Slide #6-1
Integrity Policies
CS461/ECE422 – Computer Security I Fall 2009
Based on slides provided by Matt Bishop for use with Computer Security: Art and Science
Integrity Policies CS461/ECE422 Computer Security I Fall 2009 - - PowerPoint PPT Presentation
Integrity Policies CS461/ECE422 Computer Security I Fall 2009 Based on slides provided by Matt Bishop for use with Slide #6-1 Computer Security: Art and Science Reading CS: Chapter 6 Slide #6-2 Overview Requirements Very
Slide #6-1
Based on slides provided by Matt Bishop for use with Computer Security: Art and Science
Slide #6-2
Slide #6-3
Slide #6-4
1. Users will not write their own programs, but will use existing production programs and databases. 2. Programmers will develop and test programs on a non-production system; if they need access to actual data, they will be given production data via a special process, but will use it on their development system. 3. A special process must be followed to install a program from the development system onto the production system. 4. The special process in requirement 3 must be controlled and audited. 5. The managers and auditors must have access to both the system state and the system logs that are generated.
Slide #6-5
Slide #6-6
Slide #6-7
Slide #6-8
Slide #6-9
Slide #6-10
Slide #6-11
Slide #6-12
Slide #6-13
Slide #6-14
Slide #6-15
Slide #6-16
Slide #6-17
Slide #6-18
Slide #6-19
(AM, { appropriate }) System and application logs (SL, { SD, T }) System programs in modification (SL, ∅ ) System programs (SL, { T }) Software tools (SL, { PC, PD }) Production data (SL, { PC }) Production code (SL, { D, T }) Development code/test data Security Level Objects
Slide #6-20
Slide #6-21
Slide #6-22
Slide #6-23
Slide #6-24
Slide #6-25
Slide #6-26
(ISL, { IP }) (ISP, { IP, ID}) (ISL, ∅) (ISL, { ID }) (ISL, { ID }) (ISL, { IP }) Integrity Level (SL, { SP }) Repair (SL, { SP, SD, SSD }) and downgrade privilege System controllers (AM, { SP, SD, SSD }) System managers and auditors (SL, { SSD }) System programmers (SL, { SD }) Application developers (SL, { SP }) Ordinary users Security Level Subjects
Slide #6-27
(ISL, { IP }) (ISL, ∅ ) (ISL, { ID }) (ISP, { IP, ID }) (IO, { ID }) (ISL, { IP }) (IO, { IP }) (ISL, { ID } ) Integrity Level (SL, {SP}) Repair (AM, { appropriate }) System and application logs (SL, { SSD }) System programs in modification (SL, ∅ ) System programs (SL, ∅ ) Software tools (SL, { SP }) Production data (SL, { SP }) Production code (SL, { SD }) Development code/test data Security Level Objects
Slide #6-28
Slide #6-29
Slide #6-30
Slide #6-31
Slide #6-32
Slide #6-33
Slide #6-34
Slide #6-35
Slide #6-36
Slide #6-37
Slide #6-38
Slide #6-39
Slide #6-40
Slide #6-41
Slide #6-42
Slide #6-43
Slide #6-44
Slide #6-45
Slide #6-46
Slide #6-47
CDI1
CDI2
Slide #6-48
Slide #6-49
Slide #6-50
CDI1
CDI2
Slide #6-51
CDI1
CDI2
Slide #6-52
Slide #6-53