the
play

THE ENEMY AND HE IS US U C U C D A VI S CA LABS MATT BISHOP - PowerPoint PPT Presentation

WE HAVE MET THE ENEMY AND HE IS US U C U C D A VI S CA LABS MATT BISHOP CARRIE GATES SOPHIE ENGLE SEAN PEISERT LAKE TAHOE, CA SEAN WHALEN NSPW W 09.23. .23.2008 2008 MATT BISHOP SOPHIE ENGLE CARRIE GATES SEAN


  1. WE HAVE MET THE ENEMY AND HE IS US U C U C D A VI S CA LABS MATT BISHOP CARRIE GATES SOPHIE ENGLE SEAN PEISERT LAKE TAHOE, CA SEAN WHALEN NSPW W 09.23. .23.2008 2008 MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 1 NEW SECURITY PARADIGMS WORKSHOP

  2. WHAT WE Binary, perimeter-based definition SAW of insiders hinder threat analysis WHAT WE How to define and analyze the SHOW insider problem WHAT WE How to detect, deter, mitigate, DON’T SHOW or solve the insider problem WHY IT’S Identifies highest-risk resources IMPORTANT and highest-threat insiders MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 2 NEW SECURITY PARADIGMS WORKSHOP

  3. NAVIGATION Main Sections:  Part 1: Unifying Policy Hierarchy  Part 2: Existing Insider Definitions  Part 3: Attribute-Based Group Access Control Supplemental:  Definitions MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 3 NEW SECURITY PARADIGMS WORKSHOP

  4. PART 1 Understanding Insiders and Insider Threat

  5. CLAIMS • The complexity of security policy is key to understanding the insider problem. • Binary or perimeter-based definitions of an insider impede threat analysis. • The ABGAC model identifies “ insiderness ” with respect to a resource and allows for insider threat analysis. MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 5 NEW SECURITY PARADIGMS WORKSHOP

  6. SECURITY POLICY The Complexities

  7. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 7 NEW SECURITY PARADIGMS WORKSHOP

  8. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Ideal Policy:  Yasmin is authorized to read {  } records for the purpose of treating {  } patients.  Yasmin is authorized to append {  } records for the purpose of treating {  } patients. Feasible? MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 8 NEW SECURITY PARADIGMS WORKSHOP

  9. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Ideal Policy:  Yasmin is authorized to authenticate as yasmin .  yasmin is authorized to read {  } records.  yasmin is authorized to append {  } records. MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 9 NEW SECURITY PARADIGMS WORKSHOP

  10. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Ideal Policy:  Yasmin is authorized to authenticate as yasmin .  yasmin is authorized to read {  } records.  yasmin is authorized to append {  } records. Practical? MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 10 NEW SECURITY PARADIGMS WORKSHOP

  11. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Ideal Policy:  Yasmin is authorized to authenticate as yasmin .  yasmin is authorized to read all records.  yasmin is authorized to write all records. Possible? MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 11 NEW SECURITY PARADIGMS WORKSHOP

  12. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Ideal Policy:  Yasmin is authorized to authenticate as yasmin .  yasmin is authorized to read all records.  yasmin is authorized to write all records.  yasm smin in can delete all records. Exploit! MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 12 NEW SECURITY PARADIGMS WORKSHOP

  13. POLICY EXAMPLE The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. The Different Policies:  What is ideal?  What is feasible?  What is practical?  What is possible? MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 13 NEW SECURITY PARADIGMS WORKSHOP

  14. SECURITY POLICY The Unifying Policy Hierarchy

  15. UNIFYING POLICY HIERARCHY What is the Unifying Policy Hierarchy?  Introduced by Carlson in 2006: • Carslon , Adam, “The Unifying Policy Hierarchy Model,” Master’s Thesis, UC Davis, June 2006.  A hierarchical model of security policy at different levels of abstraction. What is it good for?  Analyzing gaps in the hierarchy lead to insight to where and why problems occur MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 15 NEW SECURITY PARADIGMS WORKSHOP

  16. EXAMPLE SCENARIO The Scenario:  Yasmin, a doctor, is only authorized to read and append medical records of her patients for the purpose of treating them. MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 16 NEW SECURITY PARADIGMS WORKSHOP

  17. EXAMPLE SCENARIO Oracle Policy (Ideal) OP( subject, object, action, environment/intent ) = { authorized , unauthorized } OP( s,o,a,e ) = authorized  Yasmin, yasmin , authenticate, any  yasmin , {  } records, read, treating {  } patients  yasmin , {  } records, append, treating {  } patients MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 17 NEW SECURITY PARADIGMS WORKSHOP

  18. EXAMPLE SCENARIO Feasible Policy (Feasible) FP( subject, object, action ) = { authorized , unauthorized, unknown }  FP( yasmin , {  } records, read ) = authorized  FP( yasmin , {  } records, append ) = authorized  FP( Yasmin , yasmin , authenticate ) = unknown  FP( Xander , yasmin , authenticate ) = unknown MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 18 NEW SECURITY PARADIGMS WORKSHOP

  19. EXAMPLE SCENARIO Configured Policy ( ≈ Practical) CP( subject, object, action ) = { authorized , unauthorized, unknown }  FP( yasmin , {  } records, read ) = authorized  FP( yasmin , {  } records, append ) = authorized  CP( yasmin , all records, read ) = authorized  CP( yasmin , all records, write ) = authorized MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 19 NEW SECURITY PARADIGMS WORKSHOP

  20. EXAMPLE SCENARIO Real-Time Policy (Possible) RP( subject, object, action ) = { possible , impossible }  OP( Xander, yasmin , authenticate ) = unauthorized  CP( yasmin , all records, delete ) = unauthorized  RP( Xander, yasmin , authenticate ) = possible  RP( yasmin , all records, delete ) = possible MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 20 NEW SECURITY PARADIGMS WORKSHOP

  21. POLICY GAPS Oracle/Feasible Gap  Technology Limitations Ex: user versus user account, user intent Feasible/Configured Gap  Configuration Errors Ex: slow removal of terminated employees Configured/Real-Time Gap  Implementation Errors and Vulnerabilities Ex: buffer overflow, runtime vulnerability MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 21 NEW SECURITY PARADIGMS WORKSHOP

  22. POLICY GAPS Action OP FP CP RP ? ?   Xander authenticates as xander .     xander accesses a website… ? ?   …to check the weather ? ?   …to expose system to exploit     Web browser leaks user password ? ?   Yasmin authenticates as xander . MATT BISHOP ∙ SOPHIE ENGLE ∙ CARRIE GATES ∙ SEAN PEISERT ∙ SEAN WHALEN WE HAVE MET THE ENEMY AND HE IS US SEPTEMBER 23 2008 ∙ LAKE TAHOE, CA ∙ SLIDE 22 NEW SECURITY PARADIGMS WORKSHOP

  23. UNIFYING POLICY HIERARCHY Understanding Insiders and Insider Threat

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend