CSE509: (Intro to) Systems Security

Similar documents
Chapter 6: Integrity Policies

Chapter 7: Hybrid Policies

May 1: Integrity Models

Integrity Policies. Murat Kantarcioglu

Introduction to Security

Information Security & Privacy

CS 392/ CS Computer Security. Nasir Memon Polytechnic University Module 7 Security Policies

Πανεπιστήμιο Αιγαίου Τμήμα μηχανικών πληροφοριακών & επικοινωνιακών συστημάτων. Ασφάλεια Συστημάτων. Πολιτικές. 15/1/2012 Π.

CS52600: Information Security

CCM Lecture 14. Security Models 2: Biba, Chinese Wall, Clark Wilson

Lecture 5: Integrity Models

Access Control Models Part II

Intergrity Policies CS3SR3/SE3RA3. Ryszard Janicki. Outline Integrity Policies The Biba Integrity Model

CSE Computer Security

Access control models and policies. Tuomas Aura T Information security technology

Access Control. Discretionary Access Control

Advanced Systems Security: Integrity

Access Control Models

Advanced Systems Security: Integrity

Discretionary Vs. Mandatory

Advanced Systems Security: Integrity

Access control models and policies

Security Models Trusted Zones SPRING 2018: GANG WANG

CIS433/533 - Introduction to Computer and Network Security. Access Control

Access control models and policies

Computer Security. Access control. 5 October 2017

CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:

Verifiable Security Goals

CCM Lecture 12. Security Model 1: Bell-LaPadula Model

Policy, Models, and Trust

Security Principles and Policies CS 136 Computer Security Peter Reiher January 15, 2008

Information Security. Structure. Common sense security. Content. Corporate security. Security, why

Dion Model. Objects and their classification

P1_L6 Mandatory Access Control Page 1

Access Control Mechanisms

Last time. User Authentication. Security Policies and Models. Beyond passwords Biometrics

Computer Security 3e. Dieter Gollmann. Chapter 5: 1

Complex Access Control. Steven M. Bellovin September 10,

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

Justifying Integrity Using a Virtual Machine Verifier

Access Control (slides based Ch. 4 Gollmann)

Asset Analysis -I. 1. Fundamental business processes 2.Critical ICT resources for these processes 3.The impact for the organization if

Operating System Security. Access control for memory Access control for files, BLP model Access control in Linux file systems (read on your own)

Minimum Requirements For The Operation of Management System Certification Bodies

Access Control. Discretionary Access Control

CS 591: Introduction to Computer Security. Lecture 3: Policy

Summary. Final Week. CNT-4403: 21.April

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications

Access Control Part 3 CCM 4350

Exercises with solutions, Set 3

CSE361 Web Security. Access Control. Nick Nikiforakis

INFSCI 2935: Introduction of Computer Security 1. Courtesy of Professors Chris Clifton & Matt Bishop. INFSCI 2935: Introduction to Computer Security 2

Module 4: Access Control

CS 356 Lecture 7 Access Control. Spring 2013

Issues of Operating Systems Security

Foundations of Computer Security

Waterfall Life Cycle Model

A SECURITY MODEL FOR MILITARY MESSAGE SYSTEMS

Access Control Part 1 CCM 4350

A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL

Chapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

Computer Security. 04r. Pre-exam 1 Concept Review. Paul Krzyzanowski. Rutgers University. Spring 2018

8.3 Mandatory Flow Control Models

DAC vs. MAC. Most people familiar with discretionary access control (DAC)

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

ETHIOPIAN NATIONAL ACCREDITATION OFFICE. Minimum Requirements For The Operation Of Product Certification Bodies

Labels and Information Flow

Lecture 4: Bell LaPadula

Virginia Commonwealth University School of Medicine Information Security Standard

Frequently Asked Questions Auditor

Intrusion Detection Types

CSE 565 Computer Security Fall 2018

CSE 127: Computer Security. Security Concepts. Kirill Levchenko

CSN11111 Network Security

Post-Class Quiz: Access Control Domain

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security

GUJARAT TECHNOLOGICAL UNIVERSITY

Towards Formal Evaluation of a High-Assurance Guard

Chapter 4: Access Control

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

CSE Computer Security

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations,

System design issues

Working Book Title: INFORMATION SYSTEM SECURITY: a management challenge. CHAPTER 3: Designing Technically Secure IS: formal models

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

ISO/IEC INTERNATIONAL STANDARD

Demonstrating data privacy for GDPR and beyond

MIS5206-Section Protecting Information Assets-Exam 1

Chapter 15: Information Flow

VOLUNTARY CERTIFICATION SCHEME FOR MEDICINAL PLANT PRODUCE REQUIREMENTS FOR CERTIFICATION BODIES

Asbestos Operating System

Efficient Role Based Access Control Method in Wireless Environment

Real4Test. Real IT Certification Exam Study materials/braindumps

QMS/EMS CB Accreditation Criteria

Access Control. Access Control: enacting a security policy. COMP 435 Fall 2017 Prof. Cynthia Sturton. Access Control: enacting a security policy

Governance, Risk, and Compliance Controls Suite. Release Notes. Software Version

Transcription:

CSE509: (Intro to) Systems Security Fall 2012 Radu Sion Integrity Policies Hybrid Policies 2005-12 parts by Matt Bishop, used with permission

Integrity Policies: Overview Requirements Very different than confidentiality policies Biba s model Clark-Wilson model Systems Security 2

Commercial Frameworks: Requirements 1. Users will not write their own programs, but will use existing production programs and databases. 2. Programmers will develop and test programs on a non-production system; if they need access to actual data, they will be given production data via a special process, but will use it on their development system. 3. A special process must be followed to install a program from the development system onto the production system. 4. The special process in requirement 3 must be controlled and audited. 5. The managers and auditors must have access to both the system state and the system logs that are generated. Systems Security 3

Biba Integrity Model Set of subjects S, objects O, integrity levels I, relation I I holding when second dominates first min: I I I returns lesser of integrity levels i: S O I gives integrity level of entity r: S O means s S can read o O w, x defined similarly Systems Security 4

Intuition for Integrity Levels The higher the level, the more confidence That a program will execute correctly That data is accurate and/or reliable Note relationship between integrity and trustworthiness Important point: integrity levels are not security levels Systems Security 5

Information Transfer Path An information transfer path is a sequence of objects o 1,..., o n+1 and corresponding sequence of subjects s 1,..., s n such that s i r o i and s i w o i+1 for all i, 1 i n. Idea: information can flow from o 1 to o n+1 along this path by successive reads and writes Systems Security 6

Low-Water-Mark Policy Idea: when s reads o, i(s) = min(i(s), i (o)); s can only write objects at lower levels Rules 1. s S can write to o O if and only if i(o) i(s). 2. If s S reads o O, then i (s) = min(i(s), i(o)), where i (s) is the subject s integrity level after the read. 3. s 1 S can execute s 2 S if and only if i(s 2 ) i(s 1 ). Systems Security 7

Information Flow and Model If there is an information transfer path from o 1 O to o n+1 O, enforcement of low-water-mark policy requires i(o n+1 ) i(o n ) for all n > 1. proof: by induction Systems Security 8

Problems Subjects integrity levels decrease as system runs Soon no subject will be able to access objects at high integrity levels Alternative: change object levels rather than subject levels Soon all objects will be at the lowest integrity level Crux of problem: model prevents indirect modification Because subject levels lowered when subject reads from low-integrity object Systems Security 9

Ring Policy Idea: subject integrity levels static Rules 1. s S can write to o O if and only if i(o) i(s). 2. Any subject can read any object. 3. s 1 S can execute s 2 S if and only if i(s 2 ) i(s 1 ). Eliminates indirect modification problem Same information flow result holds Systems Security 10

Strict Integrity Policy ( Biba Model ) Similar to Bell-LaPadula model 1. s S can read o O iff i(s) i(o) 2. s S can write to o O iff i(o) i(s) 3. s 1 S can execute s 2 S iff i(s 2 ) i(s 1 ) Need to add compartments (and discretionary controls) to get full dual of Bell-LaPadula model Information flow result holds Term Biba Model refers to this Systems Security 11

Biba Implementation on LOCUS OS Goal: prevent untrusted software from altering data or other software Approach: make levels of trust explicit credibility rating based on estimate of software s trustworthiness (0 untrusted, n highly trusted) trusted file systems contain software with a single credibility level Process has risk level or highest credibility level at which process can execute Must use run-untrusted command to run software at lower credibility level Systems Security 12

Lipner s Integrity Matrix Model First realistic commercial model Combines Bell-LaPadula, Biba models to obtain model conforming to requirements Bell-LaPadula components Security clearances: security level (audit, low) + category (devlp, prodcode, proddata, ) Biba components Integrity clearances: classification (system, operational, low) + category (devlp, prod) Systems Security 13

Clark-Wilson Integrity Model Integrity defined by a set of constraints Data in a consistent or valid state when it satisfies these Example: Bank D today s deposits, W withdrawals, YB yesterday s balance, TB today s balance Integrity constraint: D + YB W Well-formed transaction move system from one consistent state to another Issue: who examines, certifies transactions done correctly? Systems Security 14

Entities CDIs: constrained data items Data subject to integrity controls UDIs: unconstrained data items Data not subject to integrity controls IVPs: integrity verification procedures Procedures that test the CDIs conform to the integrity constraints TPs: transaction procedures Procedures that take the system from one valid state to another Systems Security 15

Certification Rules 1 and 2 CR1 When any IVP is run, it must ensure all CDIs are in a valid state CR2 For some associated set of CDIs, a TP must transform those CDIs in a valid state into a (possibly different) valid state Defines relation certified that associates a set of CDIs with a particular TP Example: TP balance, CDIs accounts, in bank example Systems Security 16

Enforcement Rules 1 and 2 ER1 The system must maintain the certified relations and must ensure that only TPs certified to run on a CDI manipulate that CDI. ER2 The system must associate a user with each TP and set of CDIs. The TP may access those CDIs on behalf of the associated user. The TP cannot access that CDI on behalf of a user not associated with that TP and CDI. System must maintain, enforce certified relation System must also restrict access based on user ID (allowed relation) Systems Security 17

Users and Rules CR3 The allowed relations must meet the requirements imposed by the principle of separation of duty. ER3 The system must authenticate each user attempting to execute a TP Type of authentication undefined, and depends on the instantiation Authentication not required before use of the system, but is required before manipulation of CDIs (requires using TPs) Systems Security 18

Logging CR4 All TPs must append enough information (to an append-only CDI) to reconstruct the operation. This CDI is the log Auditor needs to be able to determine what happened during reviews of transactions Systems Security 19

Handling Untrusted Input CR5 Any TP that takes as input a UDI may perform only valid transformations, or no transformations, for all possible values of the UDI. The transformation either rejects the UDI or transforms it into a CDI. In bank, numbers entered at keyboard are UDIs, so cannot be input to TPs. TPs must validate numbers (to make them a CDI) before using them; if validation fails, TP rejects UDI Systems Security 20

Separation of Duty In Model ER4 Only the certifier of a TP may change the list of entities associated with that TP. No certifier of a TP, or of an entity associated with that TP, may ever have execute permission with respect to that entity. Enforces separation of duty with respect to certified and allowed relations Systems Security 21

Comparison: Requirement 1 Users will not write their own programs, but will use existing production programs and databases. Users can t certify TPs: CR5 and ER4 enforce it Systems Security 22

Comparison: Requirement 2 Programmers will develop and test programs on a non-production system; if they need access to actual data, they will be given production data via a special process, but will use it on their development system. Procedural, so model doesn t directly cover it; but special process corresponds to using TP No technical controls can prevent programmer from developing program on production system; usual control is to delete software tools Systems Security 23

Comparison: Requirement 3 A special process must be followed to install a program from the development system onto the production system. TP does the installation, trusted personnel do certification Systems Security 24

Comparison: Requirement 4 The special process in requirement 3 must be controlled and audited. CR4 provides logging; ER3 authenticates trusted personnel doing installation; CR5, ER4 control installation procedure New program UDI before certification, CDI (and TP) after Systems Security 25

Comparison: Requirement 5 The managers and auditors must have access to both the system state and the system logs that are generated. Log is CDI, so appropriate TP can provide managers, auditors access Access to state handled similarly Systems Security 26

Comparison to Biba Biba No notion of certification rules; trusted subjects ensure actions obey rules Untrusted data examined before being made trusted Clark-Wilson Explicit requirements that actions must meet Trusted entity must certify method to upgrade untrusted data (and not certify the data itself) Systems Security 27

Hybrid Policies Chinese Wall Model Focuses on conflict of interest RBAC Base controls on job function Systems Security 28

Chinese Wall Model Problem: Tony advises American Bank He is also asked to advise Toyland Bank Conflict of interest to accept, because his advice for either bank would affect his advice to the other bank Systems Security 29

Organization Organize entities into conflict of interest classes Control subject accesses to each class Control writing to classes to ensure information flow is not violating rules Sanitized data can be viewed by everyone Systems Security 30

Definitions Objects: items of information related to a company Company dataset (CD): contains objects related to a single company: CD(O) Conflict of interest class (COI): contains datasets of companies in competition: COI(O) Assume: each object belongs to exactly one COI class Systems Security 31

Example Bank COI Class Gasoline Company COI Class Bank of America Shell Oil Standard Oil Citibank Bank of the W est Union 76 ARCO Systems Security 32

Temporal Element If Anthony reads any CD in a COI, he can never read another CD in that COI Possibility: information learned earlier may allow him to make decisions later! PR(S) = set of objects that S has already read Systems Security 33

CW-Simple Security Condition s can read o iff either condition holds: 1. There is an o such that s has accessed o and CD(o ) = CD(o) (s has already read something in o s dataset) 2. For all o PR(s) COI(o ) COI(o) (s has not read any objects in the conflict of interest class of o) Ignores sanitized data (see below) Initially, PR(s) =, so initial read request granted Systems Security 34

Sanitization Public information may belong to a CD As is publicly available, no conflicts of interest arise So, should not affect ability of analysts to read Typically, all sensitive data removed from such information before it is released publicly (called sanitization) Add option to CW-Simple Security Condition: 3. o is a sanitized object Systems Security 35

Writing Anthony, Susan work in same trading house Anthony: can read Bank1, Gas Susan: can read Bank2, Gas If Anthony could write to Gas then Susan could read it too! Hence, indirectly, she can read information from Bank 1 s CD, a clear conflict of interest Systems Security 36

CW-*-Property s can write to o iff both of the following hold: 1. The CW-simple security condition permits s to read o; and 2. For all unsanitized objects o, if s can read o, then CD(o ) = CD(o) Says that s can write to an object if all the (unsanitized) objects it can read are in the same dataset Systems Security 37

Compare to Bell-LaPadula Fundamentally different CW has no security labels, B-LP does CW has notion of past accesses, B-LP does not Bell-LaPadula can emulate current state of CW only Bell-LaPadula cannot track changes over time Susan becomes ill, Anna needs to take over C-W history lets Anna know if she can No way for Bell-LaPadula to capture this Access constraints change over time Initially, subjects in C-W can read any object Bell-LaPadula constrains set of objects that a subject can access Can t clear all subjects for all categories, because this violates CWsimple security condition Systems Security 38

Compare to Clark-Wilson Clark-Wilson Model covers integrity also If subjects and processes are interchangeable, a single person could use multiple processes to violate CW-simple security condition Would still comply with Clark-Wilson Model If subject is a specific person and includes all processes the subject executes, then consistent with Clark-Wilson Model Systems Security 39

Role Based AC (RBAC) Access depends on function, not identity Example: Allison, bookkeeper for Math Dept, has access to financial records. She leaves. Betty hired as the new bookkeeper, so she now has access to those records The role of bookkeeper dictates access, not the identity of the individual. Systems Security 40

Definitions Role r: collection of job functions trans(r): set of authorized transactions for r Active role of subject s: role s is currently in actr(s) Authorized roles of a subject s: set of roles s is authorized to assume authr(s) canexec(s, t) iff subject s can execute transaction t at current time Systems Security 41

Axioms Let S be the set of subjects and T the set of transactions. Rule of role assignment: ( s S)( t T) [canexec(s, t) actr(s) ]. If s can execute a transaction, it has a role This ties transactions to roles Rule of role authorization: ( s S) [actr(s) authr(s)]. Subject must be authorized to assume an active role (otherwise, any subject could assume any role) Systems Security 42

Axiom Rule of transaction authorization: ( s S)( t T) [canexec(s, t) t trans(actr(s))]. If a subject s can execute a transaction, then the transaction is an authorized one for the role s has assumed Systems Security 43

Hierarchy of Roles Trainer (r) can do all transactions that trainee (r ) can do (and then some). This means role r contains role r (r > r ). Access to one role implies access to all roles containing it: ( s S)[ (r authr(s)) (r > r ) r authr(s) ] Systems Security 44

Separation of Duty Let r be a role, and let s be a subject such that r auth(s). Then the predicate meauth(r) (for mutually exclusive authorizations) is the set of roles that s cannot assume because of the separation of duty requirement. Separation of duty:( r 1, r 2 R) [ r 2 meauth(r 1 ) [ ( s S) [ r 1 authr(s) r 2 authr(s) ] ] ] Systems Security 45

Key Points Integrity policies deal with trust As trust is hard to quantify, these policies are hard to evaluate completely Look for assumptions and trusted users to find possible weak points in their implementation Biba based on multilevel integrity Clark-Wilson focuses on separation of duty and transactions Hybrid policies deal with both confidentiality and integrity Chinese Wall models conflicts of interest RBAC model controls access based on functionality Systems Security 46