Security Objectives and Design Information Security Management Dr - - PowerPoint PPT Presentation

security objectives and design
SMART_READER_LITE
LIVE PREVIEW

Security Objectives and Design Information Security Management Dr - - PowerPoint PPT Presentation

Security Objectives and Design Information Security Management Dr Hans Georg Schaathun University of Surrey Autumn 2010 Week 2 Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 Week 2 1 / 54 The session Outline


slide-1
SLIDE 1

Security Objectives and Design

Information Security Management Dr Hans Georg Schaathun

University of Surrey

Autumn 2010 – Week 2

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 1 / 54

slide-2
SLIDE 2

The session

Outline

1

The session

2

Security Design

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 2 / 54

slide-3
SLIDE 3

The session

Session objectives

Realise how difficult security is. Realise how easy security is. Consider some general design decisions which have to be made Understand the concept of security perimeters

1

Whitman and Mattord Ch. 2

2

‘Data-Centric Security’ IBM Whitepaper December 2006

3

Gollmann Ch. 2.2–2.6

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 3 / 54

slide-4
SLIDE 4

Security Design

Outline

1

The session

2

Security Design Security and Simplicity Real Security Challenges CObIT

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 4 / 54

slide-5
SLIDE 5

Security Design Security and Simplicity

Outline

1

The session

2

Security Design Security and Simplicity Real Security Challenges CObIT

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 5 / 54

slide-6
SLIDE 6

Security Design Security and Simplicity

How difficult is security?

Which is the most challenging?

Building a secure system? Securing a built system?

Why?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 6 / 54

slide-7
SLIDE 7

Security Design Security and Simplicity

How difficult is security?

Which is the most challenging?

Building a secure system? Securing a built system?

Why?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 6 / 54

slide-8
SLIDE 8

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-9
SLIDE 9

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-10
SLIDE 10

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-11
SLIDE 11

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-12
SLIDE 12

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-13
SLIDE 13

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-14
SLIDE 14

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-15
SLIDE 15

Security Design Security and Simplicity

Patchwork security

Security added as an afterthought. Existing, insecure system is extremely complex. Reverse-engineering to find flaws. Many flaws found only upon attack.

Security experts on their heels Patching holes as they are exploited

System too complex to understand

Trial-and-Error

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 7 / 54

slide-16
SLIDE 16

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-17
SLIDE 17

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-18
SLIDE 18

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-19
SLIDE 19

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-20
SLIDE 20

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-21
SLIDE 21

Security Design Security and Simplicity

Secure design

No features ⇒ no security holes. Add only secure features. Default is always ‘access denied’.

Access given when demonstrateably necessary. Need-to-know policy

Security is maintained during the design and building.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 8 / 54

slide-22
SLIDE 22

Security Design Security and Simplicity

Adding features to the box

Feature-oriented design

Users must be able to add data

Security-oriented design

Authorised users and nobody else must be able to add data.

We only add features if we can maintain security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 9 / 54

slide-23
SLIDE 23

Security Design Security and Simplicity

Adding features to the box

Feature-oriented design

Users must be able to add data

Security-oriented design

Authorised users and nobody else must be able to add data.

We only add features if we can maintain security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 9 / 54

slide-24
SLIDE 24

Security Design Security and Simplicity

Adding features to the box

Feature-oriented design

Users must be able to add data

Security-oriented design

Authorised users and nobody else must be able to add data.

We only add features if we can maintain security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 9 / 54

slide-25
SLIDE 25

Security Design Real Security Challenges

Outline

1

The session

2

Security Design Security and Simplicity Real Security Challenges CObIT

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 10 / 54

slide-26
SLIDE 26

Security Design Real Security Challenges

Question

If it is that simple, why are there so many security issues? Security was not prioritised when the system was built.

Now, it is a priority Too expensive to rebuild from scratch

Most developers are not trained for security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 11 / 54

slide-27
SLIDE 27

Security Design Real Security Challenges

Question

If it is that simple, why are there so many security issues? Security was not prioritised when the system was built.

Now, it is a priority Too expensive to rebuild from scratch

Most developers are not trained for security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 11 / 54

slide-28
SLIDE 28

Security Design Real Security Challenges

Question

If it is that simple, why are there so many security issues? Security was not prioritised when the system was built.

Now, it is a priority Too expensive to rebuild from scratch

Most developers are not trained for security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 11 / 54

slide-29
SLIDE 29

Security Design Real Security Challenges

Question

If it is that simple, why are there so many security issues? Security was not prioritised when the system was built.

Now, it is a priority Too expensive to rebuild from scratch

Most developers are not trained for security

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 11 / 54

slide-30
SLIDE 30

Security Design Real Security Challenges

KISS

Keep it simple, stupid

What can we learn from the ideal design approach? When the task is to secure an existing, complex system? Consider simple components first

asset by asset – how can they be accessed? interface by interface – how can they be (ab)used? user by user – what can they do?

Analyse the composite sybsystems ...

when you understand the components fully

Throughout the module, look for ways to break the system or problem into smaller, simpler pieces.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 12 / 54

slide-31
SLIDE 31

Security Design Real Security Challenges

KISS

Keep it simple, stupid

What can we learn from the ideal design approach? When the task is to secure an existing, complex system? Consider simple components first

asset by asset – how can they be accessed? interface by interface – how can they be (ab)used? user by user – what can they do?

Analyse the composite sybsystems ...

when you understand the components fully

Throughout the module, look for ways to break the system or problem into smaller, simpler pieces.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 12 / 54

slide-32
SLIDE 32

Security Design Real Security Challenges

KISS

Keep it simple, stupid

What can we learn from the ideal design approach? When the task is to secure an existing, complex system? Consider simple components first

asset by asset – how can they be accessed? interface by interface – how can they be (ab)used? user by user – what can they do?

Analyse the composite sybsystems ...

when you understand the components fully

Throughout the module, look for ways to break the system or problem into smaller, simpler pieces.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 12 / 54

slide-33
SLIDE 33

Security Design Real Security Challenges

KISS

Keep it simple, stupid

What can we learn from the ideal design approach? When the task is to secure an existing, complex system? Consider simple components first

asset by asset – how can they be accessed? interface by interface – how can they be (ab)used? user by user – what can they do?

Analyse the composite sybsystems ...

when you understand the components fully

Throughout the module, look for ways to break the system or problem into smaller, simpler pieces.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 12 / 54

slide-34
SLIDE 34

Security Design Real Security Challenges

KISS

Keep it simple, stupid

What can we learn from the ideal design approach? When the task is to secure an existing, complex system? Consider simple components first

asset by asset – how can they be accessed? interface by interface – how can they be (ab)used? user by user – what can they do?

Analyse the composite sybsystems ...

when you understand the components fully

Throughout the module, look for ways to break the system or problem into smaller, simpler pieces.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 12 / 54

slide-35
SLIDE 35

Security Design Real Security Challenges

On Eating an Elephant?

How do you eat an elephant? Take one little bit if more elephant, go to (1) Throughout the module, look for ways to cut bits off the elephant.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 13 / 54

slide-36
SLIDE 36

Security Design Real Security Challenges

On Eating an Elephant?

How do you eat an elephant? Take one little bit if more elephant, go to (1) Throughout the module, look for ways to cut bits off the elephant.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 13 / 54

slide-37
SLIDE 37

Security Design Real Security Challenges

On Eating an Elephant?

How do you eat an elephant? Take one little bit if more elephant, go to (1) Throughout the module, look for ways to cut bits off the elephant.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 13 / 54

slide-38
SLIDE 38

Security Design Real Security Challenges

On Eating an Elephant?

How do you eat an elephant? Take one little bit if more elephant, go to (1) Throughout the module, look for ways to cut bits off the elephant.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 13 / 54

slide-39
SLIDE 39

Security Design CObIT

Outline

1

The session

2

Security Design Security and Simplicity Real Security Challenges CObIT

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 14 / 54

slide-40
SLIDE 40

Security Design CObIT

The CObIT Information Criteria

Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 15 / 54

slide-41
SLIDE 41

Security Design CObIT

Security is a means

CObIT — Control Objectives for IT The Information Criteria is more than security Security is a means to reaching objectives

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 16 / 54

slide-42
SLIDE 42

Security Design CObIT

Security is a means

CObIT — Control Objectives for IT The Information Criteria is more than security Security is a means to reaching objectives

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 16 / 54

slide-43
SLIDE 43

Security Design CObIT

Security is a means

CObIT — Control Objectives for IT The Information Criteria is more than security Security is a means to reaching objectives

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 16 / 54

slide-44
SLIDE 44

Security Design CObIT

Effectiveness and Efficiency

Effectiveness relevance and suitability of information Information has to serve business processes accuracy, consistency and usability. Efficiency information with optimum use of resources minimise the cost of providing information and services

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 17 / 54

slide-45
SLIDE 45

Security Design CObIT

The CIA Triad

Security Criteria

Confidentiality against unauthorised disclosure Integrity against unauthorised modification and falsification Availability for authorised users

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 18 / 54

slide-46
SLIDE 46

Security Design CObIT

Compliance and Reliability

Compliance deals with the adherence to laws, regulations and rontractual agreements businesses need to obey the laws of the land stick to contracts with clients and suppliers

  • bserve constent enforcement of own guidelines and

policies Reliability – Reliable Management Information appropriate information and metrics to support management of the organisation meta-information to allow management of the other criteria managing to meet requirements and make surplus

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 19 / 54

slide-47
SLIDE 47

Perimeter Defences

Outline

1

The session

2

Security Design

3

Perimeter Defences City Walls The Man-Machine Scale The User End Product and System

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 20 / 54

slide-48
SLIDE 48

Perimeter Defences City Walls

Outline

1

The session

2

Security Design

3

Perimeter Defences City Walls The Man-Machine Scale The User End Product and System

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 21 / 54

slide-49
SLIDE 49

Perimeter Defences City Walls

Classic Security Measure

Walls protect the City Strict Access Control

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 22 / 54

slide-50
SLIDE 50

Perimeter Defences City Walls

Trust within the City Walls

Whom do you have to trust under a wall-type defence? Whom do you protect against? Assumption A City Wall defence assumes

1

The enemy is outside the walls

2

We can trust anyone inside the walls

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 23 / 54

slide-51
SLIDE 51

Perimeter Defences City Walls

Trust within the City Walls

Whom do you have to trust under a wall-type defence? Whom do you protect against? Assumption A City Wall defence assumes

1

The enemy is outside the walls

2

We can trust anyone inside the walls

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 23 / 54

slide-52
SLIDE 52

Perimeter Defences City Walls

Security Perimeter

City Walls form a perimeter The perimeter defines the scope of the security mechanism Protection against threats originating outside the perimeter No protection againts inside threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 24 / 54

slide-53
SLIDE 53

Perimeter Defences City Walls

Security Perimeter

City Walls form a perimeter The perimeter defines the scope of the security mechanism Protection against threats originating outside the perimeter No protection againts inside threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 24 / 54

slide-54
SLIDE 54

Perimeter Defences City Walls

Security Perimeter

City Walls form a perimeter The perimeter defines the scope of the security mechanism Protection against threats originating outside the perimeter No protection againts inside threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 24 / 54

slide-55
SLIDE 55

Perimeter Defences City Walls

Security Perimeter

City Walls form a perimeter The perimeter defines the scope of the security mechanism Protection against threats originating outside the perimeter No protection againts inside threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 24 / 54

slide-56
SLIDE 56

Perimeter Defences City Walls

Perimeter Security

Perimeter Security (or Perimeter Defences) refer to

wall-like mechanisms protecting a large system/organisation ... like a city wall

Simple organisation:

concentrate all your resources on the perimeter maintain complete control of who and what is in the city

Other examples:

high-security buildings system-level access control fire-walls

Most data centres are secured this way

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 25 / 54

slide-57
SLIDE 57

Perimeter Defences City Walls

Perimeter Security

Perimeter Security (or Perimeter Defences) refer to

wall-like mechanisms protecting a large system/organisation ... like a city wall

Simple organisation:

concentrate all your resources on the perimeter maintain complete control of who and what is in the city

Other examples:

high-security buildings system-level access control fire-walls

Most data centres are secured this way

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 25 / 54

slide-58
SLIDE 58

Perimeter Defences City Walls

Perimeter Security

Perimeter Security (or Perimeter Defences) refer to

wall-like mechanisms protecting a large system/organisation ... like a city wall

Simple organisation:

concentrate all your resources on the perimeter maintain complete control of who and what is in the city

Other examples:

high-security buildings system-level access control fire-walls

Most data centres are secured this way

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 25 / 54

slide-59
SLIDE 59

Perimeter Defences City Walls

Perimeter Security

Perimeter Security (or Perimeter Defences) refer to

wall-like mechanisms protecting a large system/organisation ... like a city wall

Simple organisation:

concentrate all your resources on the perimeter maintain complete control of who and what is in the city

Other examples:

high-security buildings system-level access control fire-walls

Most data centres are secured this way

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 25 / 54

slide-60
SLIDE 60

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-61
SLIDE 61

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-62
SLIDE 62

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-63
SLIDE 63

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-64
SLIDE 64

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-65
SLIDE 65

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-66
SLIDE 66

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-67
SLIDE 67

Perimeter Defences City Walls

The fall of the wall

Why don’t modern cities have walls? Walls work very well when

1

you trust your insiders

large populations cannot be controlled ... complexity becomes overwhelming

2

you don’t want or need to deal with outsiders

why don’t we trust a Greek bearing gifts? the walls prevent trade

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 26 / 54

slide-68
SLIDE 68

Perimeter Defences The Man-Machine Scale

Outline

1

The session

2

Security Design

3

Perimeter Defences City Walls The Man-Machine Scale The User End Product and System

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 27 / 54

slide-69
SLIDE 69

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-70
SLIDE 70

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-71
SLIDE 71

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-72
SLIDE 72

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-73
SLIDE 73

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-74
SLIDE 74

Perimeter Defences The Man-Machine Scale

Security Perimeters

We discussed perimeters in terms of perimeter defences

let’s extend the concept of a perimeter

Every security control defines a perimeter

Abstract or Concrete perimeters

Only by recognising the perimeter can we understand

... which threats we control (outside) and which entities we have to trust (inside)

This will become clearer as we proceed Remember to look for the perimeters when we discuss controls ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 28 / 54

slide-75
SLIDE 75

Perimeter Defences The Man-Machine Scale

The Man-Machine Scale

✬ ✫ ✩ ✪

applications

✬ ✫ ✩ ✪

services

✬ ✫ ✩ ✪

  • perating

system

✗ ✖ ✔ ✕

OS kernel

✞ ✝ ☎ ✆

hardware Where on the scale do you put your controls (perimeters)?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 29 / 54

slide-76
SLIDE 76

Perimeter Defences The Man-Machine Scale

Example

Operating System Access Control

OS requires username and password

  • n the console when the box boots
  • n remote login

‘Where’ is the security perimeter? What is inside and what is outside? Perimeter defence between software and terminal (keyboard/screen)

software inside; user outside

No defence between software and core hardware (harddisk)

the perimeter is not closed!

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 30 / 54

slide-77
SLIDE 77

Perimeter Defences The Man-Machine Scale

Example

Operating System Access Control

OS requires username and password

  • n the console when the box boots
  • n remote login

‘Where’ is the security perimeter? What is inside and what is outside? Perimeter defence between software and terminal (keyboard/screen)

software inside; user outside

No defence between software and core hardware (harddisk)

the perimeter is not closed!

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 30 / 54

slide-78
SLIDE 78

Perimeter Defences The Man-Machine Scale

Example

Operating System Access Control

OS requires username and password

  • n the console when the box boots
  • n remote login

‘Where’ is the security perimeter? What is inside and what is outside? Perimeter defence between software and terminal (keyboard/screen)

software inside; user outside

No defence between software and core hardware (harddisk)

the perimeter is not closed!

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 30 / 54

slide-79
SLIDE 79

Perimeter Defences The Man-Machine Scale

Example

Operating System Access Control

OS requires username and password

  • n the console when the box boots
  • n remote login

‘Where’ is the security perimeter? What is inside and what is outside? Perimeter defence between software and terminal (keyboard/screen)

software inside; user outside

No defence between software and core hardware (harddisk)

the perimeter is not closed!

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 30 / 54

slide-80
SLIDE 80

Perimeter Defences The Man-Machine Scale

Example

Operating System Access Control

OS requires username and password

  • n the console when the box boots
  • n remote login

‘Where’ is the security perimeter? What is inside and what is outside? Perimeter defence between software and terminal (keyboard/screen)

software inside; user outside

No defence between software and core hardware (harddisk)

the perimeter is not closed!

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 30 / 54

slide-81
SLIDE 81

Perimeter Defences The Man-Machine Scale

Perimeter Observation

Operating System Access Control

Multi-dimensional

there is a physical dimension – hardware there is a more abstract dimension – software

A user is outside the security perimeter

until a successful login

The OS surrounds the entire system in a software sense

attacks through software interfaces are prevented

The hardware is also inside the OS perimeter

but the OS does not control the hardware (except peripheral devices, like the terminal)

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 31 / 54

slide-82
SLIDE 82

Perimeter Defences The Man-Machine Scale

Perimeter Observation

Operating System Access Control

Multi-dimensional

there is a physical dimension – hardware there is a more abstract dimension – software

A user is outside the security perimeter

until a successful login

The OS surrounds the entire system in a software sense

attacks through software interfaces are prevented

The hardware is also inside the OS perimeter

but the OS does not control the hardware (except peripheral devices, like the terminal)

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 31 / 54

slide-83
SLIDE 83

Perimeter Defences The Man-Machine Scale

Perimeter Observation

Operating System Access Control

Multi-dimensional

there is a physical dimension – hardware there is a more abstract dimension – software

A user is outside the security perimeter

until a successful login

The OS surrounds the entire system in a software sense

attacks through software interfaces are prevented

The hardware is also inside the OS perimeter

but the OS does not control the hardware (except peripheral devices, like the terminal)

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 31 / 54

slide-84
SLIDE 84

Perimeter Defences The Man-Machine Scale

Perimeter Observation

Operating System Access Control

Multi-dimensional

there is a physical dimension – hardware there is a more abstract dimension – software

A user is outside the security perimeter

until a successful login

The OS surrounds the entire system in a software sense

attacks through software interfaces are prevented

The hardware is also inside the OS perimeter

but the OS does not control the hardware (except peripheral devices, like the terminal)

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 31 / 54

slide-85
SLIDE 85

Perimeter Defences The Man-Machine Scale

Vulnerabilities in lower layers

City walls can be flown over or dug under. The OS can control vulnerabilities in the software layers Hardware is a lower and therefore unprotected layer

we can dig under the defence, through hardware

Can you think of examples of how to dig under the OS access control?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 32 / 54

slide-86
SLIDE 86

Perimeter Defences The Man-Machine Scale

Vulnerabilities in lower layers

City walls can be flown over or dug under. The OS can control vulnerabilities in the software layers Hardware is a lower and therefore unprotected layer

we can dig under the defence, through hardware

Can you think of examples of how to dig under the OS access control?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 32 / 54

slide-87
SLIDE 87

Perimeter Defences The Man-Machine Scale

Vulnerabilities in lower layers

City walls can be flown over or dug under. The OS can control vulnerabilities in the software layers Hardware is a lower and therefore unprotected layer

we can dig under the defence, through hardware

Can you think of examples of how to dig under the OS access control?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 32 / 54

slide-88
SLIDE 88

Perimeter Defences The Man-Machine Scale

Hardware attacks

Boot the box from a removable medium (USB stick)

mount the harddrive and edit the password as superuser

The box should only boot from the authorised harddrive. Remove the harddrive and mount it on a different box

replace the password file as superuser

Physical locks on the cabinet In both cases we run an unauthorised OS

with access to assets of the authorised OS

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 33 / 54

slide-89
SLIDE 89

Perimeter Defences The Man-Machine Scale

Hardware attacks

Boot the box from a removable medium (USB stick)

mount the harddrive and edit the password as superuser

The box should only boot from the authorised harddrive. Remove the harddrive and mount it on a different box

replace the password file as superuser

Physical locks on the cabinet In both cases we run an unauthorised OS

with access to assets of the authorised OS

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 33 / 54

slide-90
SLIDE 90

Perimeter Defences The Man-Machine Scale

Hardware attacks

Boot the box from a removable medium (USB stick)

mount the harddrive and edit the password as superuser

The box should only boot from the authorised harddrive. Remove the harddrive and mount it on a different box

replace the password file as superuser

Physical locks on the cabinet In both cases we run an unauthorised OS

with access to assets of the authorised OS

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 33 / 54

slide-91
SLIDE 91

Perimeter Defences The Man-Machine Scale

Hardware attacks

Boot the box from a removable medium (USB stick)

mount the harddrive and edit the password as superuser

The box should only boot from the authorised harddrive. Remove the harddrive and mount it on a different box

replace the password file as superuser

Physical locks on the cabinet In both cases we run an unauthorised OS

with access to assets of the authorised OS

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 33 / 54

slide-92
SLIDE 92

Perimeter Defences The Man-Machine Scale

Hardware attacks

Boot the box from a removable medium (USB stick)

mount the harddrive and edit the password as superuser

The box should only boot from the authorised harddrive. Remove the harddrive and mount it on a different box

replace the password file as superuser

Physical locks on the cabinet In both cases we run an unauthorised OS

with access to assets of the authorised OS

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 33 / 54

slide-93
SLIDE 93

Perimeter Defences The User End

Outline

1

The session

2

Security Design

3

Perimeter Defences City Walls The Man-Machine Scale The User End Product and System

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 34 / 54

slide-94
SLIDE 94

Perimeter Defences The User End

The Man-Machine Perimeters

The onion model might have been drawn like this.

✬ ✫ ✩ ✪

hardware

✬ ✫ ✩ ✪

OS kernel

✬ ✫ ✩ ✪

  • perating system

✤ ✣ ✜ ✢

services

✗ ✖ ✔ ✕

applications

✞ ✝ ☎ ✆

user Now, the user is the lower layer

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 35 / 54

slide-95
SLIDE 95

Perimeter Defences The User End

Digging through the human layer

How can you exploit the user to circumvent security? Bribery ; Blackmail ; Extortions Evesdropping ; Surveillance Phishing Not to speak of carelessness ... Passwords stuck under the keyboard Easy-to-guess passwords

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 36 / 54

slide-96
SLIDE 96

Perimeter Defences The User End

Digging through the human layer

How can you exploit the user to circumvent security? Bribery ; Blackmail ; Extortions Evesdropping ; Surveillance Phishing Not to speak of carelessness ... Passwords stuck under the keyboard Easy-to-guess passwords

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 36 / 54

slide-97
SLIDE 97

Perimeter Defences The User End

Digging through the human layer

How can you exploit the user to circumvent security? Bribery ; Blackmail ; Extortions Evesdropping ; Surveillance Phishing Not to speak of carelessness ... Passwords stuck under the keyboard Easy-to-guess passwords

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 36 / 54

slide-98
SLIDE 98

Perimeter Defences The User End

Digging through the human layer

How can you exploit the user to circumvent security? Bribery ; Blackmail ; Extortions Evesdropping ; Surveillance Phishing Not to speak of carelessness ... Passwords stuck under the keyboard Easy-to-guess passwords

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 36 / 54

slide-99
SLIDE 99

Perimeter Defences The User End

Digging through the human layer

How can you exploit the user to circumvent security? Bribery ; Blackmail ; Extortions Evesdropping ; Surveillance Phishing Not to speak of carelessness ... Passwords stuck under the keyboard Easy-to-guess passwords

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 36 / 54

slide-100
SLIDE 100

Perimeter Defences The User End

Controls in the human layer

How can you protect against the attacks in the human layer?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 37 / 54

slide-101
SLIDE 101

Perimeter Defences Product and System

Outline

1

The session

2

Security Design

3

Perimeter Defences City Walls The Man-Machine Scale The User End Product and System

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 38 / 54

slide-102
SLIDE 102

Perimeter Defences Product and System

Product and System

Product is a software package designed for general use in a variety of systems. System is a specific IT installation, with a particular purpose and

  • perational environment.

What are the differences between security planning for products and for systems?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 39 / 54

slide-103
SLIDE 103

Perimeter Defences Product and System

Products

Products are designed for larger markets.

Security affects many users.

Generic – for a range of different users.

Has to suit as many clients as possible.

General Security Requirements.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 40 / 54

slide-104
SLIDE 104

Perimeter Defences Product and System

Systems

Systems are designed for a particular user/corporation. Adapted to local security requirements

May be tailor made. ... or may be a configuration of a product

A secure product can be deployed insecurily in a system.

misconfiguration poor match with the requirements

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 41 / 54

slide-105
SLIDE 105

Perimeter Defences Product and System

Security Pitfalls

Wasting money on products

failing to invest in configuration and training

Buying a good product for X

when you need a product for Y

Buying controls of threats you don’t face You had better understand what you need.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 42 / 54

slide-106
SLIDE 106

The fundamental dilemma

Outline

1

The session

2

Security Design

3

Perimeter Defences

4

The fundamental dilemma Security versus Business Processes Data-Centric Security

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 43 / 54

slide-107
SLIDE 107

The fundamental dilemma Security versus Business Processes

Outline

1

The session

2

Security Design

3

Perimeter Defences

4

The fundamental dilemma Security versus Business Processes Data-Centric Security

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 44 / 54

slide-108
SLIDE 108

The fundamental dilemma Security versus Business Processes

The fundamental dilemma

IBM Whitepaper view

Ambivalent attitude to security in businesses

1

security problems cause serious losses

money reputation

2

security does not contribute to business processes

it becomes a pure cost, like insurance and estates

Security is important, but it has to be cheap Value for money is immeasurable in security ...

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 45 / 54

slide-109
SLIDE 109

The fundamental dilemma Security versus Business Processes

The fundamental dilemma

Gollmann’s presentation

The users

Require security No security expertise

The expert

Security expertise Unfamiliar of the application and local requirements

Who can capture the local security requirements? Without a link to business processses, managers don’t care

  • cf. IBM Whitepaper

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 46 / 54

slide-110
SLIDE 110

The fundamental dilemma Security versus Business Processes

The fundamental dilemma

Gollmann’s presentation

The users

Require security No security expertise

The expert

Security expertise Unfamiliar of the application and local requirements

Who can capture the local security requirements? Without a link to business processses, managers don’t care

  • cf. IBM Whitepaper

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 46 / 54

slide-111
SLIDE 111

The fundamental dilemma Security versus Business Processes

The fundamental dilemma

Gollmann’s presentation

The users

Require security No security expertise

The expert

Security expertise Unfamiliar of the application and local requirements

Who can capture the local security requirements? Without a link to business processses, managers don’t care

  • cf. IBM Whitepaper

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 46 / 54

slide-112
SLIDE 112

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-113
SLIDE 113

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-114
SLIDE 114

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-115
SLIDE 115

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-116
SLIDE 116

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-117
SLIDE 117

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-118
SLIDE 118

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-119
SLIDE 119

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-120
SLIDE 120

The fundamental dilemma Security versus Business Processes

The Manager’s Perspective

We want to buy insurance A firewall is good insurance

it prevents, maybe, 95% of attacks on a global scale if it fails, we can say we followed best ‘industry practice’

What potential attacks do we face?

are they typically attacks which can be prevented? maybe we only face the top 5% attacks?

The manufacturer does not know the business.

Products designed for a general market.

Insurance assumes that all clients are average or typical Businesses rarely are typical.

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 47 / 54

slide-121
SLIDE 121

The fundamental dilemma Data-Centric Security

Outline

1

The session

2

Security Design

3

Perimeter Defences

4

The fundamental dilemma Security versus Business Processes Data-Centric Security

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 48 / 54

slide-122
SLIDE 122

The fundamental dilemma Data-Centric Security

Data-Centric Security Model

Figure from IBM’s white paper

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 49 / 54

slide-123
SLIDE 123

The fundamental dilemma Data-Centric Security

Data-Centric? Or Business-Centric?

Security starts with Business Management Understand the Business Processes

and the role of the data in the processes

Classify data according to their role Define data-control rules based on business needs Is this related to secure design as we discussed it?

need-to-know policy

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 50 / 54

slide-124
SLIDE 124

The fundamental dilemma Data-Centric Security

Data-Centric? Or Business-Centric?

Security starts with Business Management Understand the Business Processes

and the role of the data in the processes

Classify data according to their role Define data-control rules based on business needs Is this related to secure design as we discussed it?

need-to-know policy

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 50 / 54

slide-125
SLIDE 125

The fundamental dilemma Data-Centric Security

Data-Centric? Or Business-Centric?

Security starts with Business Management Understand the Business Processes

and the role of the data in the processes

Classify data according to their role Define data-control rules based on business needs Is this related to secure design as we discussed it?

need-to-know policy

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 50 / 54

slide-126
SLIDE 126

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-127
SLIDE 127

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-128
SLIDE 128

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-129
SLIDE 129

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-130
SLIDE 130

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-131
SLIDE 131

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-132
SLIDE 132

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-133
SLIDE 133

The fundamental dilemma Data-Centric Security

The limits of perimeters

Perimeter defences protect systems

Build a firewall around the business Separate the insiders from the outsiders

Problems with Perimeter Thinking

People need to leave the safety of the walls Information needs to leave the safety of the walls One-size-fits-all – no granularity

wasting resources on low-value assets failing adequate controls of high-value assets

Insider threats

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 51 / 54

slide-134
SLIDE 134

The fundamental dilemma Data-Centric Security

Data-Centric Security

Figure from IBM’s white paper

Data is the centre of security Regulations on data usage Who owns the data? Who needs the data? Who may change the data?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 52 / 54

slide-135
SLIDE 135

Summary

Outline

1

The session

2

Security Design

3

Perimeter Defences

4

The fundamental dilemma

5

Summary

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 53 / 54

slide-136
SLIDE 136

Summary

Conclusion

Two approaches to information systems design

building security in throughout every phase of development patching security onto a system which has grown out of hand

Which do you prefer and why? Two approaches to security management

systems-centric – perimeters around the institution data-centric – each category of data is a target of security

Which do you prefer and why? Perimeters fits one security mechanism on the entire system

data-sharing becomes hard perimeters rarely manage to enclose everything

What will future security look like?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 54 / 54

slide-137
SLIDE 137

Summary

Conclusion

Two approaches to information systems design

building security in throughout every phase of development patching security onto a system which has grown out of hand

Which do you prefer and why? Two approaches to security management

systems-centric – perimeters around the institution data-centric – each category of data is a target of security

Which do you prefer and why? Perimeters fits one security mechanism on the entire system

data-sharing becomes hard perimeters rarely manage to enclose everything

What will future security look like?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 54 / 54

slide-138
SLIDE 138

Summary

Conclusion

Two approaches to information systems design

building security in throughout every phase of development patching security onto a system which has grown out of hand

Which do you prefer and why? Two approaches to security management

systems-centric – perimeters around the institution data-centric – each category of data is a target of security

Which do you prefer and why? Perimeters fits one security mechanism on the entire system

data-sharing becomes hard perimeters rarely manage to enclose everything

What will future security look like?

Dr Hans Georg Schaathun Security Objectives and Design Autumn 2010 – Week 2 54 / 54