Security Architecture and Design



Similar documents
Machine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.

Security Models and Architecture

Domain 9 Security Architecture and Design

Operating Systems 4 th Class

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

CHAPTER 2: HARDWARE BASICS: INSIDE THE BOX

TEST CHAPTERS 1 & 2 OPERATING SYSTEMS

Types Of Operating Systems

Chapter 3. Operating Systems

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

Secure Network Communications FIPS Non Proprietary Security Policy

Security Architecture and Models

Computer Security. Evaluation Methodology CIS Value of Independent Analysis. Evaluating Systems Chapter 21

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

Reference Guide for Security in Networks

1 PERSONAL COMPUTERS

Chapter 1: Introduction. What is an Operating System?

Mandatory Access Control

Certification Report

Installing, Configuring and Administering Microsoft Windows

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives

Basic Concepts of Information Technology (IT)

Weighted Total Mark. Weighted Exam Mark

Introduction to Information System Layers and Hardware. Introduction to Information System Components Chapter 1 Part 1 of 4 CA M S Mehta, FCA

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

Access Control Intro, DAC and MAC. System Security

MICROPROCESSOR. Exclusive for IACE Students iacehyd.blogspot.in Ph: /422 Page 1

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Chapter 2 Logic Gates and Introduction to Computer Architecture

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module

CHAPTER 15: Operating Systems: An Overview

THE BUSINESS VALUE OF AN ERP SYSTEM

Chapter 4 System Unit Components. Discovering Computers Your Interactive Guide to the Digital World

Constructing Trusted Code Base XIV

Pulse Secure, LLC. January 9, 2015

Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are

Post-Class Quiz: Software Development Security Domain

CISSP Common Body of Knowledge Review: Security Architecture & Design Domain Version: 5.10

Chapter 2: Computer-System Structures. Computer System Operation Storage Structure Storage Hierarchy Hardware Protection General System Architecture

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

Tech Application Chapter 3 STUDY GUIDE

Chapter 2: OS Overview

Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9. Do Now: Name 3 parts of the computer.

Computer Components Study Guide. The Case or System Box

Discovering Computers Living in a Digital World

Data Collection Agent for Active Directory

Operating System Structures

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

Security Architecture and Design

COMPUTER HARDWARE & SERVICING QUESTION BANK

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

Primary Memory. Input Units CPU (Central Processing Unit)

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Lecture 2: Computer Hardware and Ports.

Chapter 3: Operating-System Structures. Common System Components

DEPARTMENT OF DEFENSE STANDARD DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA

Ways to Use USB in Embedded Systems

Role Based Access Control: Adoption and Implementation in the Developing World

Chapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan

Devices and Device Controllers

2) What is the structure of an organization? Explain how IT support at different organizational levels.

Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

Enabling Technologies for Distributed and Cloud Computing

theguard! ApplicationManager System Windows Data Collector

Scheduling. Scheduling. Scheduling levels. Decision to switch the running process can take place under the following circumstances:

Secure Virtual Machine Systems

Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization

Chapter 11 I/O Management and Disk Scheduling

Operating System Fundamentals Robert Power & Robert Ford

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Virtualization in Linux KVM + QEMU

Windows Server Virtualization & The Windows Hypervisor

SECURITY ARCHITECTURE

Enabling Technologies for Distributed Computing

Data Cables. Schmitt TTL LABORATORY ELECTRONICS II

That Point of Sale is a PoS

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai Jens Onno Krah

ManageEngine Desktop Central Training

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

How To Understand The History Of An Operating System

Chap-02, Hardware and Software. Hardware Model

Data Collection Agent for NAS EMC Isilon Edition

Module 1 Introduction to Information and Communication Technologies

Common Criteria. Introduction Magnus Ahlbin. Emilie Barse Emilie Barse Magnus Ahlbin

Computer Engineering

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

ICT THEORY 4 MAIN AREAS

Overview and History of Operating Systems

Transcription:

IT Networks and Security & CERIAS CISSP Luncheon Series Security Architecture and Design Presented by Rob Stanfield

Domain Overview Identify key principles and concepts critical to securing the infrastructure Design Implementation Operation Ensure security from a hardware/software level Operating Systems Applications Equipment Networks

CISSP Expectations Identify physical components of IT architecture Understand software relationships Understand design principals for the architecture Describe how to secure an enterprise Identify trusted and un-trusted components Discuss security models and architecture theory Identify appropriate protection mechanisms Discuss evaluation methods and criteria Understand the role of assurance evaluations Explain certification and accreditation Identify techniques used to provide system security

System Architecture Three basic components CPU Central Processing Unit Storage Devices includes both long and short-term storage, such as memory and disk Peripherals includes both input and output devices, such as keyboards and printer

ALU Arithmetic Logic Unit Control Unit Registers General and special registers Bus Address and data Privileged mode or user mode Multiprocessor - symmetric or asymmetric CPU Computer Brain

CPU Example

Storage Devices Primary Storage Cache or registers Memory (RAM, ROM, Cache, Flash) Secondary Storage Disk CD or Tape Virtual Memory Memory

Peripherals or I/O Devices Some examples are Monitor Keyboard Printers

Basic Components Diagram

An Operating System provides an environment to run applications Operating System Architecture Process Management for all processes Process - a set of instructions and the information & resources needed to process it. Multitasking cooperative, preemptive Process State running, ready, blocked

Application Programs Applications interact with the operating system to perform a task Each application is a process Applications run in user mode Threads Other applications Firmware and Middleware

Protection Rings

Security Policy documents the security requirements for an organization Security Models Security Model formally outlines the requirements needed to support the security policy, and how authorization is enforced Reference Monitor abstract machine that provides auditable access control to objects Trusted Computing Base (TCB)

Biba Integrity Model Security Model Examples Bell-LaPadula Confidentiality Model Clark-Wilson Integrity Model Brewer and Nash Model Others State Machine Model Non-Interference Model Graham Denning Model Harrison-Ruzzo-Ullman Model

Subject to object model Objects you are able to access Bell-LaPadula Confidentiality Model Used to provide confidentiality 3 main rules used and enforced Simple security rule (no read up)» Subject cannot read data at a higher level The *-property rule (no write down)» Subject cannot write data to a lower level Strong star property rule» Subject with read/write only at same level

Similar to the Bell-LaPadula Model Biba Security Model First to address integrity Difference between Biba and Bell-LaPadula Two main rules used and enforced *-integrity axiom (no write up)» Subject cannot write data to objects at higher level Simple integrity axiom (no read down)» Subject cannot read data from lower level Biba and BP are informational flow models Concerned with data flowing up or down levels

Clark-Wilson Model Addresses all 3 integrity model goals Prevent unauthorized users from making modifications Prevent authorized users from making improper modifications (separation of duties) Maintain internal/external consistency (well-formed transaction)

Other Models Non-interference model - Actions at a higher level (domain) cannot interfere with actions at a lower level. State machine model - Abstract math model that uses state variables to represent the system state. Failure of a state machine should fail in a secure state. Graham-Denning Modem Used eight basic protection rules. Brewer and Nash Model (Chinese Wall Model) - Allows for dynamically changing access controls to protect against conflicts of interest

Evaluation Methods and Criteria Trusted Computer Security Evaluation Criteria (TCSEC) addresses confidentiality only A Verified protection» A1 verified design B Mandatory Protection» B3 Labeled Security» B2 Structured Protection» B1 Labeled Security C Discretionary Protection» C2 Discretionary Protection» C1 Controlled Access D Minimal Security Others are ITSEC, SEI Common Criteria (ISO) based on TCSEC & ITSEC Evaluation Assurance Levels (EAL 1 7 )

Certification and Accreditation These are distinct steps Certification relates to validation of the system» Security modes of operation» Data sensitivity handling procedures» System and facility configuration» Intercommunication with other systems Accreditation relates to management evaluation once the certification process is complete. Does the system meet the needs of the business while satisfying the security needs?