Security Models: Past, Present and Future



Similar documents
The Future of Access Control: Attributes, Automation and Adaptation

The Future of Cyber Security

Foundations Applications Technologies

Cyber Security Research: A Personal Perspective

Access Control Intro, DAC and MAC. System Security

Cyber Security: Past, Present and Future

The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?

The Science, Engineering, and Business of Cyber Security

Towards Secure Information Sharing Models for Community Cyber Security

Access Control Models Part I. Murat Kantarcioglu UT Dallas

The Science, Engineering, and Business of Cyber Security

Database Security Part 7

ATTRIBUTE-BASED ACCESS CONTROL MODELS AND IMPLEMENTATION IN CLOUD INFRASTRUCTURE AS A SERVICE

Toward a Usage-Based Security Framework for Collaborative Computing Systems

BM482E Introduction to Computer Security

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Role Based Access Control (RBAC) Nicola Zannone

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Part III. Access Control Fundamentals

Information Security Information & Network Security Lecture 2

Analysis of Different Access Control Mechanism in Cloud

Role Based Access Control: Adoption and Implementation in the Developing World

Cyber Security: What You Need to Know

Computer security Lecture 3. Access control

USER ACCESS CONTROL AND SECURITY MODEL

Chapter 23. Database Security. Security Issues. Database Security

Identity Management and Access Control

Access Control Matrix

How To Model Access Control Models In Cse543

Introduction to Computer Security

CPSC 467b: Cryptography and Computer Security

How To Secure Cloud Computing

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms

Bell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix

Extended RBAC Based Design and Implementation for a Secure Data Warehouse

What is a secret? Ruth Nelson

Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.

... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg

Role-based access control. RBAC: Motivations

Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill

1. Introduction. 2. Background Cloud computing in a nutshell

Security Enhanced Linux and the Path Forward

ITM661 Database Systems. Database Security and Administration

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements

RBAC and HIPAA Security

Access Control of Cloud Service Based on UCON

A Survey of Access Control Policies

SELinux Policy Management Framework for HIS

Institute for Cyber Security. A Multi-Tenant RBAC Model for Collaborative Cloud Services

Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS

Agenda SAP AG or an SAP affiliate company. All rights reserved. 2

Database Security and Authorization

Access Control. Dr George Danezis

Outline. INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control. The concept of identity

Chapter 8 A secure virtual web database environment

Towards Securing APIs in Cloud Computing

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module

CHAPTER 22 Database Security Integration Using Role-Based Access Control

Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model

Access Control Basics. Murat Kantarcioglu

Chapter 23. Database Security. Security Issues. Database Security

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL

Firewalls. Mahalingam Ramkumar

Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice NFPs Reid Holmes Lecture 5 - Tuesday, Sept

Role Based Access Control Framework for Network Enterprises

Information Security and Cryptography

Access Control Fundamentals

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)

Transcription:

Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu 1

Security Objectives INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 2

Security Objectives USAGE purpose INTEGRITY modification AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 3

Security Objectives USAGE purpose INTEGRITY modification USAGE AVAILABILITY access CONFIDENTIALITY disclosure Ravi Sandhu 4

Butler Lampson Paraphrased (I think) Computer scientists could never have designed the web because they would have tried to make it work. But the Web does work. What does it mean for the Web to work? Security geeks could never have designed the ATM network because they would have tried to make it secure. But the ATM network is secure. What does it mean for the ATM network to be secure? Ravi Sandhu 5

Foundational Security Assumptions Information needs to be protected In motion At rest In use Absolute security is impossible and unnecessary Trying to approximate absolute security is a bad strategy Good enough security is feasible and meaningful Better than good enough is bad Security is meaningless without application context Cannot know we have good enough without this context Models and abstractions are all important Without a conceptual framework it is hard to separate what needs to be done from how we do it We are not very good at doing any of this Ravi Sandhu 6

PEI Models: 3 Layers/5 Layers This lecture is focused on the policy models layer Idealized Enforceable (Approximate) Codeable At the policy layer security models are essentially access control models Ravi Sandhu 7

THE PAST Ravi Sandhu 8

Access Control Models Discretionary Access Control (DAC) Owner controls access but only to the original, not to copies Mandatory Access Control (MAC) Same as Lattice-Based Access Control (LBAC) Access based on security labels Labels propagate to copies Role-Based Access Control (RBAC) Access based on roles Can be configured to do DAC or MAC Generalizes to Attribute-Based Access Control (ABAC) Numerous other models but only 3 successes Ravi Sandhu 9

DAC: ACCESS MATRIX MODEL Objects (and Subjects) F G S u b j e c t s U V r w own r r w own rights Ravi Sandhu 10

DAC: TROJAN HORSE EXAMPLE ACL File F A:r A:w File G B:r A:w B cannot read file F Ravi Sandhu 11

DAC: TROJAN HORSE EXAMPLE A executes Program Goodies read File F ACL A:r A:w Trojan Horse write File G B:r A:w B can read contents of of file F copied to to file G Ravi Sandhu 12

LBAC: LATTICE STRUCTURES Top Secret Secret Confidential Unclassified dominance can-flow Ravi Sandhu 13

LBAC: LATTICE STRUCTURES TS, {A} TS, {A,B} TS, {B} Hierarchical Classes with Compartments TS, {} S, {A,B} S, {A} S, {B} S, {} Ravi Sandhu 14

LBAC: BELL LAPADULA (BLP) SIMPLE-SECURITY Subject S can read object O only if label(s) dominates label(o) STAR-PROPERTY (LIBERAL) Subject S can write object O only if label(o) dominates label(s) STAR-PROPERTY (STRICT) Subject S can write object O only if label(o) equals label(s) Ravi Sandhu 15

LBAC: COVERT CHANNELS High User High Trojan Horse Infected Subject Information is is leaked unknown to to the high user COVERT CHANNEL Low User Low Trojan Horse Infected Subject Ravi Sandhu 16

RBAC: Role-Based Access Control Access is determined by roles A user s roles are assigned by security administrators A role s permissions are assigned by security administrators Is RBAC MAC or DAC or neither? First emerged: mid 1970s First models: mid 1990s RBAC can be configured to do MAC RBAC can be configured to do DAC RBAC is policy neutral RBAC is neither MAC nor DAC! Ravi Sandhu 17

RBAC: RBAC96 Model ROLE HIERARCHIES USER-ROLE ASSIGNMENT PERMISSIONS-ROLE ASSIGNMENT USERS ROLES PERMISSIONS... SESSIONS CONSTRAINTS Ravi Sandhu 18

RBAC: The RBAC Story Proposed Standard Standard Adopted RBAC96 paper Ravi Sandhu 19

THE PRESENT Ravi Sandhu 20

UCON: Usage Control Scope Privacy Protection Security Objectives Intellectual Property Rights Protection DRM Sensitive Information Protection Traditional Trust Access Management Control Usage Control Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) SRM & CRM Security Architectures Ravi Sandhu 21

UCON: Usage Control Model unified model integrating authorization obligation conditions and incorporating continuity of decisions mutability of attributes Subjects (S) Rights (R) Usage Decisions Objects (O) pre-decision Continuity of Decisions ongoing-decision before-usage ongoing-usage after-usage Subject Attributes (SA) Authoriz ations (A) Obliga tions (B) Condi tions (C) Object Attributes (OA) pre-update ongoing-update post-update Mutability of Attributes UCON is ABAC on steroids Ravi Sandhu 22

THE FUTURE Ravi Sandhu 23

Application-Centric Security Models Our Basic Premise There can be no security model without application context So how does one customize an application-centric security model? Meaningfully combine the essential insights of DAC, LBAC, RBAC, ABAC, UCON, etcetera Directly address the application-specific trade-offs Within the security objectives of confidentiality, integrity and availability Across security, performance, cost and usability objectives Separate the real-world concerns of practical distributed systems and ensuing staleness and approximations (enforcement layer) from policy concerns in a idealized environment (policy layer) Ravi Sandhu 24

Dissemination Centric Sharing Extensive research in the last two decades ORCON, DRM, ERM, XrML, ODRL, etc. Copy/usage control has received major attention Manageability problem largely unaddressed Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Alice Bob Charlie Eve Susie Attribute Cloud Attribute Cloud Attribute Cloud Attribute Cloud Attribute Cloud Dissemination Chain with Sticky Policies on Objects Ravi Sandhu 25

Group Centric Sharing (g SIS) Brings users & objects together in a group Focuses on manageability using groups Co-exists with dissemination-centric Two metaphors Secure Meeting Room (E.g. Program committee) Subscription Model (E.g. Secure multicast) Operational aspects Group characteristics E.g. Are there any core properties? Group operation semantics E.g. What is authorized by join, add, etc.? Read-only Vs Read-Write Administrative aspects E.g. Who authorizes join, add, etc.? May be application dependant Multiple groups Inter-group relationship join add Users Group Authz (u,o,r)? Objects leave remove Ravi Sandhu 26

CONCLUSION Ravi Sandhu 27

Conclusion THE PAST Discretionary Access Control (DAC) Mandatory Access Control (MAC) Equivalently Lattice-Based Access Control (LBAC) Role-Based Access Control (RBAC) THE PRESENT Usage Control (UCON) Attribute-Based Access Control (ABAC) on steroids THE FUTURE Application-Centric Access Control Models Technology-Centric Access Control Models Models are all important A Policy Language is not a substitute for a good model Lots of interesting/impactful research to be done at P, E and I layers Ravi Sandhu 28