Information Security Information & Network Security Lecture 2



Similar documents
How To Model Access Control Models In Cse543

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Part III. Access Control Fundamentals

Role Based Access Control: Adoption and Implementation in the Developing World

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Computer security Lecture 3. Access control

Role Based Access Control (RBAC) Nicola Zannone

BM482E Introduction to Computer Security

Role-Based Access Controls

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module

Access Control Intro, DAC and MAC. System Security

SELinux Policy Management Framework for HIS

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg

Chapter 23. Database Security. Security Issues. Database Security

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Introduction to Computer Security

ITM661 Database Systems. Database Security and Administration

Identity Management and Access Control

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)

Domain 9 Security Architecture and Design

Security Models: Past, Present and Future

10 Things IT Should be Doing (But Isn t)

Database Security. Chapter 21

Access Control Matrix

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University

RBAC and HIPAA Security

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

Module 7 Security CS655! 7-1!

Reference Guide for Security in Networks

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Outline. INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control. The concept of identity

ISSECO Syllabus Public Version v1.0

Database Security Part 7

Newcastle University Information Security Procedures Version 3

Information Security: A Perspective for Higher Education

Goal-Oriented Auditing and Logging

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL

Security Enhanced Linux and the Path Forward

Access Control. 1 Overview of Access Control. Lecture Notes (Syracuse University) Access Control: 1. What is Access Control?

Central Agency for Information Technology

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Information Security Policy

Chapter 8 A secure virtual web database environment

Mandatory Access Control

Data Management Policies. Sage ERP Online

Best Practices for PCI DSS V3.0 Network Security Compliance

Supporting FISMA and NIST SP with Secure Managed File Transfer

INFO/CS 330: Applied Database Systems

Session objectives. Access control. Subjects and objects. The request. Information Security

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Can You be HIPAA/HITECH Compliant in the Cloud?

Access Control Basics. Murat Kantarcioglu

An Oracle White Paper March Oracle Label Security in Government and Defense Environments

ISO Controls and Objectives

VMware vcloud Air HIPAA Matrix

Chapter 23. Database Security. Security Issues. Database Security

Miami University. Payment Card Data Security Policy

ISACA PROFESSIONAL RESOURCES

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

SecTor 2009 October 6, Tracy Ann Kosa

INF3510 Information Security University of Oslo Spring Lecture 8 Identity and Access Management. Audun Jøsang

Hengtian Information Security White Paper

Computer Security: Principles and Practice

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

HIPAA: Compliance Essentials

Database Security and Authorization

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

INFORMATION TECHNOLOGY SECURITY STANDARDS

Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager

INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

An Introduction to HIPAA and how it relates to docstar

University of Aberdeen Information Security Policy

Mandatory Access Control in Linux

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Implementing HIPAA Compliance with ScriptLogic

Client Advisory October Data Security Law MGL Chapter 93H and 201 CMR 17.00

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

ISO COMPLIANCE WITH OBSERVEIT

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Transcription:

1 Information Security Information & Network Security Lecture 2 David Weston Birkbeck, University of London Autumn Term

2 Security Policies

3 Introduction So you ve succeeded as SO in convincing people that taking care of information security and assessing the risks is a good idea What s next? Implementing everything and putting things in practice

4 Introduction (2) Implementing information security is not just about scrambling like mad to install the newest patches get firewalls up and running install virus scanners It s also about putting sensible practices and procedures in place We re still talking about administrative/management side, we ll look at technical issues later

5 Security Policies This is where the concept of a security policy comes into play It is a (set of) document(s) in which an organization s philosophy strategy practices with regard to confidentiality, integrity, and availability of information and information systems are laid out

6 Security Policies (2) What can policies do that technology alone can t? Tie in upper management: technological controls are the responsibility of an IT administrator/manager, policies are those of upper management If an organization has legal obligations to fulfill, it can provide a paper trail Define a strategy with regard to security: what to protect and to which degree (rather than how) Serve as a guide to information security for employees

7 Defining a Security Policy First step: find out about your risks (risk assessment) Policies can be seen as a risk-control mechanism (a procedural one rather than a technical one) Goal of a control mechanism is to get risk down to an acceptable level Policy should cover risks identified during risk assessment Before going into concrete examples, we ll define some important concepts of security policies

8 Formal Models An important aspect of security policies are classification and access control models: Distinguishes between various groups of people, systems, and information in terms of security Determines who is authorized to access which information on which system Access Control usually comes in two different flavors: Discretionary Access Control (DAC) Mandatory Access Control (MAC)

9 Discretionary vs. Mandatory Discretionary Access Control (DAC) Each data object is owned by a user and user can decide freely which other users are allowed to access data object Many operating systems follow this line Mandatory Access Control (MAC) Access is controlled by a system-wide policy with no say by the users Military systems often use this kind of control We ll now look at some concrete models

10 Access Control Matrix One of the earliest models to emerge was the Access Control Matrix An Access Control Matrix is used to describe the protection state of information or a system More formally, there are objects o that need to be protected objects can be files, devices, processes subjects s who want to access the objects subjects can be users, other processes rights r(s, o) that specify which type of access subject s is permitted on object o access rights can include read, write, execute, own

11 Access Control Matrix (2) This is organized in a matrix: subjects are in the rows, objects in the columns, and the rights in the cells o 1 o 2 o 3... s 1 r 1 11, r 2 11,... r 1 12, r 2 12,... r 1 13, r 2 13,...... s 2 r 1 21, r 2 21,... r 1 22, r 2 22,... r 1 23, r 2 23,...... s 3 r 1 31, r 2 31,... r 1 32, r 2 32,... r 1 33, r 2 33,.....................

12 Example Here s a bookkeeping example with different users and objects: Operating Accounting Accounting Audit System Application Data Trail Alice (sysadmin) rwx rwx r r Bob (manager) rx x - - Charlie (auditor) rx r r r Acc. Application rx r rw w (r: read access, w: write access, x: execution permission, -: no rights)

13 Problems with Access Control Matrices If applied in a straightforward fashion, this matrix doesn t scale very well Example: bank with 50,000 staff and 300 applications 15,000,000 million entries On top of that, most entries are empty: storing a sparsely populated matrix explicitly wastes a lot of space Solution: only store entries that actually exist, can be done in two different ways: by row, store privileges with user (capability lists) by column, store privileges with objects (access control lists)

14 Capability Lists Storing the example matrix by rows would yield the following capability lists: Alice Op. Sys.: rwx, Acc. App.: rwx, Acc. Data: r, Audit: r Bob Op. Sys.: rx, Acc. App.: x...... Makes it difficult to check who has privileges for certain files One would have to look at every list

15 Access Control Lists Storing the example matrix column-wise would result in the following access control lists Op. Sys. Alice: rwx, Bob: rx, Charlie: rx, Acc. App.: rx Acc. App. Alice: rwx, Bob: x, Charlie: r, Acc. App.: r Acc. Data. Alice: r, Charlie: r, Acc. App.: rw...... Makes it easier to check who can access which file (and, if necessary, revoke the rights) However, lists may still be too long and it may be too tedious to manage them One solution is to organize users into groups

16 Access Control Lists (2) Grouping users is an approach employed by many operating systems For example, in UNIX/Linux systems you have the following partitioning: - rwx }{{} self self: owner of a file group: a group of users sharing common access other: everyone else r-x }{{} group r-x }{{} other alice is the name of the owner users is the name of a group accounts is the name of a file alice users accounts

17 Access Control Lists (3) However, ownership of a file is still under control of a single user This user can pass on access permissions as they see fit Assigning users to groups is usually done by a system administrator, though This might not always be appropriate for (larger) organizations There is a model called role-based access control, which we will look at after introducing some other models

18 Summary Access Control Matrix An Access Control Matrix specifies permissions on an abstract level limits the damage that certain subjects can cause in the form described above is a snapshot view (dynamic behavior is not described)

19 Bell-La Padula Model In the Bell-La Padula (BLP) model, every document (or information object) has a security classification The more sensitive the information, the higher the classification level Examples for typical levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc) Every user of the system has a clearance (level) Classification and clearance levels are not decided by the users, some certified entity has to do this To be able to access a document, a user must have at least the level of the document The concept of this model originated in the military Let s define this more formally

20 Bell-La Padula Model (2) Assume that you have a data object o a subject s Let c(o) be the classification of o and c(s) be the clearance of s BLP enforces the following two properties: Simple security property: s may have read access to o only if c(o) c(s) * (star) property: s, who has read access to o, may have write access to another object p only if c(o) c(p)

21 Bell-La Padula Model (3) First rule is quite straightforward: no-one may access information that is classified higher than their clearance Second rule seems counterintuitive at first glance Intended to prevent a write-down effect write-down : more highly classified information is passed to a lower classified object BLP can be extended by categories

22 Categories Categories (or compartments) describes types of information Each data object may be assigned to different categories (multiple categories are possible) A subject should only have access to information that they need to do their job In addition to a clearance level, a subject is also assigned a set of categories (which they are allowed to access)

23 Categories (2) Let s assume we have the categories NUC, EUR, US All possible subsets of these categories form a lattice with regard to the subset relation: A person with access to { NUC, US } may look at data objects categorized as { NUC, US }, { NUC }, { US }, or (uncategorized), subject to clearance level

24 Summary BLP In essence BLP enforces confidentiality Can be explained by its military origin Does not handle data integrity (or only to a very limited extent) We ll have a look at some other models now (which also ensure integrity)

25 Clark-Wilson Integrity Model In a commercial environment, preventing unauthorized modification of data is at least as important as preventing disclosure Examples: Preventing fraud (or mistakes) in accounting Inventory control: Still works if information is disclosed May break down if too much data is incorrect

26 Clark-Wilson Integrity Model (2) BLP protects data against unauthorized users The Clark-Wilson (CW) integrity model also tries to protect data against authorized users This has started long before computers, two mechanisms are especially important Well-formed transaction: user is constrained in the way they can manipulate data, e.g. record a log of changes double entry bookkeeping Separation of duty: executing different subparts of a task by different persons, e.g. authorizing purchase order, recording arrival, recording arrival of invoice, authorizing payment

27 Clark-Wilson Integrity Model (3) How are these concepts translated for data integrity in information systems? Identify Constrained Data Items (CDIs) These are data items for which integrity has to be upheld Not all data items need to be CDIs, other data items are called Unconstrained Data Items (UDIs) The integrity policy is defined by two classes of procedures: Integrity Verification Procedures (IVPs) Transformation Procedures (TPs)

28 Integrity Verification Procedures IVPs check that all CDIs in the system conform to integrity constraints On successful completion this confirms that at the time of running an IVP, the integrity constraints were satisfied Example for accounting: Audit functions are typical IVPs For example, an auditor confirms that the books are balanced and reconciled

29 Transformation Procedures TPs correspond to the concept of a well-formed transaction Applying a TP to a CDI in a valid state will result in a CDI that is still in a valid state Example for accounting: A double entry transaction is a TP

30 IVPs and TPs CW works in the following way: We start in a valid state (confirmed by IVPs) We only manipulate CDIs with TPs We will always be in a valid state What s missing? A system can enforce that CDIs are only manipulated by TPs A system cannot ensure (on its own) that the IVPs and TPs are well-behaved IVPs and TPs need to be certified by someone

31 Certification The security officer (or an agent with similar responsibilities) certifies IVPs and TPs with respect to an integrity policy This is usually not done automatically, but semi-automatically (i.e. some human intervention is necessary) Accounting example: SO certifies that TPs implement properly segregated double entry bookkeeping

32 CW Model Assuring the integrity in CW consists of two important parts: Certification (which is done by a human) Enforcement (which is done by a system) CW consists of a set of rules referring to certification (C-rules) and enforcement (E-rules)

33 Concrete Rules Basic framework: C1: (IVP certification) Successful execution of IVPs confirms that all CDIs are in a valid state C2: (TP certification) Agent specifies relations of the form (TP i, (CDI i1, CDI i2,... )) that defines for which CDIs TP i returns valid states E1: (TP enforcement) System maintains a list of relations and only allows manipulation of CDIs via the specified TPs

34 Concrete Rules (2) Separation of duty: C3: (User certification) Agent specifies relations of the form (UserID, TP i, (CDI i1, CDI i2,... )) that defines which TPs may be executed on which CDIs on behalf of which user E2: (User enforcement) System maintains a list of relations and enforces them E3: (Authentication) Each user must be authenticated before executing a TP for that user E4: (Certification and execution) Only an agent permitted to certify entities may change relations, this agent may not have any execution rights with respect to that entity

35 Concrete Rules (3) Logging/Auditing: C4: (Logging) All TPs must be certified to write to an append-only log, making it possible to reconstruct each executed operation There s no special enforcement rule, because the log can be modeled as a CDI and each TP has to be certified to append to this CDI We re almost done...

36 Concrete Rules (4) Relationship between UDIs and CDIs C5: (Transformation) Any TP taking a UDI as an input must be certified to only use valid transformations when taking the UDI input to a CDI or reject the UDI This is important as new information is fed into a system via UDIs For example, data typed in by a user may be a UDI

37 Summary CW CW enforces integrity: Uses two different integrity levels: CDIs and UDIs (CDI being the higher level) Upgrades from UDIs to CDIs via certified methods Could also enforce confidentiality (not a main concern in the original model): If users are only allowed to access data through Transformation Procedures as well Although in this case, no data will be changed

38 Role-Based Access Control Role-based Access Control (RBAC) is a mandatory access control model Mainly for commercial/civilian applications, so does not have the different levels of secrecy of Bell-La Padula Can be seen as a more strict version of the Access Control List (ACL) Main difference to ACL: in RBAC a certified entity grants and revokes privileges, this is not done by the user

39 Roles Similar to ACL RBAC also puts users into different groups, these are called roles Depending on their current role, users can access (and modify) certain data objects For example, in a hospital setting you could have the following roles: doctors, nurses, pharmacists, administrators While doctors may modify a diagnosis file, administrators may not do so Let s give a more formal description now

40 Formal Definition In RBAC you have a subject s role r transaction t (transactions access/modify data) object o mode x (read, write, execute, etc.) Furthermore, there are AR(s): the active role of s, i.e. the role s is currently using RA(s): the roles s is authorized to perform TA(r): the transactions a role is authorized to perform

41 Formal Definition (2) A subject s may execute a transaction t if exec(s, t) is true exec(s, t) is true, if and only if s can execute t at the current time This is determined by AR(s) and TA(r) This is the case if t TA(AR(s))

42 Rules in RBAC RBAC enforces the following rules 1 Role assignment: the assignment of a role is a necessary prerequisite for executing transactions For all s, t : exec(s, t) can only be true if AR(s) 2 Role authorization: a subject s active role must be authorized For all s : AR(s) RA(s) 3 Transaction authorization: s can execute t only if t is authorized for the active role of s For all s, t : exec(s, t) is true only if t TA(AR(s))

43 Rules in RBAC (2) Access modes can be defined for transactions (to allow a finer granularity) This defines what a user (in a certain role) can do with data (read-only, modify, etc.) access(r, t, o, x) is true, if and only if role r may execute transaction t on object o in mode x So sometimes a fourth rule is added to RBAC: 4 For all s, t, o : exec(s, t) is true, only if access(ar(s), t, o, x) is true

44 Role Relationships The relationship between users, roles, transactions, and objects can also be described graphically Object 1 transaction_a member_of User 1 Role 1 Object 2 transaction_b member_of User 2 A more concrete example in a hospital setting: Patient file 1 prescribe_drug member_of Dr House doctor Patient file 2 diagnose member_of Dr Wilson

45 Summary RBAC Often MAC is equated with military applications, while DAC is seen as appropriate for commercial/civilian applications However, DAC might not always provide the appropriate security in a commercial/civilian setting RBAC fills this gap: it s a MAC model without the specific military requirements

46 Summary of Formal Models Access Control Matrix, BLP, CW, and RBAC are just four (though important) models Other well-known models include Biba (integrity) and Chinese Wall (hybrid) Due to time constraints they are not discussed here We will now turn our attention to the management side of security policies

47 Organization-wide Policies Ideally, a policy for an organization should be light, i.e. not covering hundreds or even thousands of pages simple and practical easy to manage and maintain accessible, i.e. people can find what they re looking for Policy should be organized in a hierarchical fashion: Security framework paper Position papers (on specific issues)

48 Organization-wide Policies (2)

49 Framework Paper The security framework document should state an organization s commitment to information security define a classification system (e.g. based on one of the discussed formal models) make clear that users and administrators will be held accountable for their behavior give the SO appropriate authority to enforce security policy state clearly the responsibilities that individuals have define how security will be reviewed

50 Position Papers Position papers address specific aspects of the security policy, e.g. how to configure servers connected to the internet the process to be followed in the event of a security breach should be focused and kept short can have different authors (should be written by someone with expertise in the area)

51 Position Papers (2) Exact topics depend on the organization, here are some important ones: Physical security Network security Access control Authentication Encryption Key management Compliance Auditing and Review Security Awareness Incident response and contingency plan

52 Content of Position Papers Scope: should describe which issue, organizational unit, or system is covered Ownership: name and contact details of the document owner Validity: policies can/should have limited lifespans (after which they re reviewed) Responsibilities: who is responsible for which elements Compliance: the consequences of non-compliance with the policy Supporting documentation: references to documents higher and lower in the policy structure Position statement: statements about the actual issue or system (the hard part) Review: whether, when, and how issue or system will be reviewed

53 Summary Policies are an important part of information security, as they also cover the non-technical side There s no one size fits all, policy must be adapted to the risk profile of an organization There are (customizable) policy solutions out there, so not everything has to be done from scratch Security policies should be easy to access, use and understand For a more detailed example, see http://www.securityfocus.com/infocus/1193