Tom can read file A. CSci530: Computer Security Systems Security Policy Models 12 November 2003

Similar documents
Discretionary Vs. Mandatory

Access Control Models

CSE509: (Intro to) Systems Security

Chapter 7: Hybrid Policies

Access Control Models Part II

Access Control. Discretionary Access Control

Access Control (slides based Ch. 4 Gollmann)

Computer Security 3e. Dieter Gollmann. Chapter 5: 1

Access Control Mechanisms

Computer Security. Access control. 5 October 2017

Security Models Trusted Zones SPRING 2018: GANG WANG

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics

Chapter 6: Integrity Policies

CSE Computer Security

CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:

CS 392/ CS Computer Security. Nasir Memon Polytechnic University Module 7 Security Policies

CCM Lecture 12. Security Model 1: Bell-LaPadula Model

CCM Lecture 14. Security Models 2: Biba, Chinese Wall, Clark Wilson

May 1: Integrity Models

Integrity Policies. Murat Kantarcioglu

Access control models and policies. Tuomas Aura T Information security technology

Module 4: Access Control

CIS433/533 - Introduction to Computer and Network Security. Access Control

Information Security & Privacy

Introduction to Security

Policy, Models, and Trust

DAC vs. MAC. Most people familiar with discretionary access control (DAC)

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if

Intrusion Detection Types

CS 356 Lecture 7 Access Control. Spring 2013

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

Operating System Security. Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own)

Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008

Discretionary Access Control (DAC)

Access control models and policies

Complex Access Control. Steven M. Bellovin September 10,

Access Control Part 1 CCM 4350

Access Control Part 3 CCM 4350

Access control models and policies

Dion Model. Objects and their classification

8.3 Mandatory Flow Control Models

Access Control. Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions

Summary. Final Week. CNT-4403: 21.April

Access Control. Protects against accidental and malicious threats by

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Formal methods and access control. Dr. Hale University of Nebraska at Omaha Information Security and Policy Lecture 8

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Pointers & Arrays. CS2023 Winter 2004

CSE361 Web Security. Access Control. Nick Nikiforakis

Access Control. Access Control: enacting a security policy. COMP 435 Fall 2017 Prof. Cynthia Sturton. Access Control: enacting a security policy

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

CS52600: Information Security

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

Information Security. Structure. Common sense security. Content. Corporate security. Security, why

Advanced Systems Security: Principles

CSE Computer Security

Post-Class Quiz: Access Control Domain

Advanced Systems Security: Integrity

P1_L6 Mandatory Access Control Page 1

CSCI 420: Mobile Application Security. Lecture 7. Prof. Adwait Nadkarni. Derived from slides by William Enck, Patrick McDaniel and Trent Jaeger

Discretionary Access Control (DAC)

IBM Security Identity Manager Version Planning Topics IBM

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018

Labels and Information Flow

Advanced Systems Security: Integrity

Chapter 4: Access Control

Data quality attributes in network-centric systems

Lecture 4: Bell LaPadula

USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS

Information Security Theory vs. Reality

Virginia Commonwealth University School of Medicine Information Security Standard

A Framework for Enforcing Constrained RBAC Policies

DATABASE SECURITY AND PRIVACY. Some slides were taken from Database Access Control Tutorial, Lars Olson, UIUC CS463, Computer Security

MULTILEVEL POLICY BASED SECURITY IN DISTRIBUTED DATABASE

RBAC: Motivations. Users: Permissions:

Chapter 4 Protection in General-Purpose Operating Systems

Data Security and Privacy. Unix Discretionary Access Control

Πανεπιστήμιο Αιγαίου Τμήμα μηχανικών πληροφοριακών & επικοινωνιακών συστημάτων. Ασφάλεια Συστημάτων. Πολιτικές. 15/1/2012 Π.

Asbestos Operating System

IT Services IT LOGGING POLICY

Advanced Systems Security: Integrity

Instructor: Jinze Liu. Fall 2008

CS 591: Introduction to Computer Security. Lecture 3: Policy

Identity, Authentication and Authorization. John Slankas

CHAPTER 5 SECURITY ADVANCED DATABASE SYSTEMS. Assist. Prof. Dr. Volkan TUNALI

Unix, History

CSE 127: Computer Security. Security Concepts. Kirill Levchenko

HIPAA Controls. Powered by Auditor Mapping.

Verifiable Security Goals

Computer Security Fall 2006 Joseph/Tygar Midterm 3

INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

System design issues

Multilevel relations: Schema and multiple instances based on each access class. A multilevel relation consists of two parts:

Mapping of ITSG-33 Security Controls to SP Revision 4 Security Controls

Representation and Evaluation of Security Policies for Distributed System Services

HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control

Understanding ACS 5.4 Configuration

ATM Use Cases. ID: CIS Title: Check Balance Description: Customer aims to know the balance in his/her account

Transcription:

CSci530: Computer Security Systems Security Policy Models 12 November 2003 Dr. Clifford Neuman, Dr.Tatyana Ryutov University of Southern California Information Sciences Institute the midterm, problems 1 and 4 are graded still waiting on grades for uestions 2 and 3 before the exams can be merged, a final grade assigned, and the exams returned. 1 2! "# "$"$%& '( $ What is policy? What is policy model? Examples of security models: Bell LaPadula Model, Biba, Chinese Wall, Role Based ccess Control Problems with these models ECL model Emulation of various models Policy Composition Security Policy reuest subject uthorization Mechanism grant/deny object 3 4 $" +,/.0 "1, 324.0 "1,6587 32 Measures to protect against potential violations unauthorized release, modification, DoS Can be specified informally or formally Rely on the basic security functions (authentication, authorization, intrusion detection, audit subject access right object Tom can read file. 5 6 1

o $" +,/.0 "1, $.0 "1,! 8 2. $"$%& More formalized security policy bstracts details concerning implementation Target is to prove system properties: Consistency Completeness Examples for security models: ccess Matrix Model, Bell LaPadula Model, Biba, Chinese Wall, Role Based ccess Control 1. Informal policy specification. 2. ormal policy specification. 3. Policy implementation. 4. Policy correction. 7 8!"$#%&'#(,+ /.103214658717.10039:2 ;/<>=?2,@ Understand and employ complex finegrained policies. Precise semantics for policy representation & evaluation. Unambiguously describe the implemented system. Separate policy from mechanism. Support translation of security policies across multiple authorization models. Improve technical understanding of the composition of policies from multiple sources Discretionary ccess Control (DC a user can grant or revoke access to the protected objects that he owns Mandatory ccess Control (MC Decisions are made based on the security labeling of objects and subjects. The security labels are assigned externally and are not determined by owner. 9 10 ' $ Subjects are assigned labels that reflect the security clearance (authorizations of the user. Objects are assigned labels that reflect the security classification (protection reuirements of the data they contain MC: if the subject label and the object label cannot be compared, no access is allowed. If the labels can be compared, access is determined based on rules regarding the relationship between the labels. B Types of MC models Confidentiality (BellLaPadula Integrity (Biba Hybrid C D/EEHGJILKNMPOHG>QRKSUTVKWQYXUZH[]_^`^ anbdc_efc_gfhd^ c6ij_gdf^_kl[ubme]n Subjects: active entities (users, processes o Objects: passive entities (data, files, directories o ccess Rights (read, write o Security Classes (Labels form a partially ordered lattice. p lattice is a partially ordered set for which every pair of elements has a greatest lower bound and a least upper bound. p partial ordering < orders some, but not all, elements of set 11 12 2

N security class has two parts: classification/clearance hierarchical security level set of categories, possibly empty The class has two operations defined on it Euals, an euivalence relation Dominates, a partial ordering! #"%$'&( #,+. "%/10!"203/546!$7$8&:9305;=<>!?@1,0 Top Secret, {Medical, Salary} Secret {Salary} Confidential {Salary} Confidential {Medical} 13 14 B C DE GIH JKML B C DEPOMQRTSU JKWV reuest =(object o, access right r, subject s is granted if and only if all of the following properties are satisfied: 1. Discretionary security property: The cell in the access matrix for row s and column o contains r. 2. Simple security property (read down, no read up: user can only read an object if the security class of the user dominates the security class of the object. 3. property (write up, no write down: subject can only write an object if the security class of the subject is dominated by the security class of the object. information flow Subjects Top Secret Secret Objects Top Secret Secret 15 16 B C DEPOMQRTSU JKYX B C DEPOMQRTSU JKYZ Subjects Objects N Suppose Tom s security class is [Secret, {medical, salary}]. [ Then Tom can read the following information: ny information classified Secret or lower and has no categories information flow Top Secret Secret Read orbidden Top Secret Secret ny information classified Secret or lower and belongs to category medical ny information classified Secret or lower and belongs to the category salary [ Tom CNNOT read information that is Classified higher than Secret Classified Secret or lower and has a category other than medical or salary associated with it. N Suppose a file s security class is [Secret, {medical, salary}] [ It can be read only by subjects having a clearance of Secret or better, and who have read access to BOTH categories medical and salary. 17 18 3

N KPG EPB R reuest =(object o, access right r, subject s is granted if and only if all of the following properties are satisfied: 1. Discretionary security property: The cell in the access matrix for row s and column o contains r. 2. Simple security property (read up, no read down: subject's integrity class must be dominated by the integrity class of the object being read. 3. property (write down, no write up: Subject's integrity class must dominate the class of the object being written.!#"%$'&("!,+ Implementation of both Mandatory Confidentiality and Integrity rules can be based on a single security class for both confidentiality and integrity. This would result in a readeual and writeeual rules. The drawback is reduced flexibility of the resulting system. 19 20.0/214357698(:/<;>=@?BC=DE/>GIHKJLM,N OQP<RSTVUXWZYP[K]^_V`aVbdcKecdf gihkj0hlk>mnofp constrained data items (CDI. well formed transaction (WT preserves the integrity of CDI. The Principle of separation of duty: no single person should perform a task from beginning to end. Static separation of duty Dynamic separation of duty 21 22.0/214357698(:/<;>=@?sr%3t:u/2Ewvt; The ClarkWilson triplets: <UserID, WTi, {CDIk, CDIl,...,CDIn}> Example: CDI bank account values CW policy: users and appls can modify CDIs (move money if: 1. The sum of all money remains constant 2. second user must confirm a transaction 3. ll transaction are recorded in append only log xy gjoadzoa{ c~}} @hd Va }d Xƒ ˆ Š Œ VŽ Q The Chinese wall model is deployed to avoid conflicts of interest. Objects are grouped into company datasets. Company datasets whose organizations are in competitions are then grouped into conflict of interest (COI classes. The Chinese Wall model reuires that a consultant not be able to read information for more than one company in any given COI class. 23 24 4

. :?>E;>E 8 1/ / =4?v D n access reuest =(object o, access right r, subject s is granted iff all of the following properties are satisfied: Discretionary security property: The cell in the access matrix for row s and column o contains the reuested right r. Mandatory security property: Subject s can access object o only if o is in the same company dataset as any object already read by s. or the object o does not belong to any of the COI classes of objects already accessed by subject s.!#"$%'&!((!# Each principal is given minimum access needed to accomplish its task 25 26 +,'.0/1324.65 798:86.32;2=<!, >3?@B,4CB+/7D<E GIHJLKM!!$NO user: human being / autonomous agent / computer role: job function with associated semantics regarding the authority and responsibility conferred on a member of the role. permission: an approval of a particular mode of access to one or more objects in the system. user assignment: manytomany relation between user and role. permission assignment: manytomany relation between role and permission. users User ssignment Role Hierarchy roles Permission ssignment permissions 27 28 9PQ!(RS"UTV($W X$W #":YRX!N!Z" []_^a`cbedcfgchijakfmlcbedon enforce a single security policy do not support the specification of expressive policies policies are not adaptive (do not allow active actions when security violations are suspected or detected provide no means to reason about the composition of policies MC access reuest DC local policies 29 30 5

[]_^a`cbedcfgchijakfmlcbed condition (subject access right object condition preconditions time, access identity reuestresultconditions audit midconditions threshold postconditions notification Tom can run a process on host bom.isi.edu. If the reuest fails, a notification must be sent to a system administrator. The process must not consume more than 20% of the CPU. n audit record about the completed process must be generated. condition condition conditions read conditions X op P op can represent: numerical comparison string matching regular expression matching settheoretic comparison delegation write conditions X, new_value on success/failure 31 32 i! f ^ "cdab # specify and enforce complex and finegrained access control policies in a uniform and structured way # adaptive to changes in the security reuirements and assist in detecting and responding to intrusion and misuse. # support enforcement at various time stages of the reuested action # capture policy evaluation properties (such as priority and composition mode to support policy composition in a controlled and secure manner $&%'(+,/.02134+02576&8!9:.;4<=.&>?.4@&CB4D5E+@ Extended ccess Control List (ECL positive/negative right set of conditions Entry1 Entry2 Entry3 read +read write System threat <high Tom, Mondayriday... dmin, Mondayriday 33 34 HG:IJK LNMNOQP7RNS/THUVONONW2XNTHYHZHO[XHLNP]E^`_ OQabcLQUV^NONdeOQaHf bom.isi.edu Policy shut_down, ID=Joe login, ID=Tom, audit login, day {Mon,Tue} Reuest =<bom.isi.edu, login, Tom> uthorization Mechanism authorization( evaluates pre and rrconditions execution_control( evaluates midconditions post_execution_actions( evaluates postconditions Read( System State Write( T//U T//U T//U $&%'g(h+,/.021$ihj40kb/l5]+@h+?mg%n'po C={c1,c2,...,cn} is a partially ordered set of conf. labels, such as unclassified, secret, topsecret, with ordering relation r. s I={i1,i2,...,i3} is a partially ordered set of integrity labels, such as lowintegrity, mediumintegrity, highintegrity, with ordering relation r. s M={m1,m2,...,mn} is a set of single security labels for both conf/integrity, such as topsecret/lowintegrity, secret/mediumintegrity and so on, with ordering relation r. s Every object and subject in the system bears one of the labels from the sets C, I or M. Labels co t C, io t I, and mo t M denote object's classification, integrity label and combined classification/integrity s Similarly, labels cs t C, is t I, and ms t M denote subject's clearance, integrity label and combined clearance/integrity 35 36 6

!!! Ê Ê ll access rights are divided into readclass and writeclass read precondition X op P X represents the subject's security class P represents object's security class op is the operation (" or # $ % &'( &' ' +,./ 01 % & Simple security property: 243658789 :<;>=? @;>BDCE G H8:C= G IJ G = KLJ I7:JDM5@ =H8BDMNG CI>= :L= O: ;>BDCE G H8:'C= G IJ G = KLJ I'7:J8B8E= O:LBD789 :>;>=7:G C8PNQR:>I>HS T represented by a read precondition Cs U Co associated with the readtype access rights. property: 243658789 :<;>=? @;>BDCE G H8:C= G IJ G = KLJ I7:JDM5@ =V7:LH8BDMNG CI>= :<H78KW= O: ;>BDCE G H8:'C= G IJ G = KLJ I'7:J8B8E= O:LBD789 :>;>=7:G C8PWX Q G = = :CS T represented by a read precondition Cs Y Co associated with the writetype access rights. 37 38 Z [ $] ^%_`abczd ebf gh_i_j kh>l f1^_`ab Z [$$] ^%_&`ab'c(zd ebfngh_i_j Ž, L R L % Ž Biba mandatory integrity model. Simple security property: mrn+o p4>r srtru vodw xdu s yz w u {} ~ Ds < p o u> sv 4ƒ> w x ~Ru sr <{}u s8w x u s y'z w u{ ~ s 4ƒ4 Du sƒ 4r srtru>ds w x4y z sr~r 4ˆ represented by a read precondition is Y readtype access rights. io associated with the property: m'šp4>r srtru volw x u s y'z w u { ~ s > pdo u4 6ƒ> w xd~ru svu s8 ~ s 4ƒ4 u svƒ>4r srtru> s w x6y Œ}z w u u s xdˆ represented by a read precondition is U writetype access rights. io associated with the Mo=Ms associated with the read and writetype access rights co š cs, io is associated with the readtype access rights and is used to enforce "read down" mandatory confidentiality and "read up" mandatory integrity rule co cs, io š is This condition block is associated with the writetype access rights and is used to enforce "write up" mandatory confidentiality and "write down" mandatory integrity rule. 39 40 œ Ž / L,žRŸ œ Lž L D W. V +ª «& ± ² ³µ ¹Ļº»,¼R½L²¾ L¼ ÀLÁ  WÃ. Ä µålârã» Æ»$Ç%À,¼R¼L ÈĻºL»,¼É company information COI Banks COI Toy Companies Datasets Datasets Bank1 Bank2 Company1 Company 2 read preconditions: accessed_ds = P and accessed_coi = P. write postconditions: update_accessed_ds, new_value:on_success update_accessed_coi,new_value:on_success. ile ile B ile C ile D ile J ile K ile M ile N 41 42 7

7 8 ² ³µ+ /Ļº»,¼R½L²¾ L¼ ÀLÁ  ĻÃ. ÄNµÅLÂRû Æ»$Ç%À,¼R¼L ÈĻºL»,¼ ² ³µ+ /Ļº»,¼R½L²¾ L¼ ÀLÁ  ĻÃ. ÄNµ¼ À Ç Â ¼ Æ,à / ºL»,¼ read preconditions write postconditions read preconditions read precondition write postconditions <read, Tom, accessed_ds= upd_accessed_ds:on_success/tom_bank1, upd_accessed_coi:tom_banks > <read, Tom, accessed_ds=tom_bank1 > <read, Tom,accessed_COI Tom_Banks, upd_accessed_ds:on_success/tom_bank1, upd_accessed_coi:tom_banks> The ClarkWilson triplets: <UserID, WTi, {CDIk,CDIl,...,CDIn}> The CDIs are represented as the objects to be protected The WTi represent access rights with associated access identity conditions UserID Static separation of duty enforced by the security administrator when assigning the authorizations Dynamic separation of duty enforced by conditions that read and update the system variables that represent the history of executed operations 43 44 ² ³µ ¹Ļº»,¼R½L²¾ L¼ ÀLÁ  WÃ. ijµ /ĻºL»,¼ ² ³µ ¹Ļº»,¼R½L²¾ L¼ ÀLÁ  WÃ. ijµ /ĻºL»,¼É group is a convenient method to associate a name with a set of subjects and to use this group name for access control purposes. principal may be a member of several groups. By default, a principal operates with the union of privileges of all groups to which it belongs Role properties include: 1. user can be a member of several roles 2. Role can be activated and deactivated by users at their discretion 3. uthorizations given to a role are applicable only when that role is activated 4. There may be various constraints placed on the use of roles, e.g. a user can activate just one role at a time With RBC, access rights are grouped by role name and the use of resources is restricted to individuals authorized to enter the role. Example: rolebased policy assigns users: Tom, Joe, and Ken role Bank_Teller that allows one to perform deposit and withdraw operations on objects account1 and account2. group Bank_teller is defined which includes Tom, Joe, and Ken, who are issued the group membership certificates. The ECLs for objects account1 and account2 : < deposit, X=Bank_teller > < withdraw X=Bank_teller > 45 46 ² ³µ ¹Ļº»,¼R½L²¾ L¼ ÀLÁ  WÃ. ijµ /ĻºL»,¼!#"$ %'&(,+./%102%3$465 One can choose to have the subject operate with the privilege of only one group at a time. Example: user is a member groups: Programmers and System_managers read conditions: X=Pogrammers and X=System_managers Similarly, one may allow a subject to operate with privileges of several specified groups at a time. read condition, X {Programmers,Users} Woo and Lam describe two types of policy composition: 8 The Vertical Policy Composition the policy authorities are hierarchically related in a supervisorsubordinate fashion Horizontal Policy Composition: allows each authority to enforce its access control reuirements independently of the others 47 48 8

$!" %'&( $,+.%302%34 Objects and policies are organized into security domains Domains are organized into peerpeer and supervisorsubordinate relationships. Predetermined hierarchical levels of security domains for assigning priorities to each domain's policies To compose policies with different priorities (vertical composition, use a composition mode: expand narrow stop To compose policies with eual priorities (horizontal composition take a conjunction of the policies!" #$ &%' ( System wide Policy Local Policy Systemwide policy defines a composition mode: expand narrow stop system system system OR ND local local local 49 50 +,./012345036 7809:0;6 <"6 0=$+&>?9:3 2$@ policy priorities US Policy specifies narrow mode USC Policy specifies stop mode CS Policy specifies expand mode US ND USC CS 51 9