1 IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield
2 Domain Overview Identify key principles and concepts critical to securing the infrastructure Design Implementation Operation Ensure security from a hardware/software level Operating Systems Applications Equipment Networks
3 CISSP Expectations Identify physical components of IT architecture Understand software relationships Understand design principals for the architecture Describe how to secure an enterprise Identify trusted and un-trusted components Discuss security models and architecture theory Identify appropriate protection mechanisms Discuss evaluation methods and criteria Understand the role of assurance evaluations Explain certification and accreditation Identify techniques used to provide system security
4 System Architecture Three basic components CPU Central Processing Unit Storage Devices includes both long and short-term storage, such as memory and disk Peripherals includes both input and output devices, such as keyboards and printer
5 ALU Arithmetic Logic Unit Control Unit Registers General and special registers Bus Address and data Privileged mode or user mode Multiprocessor - symmetric or asymmetric CPU Computer Brain
6 CPU Example
7 Storage Devices Primary Storage Cache or registers Memory (RAM, ROM, Cache, Flash) Secondary Storage Disk CD or Tape Virtual Memory Memory
8 Peripherals or I/O Devices Some examples are Monitor Keyboard Printers
9 Basic Components Diagram
10 An Operating System provides an environment to run applications Operating System Architecture Process Management for all processes Process - a set of instructions and the information & resources needed to process it. Multitasking cooperative, preemptive Process State running, ready, blocked
11 Application Programs Applications interact with the operating system to perform a task Each application is a process Applications run in user mode Threads Other applications Firmware and Middleware
12 Protection Rings
13 Security Policy documents the security requirements for an organization Security Models Security Model formally outlines the requirements needed to support the security policy, and how authorization is enforced Reference Monitor abstract machine that provides auditable access control to objects Trusted Computing Base (TCB)
14 Biba Integrity Model Security Model Examples Bell-LaPadula Confidentiality Model Clark-Wilson Integrity Model Brewer and Nash Model Others State Machine Model Non-Interference Model Graham Denning Model Harrison-Ruzzo-Ullman Model
15 Subject to object model Objects you are able to access Bell-LaPadula Confidentiality Model Used to provide confidentiality 3 main rules used and enforced Simple security rule (no read up)» Subject cannot read data at a higher level The *-property rule (no write down)» Subject cannot write data to a lower level Strong star property rule» Subject with read/write only at same level
16 Similar to the Bell-LaPadula Model Biba Security Model First to address integrity Difference between Biba and Bell-LaPadula Two main rules used and enforced *-integrity axiom (no write up)» Subject cannot write data to objects at higher level Simple integrity axiom (no read down)» Subject cannot read data from lower level Biba and BP are informational flow models Concerned with data flowing up or down levels
17 Clark-Wilson Model Addresses all 3 integrity model goals Prevent unauthorized users from making modifications Prevent authorized users from making improper modifications (separation of duties) Maintain internal/external consistency (well-formed transaction)
18 Other Models Non-interference model - Actions at a higher level (domain) cannot interfere with actions at a lower level. State machine model - Abstract math model that uses state variables to represent the system state. Failure of a state machine should fail in a secure state. Graham-Denning Modem Used eight basic protection rules. Brewer and Nash Model (Chinese Wall Model) - Allows for dynamically changing access controls to protect against conflicts of interest
19 Evaluation Methods and Criteria Trusted Computer Security Evaluation Criteria (TCSEC) addresses confidentiality only A Verified protection» A1 verified design B Mandatory Protection» B3 Labeled Security» B2 Structured Protection» B1 Labeled Security C Discretionary Protection» C2 Discretionary Protection» C1 Controlled Access D Minimal Security Others are ITSEC, SEI Common Criteria (ISO) based on TCSEC & ITSEC Evaluation Assurance Levels (EAL 1 7 )
20 Certification and Accreditation These are distinct steps Certification relates to validation of the system» Security modes of operation» Data sensitivity handling procedures» System and facility configuration» Intercommunication with other systems Accreditation relates to management evaluation once the certification process is complete. Does the system meet the needs of the business while satisfying the security needs?
Chapter 9........................................ Shih planned to make a great wall by extending and enlarging preexisting walls made by previous rulers. This great wall would serve as a barricade to keep
Microsoft Windows Common Criteria Evaluation Microsoft Windows Server 2008 R2 Hyper-V Security Target Document Information Version Number 2.6 Updated On Thursday, January 12, 2012 Microsoft Corporation
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
Best Practice Guide for Securing Active Directory Installations Microsoft Corporation First published: October 2005 Updated and republished: January 2009 Abstract This guide contains recommendations for
BlackBerry Enterprise Solution for Microsoft Exchange Security Analysis Fraunhofer SIT Certification Report 06-104302 Copyright Notice The content of this document is owned by Fraunhofer Gesellschaft e.
FIRST Site Visit Requirements and Assessment Document originally produced by CERT Program at the Software Engineering Institute at Carnegie Mellon University And Cisco Systems PSIRT Revision When Who What
Ph.D Dissertation Proposal A Firewall Model of File System Security By Lihui Hu Department Of Computer Science Michigan Technological University March 2010 Committee Members: Dr. Jean Mayo, Chair Dr. Steve
BSI-DSZ-CC-0848-2012 for Red Hat Enterprise Linux, Version 6.2 on IBM Hardware for Power and System z Architectures from Red Hat, Inc. BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach
Basic System Administration ESX Server 3.0 and VirtualCenter 2.0 Basic System Administration Revision: 20090213 Item: VI-ENG-Q206-219 You can find the most up-to-date technical documentation at: http://www.vmware.com/support/pubs
TCG PC Client Specific Implementation Specification for Conventional BIOS Specification Version 1.21 Errata Revision 1.00 February 24 th, 2012 For TPM Family 1.2; Level 2 Contact: firstname.lastname@example.org
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
Configuration, Change, and Release Management Policies and Procedures Guide Table of Contents Section 1 Introducing Configuration, Change, and Release Management...5 1.1 Overview of Configuration, Change,
Security Target for Oracle Database 11g Release 2 (220.127.116.11) Standard Edition and Standard Edition One October 2011 Version 1.3 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores,
Version: 9.02 Status: Final Last Update: 2012-09-09 Classification: Public Trademarks The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
AWS Security Best Practices Dob Todorov Yinal Ozkan November 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 56 Table of Contents Abstract... 4 Overview...
Microsoft Exchange Server 2010 Microsoft William R. Stanek Author and Series Editor Administrator s Pocket Consultant Microsoft prepress is early content, straight from the source. What makes it prepress?
Windows Firewall with Advanced Security Design Guide and Deployment Guide Microsoft Corporation Published: October 2008 Author: Dave Bishop Editor: Allyson Adley Reviewers: Bilal Aijazi, Boyd Benson, Shalaka
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Guide to SATA Hard Disks Installation and RAID Configuration 1. Guide to SATA Hard Disks Installation...2 1.1 Serial ATA (SATA) Hard Disks Installation...2 2. Guide to RAID Configurations...3 2.1 Introduction
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
BEST PRACTICES WHITE PAPER Leveraging the Synergy between Identity Management and ITIL Processes Ken Turbitt, best practices director, BMC Software Rami Elron, senior system architect, Identity Management,
BSI-DSZ-CC-0755-2012 For Microsoft Windows Server 2008 R2 Hyper-V, Release 6.1.7600 from Microsoft Corporation BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn