Presentation is loading. Please wait.

Presentation is loading. Please wait.

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.

Similar presentations


Presentation on theme: "INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security."— Presentation transcript:

1 INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu

2 INSTITUTE FOR CYBER SECURITY 2 THE BIG PICTURE © Ravi Sandhu

3 INSTITUTE FOR CYBER SECURITY Security Objectives 3 INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure © Ravi Sandhu

4 INSTITUTE FOR CYBER SECURITY Security Objectives 4 INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose © Ravi Sandhu

5 INSTITUTE FOR CYBER SECURITY Security Objectives 5 INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure USAGE purpose USAGE © Ravi Sandhu

6 INSTITUTE FOR CYBER SECURITY Security Trends and Change Drivers © Ravi Sandhu6 Stand-alone computersInternet Enterprise security Mutually suspicious yet mutually dependent security VandalsCriminals, Nation states, Terrorists Few standard services Many and new innovative services We are at an inflection point

7 INSTITUTE FOR CYBER SECURITY Diffie on Information Security … 2007 “Now we face a new challenge to security, a world of shared computing and web services. As with radio, this technology is too valuable to go unused, By contrast with radio, which could be protected with cryptography, there may be no technology that can protect shared computation to the degree we would call secure today. In a decade or a generation, there may be no secure computing.” © Ravi Sandhu7 Need to be realistic in our security expectations

8 INSTITUTE FOR CYBER SECURITY Butler Lampson Paraphrased (I think) Computer scientists could never have designed the web because they would have tried to make it work. But the Web does “work.” What does it mean for the Web to “work”? Security geeks could never have designed the ATM network because they would have tried to make it secure. But the ATM network is “secure. What does it mean for the ATM network to be “secure”? © Ravi Sandhu8

9 INSTITUTE FOR CYBER SECURITY Foundational Security Assumptions Information needs to be protected  In motion  At rest  In use Absolute security is impossible and unnecessary  Trying to approximate absolute security is a bad strategy  “Good enough” security is feasible and meaningful  Better than “good enough” is bad Security is meaningless without application context  Cannot know we have “good enough” without this context Models and abstractions are all important  Without a conceptual framework it is hard to separate “what needs to be done” from “how we do it” © Ravi Sandhu9 We are not very good at doing any of this

10 INSTITUTE FOR CYBER SECURITY Application Context Our Basic Premise  There can be no security without application context  Courtney’s Law (1970s, 1980s ??):  You cannot say anything interesting (i.e. significant) about the security of a system except in the context of a particular application and environment Corollary  There can be no security model without application context Reality  Existing security models are application neutral  Assumption is they can be readily “configured” or “policy- fied” to suit application context © Ravi Sandhu10 There is also a notion of technology context for security models but out of scope for this lecture

11 INSTITUTE FOR CYBER SECURITY Application Context Software- ArchitectProject% TimeLabel AliceVista25%U AliceSecureVista75%S BobXP100%U What precisely is Secret?  There exists a SecureVista project  Alice works on SecureVista  Alice’s effort on SecureVista is 75%  All or some of the above How do we maintain integrity of the database?  Depends © Ravi Sandhu11 Much work and $$$ by researchers and vendors, late 80’s-early 90’s

12 INSTITUTE FOR CYBER SECURITY Emerging Application-Centric Era (ACE) © Ravi Sandhu12 ECE Enterprise-Centric Era ACE Application-Centric Era Applications are cyber analogs of previously existing enterprise-centric applications on-line banking brokerage e-retail auctions search engines Future applications will be fundamentally different ?

13 INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers © Ravi Sandhu13 Idealized Enforceable (Approximate) Codeable This lecture is focused on the policy models layer At the policy layer security models are essentially access control models

14 INSTITUTE FOR CYBER SECURITY 14 THE PAST © Ravi Sandhu

15 INSTITUTE FOR CYBER SECURITY Access Control Models Discretionary Access Control (DAC)  Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Same as Lattice-Based Access Control (LBAC)  Access based on security labels  Labels propagate to copies Role-Based Access Control (RBAC)  Access based on roles  Can be configured to do DAC or MAC © Ravi Sandhu15

16 INSTITUTE FOR CYBER SECURITY ACCESS MATRIX MODEL U r w own V F SubjectsSubjects Objects (and Subjects) r w own G r rights © Ravi Sandhu16

17 INSTITUTE FOR CYBER SECURITY ACCESS CONTROL LISTS (ACLs) F U:r U:w U:own G U:r V:r V:w V:own each column of the access matrix is stored with the object corresponding to that column © Ravi Sandhu17

18 INSTITUTE FOR CYBER SECURITY CAPABILITY LISTS each row of the access matrix is stored with the subject corresponding to that row UF/r, F/w, F/own, G/r VG/r, G/w, G/own © Ravi Sandhu18

19 INSTITUTE FOR CYBER SECURITY ACCESS CONTROL TRIPLES SubjectAccessObject UrF UwF UownF UrG VrG VwG VownG commonly used in relational database management systems © Ravi Sandhu19

20 INSTITUTE FOR CYBER SECURITY TROJAN HORSE EXAMPLE File F A:r A:w File G B:r A:w B cannot read file F ACL © Ravi Sandhu20

21 INSTITUTE FOR CYBER SECURITY TROJAN HORSE EXAMPLE File F A:r A:w File G B:r A:w B can read contents of file F copied to file G ACL A Program Goodies Trojan Horse executes read write © Ravi Sandhu21

22 INSTITUTE FOR CYBER SECURITY DAC Summary Traditional DAC does not prevent copies from being made and there is no control over copies  Modern approaches to information sharing and trusted computing seek to maintain control over copies Traditional DAC is weak with respect to confidentiality but may have value with respect to integrity © Ravi Sandhu22

23 INSTITUTE FOR CYBER SECURITY LATTICE STRUCTURES Unclassified Confidential Secret Top Secret can-flow dominance  © Ravi Sandhu23

24 INSTITUTE FOR CYBER SECURITY BELL LAPADULA (BLP) MODEL SIMPLE-SECURITY Subject S can read object O only if label(S) dominates label(O) STAR-PROPERTY (LIBERAL) Subject S can write object O only if label(O) dominates label(S) STAR-PROPERTY (STRICT) Subject S can write object O only if label(O) equals label(S) © Ravi Sandhu24

25 INSTITUTE FOR CYBER SECURITY LATTICE STRUCTURES {ARMY, CRYPTO} Compartments and Categories {ARMY } {CRYPTO} {} © Ravi Sandhu25

26 INSTITUTE FOR CYBER SECURITY LATTICE STRUCTURES Hierarchical Classes with Compartments TS S {A,B} {} {A} {B} product of 2 lattices is a lattice © Ravi Sandhu26

27 INSTITUTE FOR CYBER SECURITY LATTICE STRUCTURES Hierarchical Classes with Compartments S, {A,B} {} {A}{B} S, TS, {A,B} {} {A} {B} TS, © Ravi Sandhu27

28 INSTITUTE FOR CYBER SECURITY SMITH'S LATTICE TS-W S-W TS S C U S-L S-LW S-A TS-X TS-L TS-K TS-Y TS-QTS-Z TS-X TS-KL TS-KLX TS-KY TS-KQZ TS-AKLQWXYZ © Ravi Sandhu28

29 INSTITUTE FOR CYBER SECURITY EQUIVALENCE OF BLP AND BIBA HI (High Integrity) LI (Low Integrity)  BIBA LATTICE EQUIVALENT BLP LATTICE LI (Low Integrity) HI (High Integrity) © Ravi Sandhu29

30 INSTITUTE FOR CYBER SECURITY EQUIVALENCE OF BLP AND BIBA HS (High Secrecy) LS (Low Secrecy)  BLP LATTICE EQUIVALENT BIBA LATTICE LS (Low Secrecy) HS (High Secrecy) © Ravi Sandhu30

31 INSTITUTE FOR CYBER SECURITY COMBINATION OF DISTINCT LATTICES HS LS HI LI GIVEN BLP BIBA  HS, LI HS, HI LS, LI LS, HI EQUIVALENT BLP LATTICE © Ravi Sandhu31

32 INSTITUTE FOR CYBER SECURITY LIPNER'S LATTICE S:Repair S:Production Users O:Production Data S:Application Programmers O:Development Code and Data S:System Programmers O:System Code in Development O:Repair Code O:System Programs O:Production Code O:Tools S:System Managers O:Audit Trail S:System Control LEGEND S:Subjects O:Objects LEGEND S:Subjects O:Objects © Ravi Sandhu32

33 INSTITUTE FOR CYBER SECURITY CHINESE WALL EXAMPLE BANKS OIL COMPANIES A B XY © Ravi Sandhu33

34 INSTITUTE FOR CYBER SECURITY CHINESE WALL LATTICE A, - B, - -, X-, Y A, X A, Y B, XB, Y SYSHIGH SYSLOW © Ravi Sandhu34

35 INSTITUTE FOR CYBER SECURITY COVERT CHANNELS Low User High Trojan Horse Infected Subject High User Low Trojan Horse Infected Subject COVERT CHANNEL Information is leaked unknown to the high user © Ravi Sandhu35

36 INSTITUTE FOR CYBER SECURITY MAC/LBAC Summary LBAC fails to control covert channels LBAC fails to control inference and aggregation It is too rigid for most commercial applications It has strong mathematical foundations © Ravi Sandhu36

37 INSTITUTE FOR CYBER SECURITY RBAC: Role-Based Access Control  Access is determined by roles  A user’s roles are assigned by security administrators  A role’s permissions are assigned by security administrators First emerged: mid 1970s First models: mid 1990s Is RBAC MAC or DAC or neither? © Ravi Sandhu37

38 INSTITUTE FOR CYBER SECURITY Fundamental Theorem of RBAC  RBAC can be configured to do MAC  RBAC can be configured to do DAC  RBAC is policy neutral RBAC is neither MAC nor DAC! © Ravi Sandhu38

39 INSTITUTE FOR CYBER SECURITY RBAC96 Model ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS PERMISSIONS... SESSIONS © Ravi Sandhu39

40 INSTITUTE FOR CYBER SECURITY RBAC96 Model ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS PERMISSIONS... SESSIONS ROLE HIERARCHIES © Ravi Sandhu40

41 INSTITUTE FOR CYBER SECURITY RBAC96 Model ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS PERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS © Ravi Sandhu41

42 INSTITUTE FOR CYBER SECURITY Example Role Hierarchy Engineering Department (ED) Project Lead 1 (PL1) Engineer 1 (E1) Production 1 (P1) Quality 1 (Q1) Director (DIR) Project Lead 2 (PL2) Engineer 2 (E2) Production 2 (P2) Quality 2 (Q2) Employee (E) Inheritance hierarchy © Ravi Sandhu42

43 INSTITUTE FOR CYBER SECURITY Example Role Hierarchy Engineering Department (ED) Project Lead 1 (PL1) Engineer 1 (E1) Production 1 (P1) Quality 1 (Q1) Director (DIR) Project Lead 2 (PL2) Engineer 2 (E2) Production 2 (P2) Quality 2 (Q2) Employee (E) Inheritance and activation hierarchy © Ravi Sandhu43

44 INSTITUTE FOR CYBER SECURITY NIST/ANSI RBAC Standard Model 2004 ROLES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS PERMISSIONS... SESSIONS ROLE HIERARCHIES CONSTRAINTS Permission-role review is advanced requirement Limited to separation of duties Overall formal model is more complete © Ravi Sandhu44

45 INSTITUTE FOR CYBER SECURITY The RBAC Story © Ravi Sandhu45 RBAC96 paper Proposed Standard Adopted

46 INSTITUTE FOR CYBER SECURITY 46 THE PRESENT © Ravi Sandhu

47 INSTITUTE FOR CYBER SECURITY Access Control Models Discretionary Access Control (DAC)  Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Same as Lattice-Based Access Control (LBAC)  Access based on security labels  Labels propagate to copies Role-Based Access Control (RBAC)  Access based on roles  Can be configured to do DAC or MAC Attribute-Based Access Control (ABAC)  Access based on attributes, to possibly include roles, security labels and whatever © Ravi Sandhu47

48 INSTITUTE FOR CYBER SECURITY Founding Principles of RBAC96  Abstraction of Privileges Credit is different from Debit even though both require read and write  Separation of Administrative Functions Separation of user-role assignment from role- permission assignment  Least Privilege Right-size the roles Don’t activate all roles all the time  Separation of Duty Static separation: purchasing manager versus accounts payable manager Dynamic separation: cash-register clerk versus cash-register manager © Ravi Sandhu48

49 INSTITUTE FOR CYBER SECURITY ASCAA Principles for Future Access Control  Abstraction of Privileges Credit vs debit Personalized permissions  Separation of Administrative Functions  Containment Least Privilege Separation of Duties Usage Limits  Automation Revocation Assignment: (i) Self-assignment, (ii) Attribute-based Context and environment adjustment  Accountability Re-authentication/Escalated authentication Click-through obligations Notification and alerts © Ravi Sandhu49

50 INSTITUTE FOR CYBER SECURITY Usage Control Scope © Ravi Sandhu50 Security Objectives Security Architectures

51 INSTITUTE FOR CYBER SECURITY Usage Control Model (UCON) © Ravi Sandhu51 unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes

52 INSTITUTE FOR CYBER SECURITY Usage Control Model (UCON) DAC LBAC RBAC ABAC … and many, many others UCON  ABAC on steroids  Simple, familiar, usable and effective use cases demonstrate the need for UCON  Automatic Teller Machines  CAPTCHAs at Public web sites  End User Licencse Agreements  Terms of Usage for WiFi in Hotels, Airports  Rate limits on call center workers © Ravi Sandhu52

53 INSTITUTE FOR CYBER SECURITY 53 THE FUTURE © Ravi Sandhu

54 INSTITUTE FOR CYBER SECURITY Application-Centric Security Models Our Basic Premise  There can be no security model without application context So how does one customize an application-centric security model?  Meaningfully combine the essential insights of  DAC, LBAC, RBAC, ABAC, UCON, etcetera  Directly address the application-specific trade-offs  Within the security objectives of confidentiality, integrity and availability  Across security, performance, cost and usability objectives  Separate the real-world concerns of  practical distributed systems and ensuing staleness and approximations (enforcement layer) from  policy concerns in a idealized environment (policy layer) © Ravi Sandhu54

55 INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers © Ravi Sandhu55 Idealized Enforceable (Approximate) Codeable This lecture is focused on the policy models layer

56 INSTITUTE FOR CYBER SECURITY Dissemination-Centric Sharing Extensive research in the last two decades  ORCON, DRM, ERM, XrML, ODRL, etc. Copy/usage control has received major attention Manageability problem largely unaddressed AliceBobCharlieEveSusie Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Dissemination Chain with Sticky Policies on Objects Attribute Cloud © Ravi Sandhu56

57 INSTITUTE FOR CYBER SECURITY Group-Centric Sharing (g-SIS) Brings users & objects together in a group  Focuses on manageability using groups  Co-exists with dissemination-centric  Two metaphors Secure Meeting Room (E.g. Program committee) Subscription Model (E.g. Secure multicast) Operational aspects  Group characteristics E.g. Are there any core properties?  Group operation semantics E.g. What is authorized by join, add, etc.?  Read-only Vs Read-Write Administrative aspects  E.g. Who authorizes join, add, etc.?  May be application dependant Multiple groups  Inter-group relationship Group Authz (u,o,r)? join leave add remove Users Objects © Ravi Sandhu57

58 INSTITUTE FOR CYBER SECURITY g-SIS Operation Semantics GROUP Authz (u,o,r)? join leave add remove Users Objects © Ravi Sandhu58

59 INSTITUTE FOR CYBER SECURITY g-SIS Operation Semantics GROUP Authz (u,o,r)? Strict Join Strict Leave Liberal Add Liberal Remove Liberal Join Liberal Leave Strict Add Strict Remove Users Objects © Ravi Sandhu59

60 INSTITUTE FOR CYBER SECURITY Family of g-SIS Policy Models Most Restrictive g-SIS Specification: Traditional Groups: Secure Multicast: © Ravi Sandhu60

61 INSTITUTE FOR CYBER SECURITY g-SIS Enforcement Model CC GA Group Subjects TRM … 1. Read Objects 5.1 Request Refresh 5.2 Update Attributes 3.1 Subject Leave (s) 4.1 Object Remove (o) 3.2 Set Leave-TS (s) 4.2 Add o to ORL CC: Control Center GA: Group Administrator Subject Attributes: {id, Join-TS, Leave- TS, ORL, gKey} ORL: Object Revocation List gKey: Group Key Object Attributes: {id, Add- TS} Refresh Time (RT): TRM contacts CC to update attributes © Ravi Sandhu61

62 INSTITUTE FOR CYBER SECURITY From Policy to Enforcement Additional Trusted/Semi-Trusted Servers Approximate Enforcement Finally, the Implementation layer models spell out protocol details and details of TRM algorithms © Ravi Sandhu62

63 INSTITUTE FOR CYBER SECURITY 63 CONCLUSION © Ravi Sandhu

64 INSTITUTE FOR CYBER SECURITY Conclusion THE PAST Discretionary Access Control (DAC) Mandatory Access Control (MAC)  Equivalently Lattice-Based Access Control (LBAC) Role-Based Access Control (RBAC) THE PRESENT Usage Control (UCON)  Attribute-Based Access Control (ABAC) on steroids THE FUTURE Application-Centric Access Control Models Technology-Centric Access Control Models © Ravi Sandhu64 Models are all important A Policy Language is not a substitute for a good model


Download ppt "INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security."

Similar presentations


Ads by Google