Policy Compliance Checking Slides from the PhD defense of Dr. Vaibhav Gowadia.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Network Security Essentials Chapter 11
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
System Center Configuration Manager Push Software By, Teresa Behm.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
1 Enabling Secure Internet Access with ISA Server.
1 Host – Based Intrusion Detection “Working of Tripwire”
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
RADIUS Server (Brocade Controller)
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Using Windows Firewall and Windows Defender
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
Chapter 13 – Network Security
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Module 14: Configuring Server Security Compliance
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 6: Securing the Local Area Network
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Open DNS resolvers have to be closed ● Open resolvers respond to recursive queries from any host on the Internet ● Amplification DNS attack 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Firewall Techniques Matt Cupp.
FIREWALL configuration in linux
Configuring ALSMS Remote Navigation
Secure Software Confidentiality Integrity Data Security Authentication
Active Directory and Group Policy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Protecting Your Maps and Data when using ArcGIS Server
Network Security: IP Spoofing and Firewall
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewall.
Overview of Database Security
AbbottLink™ - IP Address Overview
Cloud Security AWS as an example.
Operating System Concepts
Cloud Security AWS as an example.
Access Control What’s New?
Hosted Security.
Presentation transcript:

Policy Compliance Checking Slides from the PhD defense of Dr. Vaibhav Gowadia

Research Problems How can we model both high-level and low- level security policies in one framework? How can we determine whether the low-level policy and current system configuration is compliant to the high-level policy?

Example High-level policy Alice must provide read access to users in group Gamecocks to access files on server Hercules. Alice must protect the files on Hercules from unauthorized access

Example Low-level Policy Give read access on all files hosted on Hercules to users in group Gamecocks Deny access to all other users Add firewall rules to block access from untrusted IP addresses

Compliance Checking Framework High-level policy KB – Ontology and Refinement Patterns (Concept-level): 1.Common to all 2.Domain-specific Report Domain-data (Instance): Role-assignment, Organization structure Domain-data (Instance): System configuration, Low-level security policies Detect Conflicts and Violations Refinement 3

State The state of a data system is described by collection of properties of objects in the data system. A state space is a set of states.

Action  A Initial State SpaceFinal State Space Action Type, A:  ! 

Action Composition Sequence Operator: a 1 ;a 2 And Operator: a 1 ^ a 2 Choice Operator: a 1 _ a 2

Composition Types Basic Composition a 1 _ a 2 : Either of them is sufficient otherwise, both a 1 and a 2 must be performed Advanced Composition Obligation to perform one of the subactions is conditional Strict Composition It must be feasible to perform both a 1 and a 2 in the initial state and both must be performed Flexible Composition It is feasible to perform either a 1 and a 2 in the initial state and both must be performed

Action Refinement a 1 © a 2 is a refinement of a, i.e., a v a 1 © a 2, 8  2  where a(  ) ! , such that  2  (a 1 © a 2 )(  ) !  ', such that  v  '. ’’  a a 1 © a 2

Policy Refinement Derivation via subject-hierarchy Derivation via action refinement