1
play

1 Multilevel Security Different security levels for resources - PDF document

Last time Threats Introduction Threat analysis Policy Introduction to access Specification control matrix Design Implementation Operation and Maintenance 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 1 Security in the


  1. Last time Threats • Introduction • Threat analysis Policy • Introduction to access Specification control matrix Design Implementation Operation and Maintenance 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 1 Security in the Course • Lectures – Introduction – Threat analysis – Introduction to access control matrix – Security policies (today) – Cryptography – Key management – Authentication – Design principles – Access control mechanisms – Assurance – The future • Literature 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 2 Today • Multilevel and multilateral security • Security policies • Confidentiality Policies – The Bell-LaPadula Model • Integrity Policies – The Biba Integrity Model • Hybrid Policies – The Chinese Wall Model 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 3 1

  2. Multilevel Security • Different security levels for resources • Important systems – A lot of research is done – Products for military applications can have a second chance • Firewalls, web servers, etc. – Often applied in the wrong context and in the wrong way 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 4 Multilateral Security • To protect information from leaking between compartments on the same level • Different types – Organizations – Privilege-based – A mix 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 5 Security Policy A security policy defines “secure” for a system or a set of system. • Purpose and goal • A foundation for the choice of security mechanisms • Who is responsible for what • What is allowed and what is not allowed • Why the policy looks like it do – important! 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 6 2

  3. Security Policy Def. A security policy is a statement that partitions the states of the system into a set of authorized , or secure , states and a set of unauthorized , or nonsecure , states. Def. A secure system is a system that starts in an authorized state and cannot enter an unauthorized state. Def. A breach of security occurs when a system enters an unauthorized state. 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 7 Confidentiality Def. Let X be a set of entities and let I be some information. Then I has the property of confidentiality with respect to X if no member of X can obtain information about I . 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 8 Integrity Def. Let X be a set of entities and let I be some information or a resource. Then I has the property of integrity with respect to X if all members of X trust I . 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 9 3

  4. Availability Def. Let X be a set of entities and let I be a resource. Then I has the property of availability with respect to X if all members of X can access I . 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 10 Types of security policies • Confidentiality policy – Identifies those states that can leak information • Integrity policy – Identifies authorized ways in which information may be altered and entities authorized to alter it • Formal statement of the policy – If the system is to be provably secure • In practice – Informal statements that assumes that the reader understands the context in which the policy is issued 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 11 Security Mechanism and Model Def. A security mechanism is an entity or procedure that enforces some part of the security policy. Def. A security model is a model that represents a particular policy or set of policies. 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 12 4

  5. Types of security policies Def. A military security policy (also called a governmental security policy ) is a security policy developed primarily to provide confidentiality. Def. A commercial security policy is a security policy developed primarily to provide integrity. Def. A confidentiality policy is a security policy dealing only with confidentiality. Def. A integrity policy is a security policy dealing only with integrity. 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 13 The Role of Trust • An example: A system administrator receives a security patch – Assumes that the patch came from the vendor and was not tampered in transit – Assumes that the vendor tested the patch thoroughly – Assumes that the vendor’s test environment corresponds to her environment – Assumes that the patch is installed correctly • Any security policy, mechanism, or procedure is based on assumptions 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 14 Types of Access Control Def. If an individual user can set an access control mechanism to allow or deny access to an object, that mechanism is a discretionary access control (DAC), also called an identity-based access control (IBAC). Def. When a system mechanism controls access to an object and an individual user cannot alter that access, the control is a mandatory access control (MAC), occasionally called a rule-based access control . Def. An originator controlled access control (ORCON or ORGCON) bases access on the creator of an object (or the information it contains). 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 15 5

  6. Discretionary Access Control Foo Bar Sam RWX RWX Alice --X --X Capabilities Bob R-X R-- ACL 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 16 Confidentiality Policies • Common in military systems • Also called information flow policy • Models – The Bell-LaPadula Model – Extensions of the Bell-LaPadula Model 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 17 The Bell-LaPadula Security Policy Model • The simplest and most known, 1973 • Trusted Computing Base (TCB) – The set of components you trust • Classification and clearance • Information flow control – No process can read information on a higher level – no-read-up – No process can write information to a lower level – no-write-down 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 18 6

  7. The Bell-LaPadula Model • Classify information A subject has a security clearance – In a linear ordering: • The higher the security clearance, the more sensitive the – information An object has a security classification – Also in a linear ordering • • The goal is to prevent read access to objects at a security classification higher than the subject’s clearance • Combines mandatory and discretionary access control 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 19 The Bell-LaPadula Model • Notation L(S) = l s : security clearance of subject S – L(O) = l o : security classification of object O – • Linear ordering For all security classifications l i , i = 0, ..., k – 1, l i < l i +1 – Simple Security Condition (prel): S can read O iff l o ≤ l s and S has discretionary read access to O . *-property (prel): S can write O iff l s ≤ l o and S has discretionary write access to O . 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 20 Expanding The Bell-LaPadula Model • Add categories – From the “need to know”-principle • Example – Categories: NUC, EUR and US give these combinations • {}, {NUC}, {EUR}, {US}, {NUC, EUR}, {NUC, US}, {EUR, US} and {NUC, EUR, US} – Alice is cleared into: (SECRET, {EUR}) – Bob: (TOP SECRET, {NUC, US}) – DocA is classified as: (CONFIDENTIAL, {EUR}) 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 21 7

  8. Expanding The Bell-LaPadula Model Def. The security level (L, C) dominates (dom) the security level (L', C') iff L' ≤ L and C' ⊆ C. Simple Security Condition: S can read O iff S dom O and S has discretionary read access to O . *-property: S can write O iff O dom S and S has discretionary write access to O . 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 22 The Basic Security Theorem Theorem. Let Σ be a system with a secure initial state σ 0 , and let T be a set of state transformations. If every element of T preserves the simple security condition and the *-property, then every σ i , i ≥ 0, is secure. 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 23 Criticism of the Bell-LaPadula Model • The principle of tranquility states that subjects and objects may not change their security levels once they have been instantiated • The Bell-LaPadula model (as presented) says nothing about changing security levels • Strong and weak tranquility • There are other controversies also • But still the simplest, and yet so hard to implement 7/10 - 05 Distributed systems - Jonny Pettersson, UmU 24 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend