Accountability Daniel Bosk Department of Information and - - PowerPoint PPT Presentation

accountability
SMART_READER_LITE
LIVE PREVIEW

Accountability Daniel Bosk Department of Information and - - PowerPoint PPT Presentation

Book-Keeping Logging References Accountability Daniel Bosk Department of Information and Communication Systems, Mid Sweden University, SE-851 70 Sundsvall. 14th May 2018 Daniel Bosk MIUN IKS Accountability 1 Book-Keeping Logging


slide-1
SLIDE 1

Book-Keeping Logging References

Accountability

Daniel Bosk

Department of Information and Communication Systems, Mid Sweden University, SE-851 70 Sundsvall.

14th May 2018

Daniel Bosk MIUN IKS Accountability 1

slide-2
SLIDE 2

Book-Keeping Logging References

1 Book-Keeping

Double-Entry Book-Keeping Separation of Duties Clark-Wilson Security Policy Model

2 Logging

Securing Logging Mechanisms Schneier-Kelsey Logs

Daniel Bosk MIUN IKS Accountability 2

slide-3
SLIDE 3

Book-Keeping Logging References

1 Book-Keeping

Double-Entry Book-Keeping Separation of Duties Clark-Wilson Security Policy Model

2 Logging

Securing Logging Mechanisms Schneier-Kelsey Logs

Daniel Bosk MIUN IKS Accountability 3

slide-4
SLIDE 4

Book-Keeping Logging References Double-Entry Book-Keeping

The banks are one of the oldest institutions with a need for strict accountability. The main tools developed for this purpose is double-entry book-keeping.

Daniel Bosk MIUN IKS Accountability 4

slide-5
SLIDE 5

Book-Keeping Logging References Double-Entry Book-Keeping

Definition (Double-entry book-keeping) Add one entry of x and one of −x. Invariant of zero (x + (−x) = 0). Example All books should be balanced. A transfer from one account to another must be a credit in

  • ne account and a debit in the other.

I.e. when adding them up they equal zero.

Daniel Bosk MIUN IKS Accountability 5

slide-6
SLIDE 6

Book-Keeping Logging References Double-Entry Book-Keeping

This principle of keeping a balance of constant zero can be tranferred to other principles. E.g. for each log-in there should be a log-out. If the difference of number of log-ins Li for a user and the number of log-outs Lo is zero (Li − Lo = 0), then the user is not currently logged-in. Hence, the user shouldn’t be able to post a comment when the system is in this state.

Daniel Bosk MIUN IKS Accountability 6

slide-7
SLIDE 7

Book-Keeping Logging References Double-Entry Book-Keeping

Note Note that you shouldn’t use the book-keeping system to keep track of whether a user is logged-in or not. You can use more efficient mechanisms for that. But the account should be kept for future reference, in case something bad happens, then you should be able to see what really happened.

Daniel Bosk MIUN IKS Accountability 7

slide-8
SLIDE 8

Book-Keeping Logging References Separation of Duties

Definition (Separation of duties) Two or more entities must collude to break the policy. Two classes: dual control and functional separation.

Daniel Bosk MIUN IKS Accountability 8

slide-9
SLIDE 9

Book-Keeping Logging References Separation of Duties

Example (Dual control) Two or more staff members must act together to authorize a transaction. Example (Dual control on film) Two guys in a nuclear weapons silo. Two keys too far from each other for one to turn simultaneously. Both staffers must agree to turn the keys.

Daniel Bosk MIUN IKS Accountability 9

slide-10
SLIDE 10

Book-Keeping Logging References Separation of Duties

Example (Dual control) Two or more staff members must act together to authorize a transaction. Example (Dual control on film) Two guys in a nuclear weapons silo. Two keys too far from each other for one to turn simultaneously. Both staffers must agree to turn the keys.

Daniel Bosk MIUN IKS Accountability 9

slide-11
SLIDE 11

Book-Keeping Logging References Separation of Duties

Example (Functional separation) Two or more staff members must act on the transaction at different points in the transaction path. Example (Functional separation) Developer team writes the code. System administrators deploy it. Auditors verifies security.

Daniel Bosk MIUN IKS Accountability 10

slide-12
SLIDE 12

Book-Keeping Logging References Separation of Duties

Example (Functional separation) Two or more staff members must act on the transaction at different points in the transaction path. Example (Functional separation) Developer team writes the code. System administrators deploy it. Auditors verifies security.

Daniel Bosk MIUN IKS Accountability 10

slide-13
SLIDE 13

Book-Keeping Logging References Clark-Wilson Security Policy Model

The Clark-Wilson Security Policy Model is a model for securely implementing a security policy. It ensures internal consistency, i.e. properties of the internal state of the system. It also allows for external consistency, i.e. the relation of the internal state of the system to the real world. This must however be enforced by e.g. auditing.

Daniel Bosk MIUN IKS Accountability 11

slide-14
SLIDE 14

Book-Keeping Logging References Clark-Wilson Security Policy Model

Mechanisms for enforcing integrity of the system are:

Well-formed transactions Separation of duties

Definition (Well-formed transactions) A limited set of functions can manipulate an object. Users have access to these functions, not the objects.

Daniel Bosk MIUN IKS Accountability 12

slide-15
SLIDE 15

Book-Keeping Logging References Clark-Wilson Security Policy Model

Mechanisms for enforcing integrity of the system are:

Well-formed transactions Separation of duties

Definition (Well-formed transactions) A limited set of functions can manipulate an object. Users have access to these functions, not the objects.

Daniel Bosk MIUN IKS Accountability 12

slide-16
SLIDE 16

Book-Keeping Logging References Clark-Wilson Security Policy Model

Requirements

1 Subjects have to be identified and authenticated. 2 Objects can be manipulated only by a restricted set of

functions.

3 Subjects can execute only a restricted set of functions. 4 A proper audit log must be maintained. 5 The system has to be certified to work properly.

Daniel Bosk MIUN IKS Accountability 13

slide-17
SLIDE 17

Book-Keeping Logging References Clark-Wilson Security Policy Model

Definition (Unconstrained data item, UDI) Input from outside the system. From outside the control of the system. It can be anything! Definition (Constrained data item, CDI) Objects (data) inside the system. This is under the system’s control. This is well-formed.

Daniel Bosk MIUN IKS Accountability 14

slide-18
SLIDE 18

Book-Keeping Logging References Clark-Wilson Security Policy Model

Definition (Unconstrained data item, UDI) Input from outside the system. From outside the control of the system. It can be anything! Definition (Constrained data item, CDI) Objects (data) inside the system. This is under the system’s control. This is well-formed.

Daniel Bosk MIUN IKS Accountability 14

slide-19
SLIDE 19

Book-Keeping Logging References Clark-Wilson Security Policy Model

Note UDIs must be converted to CDIs. This is a critical part of the system.

Daniel Bosk MIUN IKS Accountability 15

slide-20
SLIDE 20

Book-Keeping Logging References Clark-Wilson Security Policy Model

Definition (Transformation procedure, TP) Procedure which manipulates CDIs. Can take UDI as input, must convert to CDI. Definition (Integrity verification procedure, IVP) Checks the integrity of a CDI.

Daniel Bosk MIUN IKS Accountability 16

slide-21
SLIDE 21

Book-Keeping Logging References Clark-Wilson Security Policy Model

Definition (Transformation procedure, TP) Procedure which manipulates CDIs. Can take UDI as input, must convert to CDI. Definition (Integrity verification procedure, IVP) Checks the integrity of a CDI.

Daniel Bosk MIUN IKS Accountability 16

slide-22
SLIDE 22

Book-Keeping Logging References Clark-Wilson Security Policy Model

Certification rules Should be checked so that the policy is consistent: CR1 IVPs must ensure integrity of CDIs when IVPs are run. CR2 TPs must be certified to be valid; valid CDIs transform into valid CDIs; each TP can access restricted set of CDIs. CR3 Access rules must satisfy separation-of-duties requirements. CR4 All TPs must write to an append-only log. CR5 Any TP handling UDI must convert it to a CDI or reject it.

Daniel Bosk MIUN IKS Accountability 17

slide-23
SLIDE 23

Book-Keeping Logging References Clark-Wilson Security Policy Model

Enforcement rules Describes the mechanisms needed in the system: ER1 Must maintain and protect list of CDIs each TP can access. ER2 Must maintain and protect list of TPs each subject can access. ER3 The system must authenticate each subject requesting to execute a TP. ER4 Only a subject that may certify an access rule for a TP may modify the respective entry in the list. This subject must not be allowed to execute this TP.

Daniel Bosk MIUN IKS Accountability 18

slide-24
SLIDE 24

Book-Keeping Logging References

1 Book-Keeping

Double-Entry Book-Keeping Separation of Duties Clark-Wilson Security Policy Model

2 Logging

Securing Logging Mechanisms Schneier-Kelsey Logs

Daniel Bosk MIUN IKS Accountability 19

slide-25
SLIDE 25

Book-Keeping Logging References Securing Logging Mechanisms

Have a process write log messages to a file. Then the running process must access the file.

Could be done using append only access, thus no reading or rewriting. Could trust the process to do a setuid(2) system call. This saves us from trusting the user – but only if the user doesn’t have access to the hardware.

We could also log to this or another system via syslog(3), this helps us if we don’t trust the user or the process. However, the problem remains with the sysadmin who has superuser access to the system.

Daniel Bosk MIUN IKS Accountability 20

slide-26
SLIDE 26

Book-Keeping Logging References Securing Logging Mechanisms

The sysadmin problem can be solved using a clever setup of separation of duty. E.g. the logs of sysadmin A will be stored under the control of sysadmins B and C. This way sysadmin A can do everything except modify his own logging mechanisms. The downside of this is that all systems must be online for this to work.

Daniel Bosk MIUN IKS Accountability 21

slide-27
SLIDE 27

Book-Keeping Logging References Schneier-Kelsey Logs

The Schneier-Kelsey logging scheme provides a secure logging mechanism for storing logs in an untrusted machine. The untrusted machine U is expected to work correctly up to a time t when it is compromised by an attacker. The logging mechanism and the integrity of the logs L1, . . . , Lt−1 before t are provided with confidentiality and integrity. All logs Lt, Lt+1, . . . generated from this point, however, are under the influence of the attacker.

Daniel Bosk MIUN IKS Accountability 22

slide-28
SLIDE 28

Book-Keeping Logging References Schneier-Kelsey Logs

The scheme consists of an untrusted principal U and a trusted principal T.

Daniel Bosk MIUN IKS Accountability 23

slide-29
SLIDE 29

Book-Keeping Logging References Schneier-Kelsey Logs

Figure: Overview of Schneier-Kelsey secure-log scheme; where Wj is the type of entry, Dj is entry data, Kj is entry key, Aj is authentication key, and H is a one-way function. Image: [SK99].

Daniel Bosk MIUN IKS Accountability 24

slide-30
SLIDE 30

Book-Keeping Logging References Schneier-Kelsey Logs

One interesting property is that validation of logs can be delegated to a third party verifier V.

Daniel Bosk MIUN IKS Accountability 25

slide-31
SLIDE 31

Book-Keeping Logging References Schneier-Kelsey Logs

[SK99] Bruce Schneier and John Kelsey. ‘Secure audit logs to support computer forensics’. In: ACM Transactions on Information and System Security (TISSEC) 2.2 (1999),

  • pp. 159–176.

Daniel Bosk MIUN IKS Accountability 26