Dynamic and adaptive policy models for coalition
- perations
Seraphin B. Calo
Dynamic and adaptive policy models for coalition operations - - PowerPoint PPT Presentation
Dynamic and adaptive policy models for coalition operations Seraphin B. Calo Overview Goal: develop approaches and mechanisms for policy based management that enable autonomy in the operation of the constituent elements of the coalition system
Seraphin B. Calo
2 Goal: develop approaches and mechanisms for policy based management that enable autonomy in the operation of the constituent elements of the coalition system
Principal Topics
n Generative policy mechanisms: new policy
architectures in which elements can generate their policies under a loose set of guidance from a central coalition commander
n Algorithms that ensure consistency and
coherence in the operation of generative policy based systems
n Security and resource management: apply
the generative policy model to the management of coalition operations
Coalition Needs
n A dynamic, secure and resilient information
infrastructure that conforms to the policies
n Autonomous operations within the bounds
n Understand human issues that impact
policy definition and enforcement
Policy: a set of considerations designed to guide decisions on courses of action
3
Managed Device Managed Device Managed Device Human Operator Alerts, logs Manual config Handled by System Management System Auto-config
A set of managed devices connected to a management system by a communication network
information by the management system
provided by the managed device to the management system
algorithms/policies/rules to deal with the set of alerts and logs that are processed In order to handle an alert or log, the system may decide to send a reconfiguration command to the managed device
management, e.g., fault management, security management, performance management etc.
to deal with the situation, diagnoses the underlying cause, and then reconfigures the system to react to the unexpected situation
4
Policy Refinement (PRF) Policy Decision Point (PDP) Policy Enforcement Point (PEP) Human View
Configuration Alerts/Logs Machine View
managed device
machine view of policy through the process of refinement or transformation
(ECA) rules
decision point (PDP)
Policies capture desired behaviors DMTF/IETF Policy Model
5
PEP PRF PDP Device Mgmt System PEP PRF PDP Device Mgmt System PEP PRFM PDP Device Mgmt System PRFD No Autonomy Policy based Autonomy Generative Policy based Autonomy
Elements of the policy infrastructure can be configured in different ways
Generative paradigm splits refinement between management and managed systems
6
PRFM Device Mgmt System PRFD Interaction Graph PDP PEP Policies
also embedded within the managed device
coordination guidelines to the PRFD
Generative Policy Model Information Flow
needs to interact with
different devices in the system.
Interaction Graph
7
Packet Firewall Web Server SSH Server Document Server
which are considered sensitive
via a secure shell based system
both the web-based server and the SSH server
Maintaining secure access to documents
server, secure shell server and the document server
⎻ If web-server employs a moving target defense, it changes its port for the web-server regularly ⎻ Configuration of the firewall needs to be repeated manually every-time such a change occurs
Current Practice
8
Packet Firewall Web Server SSH Server Document Server
N P D
Global Interaction Graph
N P D N P D N P P D
Address, Port User Id
each derive their policies to comply with access requirements
defense, the packet firewall would automatically adjust its filtering policies accordingly
⎻ Web server and SSH server are both in the protocol protection role, Document server is in the document protection role, and Firewall is in the network protection role
and Port number to entity in role N
⎻ Discovers the other nodes that are associated with adjacent roles in the interaction graph ⎻ Gets the attribute values identified by the devices in those roles in the interaction graph ⎻ Generates its own set of policies to be used for its PDP
Generative Approach Component Interactions
Coalition Operations
interest (CoI) to accomplish joint missions
when different civilian agencies come together to deal with emergency situations (e.g., fires, hurricanes)
not all members may be trusted equally
IT Infrastructure
⎻ Each of these assets can run the PEP, PDP and the PRFD components of the generative architecture, and take decisions on their own
Access Requirements
Generative Authorization
role, and the designated role of the asset itself
attribute that specifies the network address of the peer on the link
policies for each new connected peer can be generated automatically from the interaction graph
for the operation of the assets can be derived automatically
and enabling them to generate policies for their operations on their own
provided by a management system, and which defines the scope of activities for the devices
policies and achieve self-management in different contexts
in policy based management.
advantages Generative Policy Model for Autonomous Systems