towards a reference architecture for service
play

Towards a Reference Architecture for Service- Oriented Cross Domain - PowerPoint PPT Presentation

Towards a Reference Architecture for Service- Oriented Cross Domain Security Infrastructures Wen Zhu Dr. Lowell Vizenor Dr. Avinash Srinivasan 7 th International Conference on Internet and Distributed Computing Systems Agenda Background


  1. Towards a Reference Architecture for Service- Oriented Cross Domain Security Infrastructures Wen Zhu Dr. Lowell Vizenor Dr. Avinash Srinivasan 7 th International Conference on Internet and Distributed Computing Systems

  2. Agenda • Background • Issues with Current Solutions • Example Use Case • CDS Reference Architecture • Reference Architecture concerns • CDC Participants • CDS Protocol Candidates • Putting It Together

  3. Background • Security Domain: • Protection based on the classification and sensitivity of data • Within each domain, a certain level of trust is assumed • Cross Domain Solutions • Filter and inspect traffic cross domain boundaries • Primary consist of Guards that monitors communication channels Top Secret Unclassified CDS

  4. Issues with Guard Implementations Today • Mission applications design perspective • Programs to design and implement their own individual solutions • No support workflows or full -duplex architectures • Enterprise security infrastructure perspective • Commonly associated with the links between domains • CDS vendors define the mission application interfaces • Limited configurability and API • Lack of protocol for coordination among guards • Effectiveness and performance perspective • Lack of a standard and flexible framework for describing information

  5. CDC in the Context of Service Oriented Architecture (SOA) • SOA Practices  Current Guards Capabilities • Communication at the  Inspection at the transport application layer layer • Complex workflow  Not participate in workflow • Rich metadata (service  Based on message context description and policy) • End-to-end security  Communication link • Standard-based  Lack of common standards interoperability

  6. Example Use Case: Approval of Classified Travel How does the guard determine which content to pass? And the redact action How is the guard inserted into the work flow? Itinerary Classified Network Unclassified Network (S) 1 Cost (U) Mission Planning System 2 Financial Management System 3 Mail Server 4 Guard Is a single guard monitoring both Web Service and SMTP traffic on the network? Or it just monitors TCP/IP pockets?

  7. CDS Reference Architecture The reference architect will provide • • A framework for discussing multi-faceted concerns of CDS • A context in which interactions among CDS participants can be abstracted out, forming the basis for protocols Application Aspects Architecture Context Policy Concerns Concerns Constraints Framework Workflow Information Concerns Concerns Information Transport Encoding binding Network Concerns Infrastructure Aspects

  8. CDS Participants Security Domain • • Implies a consistent a security vocabulary for users (human and systems), activities and information Security Monitor (Optional) • • Defines consistent security policies for communication with other domains using the security vocabulary. Mission Application • • Associate mission-specific concepts with the security vocabulary. Security Guard • Enforces security policy defined by the mission application. MAY act a Policy Enforcement • Point for the domain. Security Security Domain Mission Monitor Security Mission Application Administrator Security Domain Application Security Inter-guard Guard Mission Security Application Coordination Mission Application Security Mission Guard Security Mission Application Security Security Domain Guard Application Monitor Mission Enterprise Security Application Mission Mission System Application Application

  9. Associating Guards with Security Domains • A Guard SHOULD be associated with a single Domain. • Security: • Guard operates at the same security level as the associated Domain without unnecessary privilege • The same security monitor (system and human operator) manages both the domain and the guard, avoiding policy conflicts and duplication • Scalability: • Avoid n square problem in a multi domain environment • Implication: • Guards needs to trust each other without revealing mission information each other

  10. Guards as Active Participants in Workflow Mission applications MUST be aware of the guards and communicate explicitly • with the guard Need a notification mechanism in case a message is blocked by the guard for the security • reasons. • End-to-end encryption may prevent the guard from inspecting the • Covert Channels will be impossible if the guard actively intercept and forward the message. A Guard MAY provide additional information management services to mission • applications BPMN/BPEL could be extended to model the guards as part of the work flow •

  11. Opportunity for Standardizing Interactions – CDS Protocol Candidates Candidate 3: Candidate 1: Security Monitor CDS Application Interface Interface Security Administrato Mission r Security Domain Application Security Mission Security Domain Monitor Security Application Inter-guard Security Guard Coordination Mission Application Mission Application Security Mission Guard Security Mission Application Security Security Domain Guard Application Monitor Mission Enterprise Application Mission Mission Security System Application Application Candidate 2: Inter-guard Candidate 4: Coordination CDS Ontology

  12. Putting It Together

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend