Domain 9 Security Architecture and Design

Size: px
Start display at page:

Download "Domain 9 Security Architecture and Design"

Transcription

1 Domain 9 Security Architecture and Design Common Architecture Frameworks An architecture framework is a structure that can be used to develop a broad range of architectures, which typically provides a method for designing a target state as an integrated set of systems of system components a set of tools to ease architecture development a common vocabulary a set of recommended standards and operational practices information on compliant vendor products, modules, or components that can be used as design elements Strategic alignment means the business drivers and the regulatory and legal requirements are being met by the security architecture Business enablement means the core business processes are integrated into the security operating model they are standards- based and follow risk tolerance- based criteria Security effectiveness deals with metrics, meeting service level agreement (SLA) requirements, return on investment (ROI), meeting set baselines, and providing management with a dashboard or balanced scorecard system Other keywords: process enhancement, process reengineering The Zachman Framework for Enterprise Architecture Not security- specific Two- dimensional model that uses communication interrogatives intersecting with different levels Uses 6 perspectives to describe a holistic information infrastructure

2 What How Where Who When Why Scope context boundary (Planner) Business model concepts (Owner) System model logic (Designer) Technology model physics (Builder) Component configuration (Implementer) Functioning enterprise instances (Worker) SABSA The Sherwood Applied Business Security Architecutre is based on the Zachman framework The process analyses the business requirements at the outset, and creates a chain of traceability through the strategy and concept, design, Figure 1 The SABSA Model

3 implementation, and ongoing manage and measure phases of the lifecycle to ensure that the business mandate is preserved. TOGAF The Open Group s Open Group Architecture Framework was inspired by earlier frameworks from the US DoD ITIL The IT Infrastructure Library, developed by Britain s Central Computer and Telecommunication Agency, is the de facto standard of best practices for IT service management (IT governance) Service portfolio Service strategy Service catalogue Service design Service transition Service operations Continual service improvement Figure 2 ITIL version 3 in a nutshell Note: [HBH03] does not cover ITIL at all Security Models Basic Security Theorem: If a system initializes in a secure state and all allowed state transitions are secure, then every subsequent state will be secure Informal classification of security models [Har10]: State Machine Models Upon its initial start- up, the system checks to determine if it is in a secure state

4 Once the system is determined to be in a secure state, the state machine model will ensure that every time the system is accessed, it will be accessed only in accordance with the security policy rules This process will guarantee that the system will transition only from one secure state to another secure state (Multilevel) Lattice Models [HBH03] Lattice = a structure consisting of a finite partially ordered set together with least upper and greatest lower bound operators on the set An access class consists of a level and a category set, e.g., Top Secret {Iraq, Korea} Partial ordering relationships between access classes A and B: A > B, i.e. A s level B s, and A s category set B s category set A < B A = B, i.e. A > B and A < B None of the above is true System high contain the highest security level and all possible categories, hence dominates all other access classes System low contains no security level or category, hence is dominated by all other access classes Matrix- Based Models Access control matrix: subjects as rows, resources and functions as columns Can specify access in terms of capabilities (e.g., read, write, execute, etc.) Does not describe the relationship between subjects Noninterference Models

5 Any action that takes place at a higher security level does not affect, or interfere with, actions that take place at a lower level Minimizes leakages through covert channels Not concerned with the flow of data, but rather with what a subject knows about the system state Information Flow Models Focus on how information is allowed or not allowed between individual objects Bell- LaPadula Model Key properties: Simple security property: no read up *- property: no write down ds- property: (discretionary security) use of an access matrix to specify discretionary access control Strong *- property: alternative to *- property, where a subject with both read and write capabilities can only perform those functions at the same security level Tranquility principle: subjects and objects cannot change security levels once they have been instantiated Limitations: Only addresses confidentiality Does not address covert channels comprehensively Application limited to systems where security levels are static Biba Model Key properties: Simple integrity axiom: no read down *- integrity axiom: no write up Invocation property: A subject cannot invoke another subject at a higher integrity level Limitations [KAT00]:

6 Developed from a mathematical analysis of security models, so does not model any practical system, unlike Bell- LaPadula which was developed for military security systems Lipner Model Combines elements of Bell LaPadula and Biba with the idea of roles in a novel way to protect both confidentiality and integrity The first to separate objects into data and programs No known implementation of the Lipner model Clark- Wilson Model Key concepts [Fis01]: Well- formed transactions: a user should only manipulate data in constrained ways that preserve or ensure the internal consistency of data Separation of duties: all operations are separated into several subparts and each subpart should be executed by a different person Model elements: Constrained Data Item (CDI): data item within the system to which the policy must be applied Unconstrained Data Item (UDI): data item not covered by the policy (note: new data are put into the system as UDIs but may subsequently be transformed into CDIs) Integrity Verification Procedure (IVP): procedure for verifying that all CDIs in the system conform to the integrity specification at the time the IVPs are executed IVPs check that a system starts in a valid state, and periodically cross- check internal data with the external reality it represents Transformation Procedure (TP): procedure for transforming CDIs from one valid state to another

7 Access triple: A triple (UserID, TPi, (CDIa, CDIb,...)) that relates a user, a TP, and the data items that the TP may reference on the user s behalf Certification (by security officer, system owner, and system custodian) rules: C1: IVPs must ensure that all CDIs are in a valid state at the time the IVPs are run C2: All TPs must be certified to be valid. The security officer must specify for each TPi a relation (TPi, (CDIa, CDIb,...)), where (CDIa, CDIb,...) defines the set of arguments for which the TP is certified C3: Access triples must be certified to satisfy the separation of duty requirement C4: All TPs must be certified to write to the log (an append- only CDI) all information necessary for the operations to be reconstructed C5: Any TP that takes a UDI as an input value must be certified to perform only valid transformations (that convert a UDI to a CDI), or else no transformations, for any possible value of the UDI Transformation (by system) rules E1: The system must maintain the list of relations specified in rule C2, and must ensure that the only manipulation of any CDI is by a TP, where the TP is operating on the CDI as specified in some relation E2: The system must maintain a list of access triples, and ensure that only executions defined in any of the access triples are performed E3: The system must authenticate the identity of each user attempting to execute a TP E4: A user should not be able to modify the list of programs permitted to manipulate a particular data item, or to modify the list of users permitted to execute a given program Limitations [Fis01, KAT00]:

8 IVPs are difficult to implement in real- world IT systems Does not specify any way to certify TPs Brewer and Nash Model (Chinese Wall Model) Sanitized information is public information relating to all corporations Subject S can read object O if O is in the same company dataset already accessed by that subject, or O belongs to a different conflict of interest class (see Figure 3) Set of all objects Conflict of Interest Class A (e.g., banks) Conflict of Interest Class B (e.g., oil companies) Company dataset x Company dataset y Figure 3 Composition of company information objects in the Chinese Wall policy Subject S can write object O if S can read O by the read rule, and S cannot read any object that belongs to a company dataset different from the one for which write access is requested, and that contains unsanitized information This confines unsanitized information to its own company dataset, but allows sanitized information to flow freely throughout the system Advantages: Object y 1 Object y 2

9 Addresses confidentiality, and can be used to enforce the integrity principle of separation of duty Allows access permissions to change dynamically (so this model cannot be represented by the Bell- LaPadula Model) Limitations: Does not distinguish between human users and computer subjects too restrictive for practical systems [San92] Graham- Denning Model The first Discretionary Access Control model [Li05] The protection state of the system is represented as an access matrix A, with subjects identifying the row and objects the columns The entry A[S, O] contains access attributes specifying the access privileges held by subject S to object O Associated with each type of object is a monitor, through which all access to that type of objects must pass to be validated Rules to be implemented by the access matrix monitor [GD71]: R1: transfer access right R2: grant access right R3: delete access right R4: read access right R5: create object R6: destroy object R7: create subject R8: destroy subject Harrison- Ruzzo- Ullman Model This variation of the Graham- Denning model is designed to prove a point [HRU76, Fis01]: Commands model changes to the states of a system

10 A command takes the form command name (O 1,, O k) if r 1 in A[S 1,O 1] and r m in A[S m,o m] then op 1 op n end if A primitive operation op is one of enter r into A[S, O] delete r from A[S, O] create subject create object destroy subject destroy object The general safety problem for such a protection system is undecidable If a command is restricted to a single operation each, the safety problem is decidable, but this is impractical Security Modes of a Mandatory Access Control System To access any data in any security mode, a user must have signed an NDA, have clearance, formal access approval and a need to know for that data. Dedicated Security Mode: Supports single data classification. To access the system, a user must have clearance, formal access approval, and a need to know for all data on the system. System High- security Mode: Supports single data classification. To access the system, a user must have clearance, formal access approval, but not necessarily a need to know for all data on the system.

11 Compartmented Security Mode: Supports multiple data classifications. To access the system, a user must have clearance, but not necessarily formal access approval or a need to know for all data on the system. Multilevel Security Mode: Supports multiple data classifications. To access the system, a user does not necessarily need to have clearance, formal access approval or a need to know for all data on the system. Evaluation Criteria TCSEC (Trusted Computer System Evaluation Criteria) Aka Orange Book, superseded by Common Criteria The features of a class are a subset of the next higher class The documentation requirements of each class are omitted Class D: Minimal protection Class C1: Discretionary Security Protection Discretionary Access Control (DAC) controls access between named users and named objects Authenticates users (e.g., by passwords) and protects authentication data from unauthorized users TCB protects its own execution domain from tampering Periodically validates correct operation of hardware and software Class C2: Controlled Access Protection Fine- grained DAC (single- user granularity) Secures object reuse by clearing information contained with an object before allocating or reallocating it to any subject Enforces individual accountability by uniquely identifying each user and recording audit trails

12 Creates, maintains, and protects audit trails from tampering (audit trails must comply with a series of detailed requirements) Most general- purpose systems are rated at C2, e.g., Windows NT 4.0 Class B1: Labeled Security Based on an informally defined security policy model Enforces Mandatory Access Control (MAC) over all named subjects and objects under TCB s control Securely imports or exports labels of data under TCB s control Securely labels human- readable output Class B2: Structured Protection Based on a formally defined security policy model Extends DAC and MAC to all subjects and objects in the system (not only the TCB) Securely imports or exports data labels Supports a trusted communication path between users and itself for login and authentication Makes effective use of hardware to separate protection- critical and non- protection- critical elements Developer should conduct a thorough search for covert storage channels and determine the max bandwidth of each identified channel Supports separate operator and administrator functions Configuration management system controls changes to specification, source code, etc.; and ensures new version contains only intended changes Relatively resistant to penetration Class B3: Security Domains Implements reference monitor and be tamper- resistant Structure to exclude code not essential to security policy enforcement System engineering directed toward complexity minimization

13 Monitors for accumulation of security auditable events and notifies the security administrator when thresholds are exceeded Developer should conduct a thorough search for covert channels (both timing and storage) and determine the max bandwidth of each identified channel Ensures security administrator to perform functions after only taking a distinct auditable action Post- failure trusted recovery (no protection compromise) Highly resistant to penetration Class A1: Verified Design Functionality identical to B3 but more formal design and verification Common Criteria Protection profile: defines the environmental assumptions, the objectives, the functional and assurance level expectations Target of evaluation: Product proposed to provide a needed security solution Security target: Vendor s written explanation of security functionality and assurance mechanisms that meet the needed security solution ( This is what our product does and how it does it ) Product to be configured according to vendor s documentation to achieve rated security level EAL1: Functionally tested EAL2: Structurally tested EAL3: Methodically tested and checked EAL4: Methodically designed, tested and reviewed EAL5: Semiformally designed and tested EAL6: Semiformally verified, designed and tested EAL7: Formally verified, designed and tested

14 Note: wording semiformally verified design and tested and formally verified design and test in the original document suspected to be typo Computing Systems Types of read- only memory PROM can be programmed only once EPROM can erased using UV light EEPROM can be erased electrically one byte at a time Flash memory can be erased electrically one block at a time Operating System Multiprogramming: More than one program at a time Multitasking: More than one process at a time Multithreading: More than one thread per process at a time Multiprocessing: More than one CPU in the system Memory manager The memory manager has the following responsibilities: Physical organization Segment the physical memory space for application and operating system processes Relocation Swap contents from RAM to the hard drive as needed Provide pointers for applications if their instructions and memory segment have been relocated Protection Limit process to interact only with memory segment assigned to them Provide access control (read, write, execute) to memory segments Sharing

15 Use complex controls to ensure integrity and confidentiality when processes need to use the same shared memory segments Allow many users with different access rights to interact with the same application running in one memory segment Allow for the sharing of specific software modules, such as dynamic link library (DLL) procedures ([Har10] classifies this as logical organization) Input/Output Interrupted- driven I/O Programmed I/O (not Programmable I/O as in [Har10]) Synchronous because the processor is in direct control of every word of data transferred to or from the I/O device Unmapped I/O A DMA scheme where the software specifies physical addresses in memory The software trusts the I/O device that accesses the memory directly Premapped I/O (aka Virtual I/O) Unlike the unmapped case, the software specifies virtual addresses The processor checks whether the I/O device has the appropriate access permissions to the locations If yes, the processor translates the virtual addresses into physical addresses, before passing the physical addresses to the I/O device Fully mapped I/O More secure than premapped I/O The I/O device gets only virtual addresses Dedicated hardware translates virtual addresses to physical addresses on each memory reference made by the I/O device

16 Capability Maturity Model (CMM) The CMM describes procedures, principles, and practices that underlie software development process maturity It was developed to help software vendors improve their development process Five levels: Initial: Development process is ad hoc or even chaotic Repeatable: A formal management structure, change control and quality assurance are in place, but formal process models are not defined Defined: Formal procedures are in place that allow for quantitative process improvement Managed: Formal processes are in place to collect and analyze qualitative data, and metrics are defined and fed into the process- improvement program, to adjust and adapt the process to particular projects without measurable losses of quality or deviations from specifications Optimizing: The company has budgets and integrated plans for continuous process improvement References [Fis01] S. Fischer- Hubner, IT- Security and Privacy: Design and Use of Privacy- Enhancing Security Mechanisms, Springer- Verlag Berlin Heidelberg, [GD71] G. S. Graham and P. J. Denning, Protection: principles and practice, in Proceedings of the spring joint computer conference (AFIPS '72 (Spring)), pp , ACM, [HBH03] S. Hansche, J. Berti, and C. Hare, Official (ISC)2 Guide to the CISSP Exam, Auerbach Publications, [Har10] S. Harris, CISSP All- in- One Exam Guide, Fifth Edition, McGraw- Hill Osborne Media, 2010.

17 [HRU76] Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman, Protection in operating systems, Commun. ACM 19, 8 (August 1976), pp , [KAT00] Paul A. Karger, Vernon R. Austel, and David C. Toll, A New Mandatory Security Policy Combining Secrecy and Integrity, IBM Research Report RC (97406), [Li05] N. Li and M. V. Tripunitara, On safety in discretionary access control, IEEE Symposium on Security and Privacy, pp , 8-11 May 2005, doi: /SP [San92] R. S. Sandhu, Lattice- based enforcement of Chinese Walls, Computers & Security, Volume 11, Issue 8, December 1992, Pages , ISSN , DOI: / (92) A. [Tip09] H. F. Tipton, Official (ISC)2 Guide to the CISSP CBK, Second Edition, Auerbach Publications, 2009.

Security Architecture and Design

Security Architecture and Design IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield Domain Overview Identify key principles and concepts critical to securing the infrastructure

More information

Domain 5 Information Security Governance and Risk Management

Domain 5 Information Security Governance and Risk Management Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association

More information

System Assurance C H A P T E R 12

System Assurance C H A P T E R 12 C H A P T E R 12 System Assurance 169 The aim of system assurance is to verify that a system enforces a desired set of security goals. For example, we would like to know that a new operating system that

More information

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Access Control Models Part I. Murat Kantarcioglu UT Dallas UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:

More information

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module CS 665: Computer System Security Designing Trusted Operating Systems Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Trusted? An operating system is

More information

Information Security Information & Network Security Lecture 2

Information Security Information & Network Security Lecture 2 1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term 2 Security Policies 3 Introduction So you ve succeeded as SO in convincing people

More information

Part III. Access Control Fundamentals

Part III. Access Control Fundamentals Part III Access Control Fundamentals Sadeghi, Cubaleska @RUB, 2008-2009 Course Operating System Security Access Control Fundamentals 105 / 148 10 3.1 Authentication and Access Control 11 Examples for DAC

More information

Constructing Trusted Code Base XIV

Constructing Trusted Code Base XIV Constructing Trusted Code Base XIV Certification Aleksy Schubert & Jacek Chrząszcz Today s news (on tvn24bis.pl) (June 6th on BBC) security vulnerability CVE-2014-0224 was discovered by Masashi Kikuchi

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

How To Model Access Control Models In Cse543

How To Model Access Control Models In Cse543 CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control

More information

Reference Guide for Security in Networks

Reference Guide for Security in Networks Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template

More information

Access Control Matrix

Access Control Matrix Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object

More information

Access Control. Dr George Danezis ([email protected])

Access Control. Dr George Danezis (g.danezis@ucl.ac.uk) Access Control Dr George Danezis ([email protected]) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21

Computer Security. Evaluation Methodology CIS 5370. Value of Independent Analysis. Evaluating Systems Chapter 21 Computer Security CIS 5370 Evaluating Systems Chapter 21 1 Evaluation Methodology 1. Set of security functionality requirements 2. Set of assurance a requirements e e 3. Methodology to determine if the

More information

Access Control Intro, DAC and MAC. System Security

Access Control Intro, DAC and MAC. System Security Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Domain 3 Business Continuity and Disaster Recovery Planning

Domain 3 Business Continuity and Disaster Recovery Planning Domain 3 Business Continuity and Disaster Recovery Planning Steps (ISC) 2 steps [Har10] Project initiation Business Impact Analysis (BIA) Recovery strategy Plan design and development Implementation Testing

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

CSE543 - Introduction to Computer and Network Security. Module: Access Control

CSE543 - Introduction to Computer and Network Security. Module: Access Control CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration

More information

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center dshankar@us.ibm.com Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing

More information

DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA

DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DoD 5200.28-STD Supersedes CSC-STD-00l-83, dtd l5 Aug 83 Library No. S225,7ll DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA DECEMBER l985 December 26,

More information

Security Models and Architecture

Security Models and Architecture Security Models and Architecture In this chapter, you will learn about the following topics: Computer architecture and the items that fall within it Trusted computing base and security mechanisms Components

More information

What is a secret? Ruth Nelson

What is a secret? Ruth Nelson What is a Secret - and - What does that have to do with Computer Security? Ruth Nelson Information System Security 48 Hardy Avenue, Watertown, MA 02172 Abstract This paper questions some of the basic assumptions

More information

Mandatory Access Control

Mandatory Access Control CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Goal-Oriented Auditing and Logging

Goal-Oriented Auditing and Logging 1. Introduction Goal-Oriented Auditing and Logging Matt Bishop Christopher Wee Jeremy Frank Department of Computer Science University of California at Davis Davis, CA 95616-8562 This paper presents a technique

More information

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control. ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,

More information

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview

An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering

More information

Bell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix

Bell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix 1 Security Policy A document that expresses clearly and concisely what the protection mechanisms are to achieve A statement of the security we expect the system to enforce Bell & LaPadula Model Formalization

More information

Computer security Lecture 3. Access control

Computer security Lecture 3. Access control Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Access Control Fundamentals

Access Control Fundamentals C H A P T E R 2 Access Control Fundamentals An access enforcement mechanism authorizes requests (e.g., system calls) from multiple subjects (e.g., users, processes, etc.) to perform operations (e.g., read,,

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD

CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,

More information

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms Access Control: Policies, Models, and Mechanisms Pierangela Samarati 1 and Sabrina De Capitani di Vimercati 2 1 Dipartimento di Tecnologie dell Informazione Università di Milano Via Bramante 65 263 - Crema

More information

SELinux Policy Management Framework for HIS

SELinux Policy Management Framework for HIS SELinux Policy Management Framework for HIS by Luis Franco Marin (05592763) BSc., MIT This thesis is presented in fulfilment of the requirements of the degree of Master of Information Technology (Research)

More information

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms Access Control: Policies, Models, and Mechanisms Pierangela Samarati and Sabrina de Capitani di Vimercati 2 Dipartimento di Tecnologie dell Informazione, Università di Milano Via Bramante 65, 263 Crema

More information

Database Security Part 7

Database Security Part 7 Database Security Part 7 Discretionary Access Control vs Mandatory Access Control Elisa Bertino [email protected] Discretionary Access Control (DAC) No precise definition Widely used in modern operating

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se

More information

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

Mandatory Access Control

Mandatory Access Control Mandatory Access Control Håkan Lindqvist May 18, 2006 Master s Thesis in Computing Science, 20 credits Supervisor at CS-UmU: Jonny Pettersson Examiner: Per Lindström Umeå University Department of Computing

More information

Role Based Access Control: Adoption and Implementation in the Developing World

Role Based Access Control: Adoption and Implementation in the Developing World Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University

More information

Computer Security. What is Auditing? Policies CIS 5370. Prevention Deterrence. Detection. Response Recovery 2. Auditing Chapter 24.

Computer Security. What is Auditing? Policies CIS 5370. Prevention Deterrence. Detection. Response Recovery 2. Auditing Chapter 24. Computer Security CIS 5370 Auditing Chapter 24 1 A Comprehensive Security Program Prevention Deterrence Policies Detection monitoring Architectures auditing Tools Response Recovery 2 What is Auditing?

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

DATABASE SECURITY MECHANISM

DATABASE SECURITY MECHANISM DATABASE SECURITY MECHANISM Dorin Iordache Lecturer eng., Romanian Naval Academy Mircea cel Bătrân Fulgerului nr.1, Constanta, 8700, Romania email: [email protected] Abstract Database security was and

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

SkyRecon Cryptographic Module (SCM)

SkyRecon Cryptographic Module (SCM) SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.

More information

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws

More information

Joint Interpretation Library

Joint Interpretation Library for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0

More information

Information Security Policy

Information Security Policy Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...

More information

Enterprise Security Architecture

Enterprise Security Architecture Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture

More information

A Draft Framework for Designing Cryptographic Key Management Systems

A Draft Framework for Designing Cryptographic Key Management Systems A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what

More information

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19

Integration Technologies Group (ITG) ITIL V3 Service Asset and Configuration Management Assessment Robert R. Vespe Page 1 of 19 Service Asset and Configuration 1. Does the tool facilitate the registration and management of an organization s logical, physical and virtual Configuration Items (CIs)? For example, services, systems,

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Intland s Medical Template

Intland s Medical Template Intland s Medical Template Traceability Browser Risk Management & FMEA Medical Wiki Supports compliance with IEC 62304, FDA Title 21 CFR Part 11, ISO 14971, IEC 60601 and more INTLAND codebeamer ALM is

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152 Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

What is Auditing? Auditing. Problems. Uses. Audit System Structure. Logger. Reading: Chapter 24. Logging. Slides by M. Bishop are used.

What is Auditing? Auditing. Problems. Uses. Audit System Structure. Logger. Reading: Chapter 24. Logging. Slides by M. Bishop are used. Reading: Chapter 24 Auditing Slides by M. Bishop are used What is Auditing? Logging» Recording events or statistics to provide information about system use and performance Auditing» Analysis of log records

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile

Common Criteria for Information Technology Security Evaluation Protection Profile. General-Purpose Operating System Protection Profile Common Criteria for Information Technology Security Evaluation Protection Profile General-Purpose Operating System Protection Profile 09 09 2013 Table of contents Table of Contents 1 INTRODUCTION... 7

More information

... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg

... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Lecture 3 Access Control Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M. Introduction

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Chapter 8 A secure virtual web database environment

Chapter 8 A secure virtual web database environment Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services

More information

Which statement about Emergency Change Advisory Board (ECAB) is CORRECT?

Which statement about Emergency Change Advisory Board (ECAB) is CORRECT? ITIL Foundation mock exam 4 1. Which of the following is NOT a purpose of Service Transition? A) To ensure that a service can be managed, operated and supported B) To provide training and certification

More information

Basic Unix/Linux 1. Software Testing Interview Prep

Basic Unix/Linux 1. Software Testing Interview Prep Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

Identity Management and Access Control

Identity Management and Access Control and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

Release & Deployment Management

Release & Deployment Management 1. Does the tool facilitate the management of the full lifecycle of Release and Deployment Management? For example, planning, building, testing, quality assurance, scheduling and deployment? Comments:

More information

Lecture 25 Symbian OS

Lecture 25 Symbian OS CS 423 Operating Systems Design Lecture 25 Symbian OS Klara Nahrstedt Fall 2011 Based on slides from Andrew S. Tanenbaum textbook and other web-material (see acknowledgements) cs423 Fall 2011 1 Overview

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information