliers Business business processes, organization units, roles and responsibilities, information flows, sites Process applications, application domains, technical services, IS-Functionality, information objects, interfaces Integration software components, datastructures Software hardware, network, software platforms Technology customers, suppliers, countries laws and regulations, business reqs, business data, roles Business IT services applications, subservices structured data IT layer hardware, network topology, security capabilities Landscape

4 Policy chain high-level security requirements and business- and legal- driven policies selected IT policies and controls to fulfill requirements technology-specific security configurations to implement controls on a given IT landscape detection and analysis of req conflicts matching reqs against suppliers refinement / selection of security controls optimized configuration generation analysis of reqs and landscape changes system validation and audit Changes of settings in productive systems Changes of laws, regulations, standards, customers, … connects separated policy abstraction to form a policy chain: runtime

5 Governance meta-model Stakeholder Model defines the stakeholders involved in the security requirements management process System Meta Model static concepts relevant for the security requirements management process (e.g., Business and IT services) security related information (e.g. security requirements and risks) attached to a functional concept (e.g., a business process or an IT resource) a System Model describes the status of the organisation at a certain point of time including its security status (e.g. actual security requirements) View Model: the portion of the system model seen by each stakeholder Process View: requests and change events

Business policy harmonization and refinement IT policy ontology-based refinement logical associations landscape configuration configurations 6 Implementing the policy chain: policy refinement: examples from end-user partners (Crossgate, Deloitte) “manage private data according to customer privacy law” examples from end-user partners (Crossgate, Deloitte) “manage private data according to customer privacy law” ABSTRACT = device dependent / syntax independent Example (packet filter): 1.from :80/TCP to :any/any ALLOW 2.from :any/any to :any/any ALLOW 3.DENY all ABSTRACT = device dependent / syntax independent Example (packet filter): 1.from :80/TCP to :any/any ALLOW 2.from :any/any to :any/any ALLOW 3.DENY all set of statements in form subject-verb-object (options) form subject and objects may be groups or categories of individuals interesting for policy enforcement purposes may (implicitly) express relations Example: high security services ‘securely reach’ their sub-services set of statements in form subject-verb-object (options) form subject and objects may be groups or categories of individuals interesting for policy enforcement purposes may (implicitly) express relations Example: high security services ‘securely reach’ their sub-services landscape configuration high-level refinement Change and Configuration Management (CCM) software is used to: update landscape description create change requests audit the productive landscape with help of standardized, comparable checklists and checks. Change and Configuration Management (CCM) software is used to: update landscape description create change requests audit the productive landscape with help of standardized, comparable checklists and checks. intermediate format express a relationship between network elements (individuals) relationships are associated to security properties topology independent Example sub-service App1 ‘securely reach’ sub-service WebFrontEnd or ‘reach’ :80/TCP intermediate format express a relationship between network elements (individuals) relationships are associated to security properties topology independent Example sub-service App1 ‘securely reach’ sub-service WebFrontEnd or ‘reach’ :80/TCP

collaboration: standardize policy languages business policy format (October 2011) no official or de facto standards (BPMN?) IT policy language and formal models (2012) according to the different security properties to enforce allow conflict analysis, complex refinement process, backtracing common format for configurations (2012) filtering, channel protection, access control devices Policy Common Information Model bind to landscape description common outcome: define policy meta-models for EU projects maximum freedom to extend and customize policies according to other projects needs input: policy models from other projects collaboration: documents circulation of policy-related topics, meetings and synchronization events 7 EffectPlus: building a common understanding

topology aware many refinement modules one for each security property e.g., reachability, channel protection, Access Control (= different requirements) implement refinement strategies at the lowest level and optimize configurations in distributed systems logical associations topology-independent relations (between network elements) Kommunikation SUN cluster 1 ‘reach’ Kommunikation SUN cluster ‘reach’ SAP II EDI process engine ‘securely reach’ WebEDI Business process Engine optional attributes time (weekdays, ), protection level (HIGH/MEDIUM/LOW), … formats depend on the security property outcome for other projects: a set of modules to be used as configuration generation services input: support for virtualization and cloud 8 Landscape Refinement

9 Refinement Strategies: service4 securely ‘reach’ service2 end-to-end security (transport mode) configure Ipsec + IKE may impact on performance end-to-end security (transport layer, SSL/TLS) easy to configure may impact on performance basic VPN (tunnel mode) no impact on service performance no channel protection if services are in the same physical machine (isolation) sub-services may cipher data at the application layer topology-independent, non invasive impact on performance

extend the landscape description with semantically rich concepts and logically connect them landscape: network and topology, FI and service-related, external service providers concepts; policy and refinement concepts (strategies) 10 Ontology-based refinement landscape concepts policy concepts business concepts business and governance meta model Abstraction context dependent concepts (FI, services, virtual, etc.) designer/user dependent concepts business IT layer landscape …

landscape meta-models (initial model in October 2011) input: landscape descriptions in other projects security ontologies (initial model in October 2011) input: ontologies to represent policy-related and landscape concepts collaboration: merge with non-PoSecCo ontologies collaboration: build components on top of the PoSecCo refinement architecture use PoSecCo refinement models and tools as services collaboration: formal models for refinement, conflict analysis, enforceability analysis collaboration: PoSecCo and virtualization improve the model in other scenarios e.g., cloud computing 11 EffectPlus: building a common understanding

THANK YOU!

EU Disclaimer PoSecCo project (project no ) is partially supported/co-funded by the European Community/ European Union/EU under the Information and Communication Technologies (ICT) theme of the 7th Framework Programme for R&D (FP7). This document does not represent the opinion of the European Community, and the European Community is not responsible for any use that might be made of its content. PoSecCo Disclaimer The information in this document is provided "as is", and no guarantee or warranty is given that the information is fit for any particular purpose. The above referenced consortium members shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials subject to any liability which is mandatory due to applicable law. Disclaimer 13

14