A University Education Cyber Security Paradigm Shift



Similar documents
Security A Big Question for Big Data

System Assurance C H A P T E R 12

IQware's Approach to Software and IT security Issues

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Constructing Trusted Code Base XIV

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

External Supplier Control Requirements

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

GoodData Corporation Security White Paper

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Meeting Cyber Security Challenges

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Seven Strategies to Defend ICSs

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

IoT & SCADA Cyber Security Services

Reference Guide for Security in Networks

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

Post-Class Quiz: Software Development Security Domain

DeltaV System Cyber-Security

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis

Security Issues in Cloud Computing

CompTIA Security+ (Exam SY0-410)

NERC CIP VERSION 5 COMPLIANCE

What is Really Needed to Secure the Internet of Things?

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Defending Against Data Beaches: Internal Controls for Cybersecurity

PFP Technology White Paper

Chap. 1: Introduction

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Secure Virtual Machine Systems

Data Management Policies. Sage ERP Online

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Chapter 8 A secure virtual web database environment

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Critical Controls for Cyber Security.

Network Security Forensics

All Information is derived from Mandiant consulting in a non-classified environment.

Frontiers in Cyber Security: Beyond the OS

THE TOP 4 CONTROLS.

Windows Server Virtualization & The Windows Hypervisor

Database Security Part 7

Network Access Control in Virtual Environments. Technical Note

Click to edit Master title style

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Weighted Total Mark. Weighted Exam Mark

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Cybersecurity and internal audit. August 15, 2014

How To Achieve Pca Compliance With Redhat Enterprise Linux

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

How To Audit The Mint'S Information Technology

Chapter 23. Database Security. Security Issues. Database Security

INTRODUCING isheriff CLOUD SECURITY

How To Design A Security Kernel

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Introduction to NICE Cybersecurity Workforce Framework

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Payment Card Industry (PCI) Data Security Standard

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

future data and infrastructure

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

FREQUENTLY ASKED QUESTIONS

Introduction to Security

Security in SCADA solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Reducing the cost and complexity of endpoint management

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

IY2760/CS3760: Part 6. IY2760: Part 6

Master of Cyber Security

Computer Security Basics

Enterprise Cybersecurity: Building an Effective Defense

Mandatory Access Control in Linux

Chapter 9 Firewalls and Intrusion Prevention Systems

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

Security Challenges & Opportunities in Software Defined Networks (SDN)

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

SANS Top 20 Critical Controls for Effective Cyber Defense

Transcription:

A University Education Cyber Security Paradigm Shift For Engineers of Verifiably Secure Components and Systems Dr. Roger R. Schell schellr@ieee.org Distinguished Fellow, University of San Diego, Center for Cyber Security Engineering and Technology (CCSET) President, Aesec Corporation National Initiative for Cybersecurity Education (NICE), 2015 November 3 4, 2015 Paradise Point Conference Center San Diego, CA 92109 The opinions expressed are solely those of the presenter and not necessarily those of any employer, sponsor, or associate.

Overview of Presentation Science (or lack) underlying the mess we are in Past Present Future Reference monitor a unifying scientific principle * Enables a paradigm shift for cyber security education Implementation called a security kernel [Anderson] * Major credit: Cynthia E. Irvine, The reference monitor concept as a unifying principle in computer security education. In Proceedings of the First World Conference on Information Systems Security Education, pp. 27 37, June 1999. NIST NICE 2015 1

Perspective on Trusted Computing: Past, Present and Future The shortish version... Often in the words of others [paraphrase with emphasis added] NIST NICE 2015 2

The Science of Trusted Systems: Past Security kernel controls are effective against most internal attacks-including some that many designers never consider. [Ames et. al., IEEE Computer July 1983] security kernel distinguished by substantially dealing with the problems of subversion of security mechanism. [NCSC, circa 1984] NIST NICE 2015 3

Legacy of Past Kernel Deployment: Withstood Nation State Adversary... isolating the security relevant code to a small protected kernel whose correctness can be certified. [-- ARPA Review Group, 1970s (Butler Lampson) ] SACDIN Minuteman missile control (IBM) SCOMP for Multics comms (Honeywell) Secure Ethernet LAN (Boeing) GTNP/GEMSOS (Gemini Computers, Inc.) Class A1 Blacker key distribution and access control NSA evaluation of COTS Class A1 TNI M-component MLS Pentagon enterprise cloud for OSD and USAF ITSEC evaluation by UK CESG for MOD deployment Blacker VPN front-end (Unisys for NSA) NIST NICE 2015 4

The Practice of Trusted Systems: Present systems not designed for Internet threats, poorly implemented, nearly daily security patches, and millions of systems being compromised [Safford, October, 2002] NIST NICE 2015 5

The Practice of Trusted Systems: Present Nearly thirty years ago, Roger Schell accurately predicted the exact situation we find ourselves in: systems not designed for Internet threats, poorly implemented, nearly daily security patches, and millions of systems being compromised [Safford, IBM, October, 2002] No systematic data categorization (labeling) Only scientific basis to confine information flow NIST NICE 2015 6

The Practice of Trusted Systems: Present Cyber security is much worse than recognized Growing threat of subversion by witted adversaries - Widely demonstrated Easter egg style artifices Existential threat a pre-9/11 moment Sec Def Panetta: could virtually paralyze the nation Bandaids and weak assurance can never work Current best practice is Arms race we cannot win Unsustainable penetrated and patch Ineffective monitoring and surveillance Proven verifiable protection languishes NIST NICE 2015 7

The Prospect for Trusted Systems: Future Depends on Choices unthinkable that another thirty years will go by without one of two occurrences: 1. Either horrific cyber disasters will deprive society of much of the value of computers 2. Or available security kernel technology will be delivered in products that provide effective security [Karger, IBM, ACSAC 2002] Cyber security education has major influence NIST NICE 2015 8

Choice to Continue Present Path: To Future Horrific Cyber Disasters Men's courses will foreshadow certain ends, to which, if persevered in, they must lead. Dickens Disastrous certain ends foreshadowed by: More dependence on low assurance, e.g., cloud Lack of purchase requirement for high assurance Vested interests, e.g., monopolist, new research Competing govt products, e.g., MISSI,NetTop,SELinux,MILS Objection TCSEC interfered with research, products Common Best practice misses subversion reality Repeat failed practices, but expect different results NIST NICE 2015 9

Choice to Depart Present Path: Deliver Future Skills and Products Men's courses will foreshadow certain ends, to which, if persevered in, they must lead. But if the courses be departed from, the ends will change. Dickens Ends will change to reduce cyber risks by: Leverage reference monitor, viz., security kernel Pervasive data labeling, confidentiality and integrity Kernel confines hosted applications and networks Technology refresh can deploy in less than 2 years Previously deployed kernels, e.g., COTS OEM RTOS Aggressive phased, selective use, e.g., CDS and ICS Commitment to education, evaluation and use Align defense with threat, e.g., APT and subversion NIST NICE 2015 10

Overview of Presentation Science (or lack) underlying the mess we are in Past Present Future Reference monitor a unifying scientific principle * Enables a paradigm shift for cyber security education Implementation called a security kernel [Anderson] * Major credit: Cynthia E. Irvine, The reference monitor concept as a unifying principle in computer security education. In Proceedings of the First World Conference on Information Systems Security Education, pp. 27 37, June 1999. NIST NICE 2015 11

Paradigm Shift Only Practical Way out of the Current Mess We re in The facts of the mess with current paradigm: Secure system on insecure platform is impossibility Traditional OS is untrustworthy stream of patches Security kernel is only way we know for secure OS Half dozen kernels deployed no reported patches Only existing kernel is practical to deploy in 2 yrs Logical conclusion change current paradigm Build secure systems on a existing security kernel Cyber security engineering education is critical Current engineers not taught how to build a kernel Engineers not taught to build systems on kernel NIST NICE 2015 12

Reference Monitor (RM) as Unifying Principle is a Paradigm Shift Supported by well-define body of knowledge Technology codified for systems in Orange Book Supporting guidelines in Rainbow Series Approach: three strong legs of the stool Significantly mitigating software subversion Explicit mandatory access control (MAC) policy Systematically achieving verifiable protection RM paradigm shift for cyber-security education Security must be built into education, not bolted on Same unifying principle for any education level Example of MS degree organized around RM NIST NICE 2015 13

Classic Reference Monitor Abstraction Enforces security policy Mediate every attempt by subject to gain access to object Tamperproof database & audit trail (no observation nor interference) Small, simple & well-structured Authorization Database Repository of subject security policy attributes Repository of object security policy attributes Subjects Active entities User Processes Gain access to information on user s behalf Reference Monitor Audit Trail Objects Segments Directories Passive data repositories Record of security-related events NIST NICE 2015 14

Three Reference Monitor Principles Tamper proof Isolation: protected unauthorized alteration Deals with subversion and malicious software Always invoked Completeness: ALL subject to object references Subject to analysis and test to assure correct Verifiability: perform its functions properly Can implement policy with high assurance Hardware and software that implements RM Classic definition of security kernel [Anderson 72] NIST NICE 2015 15

Illustrative University Education Cyber Security Engineering USD Considers Cyber Security Engineering MS Designed from outset based on reference monitor Leverage experience, e.g., Dr. Burnham UNO & USC Three semester program Minimum of 27 units all directed at cyber security Full on-line real-time distance education Designed for heavy hands-on lab component Isolated vulnerability validation lab Security kernel application and administration lab Lessons learned: hands-on labs are critical No substitute for lab exercises on real security kernel NIST NICE 2015 16

RM is Scientific Basis for Three Semester Core Sequence Security policy is RM foundation for assurance Maps to TNI (Red Book) MAID policy taxonomy Access control for both confidentiality and integrity - Mathematical partition into Mandatory and Discretionary Identification for RM subjects Requirements for RM Audit file Trusted systems design build security kernel Linchpin is policy model basic security theorem Secure system engineering run on a kernel Composition methods partitioned TCB and subsets Case studies of engineering verifiably secure system NIST NICE 2015 17

RM Scientific Principles Pervasive in Illustrative Required Courses Foundations of Information Security Basic concept and terminology Students report assessment of cyber security press Application and implementation of Cryptography Apply RM to protect keys, data and algorithms Assurance in Cyberspace Security Techniques for analysis and test of RM Distributed Systems and Network Security Network interpretation of RM Using Trusted Network Interpretation (TNI) concepts NIST NICE 2015 18

RM Permeates Associated and Elective Courses Software engineering for secure systems Cyber security privacy consideration Applied Cryptography Secure Systems Administration Computer and Network Forensics Vulnerability discovery and validation Formal methods Data base security Assuring big data cyber security Legal and policy issues in cyber security NIST NICE 2015 19

Three Strong Legs of Stool : USC Applies RM for Secure Systems Secure Systems Limit Subversion 1. Subversion is tool of choice for witted adversary 2. Only MAC policy can enforce secure information flow 3. RM is only known verifiable protection technology NIST NICE 2015 20

Leg 1:Subversion is THE Problem: Likely Choice of Witted Adversary ACM: identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. 35 years ago: subversion is tool of choice Key for repeated, undetected exploits [Irvine] E.g., 6 LOC in 40M give total control of Windows E.g., 12 LOC in 4M total access to Linux file service StuxNet demonstrates subversion efficacy Remote control, unknown attacker Class of serious breaches, e.g., Target, Sony, OPM NIST NICE 2015 21

RM Proven to Mitigate Subversion Plant trap door or Trojan horse High Domain Impossible to find or fix Computer Science general case Application security noncomputable Arms race we can t win IBM Computer Science general case Protects Application data security despite noncomputable apps Computer Arms Science race we special can t win case Security IBMkernel is computable Completeness Isolation Verifiability Security kernel doesn t assume secure applications Applications, Sandboxes, Chrome OS, others Verifiable TCB (Security Kernel) Low Domain NIST NICE 2015 22

Leg 2: Use Science of MAC Policy: Explicit Label for Subject & Object Mandatory access control (MAC) policy Historically call non-discretionary policy Subject has formal authorization to access a domain Access based on sensitivity of information in object - Specific Information security domain (has label ) - Labels often called classification and clearance Fielded secure system composition examples DBMS, enterprise cloud, NSA crypto, UK guard Cannot build security on foundation of sand MAC Kernel ensures subverted apps confinement NIST NICE 2015 23

Use MAC to Build Systems: On Reusable Security Kernel The only way we know... to build highly secure software systems of any practical interest is the kernel approach. -- ARPA Review Group, 1970s (Butler Lampson, Draper Prize recipient) Appliances Applications, e.g., Industrial Control Systems (ICS) Verifiably Secure Platform Security Services Verifiable Security Kernel Intel x.86 Hardware Platform Network Monitor/ Keyboard Disk Operating System Truly a paradigm shift: no Class A1 security patches reported in years of use NIST NICE 2015 24

New vs Maintenance Cost/Benefit COSTS TO DEVELOP Maintenance & evaluation cost (if previously rated) BENEFIT TO USER Development & evaluation cost for new verifiably secure product TCSEC Rating C1 C2 B1 B2 B3 A1 (security kernel) THREAT Best Commercial Practice Resistant to application Trojan horses Insurable, No Trap Doors; Immune to Trojan Horses NIST NICE 2015 25

Verifiable Trusted Systems: OEM Delivery Eco-System Vendor delivers OEM product/support With partners port to domain specific hardware OEMs & manufacturers build platforms Trusted distribution, evaluated configurations VARs, ISVs, appliance vendors deliver box Add COTS operating system services and apps Solution providers and system integrators Customization and integration for customers HA TCB From RVM Vendor OEMS & Manufacturers VARs, ISVs, Appliance Vendors Systems Integrator Solutions NIST NICE 2015 26

Leg 3: RM is Proven Technology: Only Known Verifiable Protection Most used highly secure technique [Gasser] Not easy to build a security kernel Successful examples took 10-15 years to complete Demands supportive hardware to be practical Segmentation in instruction set, protection rings Hardware root of trust for trusted distribution Rigorous software engineering enforcement Strongly-typed language is essential (prohibit C) Information hiding [Parnas], layering [Janson] Basis for proof sketch maintains secure state NIST NICE 2015 27

Basis for Trusted System Kernel: Systematic Engineering Process E.g., Hardware Segmentation Mappings Security Policy Philosophy and Design of Protection Formal Security Policy Model [linchpin] For Reference Monitor. i.e., security kernel API Formal Top Descriptive Top Level Spec Level Spec With hardware properties visible at interface Implementation Design Documents Source Code Layering & info hiding Code correspondence Product End Item Trusted Distribution Covert channel analysis Security Features Users Guide Trusted Facility Manuals System Specifications Development Specifications Product Specifications Deliverable Product NIST NICE 2015 28

Three Strong Legs for Secure Systems Secure Systems Reference Monitor Limit Subversion is the Organizing Principle NIST NICE 2015 29

RM Only Approach Proven to Work: Paradigm Shift in Security Education 1. Witted adversary subversion dominant issue Solution not adequate unless mitigates subversion 2. Understand creating overall security policy System is only secure WRT a policy, viz., MAC 3. Graduates understand verifiable science On security kernel that needs no security patches Transformative only if RM permeates education Bolting on RM courses is NOT paradigm shift NIST NICE 2015 30

Transformative Unifying Principle for Cyber Security Education IT S UP TO YOU We have met the enemy and it is us. Pogo NIST NICE 2015 31

A University Education Cyber Security Paradigm Shift For Engineers of Verifiably Secure Components and Systems Dr. Roger R. Schell schellr@ieee.org Distinguished Fellow, University of San Diego, Center for Cyber Security Engineering and Technology (CCSET) President, Aesec Corporation National Initiative for Cybersecurity Education (NICE), 2015 November 3 4, 2015 Paradise Point Conference Center San Diego, CA 92109 The opinions expressed are solely those of the presenter and not necessarily those of any employer, sponsor, or associate.