access control: dac and mac/lbacauthentication acl's require authentication of subjects and acl...

67
1 Access Control: DAC and MAC/LBAC Prof. Ravi Sandhu Executive Director and Endowed Chair Lecture 2 [email protected] www.profsandhu.com © Ravi Sandhu World-Leading Research with Real-World Impact! CS 6393

Upload: others

Post on 25-Jul-2020

16 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

1

Access Control: DAC and MAC/LBAC

Prof. Ravi SandhuExecutive Director and Endowed Chair

Lecture 2

[email protected]

© Ravi Sandhu World-Leading Research with Real-World Impact!

CS 6393

Page 2: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 2World-Leading Research with Real-World Impact!

Authentication, Authorization, Audit

AAA

Authorization

What are YouAllowed to Do?

Authentication

Who are You?

Audit

What Did You Do?

siloed integrated

Page 3: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 3World-Leading Research with Real-World Impact!

Access Control

Discretionary Access Control (DAC), 1970

Mandatory Access Control (MAC), 1970

Role Based Access Control (RBAC), 1995

Attribute Based Access Control (ABAC), ????

Fixedpolicy

Flexiblepolicy

Page 4: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

4

Access Matrix Model

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 5: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 5World-Leading Research with Real-World Impact!

Access Matrix Model

U r wown

V

F

Subjects

Objects (and Subjects)

r wown

G

r

rights

Page 6: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Basic Abstractions Subjects Objects Rights

The rights in a cell specify the access of the subject (row) to the object (column)

© Ravi Sandhu 6World-Leading Research with Real-World Impact!

Access Matrix Model

Page 7: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

A subject is a program (application) executing on behalf of a user

A user may at any time be idle, or have one or more subjects executing on its behalf

User-subject distinction is important if subject’s rights are different from a user’s rightsUsually a subset In many systems a subject has all the rights of a user

A human user may manifest as multiple users (accounts, principals) in the system

© Ravi Sandhu 7World-Leading Research with Real-World Impact!

Users and Subjects

Page 8: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 8World-Leading Research with Real-World Impact!

Users and Subjects

JOE

JOE.TOP-SECRET

JOE.SECRET

JOE.UNCLASSIFIED

JOE.CONFIDENTIAL

USER SUBJECTS

Page 9: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 9World-Leading Research with Real-World Impact!

Users and Subjects

JANE

JANE.CHAIRPERSON

JANE.FACULTY

JANE.SUPER-USER

JANE. EMPLOYEE

USER SUBJECTS

Page 10: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

An object is anything on which a subject can perform operations (mediated by rights)

Usually objects are passive, for example:FileDirectory (or Folder)Memory segmentwith CRUD operations (create, read, update, delete)

But, subjects can also be objects, with operationskillsuspend resume

© Ravi Sandhu 10World-Leading Research with Real-World Impact!

Objects

Page 11: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 11World-Leading Research with Real-World Impact!

Access Matrix Model

U r wown

W

F

Subjects

Objects (and Subjects)W

parent

r wown

Page 12: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Access Control Lists Capabilities Relations

© Ravi Sandhu 12World-Leading Research with Real-World Impact!

Implementation

Page 13: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 13World-Leading Research with Real-World Impact!

Access Control Lists

FU:rU:wU:own

G

U:r

V:r

V:w

V:own

each column of the access matrix is stored with the object corresponding to

that column

Page 14: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 14World-Leading Research with Real-World Impact!

Capabilities

each row of the access matrix is stored with the subject corresponding to that row

U F/r, F/w, F/own, G/r

V G/r, G/w, G/own

Page 15: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 15World-Leading Research with Real-World Impact!

Relations

Subject Access ObjectU r FU w FU own FU r GV r GV w GV own G

commonly used in relational database management systems

Page 16: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Authentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control

Access review ACL's are superior on a per-object basis Capabilities are superior on a per-subject basis

Revocation ACL's are superior on a per-object basis Capabilities are superior on a per-subject basis

Least privilege Capabilities provide for finer grained least privilege control with respect to

subjects, especially dynamic short-lived subjects created for specific tasks

© Ravi Sandhu 16World-Leading Research with Real-World Impact!

ACLs versus Capabilities

Page 17: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Authentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control

Access review ACL's are superior on a per-object basis Capabilities are superior on a per-subject basis

Revocation ACL's are superior on a per-object basis Capabilities are superior on a per-subject basis

Least privilege Capabilities provide for finer grained least privilege control with respect to

subjects, especially dynamic short-lived subjects created for specific tasks

© Ravi Sandhu 17World-Leading Research with Real-World Impact!

ACLs versus Capabilities

Most Operating Systems use ACLs often in abbreviated form: owner, group, world

Page 18: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

content dependent controlsyou can only see salaries less than 50K, oryou can only see salaries of employees who

report to you

beyond the scope of Operating Systems and are provided by Database Management Systems

© Ravi Sandhu 18World-Leading Research with Real-World Impact!

Content-Dependent Controls

Page 19: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

context dependent controls cannot access classified information via remote login salary information can be updated only at year end company's earnings report is confidential until

announced at the stockholders meeting can be partially provided by the Operating System

and partially by the Database Management System more sophisticated context dependent controls

such as based on past history of accesses definitely require Database support

© Ravi Sandhu 19World-Leading Research with Real-World Impact!

Context-Dependent Controls

Page 20: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Information from an object which can be read can be copied to any other object which can be written by a subject

Suppose our users are trusted not to do this deliberately. It is still possible for Trojan Horses to copy information from one object to another.

© Ravi Sandhu 20World-Leading Research with Real-World Impact!

Trojan Horse Vulnerability of DAC

Page 21: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 21World-Leading Research with Real-World Impact!

Trojan Horse Vulnerability of DAC

File FA:r

File GB:rA:w

User B cannot read file F

ACL

Page 22: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 22World-Leading Research with Real-World Impact!

Trojan Horse Vulnerability of DAC

File FA:r

File GB:rA:w

User B can read contents of file F copied to file G

ACLUser A

Program Goodies

Trojan Horse

executes

read

write

Page 23: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Read of a digital copy is as good as read of original

Write to a digital copy is not so useful

© Ravi Sandhu 23World-Leading Research with Real-World Impact!

Copy Difference for rw

Page 24: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Chains of grants and revokes Inheritance of permissions Negative rights

© Ravi Sandhu 24World-Leading Research with Real-World Impact!

DAC Subtleties

Page 25: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

25

Denning’s Axiomsfor

Information Flow

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 26: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 26World-Leading Research with Real-World Impact!

Denning’s Axioms

< SC, →, ⊕ >

SC set of security classes

→ ⊆ SC X SC flow relation (i.e., can-flow)

⊕: SC X SC -> SC class-combining operator

Page 27: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 27World-Leading Research with Real-World Impact!

Denning’s Axioms

< SC, →, ⊕ >

1. SC is finite

2. → is a partial order on SC (i.e., reflexive, transitive, anti-symmetric)

3. SC has a lower bound L such that L → A for all A ∈ SC

4. ⊕ is a least upper bound (lub) operator on SC

Justification for 1 and 2 is stronger than for 3 and 4. In practice we may have a partially ordered set (poset).

Page 28: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 28World-Leading Research with Real-World Impact!

Denning’s Axioms Imply

SC is a universally bounded lattice

There exists a Greatest Lower Bound (glb) operator ⊗ (also called meet)

There exists a highest security class H

Page 29: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 29World-Leading Research with Real-World Impact!

Lattice Structures

Unclassified

Confidential

Secret

Top SecretHierarchical

Classes

can-flowreflexive and transitive edges

are implied but not shown

Page 30: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 30World-Leading Research with Real-World Impact!

Lattice Structures

{ARMY, CRYPTO}Compartmentsand Categories

{ARMY } {CRYPTO}

{}

Page 31: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 31World-Leading Research with Real-World Impact!

Lattice Structures

Compartmentsand Categories{ARMY, NUCLEAR, CRYPTO}

{ARMY, NUCLEAR} {ARMY, CRYPTO} {NUCLEAR, CRYPTO}

{ARMY} {NUCLEAR} {CRYPTO}

{}

Page 32: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 32World-Leading Research with Real-World Impact!

Lattice Structures

HierarchicalClasses with

CompartmentsTS

S

{A,B}

{}

{A} {B}

product of 2 lattices is a lattice

Page 33: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 33World-Leading Research with Real-World Impact!

Lattice Structures

HierarchicalClasses with

Compartments

product of 2 lattices is a lattice

S,

{A,B}

{}

{A} {B}S, S,

S,

TS,

{A,B}

{}

{A} {B}TS, TS,

TS,

Page 34: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Smith’s Lattice

TS-W

S-W

TS

S

C

U

S-L

S-LW

S-A

TS-XTS-L TS-K TS-Y TS-Q TS-Z TS-X

TS-KL

TS-KLXTS-KY TS-KQZ

TS-AKLQWXYZ

© Ravi Sandhu World-Leading Research with Real-World Impact! 34

Page 35: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 35World-Leading Research with Real-World Impact!

Smith’s Lattice

With large lattices a vanishingly small fraction of the labels will actually be used

Smith's lattice: 4 hierarchical levels, 8 compartments

number of possible labels = 4*2^8 = 1024Only 21 labels are actually used (2%)

Consider 16 hierarchical levels, 64 compartments which gives 10^20 labels

Page 36: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 36World-Leading Research with Real-World Impact!

Extending a POSET to a Lattice

{A} {B}

such extensionis always possible

{A,B,C} {A,B,D}

{A} {B}

{A,B,C} {A,B,D}

{A,B,C,D}

{}

{A,B}

Page 37: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

37

BLP Modelfor

Confidentiality

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 38: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 38World-Leading Research with Real-World Impact!

BLP Basic Assumptions

SUB = {S1, S2, ..., Sm}, a fixed set of subjects

OBJ = {O1, O2, ..., On}, a fixed set of objects

R = {r, w}, a fixed set of rights

D, an m×n discretionary access matrix with D[i,j] ⊆ R

M, an m×n current access matrix with M[i,j] ⊆ R

Page 39: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 39World-Leading Research with Real-World Impact!

BLP Model (Liberal -Property)

Lattice of confidentiality labels Λ = {λ1, λ2, ..., λp}

Static assignment of confidentiality labels λ: SUB ∪ OBJ → Λ

M, an m × n current access matrix with

r ∈ M[i,j] ⇒ r ∈ D[i,j] ∧ λ(Si) ≥ λ (Oj) simple security

w ∈ M[i,j] ⇒ w ∈ D[i,j] ∧ λ(Si) ≤ λ (Oj) liberal -property

Page 40: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 40World-Leading Research with Real-World Impact!

BLP Model (Strict -Property)

Lattice of confidentiality labels Λ = {λ1, λ2, ..., λp}

Static assignment of confidentiality labels λ: SUB ∪ OBJ → Λ

M, an m × n current access matrix with

r ∈ M[i,j] ⇒ r ∈ D[i,j] ∧ λ(Si) ≥ λ (Oj) simple security

w ∈ M[i,j] ⇒ w ∈ D[i,j] ∧ λ(Si) = λ (Oj) strict -property

Page 41: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

BLP vis a vis Lattices

© Ravi Sandhu World-Leading Research with Real-World Impact! 41

Unclassified

Confidential

Secret

Top Secret

can-flowdominance≥

Page 42: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

BLP vis a vis Lattices

© Ravi Sandhu World-Leading Research with Real-World Impact! 42

Unclassified

Confidential

Secret

Top Secret

can-flowdominance≥

it is risky to visualize lattices as total orders but it is ok sometimes

Page 43: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

BLP vis a vis Lattices

© Ravi Sandhu World-Leading Research with Real-World Impact! 43

can-flowdominance≥

often 2 levels suffice to make the main point

H (High)

L (Low)

Page 44: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 44World-Leading Research with Real-World Impact!

-Property

Applies to subjects not to users

Users are trusted (must be trusted) not to disclose secret information outside of the computer system

A user can login (create a subject) with any label dominated by the user’s clearance

Subjects are not trusted because they may have Trojan Horses embedded in the code they execute

-property prevents deliberate leakage and does not address

inference

covert channels

Simple-security and -Property do not account for

encryption

Page 45: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

45

Biba Modelfor

Integrity

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 46: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

BLP Revisited

© Ravi Sandhu World-Leading Research with Real-World Impact! 46

can-flowdominance≥

HS (High Secrecy)

LS (Low Secrecy)

Page 47: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Biba Inverted Flow

© Ravi Sandhu World-Leading Research with Real-World Impact! 47

can-flowdominance≥

HI (High Integrity)

LI (Low Integrity)

Page 48: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Biba and BLP Aligned: BLP Style

© Ravi Sandhu World-Leading Research with Real-World Impact! 48

can-flowdominance≥

HS (High Secrecy)

LS (Low Secrecy)

LI (Low Integrity)

HI (High Integrity)

One-directional flow is the key pointNo need for opposite directions for

confidentiality and integrity

Page 49: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

Biba and BLP Aligned: Biba Style

© Ravi Sandhu World-Leading Research with Real-World Impact! 49

can-flowdominance≥

LS (Low Secrecy)

HS (High Secrecy)

HI (High Integrity)

LI (Low Integrity)

One-directional flow is the key pointNo need for opposite directions for

confidentiality and integrity

Page 50: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

BLP-Biba Unified Lattice: BLP Style

© Ravi Sandhu World-Leading Research with Real-World Impact! 50

HS

LS

LI

HI

BLP BIBA

HS, LI

HS, HI LS, LI

LS, HI

Unifiedcan-flowdominance

Page 51: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 51World-Leading Research with Real-World Impact!

BLP versus Biba

BLP and Biba are fundamentally equivalent and interchangeable

Lattice-based access control is a mechanism for enforcing one-way information flow, which can be applied to confidentiality or integrity goals

We will use the BLP formulation:

high confidentiality, low integrity at the top

low confidentiality, high integrity at the bottom

Page 52: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

52

The Chinese Wall Latticefor

Separation of Duty

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 53: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 53World-Leading Research with Real-World Impact!

Chinese Wall Policy

A commercial security policy for separation of duty driven confidentiality

Mixture of free choice (discretionary) and mandatory controls

Requires some kind of dynamic labelling

Page 54: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 54World-Leading Research with Real-World Impact!

Chinese Wall Policy

COMPANYDATASETS

INDIVIDUALOBJECTS

ALL OBJECTSCONFLICT OF

INTEREST CLASSES

A consultant can access information about at most one company in each conflict of interest class

Page 55: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 55World-Leading Research with Real-World Impact!

Chinese Wall Example

BANKS OIL COMPANIES

A B X Y

Page 56: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 56World-Leading Research with Real-World Impact!

Chinese Wall Lattice

A, - B, --, X -, Y

A, X A, Y B, X B, Y

SYSHIGH

SYSLOW

Page 57: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

57

Conclusion

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 58: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 58World-Leading Research with Real-World Impact!

MAC or LBAC or BLP (or Biba)

BLP enforces one-directional information flow in a lattice of security labels

BLP can enforce one-directional information flow policies for Confidentiality

Integrity

Separation of duty

Combinations thereof

Policy

Enforcement

Page 59: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

59

Covert Channels

© Ravi Sandhu World-Leading Research with Real-World Impact!

Page 60: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 60World-Leading Research with Real-World Impact!

Covert Channels

A covert channel is a communication channel based on the use of system resources not normally intended for communication between subjects (processes)

Page 61: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 61World-Leading Research with Real-World Impact!

Covert Channels

Low User

High Trojan HorseInfected SubjectHigh User

Low Trojan HorseInfected Subject

COVERTCHANNEL

Information is leaked unknown to the high user

Page 62: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 62World-Leading Research with Real-World Impact!

Covert Channels

Low User

High Trojan HorseInfected SubjectHigh User

Low Trojan HorseInfected Subject

COVERTCHANNEL

Information is leaked unknown to the high user

-property prevents overt leakage of information and does not address covert channels

Page 63: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 63World-Leading Research with Real-World Impact!

Side Channels

User 2

User 1’s SubjectUser 1

User 2’s Trojan Horse

Infected Subject

SIDECHANNEL

Information is leaked unknown to the User 1

Page 64: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 64World-Leading Research with Real-World Impact!

Covert Channels versus Side Channels

Covert channels require a cooperating sender and receiver

Side channels do not require a sender but nevertheless information is leaked to a receiver

Page 65: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 65World-Leading Research with Real-World Impact!

Coping with Covert/Side Channels

Identify the channel

close the channel or slow it down

detect attempts to use the channel

tolerate its existence

Page 66: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 66World-Leading Research with Real-World Impact!

Storage Channels

Also known as Resource Exhaustion Channels

Given 5GB pool of dynamically allocated memory

HIGH PROCESS (sender)bit = 1 ⇒ request 5GB of memorybit = 0 ⇒ request 0GB of memory

LOW PROCESS (receiver)request 5GB of memory if allocated then bit = 0 otherwise bit = 1

Page 67: Access Control: DAC and MAC/LBACAuthentication ACL's require authentication of subjects and ACL integrity Capabilities require integrity and propagation control Access review ACL's

© Ravi Sandhu 67World-Leading Research with Real-World Impact!

Timing Channels

Also known as Load Sensing Channels

Given 5GB pool of dynamically allocated memory

HIGH PROCESS (sender)bit = 1 ⇒ enter computation intensive loop bit = 0 ⇒ go to sleep

LOW PROCESS (receiver)perform a task with known computational requirementif completed promptly then bit = 0 otherwise bit = 1