Building Robust Security Solutions Using Layering And Independence



Similar documents
INFORMATION ASSURANCE DIRECTORATE

Recommended Wireless Local Area Network Architecture

Recommended IP Telephony Architecture

Computer Networks. Secure Systems

Utilizing the NSA s CSfC Process

Using BroadSAFE TM Technology 07/18/05

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Developing Network Security Strategies

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Network and Security Controls

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Information Technology Security Guideline. Network Security Zoning

Avaya G700 Media Gateway Security - Issue 1.0

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Network Security Administrator

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Securing Cisco Network Devices (SND)

Complying with PCI Data Security

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

TABLE OF CONTENTS NETWORK SECURITY 2...1

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Firewalls, Tunnels, and Network Intrusion Detection

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Network Security Guidelines. e-governance

The next generation of knowledge and expertise Wireless Security Basics

CTS2134 Introduction to Networking. Module Network Security

Remote Access Security

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Avaya TM G700 Media Gateway Security. White Paper

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

iphone in Business Security Overview

Cyber Essentials Questionnaire

IINS Implementing Cisco Network Security 3.0 (IINS)

Executive Summary and Purpose

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

SonicWALL PCI 1.1 Implementation Guide

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Cisco Wireless Security Gateway R2

Network Access Security. Lesson 10

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Deploying iphone and ipad Security Overview

Site to Site Virtual Private Networks (VPNs):

Basics of Internet Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Making Data Security The Foundation Of Your Virtualization Infrastructure

Implementing Cisco IOS Network Security

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Network Security. Lecture 3

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ipad in Business Security

GE Measurement & Control. Cyber Security for NEI 08-09

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

TOP SECRETS OF CLOUD SECURITY

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

Altius IT Policy Collection Compliance and Standards Matrix

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Retention & Destruction

CISCO IOS NETWORK SECURITY (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS)

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Exam Questions SY0-401

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Achieving PCI Compliance Using F5 Products

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

White Paper. BD Assurity Linc Software Security. Overview

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Implementing Security for Wireless Networks

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

IBX Business Network Platform Information Security Controls Document Classification [Public]

U06 IT Infrastructure Policy

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

The Protection Mission a constant endeavor

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Secure Network Access Solutions for Banks and Financial Institutions. Secure. Easy. Protected. Access.

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Goals. Understanding security testing

Transcription:

Building Robust Security Solutions Using Layering And Independence Fred Roeper Neal Ziring Information Assurance Directorate National Security Agency Session ID: STAR-401 Session Classification: Intermediate

Introduction Purpose: Provide information about layered design techniques for secure systems, to allow you to apply this approach to your own systems. Outline: Introduction to layered design and NSA s Commercial Solutions for Classified initiative Principles of independence Case studies Evaluating independence Applying layered design 2

STAR-401: Building Robust Security Solutions Using Layering And Independence Section 1 Introduction to Layered Design and CSfC 3

GOTS versus COTS Traditionally, the US government has used government designed and certified devices to protect its most sensitive data. Government Devices (GOTS) Purpose-built for security Strict design and implementation criteria Long, exhaustive security evaluation Commercial Devices (COTS) Provide a balance of security and features Quick to market, flexible 4

GOTS versus COTS GOTS: Assurance: high Lifecycle costs: high Development: slow Gov t control: high COTS: Assurance: varies Lifecycle costs: lower Development: quick Gov t control: low How can we enjoy the agility and flexibility of commercial devices, with assurance sufficient to protect the most sensitive national security information? 5

Solution Enumerate all the individual security requirements needed to achieve overall assurance objectives (confidentiality, integrity, etc.) For each security requirement: Provide multiple mechanisms that satisfy the requirement,..such that each mechanism is sufficient should another get compromised,..such that the mechanisms are independent: vulnerability or compromise of one does not imply compromise of another. Supplement with detection mechanisms that can monitor health of the primary mechanisms. This approach can be used by anyone who needs greater assurance, not just government. 6

Security through Composition Example: IA requirement: confidentiality - prevent unauthorized access to information in transit over an untrusted network Select standards Compose Select implementation Implement WPA2 802.1AE TLS Vendor A (SW) Vendor C (SW) TLS in SW Vendor C S/MIME TLS SSH IKE+IPSec XML-Enc... IKE+IPSec IKE+IPSec Vendor A (SW) Vendor B (SW) Vendor A (HW) Open Src D (SW) Open Src E (SW) IKE+IPSec in SW Vendor B IKE+IPSec in HW Vendor A 7

Security through Composition Layered security is most effective when the layers exhibit independence. Means to achieve independence: Different algorithms, processors, suppliers, software, protocols, platform, staffing, operations, configuration,... Attack 1 2 3 IKE+IPSec in HW Vendor A IKE+IPSec in SW Vendor B TLS in SW Vendor C Router Server Desktop attacker goal 8

Example: NSA Commercial Solutions Strategy The NSA Commercial Solutions for Classified (CSfC) process uses composition to increase assurance. customer needs Capability Package Fielded Package NSA Experts Design Solution architecture Implement Solution instantiation NIAP-evaluated components Select Candidate components Selected components Assess Assess NSA Experts Inform Responsible DAA 9

Example: NSA Commercial Solutions Strategy The NSA Commercial Solutions for Classified (CSfC) process uses composition to increase assurance. customer needs Define requirements, select independent mechanisms, Identify independent components NSA Experts Design Evaluate independence of selected mechanisms Capability Package Solution architecture Implement Evaluate independence of field implementation Fielded Package Solution instantiation NIAP-evaluated components Understand background of components Provide doctrine tocandidate ensure independence components Select Assess NSA Experts Evaluate independence of fielded components Inform Selected components Assess Responsible DAA 10

STAR-401: Building Robust Security Solutions Using Layering And Independence Section 2 Principles of Independence 11

Types of Independence Coupling is the opposite of independence. Coupling is usually based on common element(s) or shared pedigree. Coupling can be based on any part of a mechanism or component s lifecycle: foundation, concept, design, implementation, deployment, etc. Coupling in multiple parts of the lifecycle reduces independence. Examples: Form of Independence Common Element Parts of Lifecycles Algorithmic Same cryptographic algorithm Concept, design Credential Same provider of keys, secrets Deployment, operation Codebase Same underlying source code Implementation Administrator Same privileged administrators Operation Forms of coupling where the common element is less assured require greater attention to independence. 12

Degree of Independence: Spectrum Independence between layered security mechanisms varies depending on: Design (e.g., algorithms, protocols, architecture) Implementation (e.g., libraries, development tools, platforms, etc.) Implementer (e.g, coders, testers, suppliers, integrators, etc.) Operation (e.g., installers, administrators, auditors, etc.)... Fully coupled (no independence) Fully independent Very Low Independence Medium Independence High Independence Brand A Hardware Encryptor Brand A Hardware Encryptor Brand A Hardware Encryptor Brand C Hardware Encryptor Brand B Software Encryptor Brand A Hardware Encryptor Same algorithm Same protocol Same embedding Same platform Same codebase Same key source Same administrators Same algorithm Same protocol Same embedding Different codebases Different platforms Different key sources Same administrators Same algorithm Different protocols Different embedding Different platforms Different codebases Different key sources Different administrators 13

Types of Independence: Prevention v. Detection Independence can be gained through differences in: Preventative controls these directly enforce/satisfy the security requirement Encryption Access control Port filtering User authentication & authorization Etc. Detective controls these detect violation of the requirement so it can be mediated Auditing and log inspection Configuration management Intrusion detection Flow monitoring Etc. 14

Audience Exercise Site 1 Hostile Site 2 network Security requirement: file integrity (file must not change in transit) Which design has more independence between A and B? Design 1: Mechanism A sign file in CMS format, using PKI cert from enterprise CA, software from vendor X Mechanism B HTTPS (TLS) transfer, using PKI cert from enterprise CA, software from vendor Y Design 2: Mechanism A sign file in XML format, using PKI cert from enterprise CA, software from vendor X Mechanism B IPSec VPN between sites, using pre-placed key, hardware from vendor Z 15

STAR-401: Building Robust Security Solutions Using Layering And Independence Section 3 Case Studies: Layered System Designs 16

Remote Office VPN Certificate Authority B Remote Office Certificate Authority A Physically Protected Processing Area Data Center Carrier Network Brand X IPSEC Router Brand Y IPSEC Router Inner IPSEC Tunnel Outer IPSEC Tunnel Brand Y IPSEC Router Brand X IPSEC Router Thin Client Workstation 17

Field Site VPN ESP and UDP port 500 only External Router Carrier Network IKE + IPSEC SDES SRTP in VOIP phone IKE + IPSEC in S/W in Workstation OS HQ switch Brand Z Call Mgr Syslog NTP TFTP Brand X Cert Auth Brand Y Cert Auth IKE + IPSEC in s/w in Workstation OS Field Site External Router IKE + IPSEC SDES SRTP in VOIP phone 18

Secure WiFi Multiple virtual machines used for independence between WPA2, IPSEC VPN client, and User OS software running on same hardware Client Devices Access Points Authentication Server 1 Authentication Server 2 Switch Port Filter VPN Gateway To Wired Network Wireless Controller WPA2 Enterprise using 128 bit AES CCMP FIPS 140 2 validated encryption with EAP TLS authentication passing X.509 machine certificates IPsec VPN using 128 bit AES CBC FIPS 140 2 validated Encryption with X.509 machine certificates 19

STAR-401: Building Robust Security Solutions Using Layering And Independence Section 4 Evaluating Independence 20

Evaluating Security of Layered Independent Protection Protection mechanisms are selected to be sufficient to protect on their own, if effective So we only need at least one effective protection mechanism in order to be secure But we don t have full assurance in mechanisms Let A i be the % Assurance of Mechanism i And mechanisms aren t always 100% independent of each other Let I i be the % of Independence of Mechanism i from all other layered mechanisms Layered Assurance = 1 - i=1 n (1-I i A i ) Or Layered Assurance = 1 (1-I 1 A 1 )(1-I 2 A 2 ) (1-I n A n ) Where n is the number of layered mechanisms If we assume 100% independence between all mechanisms, then 2 Layer Example: 1 (1-75%)(1-80%) = 95% layered assurance 3 Layer Example: 1 (1-60%) (1-75%) (1-80%) = 98% layered assurance 4 Layer Example: 1 (1-50%) (1-60%) (1-75%) (1-80%) = 99% layered assurance 21

Evaluating Security of Layered Independent Protection: Method How to determine Assurance of Mechanism? Process integrity Compliance with standards Testing Trust in developer Trust in suppliers of subsystems/components Historical record of vulnerability 22

Evaluating Security of Layered Independent Protection: Method How to determine Independence of Mechanism? A mechanism is independent to the degree that its factors of independence are different from those same factors in all other layered mechanisms I = (# of factors independent of all other layers / # of factors) Factor of Independence algorithm protocol embedding platform codebase key source administrators supplier Mechanism A Algorithm 1 Protocol 1 Embedding 1 Platform 1 Codebase 1 Key source 1 Admins 1 Supplier 1 Mechanism B Mechanism C Algorithm 1 Algorithm 2 Protocol 2 Protocol 3 Embedding 2 Embedding 3 Platform 2 Platform 1 Codebase 2 Codebase 3 Key source 2 Key source 3 Admins 1 Admins 1 Supplier 2 Supplier 3 Degree of Independence 62.5% 75% 75% 23

Evaluating Security of Layered Independent Protection: Examples Three layer example using Assurance of Mechanism and Degree of Independence values from previous examples: Layered Assurance = 1 (1-I 1 A 1 )(1-I 2 A 2 )(1-I 3 A 3 ) Mechanism 1: I 1 = 62.5%, A 1 = 60%, Mechanism 1: I 2 = 75%, A 2 = 75% Mechanism 1: I 3 = 75%, A 3 = 80% Layered Assurance = 1 (1-0.375)(1-0.5625)(1-0.6) Layered Assurance = 89.0625% Layered Assurance was 98% with I 1, I 2, I 3 = 100% 24

STAR-401: Building Robust Security Solutions Using Layering And Independence Section 5 Wrap-up 25

Application Apply layered design for your secure system projects: 1. Select set of security requirements (defense in depth cover all forms of IA needed for your information & systems) 2. For each requirement: Identify candidate mechanisms Assess independence of mechanisms Select mechanisms and compose 3. Implement composite design Select specific implementations for each mechanism Assess independence of implementations Assess assurance of implementations 4. Deploy composite design Establish independence in operation and management 26

Application Remember this when designing your next secure system: Security Requirement A Layer 2 Security Requirement A Layer 1 Security Requirement B Layer 2 Security Requiement B Layer 1 Independent Layers of Defense Defense In Depth 27

Summary Composition of security mechanisms (layering) can be used to gain assurance. Independence of mechanisms is a primary criterion for judging members of a composition. Many different forms of independence across component lifecycle Multiple forms apply to any candidate composition. Layered Assurance can be analyzed using probability Layered Assurance = 1 (1-I 1 A 1 )(1-I 2 A 2 ) (1-I n A n ) Apply this method to create more assured systems: Select IA requirements Identify multiple mechanisms/components for each requirement Assess the independence of mechanisms for each requirement Assess the assurance of mechanisms for each requirement Calculate the layered assurance for each requirement Evaluate whether resulting assurance meets Information Assurance objectives 28

Future Work Areas for further research and refinement: More rigorous definition of various forms of independence Incorporation of data necessary for evaluating independence into security certification regimes (e.g., NIAP) Practical design rules for composition of security mechanisms Improved test criteria and testing tools for composite systems Formal or scientific basis for measuring confidence Operational mechanisms for monitoring independence in fielded systems 29

STAR-401: Building Robust Security Solutions Using Layering And Independence Backup Backup Slides 30

Security through Composition Each security requirement has multiple mechanisms supporting. Some mechanisms may support multiple requirements. Each set has adequate independence. Requirement Mechanisms Layers 1 2 3 4 5 (3) (3) (3) (4) (2) attacker goals 31

Types of Independence (Longer List) Math foundation Algorithm Standards body Protocol Code library (crypto library) Credential Entropy Embedding (HW,SW,etc.) Language Codebase Dev. Tools Dev. environment Operating system Developer Supplier Installer Network Audit Location/Physical Administrator Configuration Operator Oversight Maintenance Disposal Backup Power & Cooling Management plane Control plane Data plane National origin 32

Degree of Independence: Spectrum Independence between layered components supporting the same security requirement varies along a spectrum based on how successful compromise of one affects the work needed (or chance of success) for compromising another. attacker Mechanism A Mechanism B goal Fully coupled Compromise of A reduces the work to compromise B to zero. Fully Independent Compromise of A provides no advantage for compromising B. Anti-coupled Compromise of A makes compromise of B infeasible 33