COMP3441 Lecture 9: Security Architecture



Similar documents
INTRUSION DETECTION SYSTEMS and Network Security

CMPT 471 Networking II

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

8. Firewall Design & Implementation

Building A Secure Microsoft Exchange Continuity Appliance

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Chapter 9 Firewalls and Intrusion Prevention Systems

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How To Protect Your Network From Attack From Outside From Inside And Outside

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Developing Network Security Strategies

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Architecture Overview

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Access control policy: Role-based access

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Firewall Environments. Name

Additional Security Considerations and Controls for Virtual Private Networks

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

How To Protect Your Network From Attack

Second-generation (GenII) honeypots

Designing a security policy to protect your automation solution

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Firewalls, IDS and IPS

Achieving PCI-Compliance through Cyberoam

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Network Security Guidelines. e-governance

What would you like to protect?

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Multi-factor authentication

Lesson 5: Network perimeter security

Network Instruments white paper

SCADA SYSTEMS AND SECURITY WHITEPAPER

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Protecting Your Organisation from Targeted Cyber Intrusion

Huawei Network Edge Security Solution

Basics of Internet Security

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

HANDBOOK 8 NETWORK SECURITY Version 1.0

Network Security Forensics

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Chapter 15. Firewalls, IDS and IPS

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Chapter 11 Cloud Application Development

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Computer Networks. Secure Systems

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Testing Network Security Using OPNET

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

74% 96 Action Items. Compliance

Intrusion Detection for Mobile Ad Hoc Networks

Firewall Security. Presented by: Daminda Perera

Network/Cyber Security

Taxonomy of Intrusion Detection System

A Model Design of Network Security for Private and Public Data Transmission

SCADA/Business Network Separation: Securing an Integrated SCADA System

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

NETWORK SECURITY (W/LAB) Course Syllabus

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Effective Methods to Detect Current Security Threats

Information Technology Security Guideline. Network Security Zoning

Update On Smart Grid Cyber Security

Firewalls, Tunnels, and Network Intrusion Detection

ADM:49 DPS POLICY MANUAL Page 1 of 5

Cyber Essentials Questionnaire

Computer Security: Principles and Practice

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Internet Security Firewalls

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Computer Security DD2395

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Secure networks are crucial for IT systems and their

Effective Methods to Detect Current Security Threats

Firewalls Overview and Best Practices. White Paper

CTS2134 Introduction to Networking. Module Network Security

Transcription:

COMP3441 Lecture 9: Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 6, 2014 Overview Security Design Principles Security Architecture Security Design in the Large

Saltzer and Schroeder s Security Design Principles Economy of Mechanism (simpler = easier to assure) Fail-safe defaults (e.g. deny by default/allow by exception) Complete Mediation (every access request checked) Open design (= Kerckhoff s Principle) Separation of Privilege (e.g. employ dual control) Least Privilege Least Common Mechanism (minimise sharing) Psychological Acceptability Security Perimiters One of the key defensive mechanisms is the placement of difficult to cross boundaries between assets and adversaries. physical separation s sandboxing Once crossed, these leave the assets vulnerable.

(Image: Maginot Line, from Wikimedia Commons) Defence in Depth A general approach to defence: multiple layers of defence, rather than a single layer complimentary defensive mechanisms the higher the value of an asset, the greater the number of protective layers around it.

(Image: Himeji Castle, from Wikimedia Commons) Example: use anti-virus products both at the on user machines and use different ones (which are likely to detect different attacks).

Security Architecture A security architecture is a high level design of the structure of the system, identifying main system components, defensive measures, and their interconnections. The lack of connectedness of certain components is a key aspect of the security design: it forces causal effects in the system to flow through the defensive measures. Example: Access Control Policy Architecture The enterprise has a general security policy. Multiple applications (e.g., email, accounts system, HR system,corporate planning system) need to be consistent with this policy.

Design 1: Enforcement within application code Application 1 Application 2 Application 3 Application Code Policy enforcing code Application Code Policy enforcing code Application Code Policy enforcing code Database Design 2: Policy Server Application 1 Application 2 Application 3 Application Code Application Code Application Code Policy Access Control Monitor Database Advantages: No complex interleaving of application and security code. Application programmer errors cannot cause security breaches Policy changes take immediate effect Policy enforced consistently across all applications

Isolated Users User 1 User 2 User 3 Data 1 Data 2 Data 3 CPU/Storage Sharing User 1 User 2 User 3 Machine Data 1 Data 2 Data 3 Disk

Separation User 1 User 2 User 3 Machine Separation kernel Data 1 Data 2 Data 3 Disk Following the principle of economy of mechanism, a separation kernel is a small layer of the operating system with the function of isolating user processes (and nothing more). Storage Sharing 2 User 1 User 2 User 3 Encryption Encryption Encryption Encrypted Data 1 Encrypted Data 2 Encrypted Data 3 Disk/ Cloud

Military Security Architectures Low Level Data Diode High Level Hinke-Schaefer Architecture An architecture for multi-level secure databases High Level Database H DBMS can read but not write Low level files L F. H user L user H DBMS L DBMS H F L F

Military Security Architectures: Downgrading In practice, High Level data needs to be released to the Low level domain from time to time.. Low Level Data Diode High Level Downgrader Starlight Switch An architecture for allowing an intelligence analyst to securely access low level information (e.g. web browsing) while operating in the High level domain. Low Level Data Diode High Level Starlight Switch User Machine Keyboard

Security Architecture In a network security architecture, we describe the structure of network topology and the placement of defensive measures such as s virtual private networks anti virus servers honeypots application servers, etc. Web Servers The public needs to be able to read content served by these, but they need to be protected from defacement, data theft. Compromise of the server should not impact company internal data. De-militarized zone Internal Internet Web server

Virtual Private s A cryptographic tunnel is a cryptographically secured channel, with encrypted messages carried in some insecure protocol (e.g. IP). Virtual Private s employ cryptographic tunnels as an isolation mechanism to connect two or more protected networks/machines through the internet as if they were directly connected. Remote Branch Offices Office 1 Internet Office2 encrypted channel

Joint Ventures Company 1 Internet Company 2 encrypted channel Joint data area Joint data area Telecommuting/Travelling Staff Company Internet encrypted channel employee laptop/ home machine

Telecommuting/Travelling Staff Company Internet encrypted channel/ ssh employee laptop/ home machine Telecommuting/Travelling Staff With software VPN s the previous two have the risk that a direct channel between internet and remote machine may exist, making the previous two equivalent to: Company Internet employee laptop/ home machine

Telecommuting/Travelling Staff Company Internet encrypted channel Hardware VPN employee laptop/ home machine A hardware VPN (plus disabling wireless connection capability) can disallow all unencrypted/unauthenticated internet connections, forcing all remote internet connections through the. Telecommuting/Travelling Staff And when the kids want to play... Company Internet encrypted channel Router family subnet Hardware VPN employee work subnet

Intrusion Detection Technology IDS Objective: detect attacks in progress, to enable a timely response Basic Infrastructure: Logging of events Sensors: collect information Analyzers: process sensor data Management Modules: interface to operators IDS: Types of Information that can be collected At the host: Login (attempts) File accesses Operating system calls On the network: packet traffic flow protocol type packet payload

Sensor Placement sensor placement determines which attacks can be detected, but needs to be traded off against cost De-militarized zone Internal Internet Web server Sensor Data Aggregation Where is the aggregated sensor data analyzed? Host based intrusion detection Gossip: hosts share data with each other Centralized analysis server

Analysis Approaches Anomaly Detection: patterns of activity that differ from the usual behaviour e.g.: login to machine/account not usually used login outside of usual hours, or from unknown machine higher frequency than usual of some event types Signature Detection: patterns of activity that an attacker is likely to engage in (e.g. access to system files) Attacker response to this: slow down rate of attack The Statistics of Detection 1 in 100 people suffer from disease D Test T has 87% accurracy, i.e.: if person P has D, the test is positive with probability 87% if person P does not have D, the test is negative with probability 87% Your doctor administers the test T and the results are positive. What is the probability that you do not have the disease D? low: 0-15% medium: 16-50% high: 51-90% very high: 91-100%

A Fundamental Problem with Intrusion Detection Answer: very high! (I.e. you probably don t have it!) By Bayes theorem: Pr(D = no T = yes) = Pr(T =Yes D=no)Pr(D=no) Pr(D=Yes T =yes)pr(t =yes)+pr(d=yes T =no)pr(t =no) = 0.13 0.99 0.87+0.01+0.13 0.99 = 0.937 Note that we get a large contribution 0.13 0.99 0.13 of false alarms compared to the small number 0.87 0.01 0.0087 of correct alarms! This problem affects IDS: if intrusions are rare, a high percentage of alarms will be false alarms! Security in the Large Real world security design requires meeting multiple requirements from multiple sources balancing conflicting requirements trust relationships between independent organisations

Example: Airport Security Travel from Toronto to Los Angeles requires Airline must ensure that passengers have paid to travel Clearance by US Immigration (before boarding, so it does not need to be done on arrival) US Customs Clearance Flight Security Check (no bombs/weapons on plane) Problem: Conduct a risk analysis and design the architecture of a security system for these requirements. Actual Design at Toronto Airline Checkin, issue boarding pass bag weigh US Immigration Security Check US Customs Checked Luggage Drop Boarding pass check people Bag Xray bags