CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
Secrecy Security Policy
CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger
www.cse.psu.edu/~tjaeger/cse497b-s07/
Secrecy Security Policy CSE497b - Spring 2007 Introduction Computer - - PowerPoint PPT Presentation
Secrecy Security Policy CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Secrecy
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
www.cse.psu.edu/~tjaeger/cse497b-s07/
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
2
O1 O2 O3 J R R W R W S2 N R R W S3 N R R W
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Security goals met under trusted processes – Protects against an error by a non-malicious entity
– Security goals met under potentially malicious processes – Protects against any malicious entity
– Non-malicious process shouldn’t leak the private key by writing it to O3 – A malicious process may write the private key to O3
3
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– To some other subject (user) or system (via network)
– Permission Assignment: Malicious process maximizes permissions
enabled
– Complete Mediation: DAC systems do not mediate network
– Complexity: How does she know that all these permissions prevent the leak
4
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– When will ship sail? – Where are troops? – What is the next troop movement?
– Decisions made at a higher level of authority are enacted
– Secrets flow up – Decisions flow down
– Also, “need to know”
5
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page
– We formulate an access control policy based on these levels – We can also add other dimensions, called categories which horizontally partition the rights space (in a way similar to that as was done by roles) security levels categories
CSE497b Introduction to Computer (and Network) Security - Spring 2007 - Professor Jaeger Page
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Vertices form a partial order – Every pair of vertices has a LUB, GLB
8
Very Secret Mostly Secret Pretty Secret Secret ?
CSE497b Introduction to Computer (and Network) Security - Spring 2007 - Professor Jaeger Page
– Alice: (SECRET, {CRYTPO, NUC}) – Bob: (CONFIDENTIAL, {INTEL}) – Charlie: (TOP SECRET, {CRYPTO, NUC, INTEL})
– DocA: (CONFIDENTIAL, {INTEL}) – DocB: (SECRET, {CRYPTO}) – DocC: (UNCLASSIFIED, {NUC})
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page
subject clearance level >= object sensitivity level and
Q: What would write-up be?
Bob: CONF., {INTEL}) Trent: TS, {CRYPTO, NUC, INTEL}) Alice: (SEC., {CRYTPO, NUC}) DocA: (CONFIDENTIAL, {INTEL}) DocB: (SECRET, {CRYPTO}) DocC: (UNCLASSIFIED , {NUC})
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page
– A subject s can only read from an object o if the subject’s clearance dominates or is same as the access class of the
– A subject s can only write to an object o if the subject’s clearance is dominated by or is the same as the access class of the object
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Complete mediation
– MLS *-security property
– Mandatory policy
12
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Uses an attribute of a shared resource – E.g., Fill up shared disk
– Uses temporal relationships in access to a shared resource – E.g., Driver timing behavior
13
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– that a process at a higher secrecy clearance cannot – leak to a process at a lower secrecy level
– Server process (Mail server): Many mails of different access classes are possible
– Client process (Email client): A single email client may receive and respond to emails at different access classes
– Discuss next time
14
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Program can leak secret that it reads by writing it to the lower access class
15
Program Secret Public
Read Write
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Can a secret variable leak to a public variable?
– Statement S – Sequence S1, S2 – Conditional c: S1, …, Sm
16
Stmt Cond Stmt Stmt Stmt Stmt
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Direct transfer to b from a (e.g., b = a)
– Where value of b may depend on value of a indirectly (e.g., if a = 0, then b = c)
17
Stmt
b = a
Cond
if (b < 1)
Stmt
c = d
Stmt
e = c
Stmt Stmt
c = b
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
18
Stmt
b = a
Cond
if (b < 1)
Stmt
c = d
Stmt
e = c
Stmt Stmt
c = f
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
19
Stmt
b = a
Cond
if (b < 1)
Stmt
c = d
Stmt
e = c
Stmt Stmt
c = f a
c
b d f e
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– What variables can be secret?
– What variables can be secret?
– What variables can be public?
20
Stmt
b = a
Cond
if (b < 1)
Stmt
c = d
Stmt
e = c
Stmt Stmt
c = f
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Accounts with Ford and GM
– Also, data that the subject holds – Conflict sets
21
t0 t1
Hold: None Conflict: {Ford, GM}
t2
Op: Access GM Hold: None Access: Allowed
t3 t4
Op: Access Ford Hold: GM Access: Denied
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Objects may belong to a company dataset – Companies may compete, so
– Cannot access objects in two datasets in a COI set
– Read O,
– Write O,
22
Page CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger
– Even if you are running malicious code (e.g., Trojan horse) – But, does not include covert channels
– Ones that could violate MLS – Use Denning’s model to prove compliance
23