MILS C Compl plete S ete Separa rati tion P n Platf tform orm - - PowerPoint PPT Presentation

mils c compl plete s ete separa rati tion p n platf tform
SMART_READER_LITE
LIVE PREVIEW

MILS C Compl plete S ete Separa rati tion P n Platf tform orm - - PowerPoint PPT Presentation

MILS C Compl plete S ete Separa rati tion P n Platf tform orm P Protec ecti tion n Profi file le MILS CSP PP Viola Saftig, Dr. Igor Furgel Telekom Security - T-SYSTEMS INTERNATIONAL GmbH Content/Agenda 01 Motivation 02 MILS CSP


slide-1
SLIDE 1

MILS C Compl plete S ete Separa rati tion P n Platf tform

  • rm P

Protec ecti tion n Profi file le

MILS CSP PP Viola Saftig, Dr. Igor Furgel Telekom Security - T-SYSTEMS INTERNATIONAL GmbH

slide-2
SLIDE 2

Content/Agenda

01 Motivation 02 MILS CSP PP Overview 03 TOE Architecture 04 Assets 05 Roles 06 Security Requirements

slide-3
SLIDE 3

3

Motivation

Multiple Independent Levels of Security (MILS)

 Based on the concepts of resource separation and controlled information flow.  Offering a secure decomposition of complex embedded systems into logically independent components.  Supports the coexistence of untrusted and trusted components.

Possible approach – MILS security architecture Question How to build up and operate devices with a mix of critical and of unknown (and untrustworthy) applications in a secure and reliable way? Challenge TOE (Target of Evaluation) may comprise very different system constellations.

slide-4
SLIDE 4

4

Motivation

Common Criteria Protection Profile for MILS separation platform (MILS CSP PP) A generic, but clear description is mandated

 for the components of a MILS system and  for the obligations during system integration, while determining the operational environment and selecting concrete components.

slide-5
SLIDE 5

5

Mils CS PP - Overview

Target of Evaluation (TOE)

 Special kind of operating system and underlying hardware platform.  Used as an integrated component in MILS systems.  May be used as part of embedded systems.  Can host user applications (e.g. operating systems) and system applications.  User applications can be malicious.  Controls usage of memory, devices, processors, and communication channels.  Separation of user applications.  Prevention of unexpected interference between user applications.  Enforces restrictions on the communication between user applications.

slide-6
SLIDE 6

6

TOE Architecture

slide-7
SLIDE 7

7

TOE Architecture

slide-8
SLIDE 8

8

TOE Architecture

slide-9
SLIDE 9

9

TOE Architecture

slide-10
SLIDE 10

10

Assets

Primary assets Values being really important for the risk owner and to be protected by the TOE itself. Secondary assets TSF and TSF configuration data enforcing the System Security Policy (SSP) as defined by the System Integrator. Definitions

 A system component is a system partition, system extension or an ODSP and contains user data supplied and approved by the system

integrator.

 A communication object is used for communication between partitions (object exposed to one or multiple partitions with access rights as

defined in the configuration data).

slide-11
SLIDE 11

Primary Assets

System component content Communication object content User partition content Description Generic Security Properties

User applications and/or data being executed and/or stored in a user partition

Confidentiality

Integrity

Content of a communication object and exchanged (received/read and sent/written) between partitions

Confidentiality

Integrity

System applications and/or data being executed and/or stored in a system component (a system partition, a system extension or the on-board device support package).

Confidentiality

Integrity

Electronic records reflecting events to be audited.

Confidentiality

Integrity

11

Audit data (optional)

slide-12
SLIDE 12

Secondary Assets

Communication object resources User partition shape User partition resources Description Generic Security Properties

Comprise physical memory space and allocated CPU time for each CPU

Resources are assigned according to the SSP

Availability

Contains a set of security attributes assigned to a user partition (e.g. unique partition identity, flag indicating that the partition is a user partition, SSP enforcement data.)

Links its user partition resources and its user partition content

Can contain security irrelevant data, e.g. information on optimising virtualised guests that is not security relevant

Confidentiality

Integrity

Memory space

Resources are assigned according to the SSP

Availability

Contains a set of security attributes assigned to a communication object (e.g. unique communication object identity)

Links its communication object resources and its communication object content

Confidentiality

Integrity

12

Communication object shape

slide-13
SLIDE 13

Secondary Assets

Configuration data System component shape System component resources Description Generic Security Properties

Comprises physical memory space and allocated CPU time for each CPU

Resources are assigned according to the SSP

Availability

Confidentiality

Integrity

Contains a set of security attributes assigned to a system component (e.g. unique identity, flag indicating that the partition is a system partition)

Links its system component resources and its system component content

Confidentiality

Integrity

Data used by the TOE to enforce the SSP

Confidentiality

Integrity

Interface to functions of the TSF available for system applications

Availability (in the sense of ‘executability’) only for system applications

13

System application API

slide-14
SLIDE 14

Roles

System Integrator System application User application Description

Any application within a user partition,

Allowed to use only the TOE user partition API

For each instantiation of this subject the TOE assigns a unique subject identity

Any application within a system partition, a system extension, or the on-board device support package (ODSP)

Only a system application in a system partition is allowed to use the TOE system partition API

Only a system application in a system extension is allowed to use the TOE system extension API.

Only a system application in the ODSP is allowed to use the TOE ODSP API

For each instantiation of this subject the TOE assigns a unique subject identity

Person trusted to (re-)configure and integrate the TOE

This includes identifying system partitions and user partitions and assigning applications into partitions

Person trusted to (re-)install, stop, start, restart, or access (also physically) the TOE in the field

14

System Operator

slide-15
SLIDE 15

Roles

Description

Threat agent (a person or a process acting on his/her behalf) trying to undermine the TOE security policy

The attacker especially tries to change properties of the assets having to be maintained according to the TOE security policy

The attacker is assumed to possess an at most high attack potential

Only attacks carried out by user applications are addressed (no physical attacks)

All attacks from other sources than user applications shall be averted by the TOE operational environment.

15

Attacker

slide-16
SLIDE 16

16

Security Requirements

Security Assurance Requirements (SAR)

 Defining the scope and the rigour of the evaluator’s verification work.  This PP claims conformance to the CC assurance package EAL5 augmented by AVA_VAN.5.  Resistance against high attack potential.

Security Functional Requirements (SFR)

 To be enforced by the TSF.  Security functional groups are defined and allocated to the functional requirements.  SFRs which are always used together are grouped by “{}”.  SFRs whose fulfilling might need a direct support by the TOE hardware are tagged by HW.

slide-17
SLIDE 17

Security Requirements

Separation in space of applications hosted in different partitions from each other and from the TOE operating system. Security Functional Requirements (SFRs)

User Data Protection (FDP)

{FDP_ACC.2/AS.USER_PART_CONT, FDP_ACF.1/AS.USER_PART_CONT}HW, {FDP_ACC.2/AS.SYS_COMP_CONT, FDP_ACF.1/AS.SYS_COMP_CONT}HW, {FDP_IFC.2, FDP_IFF.1}, FDP_IFF.5 Resource Utilisation (FRU)

FRU_RSA.2/AS.USER_PART_RES Supported by: Identification and Authentication (FIA)

FIA_UID.2 Security Management (FMT)

all selected components of the class FMT Protection of the TOE Security Functions (FPT)

all selected components of the class FPT

17

slide-18
SLIDE 18

Security Requirements

Separation in time of applications hosted in different partitions from each other and from the TOE operating system Security Functional Requirements (SFRs)

User Data Protection (FDP)

{FDP_ACC.2/AS.COMMUN_OBJ_CONT, FDP_ACF.1/AS.COMMUN_OBJ_CONT}, {FDP_IFC.2, FDP_IFF.1}, FDP_IFF.5, FDP_RIP.2HW Resource Utilisation (FRU)

FRU_PRS.1, FRU_RSA.2/AS.USER_PART_RES Supported by: Identification and Authentication (FIA)

FIA_UID.2 Security Management (FMT)

all selected components of the class FMT Protection of the TOE Security Functions (FPT)

selected components of the class FPT

18

slide-19
SLIDE 19

Security Requirements

Provision and management of communication objects Security Functional Requirements (SFRs)

User Data Protection (FDP)

{FDP_ACC.2/AS.COMMUN_OBJ_CONT, FDP_ACF.1/AS.COMMUN_OBJ_CONT}, {FDP_IFC.2, FDP_IFF.1}, FDP_IFF.5 Resource Utilisation (FRU)

FRU_RSA.2/AS.COMMUN_OBJ_RES Supported by: Identification and Authentication (FIA)

FIA_UID.2 Security Management (FMT)

all selected components of the class FMT Protection of the TOE Security Functions (FPT)

selected components of the class FPT

19

slide-20
SLIDE 20

Security Requirements

Management of and access to the TSF and TSF data Security Functional Requirements (SFRs)

Identification and Authentication (FIA)

FIA_UID.2 Security Management (FMT)

all selected components of the class FMTHW Protection of the TOE Security Functions (FPT)

FPT_FLS.1, FPT_RCV.2 Supported by: Identification and Authentication (FIA)

FIA_UID.2 Security Management (FMT)

all selected components of the class FMT

20

TSF self-protection and accuracy of security functionality

slide-21
SLIDE 21

21

Security Requirements

Status of MILS CSP PP

 Not published yet  Not evaluated yet  Open for comments and usage

slide-22
SLIDE 22

CONTACT PERSON

Contact Viola Saftig T-Systems International GmbH Telekom Security Bonn, Germany viola.saftig@t-systems.com Contact

  • Dr. Igor Furgel

T-Systems International GmbH Telekom Security Bonn, Germany igor.furgel@t-systems.com

22

If interested in the MILS CS PP please send an email to the authors

slide-23
SLIDE 23

23

Backup – Complete List of SFR

FAU Security Audit

Audit Data Generation FAU_GEN.1 (optional)

FDP User Data Protection

Complete Access Control FDP_ACC.2

Access Control Functions FDP_ACF.1

Complete Information Flow Control FDP_IFC.2

Simple Security Attributes FDP_IFF.1

No Illicit Information Flows FDP_IFF.5

Full Residual Information Protection FDP_RIP.2

FIA Identification and Authentication

User Identification FIA_UID.2

FPT Protection of the TSF

Failure with Preservation of Secure State FPT_FLS.1

Automated Recovery FPT_RCV.2

FRU Resource Utilization

Limited Priority of Service FRU_PRS.1

Minimum and Maximum Quotas FRU_RSA.2

FMT Security Management

Management of Security Functions Behavior FMT_MOF.1

Management of Security Attributes FMT_MSA.1

Secure Security Attributes FMT_MSA.2

Static Policy Attribute Initialization FMT_MSA.3

Management of TSF Data FMT_MTD.1

Specification of Management Functions FMT_SMF.1

Security Roles FMT_SMR.1