Security Architecture & Models “The security architecture of an information system is fundamental to enforcing an organization’s information security policy.”

Slides:



Advertisements
Similar presentations
Information Flow and Covert Channels November, 2006.
Advertisements

Operating System Security
Operating System Structures
Chapter 6 Security Kernels.
Access Control Methodologies
CMSC 414 Computer (and Network) Security Lecture 12 Jonathan Katz.
Security Models and Architecture
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Security Controls – What Works
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
1 Clark Wilson Implementation Shilpa Venkataramana.
Information Systems Security Security Architecture Domain #5.
Computer Security: Principles and Practice
CS526Topic 21: Integrity Models1 Information Security CS 526 Topic 21: Integrity Protection Models.
User Domain Policies.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson.
Stephen S. Yau CSE , Fall Security Strategies.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Trusted System? What are the characteristics of a trusted system?
ISA 562 Internet Security Theory & Practice
G53SEC 1 Reference Monitors Enforcement of Access Control.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Chapter 5 Network Security
G53SEC 1 Reference Monitors Enforcement of Access Control.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Chapter 2 Securing Network Server and User Workstations.
Trusted OS Design and Evaluation CS432 - Security in Computing Copyright © 2005, 2010 by Scott Orr and the Trustees of Indiana University.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
12/4/20151 Computer Security Security models – an overview.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
CSCE 548 Secure Software Development Security Operations.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Security Architecture & Models “The security architecture of an information system is fundamental to enforcing an organization’s information security policy.”
ISA 400 Management of Information Security
Academic Year 2014 Spring Academic Year 2014 Spring.
Security Architecture and Design: Part II
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter 8: Principles of Security Models, Design, and Capabilities
Slide #6-1 Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model.
The NIST Special Publications for Security Management By: Waylon Coulter.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
6/22/20161 Computer Security Integrity Policies. 6/22/20162 Integrity Policies Commercial requirement differ from military requirements: the emphasis.
CS526Topic 19: Integrity Models1 Information Security CS 526 Topic 19: Integrity Protection Models.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
TOPIC: Web Security Models
Access Control Model SAM-5.
Official levels of Computer Security
Chapter 19: Building Systems with Assurance
Systems Design Chapter 6.
PLANNING A SECURE BASELINE INSTALLATION
Chapter 6: Integrity Policies
Presentation transcript:

Security Architecture & Models “The security architecture of an information system is fundamental to enforcing an organization’s information security policy.”

Computer Architecture  CPU, control bus  Memory: cache, RAM, DRAM, ROM  CPU: Instruction cycle: fetch & execute Pipelining, CISC, RISC, Multi-tasking, Multi-Processing I/O: programmed I/O, DMA, Interrupts

Software  Languages 1GL: machine language 2GL: Assembly language 3GL: FORTRAN, BASIC, PL/1, C, etc 4GL: NATURAL, FOCUS, SQL 5GL: Prolog, LISP, other AI languages

Open & Closed Systems  Open: Vendor independent Designed & written by “outsiders” Subject to review & evaluation by outside parties not company insiders  Closed Vendor dependent Not typically compatible with other systems

Distributed Architecture  Migration from centralized to client/server User is also admin, programmer & operator Desktops can contain sensitive, at risk, info Users might lack security awareness Desktop can provide avenue into “trusted” networks Modems, PDAs, USB drives can be attached easily Downloading from Internet can produce disasters Desktops are hard to protect physically Lack of proper backup

Security mechanisms for Distributed Environments  & upload/download policies  Robust access controls (biometrics &/or 2 tier controls)  GUIs to restrict access to “real” system  File Encryption & cipher tools for  Users with limited “rights”  Separation of processes into privileged & non-privileged  Lock desktops, enable tampering logging  Enable remote logging  Centralized backup

Protection Mechanisms  Protection Domain: execution & memory space assigned to each process  Abstraction ie objects & OOP  Security Labels: classification for access control  Security Modes: A system operates in different modes with users having different rights depending on the security label the object being processed has

Rings or layers of security  OS kernel is usually inner most circle  Processes & users are closer or further from the center depending on classification and need

Recovery Procedures  Should not provide opportunity for violations of system’s security policy  Fault-tolerant: computer system fails but network continues to opperate  Failsafe system: hardware or software failure causes “controlled” shutdown  Fail-soft or resilient: non-critical processing is discontinued but network or computer continues in degraded mode  Failover: switching to duplicate systems in case of failure

Assurance  Degree of confidence in the satisfaction of security needs.  Following slides provide an overview of guidelines & standards that help evaluate security aspects of a system

Assurance: Evaluation Criteria  Trusted Computer Evaluation Criteria (TCSEC)  Basic control objectives are: security policy, assurance & accountability  Assurance levels are: D (minimal protection), C (discretionary), B (manditory), & A (Verified)

Assurance: Certification & Accreditation  Formal methods provide for an authority that takes responsibility for system security  Certification: comprhensive eval of system security  Accreditation: format declaration

Certification & Accreditation  Responsibility (i.e. blame) requires Formal methods  Certification Comprehensive eval of technical & non-technical security features  Accreditation Formal declaration by Designated Authority stating that system is approved to opperate in particular security mode  Rechecked after defined period of time

U. S. Defense Accreditation Process  Phase 1: understand mission, environment, & architecture to determine security requirements  Phase 2: create SSAA an evolving, binding security agreement. SSAA becomes baseline security agreement  Phase 3: Validation: check compliance  Phase 4: Post Accreditation

U. S. Defense Types of Accreditation  Site: evaluates a single site  Type: evaluates an app or system distributed to a number of locations  System: evaluates a major app or support system

Systems Security Engineering Capability Maturity Mdl (SSE-CMM)  If you can guarantee process you can guarantee the product 1.Describes essential characteristics of security engineering process 2.Captures industry best practices 3.Accepted ways of defining practices and improving capability 4.Provides measures of growth in capability

SSE-CMM Security Engineering Process Areas Administer security controls Coordinate security Assess impact & security risk Monitor security posture Assess threatProvide security input Assess vulnerabilitySpecify security needs Build assurance argument Verifiy & validate security

Information Security Models  Used to formalize security policy  Three types of models 1.Access control models 2.Integrity models 3.Information flow models

Access control models  Access Matrix Access rights for subjects to objects  Take-Grant Model Directed graph to specify rights that a subject can take or grant from or to another subject  Bell-LaPadula Model Department of Defense Deals only with confidentiality not integrity or availability

Access Matrix Columns provide ACL for each object Subject/Ob ject File: Income File: Salaries Process: Deductions Print Server: A JoeReadRead/WriteExecuteWrite JaneRead/WriteReadNoneWrite Process: Check Read ExecuteNone Program: Tax Read/Write CallWrite

Directed Graph Subject A Object B Subject C Subject/Object D Grant rights to B Including grant right A has rights Y to D Grant subset of Y on D

Bell-LaPadula Model  Simple Security Property Reading of info by subject of lower sensitivity from object of higher not permitted Writing of info by subject of higher to object of lower not permitted Uses Access Matrix to specify discretionary access control

Integrity Models  Sometimes integrity is as or more important than confidentiality  Biba Integrity Model  Clark-Wilson Integrity Model

Biba Integrity Model Three Goals: 1.Data is protected from modification by unauthorized users 2.Data is protected from unauthorized modification by authorized users 3.Data is internally & externally consistent

Biba Integrity Model Axioms High Integrity Level Medium Integrity Level Low Integrity Level Read OK (simple integrity axiom) subject Invoke Not ok Write ok (integrity axiom)

Clark-Wilson Integrity Model  Real world model  Constrained data item (CDI): object whose integrity is to be preserved  Integrity Verification Procedure: confirms that all CDIs are in valid states of integrity  Transformation Procedure: assures that well formed manipulations are used to change CDIs  Unconstrained data item

Information Flow Models  Based on a state machine  Consists of objects, state transitions, and flow policy  Objects are constrained to flow only in the directions permitted by the security policy

Confidential (Project X) Confidential (Task 1, Project X) Confidential (Task 2, Project X) Unclassified Confidential

Composition Theories  Systems are usually built by combining smaller systems  Therefore must consider whether security of component systems are maintained when combined into larger systems  Types of constructs Cascading: input to one sys is from another Feedback: loop one to second back to one Hookup: system that communicates with both internal & external systems