Information Security Information & Network Security Lecture 2
|
|
|
- Julian Skinner
- 10 years ago
- Views:
Transcription
1 1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term
2 2 Security Policies
3 3 Introduction So you ve succeeded as SO in convincing people that taking care of information security and assessing the risks is a good idea What s next? Implementing everything and putting things in practice
4 4 Introduction (2) Implementing information security is not just about scrambling like mad to install the newest patches get firewalls up and running install virus scanners It s also about putting sensible practices and procedures in place We re still talking about administrative/management side, we ll look at technical issues later
5 5 Security Policies This is where the concept of a security policy comes into play It is a (set of) document(s) in which an organization s philosophy strategy practices with regard to confidentiality, integrity, and availability of information and information systems are laid out
6 6 Security Policies (2) What can policies do that technology alone can t? Tie in upper management: technological controls are the responsibility of an IT administrator/manager, policies are those of upper management If an organization has legal obligations to fulfill, it can provide a paper trail Define a strategy with regard to security: what to protect and to which degree (rather than how) Serve as a guide to information security for employees
7 7 Defining a Security Policy First step: find out about your risks (risk assessment) Policies can be seen as a risk-control mechanism (a procedural one rather than a technical one) Goal of a control mechanism is to get risk down to an acceptable level Policy should cover risks identified during risk assessment Before going into concrete examples, we ll define some important concepts of security policies
8 8 Formal Models An important aspect of security policies are classification and access control models: Distinguishes between various groups of people, systems, and information in terms of security Determines who is authorized to access which information on which system Access Control usually comes in two different flavors: Discretionary Access Control (DAC) Mandatory Access Control (MAC)
9 9 Discretionary vs. Mandatory Discretionary Access Control (DAC) Each data object is owned by a user and user can decide freely which other users are allowed to access data object Many operating systems follow this line Mandatory Access Control (MAC) Access is controlled by a system-wide policy with no say by the users Military systems often use this kind of control We ll now look at some concrete models
10 10 Access Control Matrix One of the earliest models to emerge was the Access Control Matrix An Access Control Matrix is used to describe the protection state of information or a system More formally, there are objects o that need to be protected objects can be files, devices, processes subjects s who want to access the objects subjects can be users, other processes rights r(s, o) that specify which type of access subject s is permitted on object o access rights can include read, write, execute, own
11 11 Access Control Matrix (2) This is organized in a matrix: subjects are in the rows, objects in the columns, and the rights in the cells o 1 o 2 o 3... s 1 r 1 11, r 2 11,... r 1 12, r 2 12,... r 1 13, r 2 13, s 2 r 1 21, r 2 21,... r 1 22, r 2 22,... r 1 23, r 2 23, s 3 r 1 31, r 2 31,... r 1 32, r 2 32,... r 1 33, r 2 33,
12 12 Example Here s a bookkeeping example with different users and objects: Operating Accounting Accounting Audit System Application Data Trail Alice (sysadmin) rwx rwx r r Bob (manager) rx x - - Charlie (auditor) rx r r r Acc. Application rx r rw w (r: read access, w: write access, x: execution permission, -: no rights)
13 13 Problems with Access Control Matrices If applied in a straightforward fashion, this matrix doesn t scale very well Example: bank with 50,000 staff and 300 applications 15,000,000 million entries On top of that, most entries are empty: storing a sparsely populated matrix explicitly wastes a lot of space Solution: only store entries that actually exist, can be done in two different ways: by row, store privileges with user (capability lists) by column, store privileges with objects (access control lists)
14 14 Capability Lists Storing the example matrix by rows would yield the following capability lists: Alice Op. Sys.: rwx, Acc. App.: rwx, Acc. Data: r, Audit: r Bob Op. Sys.: rx, Acc. App.: x Makes it difficult to check who has privileges for certain files One would have to look at every list
15 15 Access Control Lists Storing the example matrix column-wise would result in the following access control lists Op. Sys. Alice: rwx, Bob: rx, Charlie: rx, Acc. App.: rx Acc. App. Alice: rwx, Bob: x, Charlie: r, Acc. App.: r Acc. Data. Alice: r, Charlie: r, Acc. App.: rw Makes it easier to check who can access which file (and, if necessary, revoke the rights) However, lists may still be too long and it may be too tedious to manage them One solution is to organize users into groups
16 16 Access Control Lists (2) Grouping users is an approach employed by many operating systems For example, in UNIX/Linux systems you have the following partitioning: - rwx }{{} self self: owner of a file group: a group of users sharing common access other: everyone else r-x }{{} group r-x }{{} other alice is the name of the owner users is the name of a group accounts is the name of a file alice users accounts
17 17 Access Control Lists (3) However, ownership of a file is still under control of a single user This user can pass on access permissions as they see fit Assigning users to groups is usually done by a system administrator, though This might not always be appropriate for (larger) organizations There is a model called role-based access control, which we will look at after introducing some other models
18 18 Summary Access Control Matrix An Access Control Matrix specifies permissions on an abstract level limits the damage that certain subjects can cause in the form described above is a snapshot view (dynamic behavior is not described)
19 19 Bell-La Padula Model In the Bell-La Padula (BLP) model, every document (or information object) has a security classification The more sensitive the information, the higher the classification level Examples for typical levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc) Every user of the system has a clearance (level) Classification and clearance levels are not decided by the users, some certified entity has to do this To be able to access a document, a user must have at least the level of the document The concept of this model originated in the military Let s define this more formally
20 20 Bell-La Padula Model (2) Assume that you have a data object o a subject s Let c(o) be the classification of o and c(s) be the clearance of s BLP enforces the following two properties: Simple security property: s may have read access to o only if c(o) c(s) * (star) property: s, who has read access to o, may have write access to another object p only if c(o) c(p)
21 21 Bell-La Padula Model (3) First rule is quite straightforward: no-one may access information that is classified higher than their clearance Second rule seems counterintuitive at first glance Intended to prevent a write-down effect write-down : more highly classified information is passed to a lower classified object BLP can be extended by categories
22 22 Categories Categories (or compartments) describes types of information Each data object may be assigned to different categories (multiple categories are possible) A subject should only have access to information that they need to do their job In addition to a clearance level, a subject is also assigned a set of categories (which they are allowed to access)
23 23 Categories (2) Let s assume we have the categories NUC, EUR, US All possible subsets of these categories form a lattice with regard to the subset relation: A person with access to { NUC, US } may look at data objects categorized as { NUC, US }, { NUC }, { US }, or (uncategorized), subject to clearance level
24 24 Summary BLP In essence BLP enforces confidentiality Can be explained by its military origin Does not handle data integrity (or only to a very limited extent) We ll have a look at some other models now (which also ensure integrity)
25 25 Clark-Wilson Integrity Model In a commercial environment, preventing unauthorized modification of data is at least as important as preventing disclosure Examples: Preventing fraud (or mistakes) in accounting Inventory control: Still works if information is disclosed May break down if too much data is incorrect
26 26 Clark-Wilson Integrity Model (2) BLP protects data against unauthorized users The Clark-Wilson (CW) integrity model also tries to protect data against authorized users This has started long before computers, two mechanisms are especially important Well-formed transaction: user is constrained in the way they can manipulate data, e.g. record a log of changes double entry bookkeeping Separation of duty: executing different subparts of a task by different persons, e.g. authorizing purchase order, recording arrival, recording arrival of invoice, authorizing payment
27 27 Clark-Wilson Integrity Model (3) How are these concepts translated for data integrity in information systems? Identify Constrained Data Items (CDIs) These are data items for which integrity has to be upheld Not all data items need to be CDIs, other data items are called Unconstrained Data Items (UDIs) The integrity policy is defined by two classes of procedures: Integrity Verification Procedures (IVPs) Transformation Procedures (TPs)
28 28 Integrity Verification Procedures IVPs check that all CDIs in the system conform to integrity constraints On successful completion this confirms that at the time of running an IVP, the integrity constraints were satisfied Example for accounting: Audit functions are typical IVPs For example, an auditor confirms that the books are balanced and reconciled
29 29 Transformation Procedures TPs correspond to the concept of a well-formed transaction Applying a TP to a CDI in a valid state will result in a CDI that is still in a valid state Example for accounting: A double entry transaction is a TP
30 30 IVPs and TPs CW works in the following way: We start in a valid state (confirmed by IVPs) We only manipulate CDIs with TPs We will always be in a valid state What s missing? A system can enforce that CDIs are only manipulated by TPs A system cannot ensure (on its own) that the IVPs and TPs are well-behaved IVPs and TPs need to be certified by someone
31 31 Certification The security officer (or an agent with similar responsibilities) certifies IVPs and TPs with respect to an integrity policy This is usually not done automatically, but semi-automatically (i.e. some human intervention is necessary) Accounting example: SO certifies that TPs implement properly segregated double entry bookkeeping
32 32 CW Model Assuring the integrity in CW consists of two important parts: Certification (which is done by a human) Enforcement (which is done by a system) CW consists of a set of rules referring to certification (C-rules) and enforcement (E-rules)
33 33 Concrete Rules Basic framework: C1: (IVP certification) Successful execution of IVPs confirms that all CDIs are in a valid state C2: (TP certification) Agent specifies relations of the form (TP i, (CDI i1, CDI i2,... )) that defines for which CDIs TP i returns valid states E1: (TP enforcement) System maintains a list of relations and only allows manipulation of CDIs via the specified TPs
34 34 Concrete Rules (2) Separation of duty: C3: (User certification) Agent specifies relations of the form (UserID, TP i, (CDI i1, CDI i2,... )) that defines which TPs may be executed on which CDIs on behalf of which user E2: (User enforcement) System maintains a list of relations and enforces them E3: (Authentication) Each user must be authenticated before executing a TP for that user E4: (Certification and execution) Only an agent permitted to certify entities may change relations, this agent may not have any execution rights with respect to that entity
35 35 Concrete Rules (3) Logging/Auditing: C4: (Logging) All TPs must be certified to write to an append-only log, making it possible to reconstruct each executed operation There s no special enforcement rule, because the log can be modeled as a CDI and each TP has to be certified to append to this CDI We re almost done...
36 36 Concrete Rules (4) Relationship between UDIs and CDIs C5: (Transformation) Any TP taking a UDI as an input must be certified to only use valid transformations when taking the UDI input to a CDI or reject the UDI This is important as new information is fed into a system via UDIs For example, data typed in by a user may be a UDI
37 37 Summary CW CW enforces integrity: Uses two different integrity levels: CDIs and UDIs (CDI being the higher level) Upgrades from UDIs to CDIs via certified methods Could also enforce confidentiality (not a main concern in the original model): If users are only allowed to access data through Transformation Procedures as well Although in this case, no data will be changed
38 38 Role-Based Access Control Role-based Access Control (RBAC) is a mandatory access control model Mainly for commercial/civilian applications, so does not have the different levels of secrecy of Bell-La Padula Can be seen as a more strict version of the Access Control List (ACL) Main difference to ACL: in RBAC a certified entity grants and revokes privileges, this is not done by the user
39 39 Roles Similar to ACL RBAC also puts users into different groups, these are called roles Depending on their current role, users can access (and modify) certain data objects For example, in a hospital setting you could have the following roles: doctors, nurses, pharmacists, administrators While doctors may modify a diagnosis file, administrators may not do so Let s give a more formal description now
40 40 Formal Definition In RBAC you have a subject s role r transaction t (transactions access/modify data) object o mode x (read, write, execute, etc.) Furthermore, there are AR(s): the active role of s, i.e. the role s is currently using RA(s): the roles s is authorized to perform TA(r): the transactions a role is authorized to perform
41 41 Formal Definition (2) A subject s may execute a transaction t if exec(s, t) is true exec(s, t) is true, if and only if s can execute t at the current time This is determined by AR(s) and TA(r) This is the case if t TA(AR(s))
42 42 Rules in RBAC RBAC enforces the following rules 1 Role assignment: the assignment of a role is a necessary prerequisite for executing transactions For all s, t : exec(s, t) can only be true if AR(s) 2 Role authorization: a subject s active role must be authorized For all s : AR(s) RA(s) 3 Transaction authorization: s can execute t only if t is authorized for the active role of s For all s, t : exec(s, t) is true only if t TA(AR(s))
43 43 Rules in RBAC (2) Access modes can be defined for transactions (to allow a finer granularity) This defines what a user (in a certain role) can do with data (read-only, modify, etc.) access(r, t, o, x) is true, if and only if role r may execute transaction t on object o in mode x So sometimes a fourth rule is added to RBAC: 4 For all s, t, o : exec(s, t) is true, only if access(ar(s), t, o, x) is true
44 44 Role Relationships The relationship between users, roles, transactions, and objects can also be described graphically Object 1 transaction_a member_of User 1 Role 1 Object 2 transaction_b member_of User 2 A more concrete example in a hospital setting: Patient file 1 prescribe_drug member_of Dr House doctor Patient file 2 diagnose member_of Dr Wilson
45 45 Summary RBAC Often MAC is equated with military applications, while DAC is seen as appropriate for commercial/civilian applications However, DAC might not always provide the appropriate security in a commercial/civilian setting RBAC fills this gap: it s a MAC model without the specific military requirements
46 46 Summary of Formal Models Access Control Matrix, BLP, CW, and RBAC are just four (though important) models Other well-known models include Biba (integrity) and Chinese Wall (hybrid) Due to time constraints they are not discussed here We will now turn our attention to the management side of security policies
47 47 Organization-wide Policies Ideally, a policy for an organization should be light, i.e. not covering hundreds or even thousands of pages simple and practical easy to manage and maintain accessible, i.e. people can find what they re looking for Policy should be organized in a hierarchical fashion: Security framework paper Position papers (on specific issues)
48 48 Organization-wide Policies (2)
49 49 Framework Paper The security framework document should state an organization s commitment to information security define a classification system (e.g. based on one of the discussed formal models) make clear that users and administrators will be held accountable for their behavior give the SO appropriate authority to enforce security policy state clearly the responsibilities that individuals have define how security will be reviewed
50 50 Position Papers Position papers address specific aspects of the security policy, e.g. how to configure servers connected to the internet the process to be followed in the event of a security breach should be focused and kept short can have different authors (should be written by someone with expertise in the area)
51 51 Position Papers (2) Exact topics depend on the organization, here are some important ones: Physical security Network security Access control Authentication Encryption Key management Compliance Auditing and Review Security Awareness Incident response and contingency plan
52 52 Content of Position Papers Scope: should describe which issue, organizational unit, or system is covered Ownership: name and contact details of the document owner Validity: policies can/should have limited lifespans (after which they re reviewed) Responsibilities: who is responsible for which elements Compliance: the consequences of non-compliance with the policy Supporting documentation: references to documents higher and lower in the policy structure Position statement: statements about the actual issue or system (the hard part) Review: whether, when, and how issue or system will be reviewed
53 53 Summary Policies are an important part of information security, as they also cover the non-technical side There s no one size fits all, policy must be adapted to the risk profile of an organization There are (customizable) policy solutions out there, so not everything has to be done from scratch Security policies should be easy to access, use and understand For a more detailed example, see
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
Part III. Access Control Fundamentals
Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module
CS 665: Computer System Security Designing Trusted Operating Systems Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Trusted? An operating system is
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
SELinux Policy Management Framework for HIS
SELinux Policy Management Framework for HIS by Luis Franco Marin (05592763) BSc., MIT This thesis is presented in fulfilment of the requirements of the degree of Master of Information Technology (Research)
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg
Lecture 3 Access Control Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M. Introduction
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Introduction to Computer Security
Introduction to Computer Security Access Control and Authorization Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access recapitulated 1. Identification Which object O requests
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
Domain 9 Security Architecture and Design
Domain 9 Security Architecture and Design Common Architecture Frameworks An architecture framework is a structure that can be used to develop a broad range of architectures, which typically provides a
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
10 Things IT Should be Doing (But Isn t)
Contents Overview...1 Top Ten Things IT Should be Doing...2 Audit Data Access... 2 Inventory Permissions and Directory Services Group Objects... 2 Prioritize Which Data Should Be Addressed... 2 Remove
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
RBAC and HIPAA Security
Chief Executive, HIPAA Academy RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Session Objective Challenges HIPAA Requirements Seven Steps to HIPAA Security Access Control RBAC Information Access
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21
Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed
Outline. INF3510 Information Security University of Oslo Spring 2015. Lecture 9 Identity Management and Access Control. The concept of identity
INF50 Information Security University of Oslo Spring 05 Outline Identity and access management concepts Identity management models Access control models (security models) Lecture 9 Identity Management
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Database Security Part 7
Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Goal-Oriented Auditing and Logging
1. Introduction Goal-Oriented Auditing and Logging Matt Bishop Christopher Wee Jeremy Frank Department of Computer Science University of California at Davis Davis, CA 95616-8562 This paper presents a technique
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Access Control. 1 Overview of Access Control. Lecture Notes (Syracuse University) Access Control: 1. What is Access Control?
Lecture Notes (Syracuse University) Access Control: 1 Access Control 1 Overview of Access Control What is Access Control? The ability to allow only authorized users, programs or processes system or resource
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
INFO/CS 330: Applied Database Systems
INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke [email protected] http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be
Session objectives. Access control. Subjects and objects. The request. Information Security
The session Session objectives Access Control Information Security Dr Hans Georg Schaathun Introduce fundamental terminology of access control Understand principles of privilege management and identity
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Can You be HIPAA/HITECH Compliant in the Cloud?
Can You be HIPAA/HITECH Compliant in the Cloud? Background For the first 10 years of its existence, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was a toothless tiger. Although
Access Control Basics. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Basics Murat Kantarcioglu Access Control - basic concepts An access control system regulates the operations that can be executed
An Oracle White Paper March 2009. Oracle Label Security in Government and Defense Environments
An Oracle White Paper March 2009 Oracle Label Security in Government and Defense Environments Protecting Sensitive Information... 2 Oracle Label Security Overview... 2 Getting Started with Oracle Label
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
ISACA PROFESSIONAL RESOURCES
ISACA PROFESSIONAL RESOURCES SEGREGATION OF DUTIES WITHIN INFORMATION SYSTEMS This is an excerpt from the CISA Review Manual 2005 Chapter 2 - Management, Planning and Organization of IS CISA Review Manual
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman, Department of Biomedical Informatics Vanderbilt University School
SecTor 2009 October 6, 2009. Tracy Ann Kosa
SecTor 2009 October 6, 2009 Tracy Ann Kosa Privacy versus Security Un enforced Privacy Privacy Requirements that Work People Process Technology Territorial Privacy Setting boundaries on intrusion into
INF3510 Information Security University of Oslo Spring 2012. Lecture 8 Identity and Access Management. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2012 Lecture 8 Identity and Access Management Audun Jøsang Outline Identity and access management concepts Identity management models Access control
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 17 IT Security Controls, Plans and Procedures First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Implementing IT Security
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager
Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager Introduction The past several years has seen an increase in the amount of attention paid to security management
INF3510 Information Security University of Oslo Spring 2016. Lecture 9 Identity Management and Access Control
INF3510 Information Security University of Oslo Spring 2016 Lecture 9 Identity Management and Access Control University of Oslo Spring 2016 Outline Identity and access management concepts Identity management
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS [email protected]
CEN 559 Selected Topics in Computer Engineering Dr. Mostafa H. Dahshan KSU CCIS [email protected] Access Control Access Control Which principals have access to which resources files they can read
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
An Introduction to HIPAA and how it relates to docstar
Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
Implementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, [email protected] Steve Davis, Clemson University, [email protected] ABSTRACT People considering improvements in database
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
