3. security architecture and models

35
Security Architecture Security Architecture and Models and Models

Upload: 7wounders

Post on 24-Jan-2015

1.661 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 3. security architecture and models

Security Architecture and Security Architecture and ModelsModels

Page 2: 3. security architecture and models

Security Architecture and ModelsSecurity Architecture and Models Security models in terms of confidentiality, Security models in terms of confidentiality,

integrity, and information flowintegrity, and information flow Differences between commercial and government Differences between commercial and government

security requirementssecurity requirements The role of system security evaluation criteria such The role of system security evaluation criteria such

as TCSEC, ITSEC, and CCas TCSEC, ITSEC, and CC Security practices for the Internet (IETF IPSec)Security practices for the Internet (IETF IPSec) Technical platforms in terms of hardware, firmware, Technical platforms in terms of hardware, firmware,

and softwareand software System security techniques in terms of System security techniques in terms of

preventative, detective, and corrective controlspreventative, detective, and corrective controls

Page 3: 3. security architecture and models

The Layered ApproachThe Layered Approach

Page 4: 3. security architecture and models

The Architectures Platform Architecture

Operating System Software and Utilities Central Processing Unit (CPU) States Memory Management Overview Input/Output Devices Storage Devices

• Operating System Multitasking - Systems allow a user to perform

more than one computer Task, such as the operation of an application program at the same time

Multithreading - The ability of a program or an operating system process to manage its use by more than one user at a time and to even manage multiple requests by the same user without having to have multiple copies of the programming running in the computer

Page 5: 3. security architecture and models

The Architectures Cont… Operating System

• Multiprogramming system - System that allows for the interleaved execution of two or more programs by a processor

• Multiprocessing - The coordinated processing of two or more programs by a processor that contains parallel processors

CPU States• Run - The CPU is executing instructions for the current process• Wait - The process is waiting for a defined event to occur, such

as retrieving data from a hard disk• Sleep - The process is suspended and waiting for its next time

slice in the CPU, or a given event to occur such as an alarm• Masked/interruptible state - Interrupts are implemented to allow

system events to be synchronized. For example, if the masked bit is not set, the interruption is disabled (masked off)

Page 6: 3. security architecture and models

The Architectures Cont… MemoryMemory

Random Access Memory (RAM) Dynamic Random Access Memory (DRAM) Extended Data Output RAM (EDO RAM) Synchronous DRAM (SDRAM) Double Data Rate SDRAM (DDR SDRAM) Burst Extended Data Output DRAM (BEDO DRAM)

Read-Only Memory (ROM) Programmable Read-Only Memory (PROM) Erasable and Programmable Read-Only Memory

(EPROM) Electrically Erasable Programmable Read-Only

Memory (EEPROM)

Flash Memory

Page 7: 3. security architecture and models

The Architectures Cont… StorageStorage

• Primary - Main memory directly accessible to the CPU• Secondary - Nonvolatile storage medium• Real - A program is given a definite storage location

in memory• Virtual - The ability to extend the apparent size of

RAM• Volatile - RAM• Nonvolatile – ROM and Secodary storage devices• Write-Once Read Memory -

Page 8: 3. security architecture and models

The Architectures Cont… Network Environment - A data communication system allowing

a number of devices to communicate with each other• Local Environment• Shared Environment• Security Environments

• Dedicated security mode -processing of one particular type or classification of information

• System high-security mode – system hardware/software is only trusted to provide need-to-know protection between users

• Multi-level security mode - allows two or more classification levels

• Controlled mode - type of multi-level security in which a more limited amount of trust

• Compartmentalized security mode - process two or more types of compartmented information

Enterprise Architecture - Systematically derived and captured structural descriptions

Page 9: 3. security architecture and models

Related DefinitionsRelated Definitions Access control - Prevention of unauthorized use or Access control - Prevention of unauthorized use or

misuse of a systemmisuse of a system ACL - Access control list ACL - Access control list Access Mode - An operation on an object Access Mode - An operation on an object

recognized by the security mechanisms - think recognized by the security mechanisms - think read, write or execute actions on filesread, write or execute actions on files

Accountability- Actions can be correlated to an Accountability- Actions can be correlated to an entityentity

Accreditation - Approval to operate in a given Accreditation - Approval to operate in a given capacity in a given environmentcapacity in a given environment

Asynchronous attack - An attack exploiting the Asynchronous attack - An attack exploiting the time lapse between an attack action and a time lapse between an attack action and a system reactionsystem reaction

Page 10: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Audit trail - Records that document actions on or Audit trail - Records that document actions on or

against a systemagainst a system Bounds Checking - Within a program, the process Bounds Checking - Within a program, the process

of checking for references outside of declared of checking for references outside of declared limits. When bounds checking is not employed, limits. When bounds checking is not employed, attacks such as buffer overflows are possibleattacks such as buffer overflows are possible

Compartmentalization - Storing sensitive data in Compartmentalization - Storing sensitive data in isolated blocks isolated blocks

Configuration Control - management and control of Configuration Control - management and control of changes to a system’s hardware, firmware, changes to a system’s hardware, firmware, software, and documentationsoftware, and documentation

confinement - Ensuring data cannot be abused confinement - Ensuring data cannot be abused when a process is executing a borrowed program when a process is executing a borrowed program and has some access to that dataand has some access to that data

Page 11: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Contamination – Corruption of data of varying Contamination – Corruption of data of varying

classification levelsclassification levels Correctness Proof - Mathematical proof of Correctness Proof - Mathematical proof of

consistency between a specification and consistency between a specification and implementationimplementation

Countermeasure - anything that neutralizes Countermeasure - anything that neutralizes vulnerabilityvulnerability

Covert Channel - A communication channel that Covert Channel - A communication channel that allows cooperating processes to transfer information allows cooperating processes to transfer information in a way that violates a system’s security policyin a way that violates a system’s security policy• covert storage channel involves memory shared by processescovert storage channel involves memory shared by processes

• covert timing channel involves modulation of system resource covert timing channel involves modulation of system resource usage (like CPU time)usage (like CPU time)

Page 12: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Criticality - Importance of system to missionCriticality - Importance of system to mission Cycle - One cycle consists of writing a zero, then Cycle - One cycle consists of writing a zero, then

a 1 in every possible locationa 1 in every possible location Data Contamination - Deliberate or accidental Data Contamination - Deliberate or accidental

change in the integrity of datachange in the integrity of data Discretionary Access Control - An entity with Discretionary Access Control - An entity with

access privileges can pass those privileges on to access privileges can pass those privileges on to other entitiesother entities

Mandatory Access control - Requires that access Mandatory Access control - Requires that access control policy decisions are beyond the control of control policy decisions are beyond the control of the individual owner of an object (think military the individual owner of an object (think military security classification)security classification)

Page 13: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… DoD Trusted Computer System Evaluation Criteria DoD Trusted Computer System Evaluation Criteria

(TCSEC) - orange book(TCSEC) - orange book Firmware - software permanently stored in Firmware - software permanently stored in

hardware device (ROM, read only memory)hardware device (ROM, read only memory) Formal Proof - Mathematical argumentFormal Proof - Mathematical argument Hacker/Cracker – Individual who cause DamageHacker/Cracker – Individual who cause Damage Logic bomb - An unauthorized action triggered by Logic bomb - An unauthorized action triggered by

a system statea system state Malicious logic - Evil hardware, software, or Malicious logic - Evil hardware, software, or

firmware included by malcontents for firmware included by malcontents for malcontentsmalcontents

Page 14: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Principle of Least Privilege - Every entity granted Principle of Least Privilege - Every entity granted

least privileges necessary to perform assigned least privileges necessary to perform assigned taskstasks

Memory bounds - The limits in a range of storage Memory bounds - The limits in a range of storage addresses for a protected memory regionaddresses for a protected memory region

Piggy Back - Unauthorized system via another’s Piggy Back - Unauthorized system via another’s authorized access (shoulder surfing is similar)authorized access (shoulder surfing is similar)

Privileged Instructions - Set of instructions Privileged Instructions - Set of instructions generally executable only when system is generally executable only when system is operating in executive stateoperating in executive state

Reference Monitor - A security control which Reference Monitor - A security control which controls subjects’ access to resources - an controls subjects’ access to resources - an example is the security kernel for a given example is the security kernel for a given hardware basehardware base

Page 15: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Resource - Anything used while a system is functioning Resource - Anything used while a system is functioning

(eg CPU time, memory, disk space)(eg CPU time, memory, disk space) Resource encapsulation - Property which states Resource encapsulation - Property which states

resources cannot be directly accessed by subjects resources cannot be directly accessed by subjects because subject access must be controlled by the because subject access must be controlled by the reference monitorreference monitor

Security Kernel - Hardware/software/firmware Security Kernel - Hardware/software/firmware elements of the Trusted Computing Base - security elements of the Trusted Computing Base - security kernel implements the reference monitor concept kernel implements the reference monitor concept

Trusted Computing Base - From the TCSEC, the portion Trusted Computing Base - From the TCSEC, the portion of a computer system which contains all elements of of a computer system which contains all elements of the system responsible for supporting the security the system responsible for supporting the security policy and supporting the isolation of objects on which policy and supporting the isolation of objects on which the protection is based -follows the reference monitor the protection is based -follows the reference monitor conceptconcept

Page 16: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… TCSEC - Trusted Computer Security Evaluation TCSEC - Trusted Computer Security Evaluation

Criteria - Evaluation Guides other than the Criteria - Evaluation Guides other than the Orange Book Orange Book

ITSEC - Information Technology Security ITSEC - Information Technology Security Evaluation Criteria (European)Evaluation Criteria (European)

CTCPEC - Canadian Trusted Computer Product CTCPEC - Canadian Trusted Computer Product Evaluation CriteriaEvaluation Criteria

CC - Common CriteriaCC - Common Criteria

Page 17: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont… Trusted SystemTrusted System

• follows from TCBfollows from TCB• A system that can be expected to meet users’ A system that can be expected to meet users’

requirements for reliability, security, effectiveness due requirements for reliability, security, effectiveness due to having undergone testing and validationto having undergone testing and validation

System AssuranceSystem Assurance• the trust that can be placed in a system, and the the trust that can be placed in a system, and the

trusted ways the system can be proven to have been trusted ways the system can be proven to have been developed, tested, maintained, etc.developed, tested, maintained, etc.

Page 18: 3. security architecture and models

TCB Levels (from TCSEC)TCB Levels (from TCSEC) D - Minimal protectionD - Minimal protection C - Discretionary ProtectionC - Discretionary Protection

• C1 cooperative users who can protect their own infoC1 cooperative users who can protect their own info• C2 more granular DAC, has individual accountabilityC2 more granular DAC, has individual accountability

B - Mandatory ProtectionB - Mandatory Protection• B1 Labeled Security ProtectionB1 Labeled Security Protection• B2 Structured ProtectionB2 Structured Protection• B3 Security DomainsB3 Security Domains

A - Verified ProtectionA - Verified Protection• A1 Verified DesignA1 Verified Design

Page 19: 3. security architecture and models

Related Definitions Cont…Related Definitions Cont…

Virus - program that can infect other programsVirus - program that can infect other programs Worm - program that propagates but doesn’t Worm - program that propagates but doesn’t

necessarily modify other programsnecessarily modify other programs Bacteria or rabbit - programs that replicate Bacteria or rabbit - programs that replicate

themselves to overwhelm system resourcesthemselves to overwhelm system resources Back Doors - trap doors - allow unauthorized Back Doors - trap doors - allow unauthorized

access to systemsaccess to systems Trojan horse - malicious program masquerading Trojan horse - malicious program masquerading

as a benign programas a benign program

Page 20: 3. security architecture and models

The Security KernelThe Security Kernel

Page 21: 3. security architecture and models

General Operating System Protection User identification and authentication Mandatory access control Discretionary access control Complete mediation Object reuse protection Audit Protection of audit logs Audit log reduction Trusted path Intrusion detection

Page 22: 3. security architecture and models

Network Protection Hash totals Recording of sequence checking Transmission logging Transmission error correction Invalid login, modem error, lost connections, CPU

failure, disk error, line error, etc. Retransmission control

Page 23: 3. security architecture and models

The BIG ThreeThe BIG Three ConfidentialityConfidentiality

• Unauthorized users cannot access dataUnauthorized users cannot access data IntegrityIntegrity

• Unauthorized users cannot manipulate/destroy dataUnauthorized users cannot manipulate/destroy data AvailabilityAvailability

• Unauthorized users cannot make system resources Unauthorized users cannot make system resources unavailable to legitimate usersunavailable to legitimate users

Page 24: 3. security architecture and models

Security ModelsSecurity ModelsBell-LaPadulaBell-LaPadulaBibaBibaClark & WilsonClark & WilsonNon-interferenceNon-interferenceState machineState machineAccess MatrixAccess MatrixInformation flowInformation flow

Page 25: 3. security architecture and models

Bell-LaPadulaBell-LaPadula A state machine model capturing the A state machine model capturing the

confidentiality aspects of access controlconfidentiality aspects of access control

Page 26: 3. security architecture and models

Biba Integrity ModelBiba Integrity Model The Biba integrity model mathematically

describes read and write restrictions based on integrity access classes of subjects and objects (Biba used the terms “integrity level” and “integrity compartments”)

Page 27: 3. security architecture and models

Clark & Wilson ModelClark & Wilson Model An Integrity Model, like BibaAn Integrity Model, like Biba Addresses all 3 integrity goalsAddresses all 3 integrity goals

• Prevents unauthorized users from making Prevents unauthorized users from making modificationsmodifications

• Maintains internal and external consistencyMaintains internal and external consistency• Prevents authorized users from making improper Prevents authorized users from making improper

modificationsmodifications T - cannot be Tampered with while being T - cannot be Tampered with while being

changedchanged L - all changes must be LoggedL - all changes must be Logged C - Integrity of data is ConsistentC - Integrity of data is Consistent

Page 28: 3. security architecture and models

Clark & Wilson Model Cont…Clark & Wilson Model Cont… Proposes “Well Formed Transactions”Proposes “Well Formed Transactions”

• perform steps in orderperform steps in order• perform exactly the steps listedperform exactly the steps listed• authenticate the individuals who perform the stepsauthenticate the individuals who perform the steps

Calls for separation of dutyCalls for separation of duty Well-formed transaction - The process and data

items can be changed only by a specific set of trusted programs

Page 29: 3. security architecture and models

More ModelsMore Models Access matrix model - A state machine model for Access matrix model - A state machine model for

a discretionary access control environmenta discretionary access control environment

Information flow model - simplifies analysis of Information flow model - simplifies analysis of covert channelscovert channels• A variant of the access control model• Attempts to control the transfer of information from

one object into another object• helps to find covert channelshelps to find covert channels

Page 30: 3. security architecture and models

More Models Cont…More Models Cont… Noninterference model - Covers ways to prevent Noninterference model - Covers ways to prevent

subjects operating in one domain from affecting subjects operating in one domain from affecting each other in violation of security policyeach other in violation of security policy

State machine model - Abstract mathematical State machine model - Abstract mathematical model consisting of state variables and transition model consisting of state variables and transition functionsfunctions

Chinese Wall Model – provides a model for access Chinese Wall Model – provides a model for access rules in a consultancy business where analysts rules in a consultancy business where analysts have to make sure that no conflicts of interest have to make sure that no conflicts of interest arisearise

Lattice Model - The higher up in secrecy, the Lattice Model - The higher up in secrecy, the more constraints on the data; the lower in more constraints on the data; the lower in secrecy, the less constraints on the datasecrecy, the less constraints on the data

Page 31: 3. security architecture and models

Certification & AccreditationCertification & Accreditation Procedures and judgements to determine the Procedures and judgements to determine the

suitability of a system to operate in a target suitability of a system to operate in a target operational environmentoperational environment

Certification considers system in operational Certification considers system in operational environmentenvironment

Accreditation is the official management decision Accreditation is the official management decision to operate a systemto operate a system

Page 32: 3. security architecture and models

IPSECIPSEC

IETF updated 1997, 1998IETF updated 1997, 1998 Addresses security at IP layerAddresses security at IP layer Key goals:Key goals:

• authenticationauthentication• encryptionencryption

ComponentsComponents• IP Authentication Header (AH)IP Authentication Header (AH)• Encapsulating Security Payload (ESP)Encapsulating Security Payload (ESP)• Both are vehicles for access controlBoth are vehicles for access control• Key management via ISAKMPKey management via ISAKMP

Page 33: 3. security architecture and models

Network/Host Security ConceptsNetwork/Host Security Concepts Security Awareness ProgramSecurity Awareness Program CERT/CIRTCERT/CIRT Errors of omission vs. correctionErrors of omission vs. correction physical securityphysical security dial-up securitydial-up security Host vs. network security controlsHost vs. network security controls WrappersWrappers Fault Tolerance Fault Tolerance

Page 34: 3. security architecture and models

TEMPESTTEMPEST Electromagnetic shielding standardElectromagnetic shielding standard Mostly for DoD communication EquipmentsMostly for DoD communication Equipments Currently not widely usedCurrently not widely used See “accreditation” - i.e. acceptance of riskSee “accreditation” - i.e. acceptance of risk

Page 35: 3. security architecture and models

??