Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
Operating System Security
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
JENNIS SHRESTHA CSC 345 April 22, Contents Introduction History Flux Advanced Security Kernel Mandatory Access Control Policies MAC Vs DAC Features.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Chapter 17 Controls and Security Measures
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
1 Flexible Mandatory Access Control (MAC) in Modern Operating Systems Jeffrey H. Jewell CS 591 December 7, 2009 Jeffrey H. Jewell CS 591 December 7, 2009.
Chapter 9 Building a Secure Operating System for Linux.
Security and Policy Enforcement Mark Gibson Dave Northey
Security-Enhanced Linux Joseph A LaConte CS 522 December 8, 2004.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Agenda Who needs an Architect? Cloud and Security Key Security Differences in Private Cloud Cloud Security Challenges Secondary to Essential Characteristics.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
SELinux. 2SELinux Wikipedia says: Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM)
Linux Security.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security-Enhanced Linux & Linux Security Module The George Washington University CS297 Programming Language & Security YU-HAO HU.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
HIPAA COMPLIANCE WITH DELL
SELinux US/Fedora/13/html/Security-Enhanced_Linux/
Microsoft Exchange in the College of Engineering Jerry Ciolkosz Senior Systems Analyst Electronic and Computing Services October 16, 2003.
1 Implementation of Security-Enhanced Linux Yue Cui Xiang Sha Li Song CMSC 691X Project 2—Summer 02.
SEC835 Practical aspects of security implementation Part 1.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Chapter 7 Securing Commercial Operating Systems. Chapter Overview Retrofitting Security into a Commercial OS History of Retrofitting Commercial OS's Commercial.
0 Penn State, NSRC Industry Day, Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems.
SELinux. The need for secure OS Increasing risk to valuable information Dependence on OS protection mechanisms Inadequacy of mainstream operating systems.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
1 Linux Security Module: General Security Support for the Linux Kernel Presented by Chao-Sheng Lin 2005/11/1.
Trusted Operating Systems
Security-Enhanced Linux Eric Harney CPSC 481. What is SELinux? ● Developed by NSA – Released in 2000 ● Adds additional security capabilities to Linux.
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
5/7/2007CoreMcClug/SELinux 1 By: Corey McClurg. Outline A History of SELinux What is SELinux and how do I get it? Getting Started Mandatory Access Control.
Lecture 3 Page 1 CS 236 Online Prolog to Lecture 3 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Module 7: Designing Security for Accounts and Services.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
MLS/MCS on SE Linux Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework Uses.
SELinux Overview Dan Walsh SELinux for Dummies Dan Walsh
Introduction to Barracuda IM Firewall
SE-1021 Software Engineering II
Critical Security Controls
Protecting the Enterprise while lowering the bottom line.
SELinux (Security Enhanced Linux)
An Overview Rick Anderson Pat Demko
How to Mitigate the Consequences What are the Countermeasures?
NSA Security-Enhanced Linux (SELinux)
Server Management and Automation Windows Server 2012 R2
Mandatory Access Control and the Real World
Presentation transcript:

Information Assurance Research Group 1 NSA Security-Enhanced Linux (SELinux) Grant M. Wagner Information Assurance Research Group National Security Agency

Information Assurance Research Group 1 The Need for Secure OS Increasing risk to valuable information – Wide variety of application space security solutions Dependence on OS protection mechanisms Inadequacy of mainstream operating systems – Discretionary access controls can't do the job Key missing feature: Mandatory Access Control (MAC) – Administratively-set security policy – Control over all processes and objects – Decisions based on all security-relevant information

Information Assurance Research Group 1 What can MAC offer? Strong separation of security domains – Separate data based on confidentiality/integrity/purpose System, application, and data integrity – Protect against unauthorized modifications – Prevent ill-formed modifications Ability to limit program privileges – Safely run code of uncertain trustworthiness – Prevent exploit of flaw in program from escalating privilege – Limit each program to only what is required for its purpose

Information Assurance Research Group 1 What can MAC offer? Processing pipeline guarantees – Ensure that data is processed as required – Split processing into small, minimally trusted stages – Encryption, sanitization, virus scanning Authorization limits for legitimate users – Decompose administrator role – Partition users into classes based on position, clearance, etc.

Information Assurance Research Group 1 SELinux provides Flexible MAC Flexible comprehensive mandatory access controls for Linux implemented as a Linux security module Building on 12 years of NSA’s OS Security research Application of NSA’s Flask security architecture – Cleanly separates policy from enforcement using well-defined policy interfaces – Allows users to express policies naturally and supports changes – Comprehensive fine-grained controls over kernel services – Transparent to applications and users Role-Based Access Control, Type Enforcement, optional Multi-Level Security, easily extensible to other models Highly configurable (example configuration provided)

Information Assurance Research Group 1 SELinux Security Impact Limits damage from virus/trojan horse infection – Can inhibit virus propagation Eliminates most privilege elevation attacks Constrains damage from undiscovered exploits – Servers need not be granted admin privileges – Reduces need for immediate security patching Reduces dependence on all-powerful admin Critical services and data can be isolated Allows control over user actions

Information Assurance Research Group 1 SELinux Research Success SELinux developed at NSA as research prototype – Public release in Dec 2000 w/regular updates since – Currently included as security module in 2.6 Kernels – Continues to be excellent platform for security research

Information Assurance Research Group 1 SELinux Acceptance SELinux was released as a reference implementation Direct benefit to Linux Other OS groups incorporating technology Direct User benefit Meeting real security needs Growing user/developer community is contributing back Open Source can be powerful technology transfer tool

Information Assurance Research Group 1 Interest in SELinux Corporate – Used or being used considered for use in products/solutions – Wide variety of industries including OEMs, ISPs, Defense, Telecommunications, SCADA systems, PDAs and other consumer electronics Linux Distributors accepting technology – Red Hat/Debian/Gentoo/Others??? SELinux deployments – Corporate, government, universities

Information Assurance Research Group 1 Research Direction Further user space integration Complete integration into networked environment – Integrate with 2.6 IPSEC and NFSv4 implementations Security-Enhanced X Windows Policy specification and analysis tools Policy management service Platform for application security mechanisms

Information Assurance Research Group 1 Want to learn more? Available at: Mailing list: Send 'subscribe selinux' to