... Lecture 3 Access Control. Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg



Similar documents
Access Control Intro, DAC and MAC. System Security

Part III. Access Control Fundamentals

Computer security Lecture 3. Access control

Access Control Basics. Murat Kantarcioglu

Mandatory Access Control

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Information Security Information & Network Security Lecture 2

CSE543 - Introduction to Computer and Network Security. Module: Access Control

How To Model Access Control Models In Cse543

Database Security Part 7

Session objectives. Access control. Subjects and objects. The request. Information Security

Bell & LaPadula Model Security Policy Bell & LaPadula Model Types of Access Permission Matrix

Introduction to Computer Security

Computer Security. What is Auditing? Policies CIS Prevention Deterrence. Detection. Response Recovery 2. Auditing Chapter 24.

Document Management System Security

Security Enhanced Linux and the Path Forward

Access Control. Dr George Danezis

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4

Introduction to Computer Security

Role Based Access Control: Adoption and Implementation in the Developing World

Design. Syntactic Issues

CIS 551 / TCOM 401 Computer and Network Security

Outline. INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control. The concept of identity

Goal-Oriented Auditing and Logging

Security Models: Past, Present and Future

Chapter 23. Database Security. Security Issues. Database Security

Role Based Access Control (RBAC) Nicola Zannone

HW 07: Ch 12 Investigating Windows

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

INF3510 Information Security University of Oslo Spring Lecture 9 Identity Management and Access Control

CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006

Access Control: Policies, Models, and Mechanisms

Access Control: Policies, Models, and Mechanisms

Access Control Matrix

SecTor 2009 October 6, Tracy Ann Kosa

Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Lecture II : Communication Security Services

Access Control. 1 Overview of Access Control. Lecture Notes (Syracuse University) Access Control: 1. What is Access Control?

Security Architecture and Design

Firewalls CSCI 454/554

Access Control Fundamentals

Technical Properties. Mobile Operating Systems. Overview Concepts of Mobile. Functions Processes. Lecture 11. Memory Management.

Weighted Total Mark. Weighted Exam Mark

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University

Central Agency for Information Technology

Chapter 23. Database Security. Security Issues. Database Security

SSL Firewalls

... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg

SELinux Policy Management Framework for HIS

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL

Chapter 12 File Management. Roadmap

Chapter 12 File Management

Domain 9 Security Architecture and Design

Module 7 Security CS655! 7-1!

USER ACCESS CONTROL AND SECURITY MODEL

UVic Department of Electrical and Computer Engineering

ISACA PROFESSIONAL RESOURCES

L16: Ring-based Access Control

International Journal on Recent and Innovation Trends in Computing and Communication ISSN Volume: 1 Issue: DATABASE SECURITY

? Resource. Access Control and Operating System Security. Access control matrix. Access control. Capabilities. Two implementation concepts.

SECURITY ARCHITECTURE

Mandatory Access Control in Linux

CS 665: Computer System Security. Designing Trusted Operating Systems. Trusted? What Makes System Trusted. Information Assurance Module

The Data Model Resource Book Revised Edition Volume 2

CEN 559 Selected Topics in Computer Engineering. Dr. Mostafa H. Dahshan KSU CCIS

User-Centered Security Engineering

File Management. Chapter 12

Secure Automated Document Delivery

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS

An Investigation of Chinese Wall Security in Cloud Computing

Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Role-Based Access Controls

Security in the PEPPOL

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

Database Security and Authorization

Transcription:

Lecture 3 Access Control Information & Communication Security (WS 14/15) Prof. Dr. Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security Goethe-University Frankfurt a. M.

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 2

Subjects and Objects There is an active subject accessing a passive object with some specific access operation, while a reference monitor grants or denies access. Typical subjects are users and processes. Typical objects are files or resources. Depending on circumstances, an entity can be a subject in one access request and an object in another. [Go99] 3

Subject Access request Access Control Model Reference monitor Object Source: B. Lampson. Protection. ACM Operating System Review, 8, 1974 4

Subjects and objects present two options for focusing control: Control Options You can either specify what a subject is allowed to do, Or what may be done with an object. [Go99] 5

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 6

Access Modes (in the original Bell-LaPadula model) On the most elementary level, a subject may observe or alter an object. Observe: to look at the contents of an object Alter: to change the contents of an object Usually a richer set of access operations will be used. [BLP76, page 10; Go99] 7

Access Rights and Access Attributes (in the original Bell-LaPadula model) Execute Append Read Write Observe x x Alter x x [BLP76, page 10ff; Go99] 8

Access Rights and Access Attributes Usually files can be opened for read or write access. This way the operating system can avoid potential conflicts like two users trying to write the same file. Write access usually includes read access. [Go99] 9

Access Rights and Access Attributes (in the original Bell-LaPadula model) Few systems implement the append function. However, sometimes the append function could be useful. Example: Log files A process writing to a log file has no need to and probably should not be able to read its contents. Operating systems can use files without opening them at all. Therefore, the execute right does not include the observer or alter mode: Example: Cryptographic engine holding a master key in a special tamper-resistant register, so that the key can be invoked without being read. [BLP76, page 10; Go99] 10

Example: Unix The Unix operating system expresses access control policies in terms of three operations: Read: reading from a file Write: writing to a file Execute: executing a (program) file Note: Write access does not include read access. Execute does not match the Bell-LaPadula definition of Execute. [Go99] 11

Example: Unix When applied to a directory, the access operations have the following meaning: Read: list directory contents Write: create or rename a file in the directory Execute: search the directory Unix controls who can create and delete files by controlling write access to the file s directory. [Go99] 12

Example: Windows NT Windows NT (and the following versions) use the New Technology File System (NTFS) as the basis for access control. NTFS uses the following permissions: Read Write Execute Delete Change permission Change ownership NTFS does not rely on operations on directories to handle deletion of files or change of access rights. [Go99] 13

Ownership The owner of a resource decrees who is allowed to have access. Most operating systems support the concept of ownership of a resource. They consider ownership when making access control decisions. They may include operations to change the ownership of a resource. [Go99] 14

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 15

Access Rights Access rights can be defined individually for each combination of subject and object. Therefore, we have: a set S of subjects, a set O of objects, a set A of access operations. [Go99] 16

Access Control Matrix Access rights are defined quite simply in the form of an access control matrix (M). M=(M so ) sєs, oєo with M so A The entry M so specifies the set of access operations subject s may perform on object o. [Go99] 17

Subject Object Access Control Matrix - Example bob.doc edit.exe fun.exe Alice {execute} {execute, read} Bob {read, write} {execute} {execute, read, write} [Go99] 18

Access rights can be kept with the subjects or with the objects. Capabilities In the first case every subject is given a capability. A capability is an unforgeable token that specifies this subject s access rights. [Go99] 19

Capabilities Example Alice s capability: edit.exe: execute; fun.exe: execute, read Bob s capability: bob.doc: read, write; edit.exe: execute; fun.exe: execute, read, write [Go99] 20

Capabilities Complexity of security management by capabilities is very high. Operating systems are traditionally oriented towards managing objects. It is difficult to get an overview of who has permission to access a given object. It is very difficult to revoke a capability. [Go99] 21

Access Control Lists (ACL) An access control list stores the access rights to an object with the object itself. Access rights of previous example: bob.doc Bob: read, write edit.exe Alice: execute; Bob: execute fun.exe Alice: execute, read; Bob: execute, read, write [Go99] 22

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 23

Security Models Security models are an important concept in the design and analysis of secure systems. They capture the security policy that should be enforced by the system. Security models capture policies for confidentiality and for integrity. Some models apply to environments where policies are static (Bell-LaPadula). Others consider dynamic changes of access rights (Chinese Wall). [Go99] 24

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 25

Bell-LaPadula (1) Bell-LaPadula (BLP) is probably the most famous of the security models. It was developed by Bell and LaPadula at the time of the first concerted efforts to design secure multi-user operating systems. It captures the confidentiality aspects of access control. Access permissions are defined both through an access control matrix and through security levels. [Go99] 26

Bell-LaPadula (2) Security policies prevent information flowing downwards from a high security level to a low security level. These policies are commonly referred to as multi level security. BLP only considers the information flow that occurs when a subject observes or alters an object. [Go99] [Bi05] 27

We have: A set of subjects S; A set of objects O; The set of access operations A={execute, read, append, write}; BLP Model Access rights and access attributes (cf. [BLP76, page 10ff]): execute: no observe, no alter read: observe, no alter append: no observe, alter write: observe, alter A set L of security levels with a partial ordering. [Go99] 28

TOP SECRET SECRET CONFIDENTIAL UNCLASSIFIED Security Levels Example Tamara, Thomas Personnel Files Sally, Samuel Electronic Mail Files Claire, Clarence Activity Log Files Ursula, Ulf Telephone List Files [Bi05] 29

Properties Simple Security Property (SS Property): No read up rule s can read o if and only if l o l s and s has discretionary read access to o. * Property (Star Property): No write down rule s can write o if and only if l s l o and s has discretionary write access to o. [Bi05] 30

Top Secret Secret Confidential Unclassified o1 o2 o3 o5 append read, write write read read, write s1 append s2 Example append, write o4 read Adapted from [Ec04] 31

Basic Security Theorem If all state transitions in the system are secure and if the initial state of the system is secure, then every subsequent state will also be secure, no matter which inputs occur. [Go99] 32

BLP with Categories Expanding the model by adding Categories to each security classification makes it richer and more powerful. The categories arise from the need to know principle: No subject should be able to read objects unless reading them is necessary for that subject to perform its functions. [Bi05] 33

Categories Example If the categories are NUC, EUR and US, the sets of categories form a lattice under the operation (subset). [Bi05] 34

Properties The security level (L A, C A ) dominates (dom) the security level (L B, C B ) if and only if L B L A and C B C A. Simple Security Property (SS Property): s can read o if and only if s dom o and s has discretionary read access to o. * Property (Star Property): s can write to o if and only if o dom s and s has discretionary write access to o. [Bi05] 35

Example George is cleared into security level (SECRET, {NUC, EUR}). DocA is classified as (CONFIDENTIAL, {NUC}). DocB is classified as (SECRET, {EUR, US}). DocC is classified as (SECRET, {EUR}). George can read DocA and DocC but not DocB. [Bi05] 36

Basic Security Theorem (revisited) If all state transitions in the system are secure and if the initial state of the system is secure, then every subsequent state will also be secure, no matter which inputs occur. [Go99] 37

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 38

Chinese Wall Model The Chinese Wall (CW) model is a model of a security policy that refers equally to confidentiality and integrity. It describes policies that involve a conflict of interest in business. The environment of a stock exchange or investment house is the most natural environment for this model. In this context, the goal of the model is to prevent a conflict of interest in which a trader represents two clients. [Bi05] 39

Definitions The objects of the database are items of information related to a company. A company dataset (CD) contains objects related to a single company. A conflict of interest (COI) class contains the datasets of companies in competition. [Bi05] 40

CW - Simple Security Condition s can read o if and only if any of the following holds: 1. There is an object o such that s has accessed o and CD(o ) = CD(o). 2. For all objects o, o є PR(s) => COI(o ) COI(o) 3. o is a sanitized object. PR(s) are the files already opened by s. [Bi05] 41

COI class CD Oil Company Bank Example BP Shell Deutsche Bank Volksbank o1 o3 o2 Based on [Ec04] 42

COI class CD Oil Company Bank Example BP Shell Deutsche Bank Volksbank access access blocked blocked o1 o3 o2 Based on [Ec04] 43

Introduction Access attributes Access control matrix Security models Bell LaPadula Chinese wall Role based access control Agenda 44

Role Based Access Control The ability or need, to access information may depend on one s job functions. This suggests associating access with the particular job of the user. [Bi05] 45

Definitions A role is a collection of job functions. Each role r is authorized to perform one or more transactions. The set of authorized transactions for r is written trans(r). The active role of a subject s, written actr(s), is the role that s is currently performing. The authorized roles of a subject s, written authr(s), is the set of roles that s is authorized to assume. The predicate canexec(s,t) is true if and only if the subject s can execute the transactions t at the current time. [Bi05] 46

Rules If a subject can execute at least one transaction, then the subject has an active role. This binds the notion of execution of a transaction to the role rather than to the user. The subject must be authorized to assume its active role. It cannot assume an unauthorized role. A subject cannot execute a transaction for which its current role is not authorized. [Bi05] 47

Cashier Auditor Employee Costumer Support Branch Manager Example: Bank Customer role R1 R2, R2 has also the rights of R1 48

References [BLP76] David Elliott Bell, Len La Padula. Secure Computer System: Unified Exposition and Multics Interpretation, ESD-TR-75-306, 1976; http:// csrc.nist.gov/publications/history/bell76.pdf [Bi05] Matt Bishop. Introduction to Computer Security. Boston: Addison Wesley, 2005. pp. 27-35, 62-69, 83-87, 92-94 [Ec04] Claudia Eckert. IT-Sicherheit. München, Wien: Oldenbourg, 2004 [Go99] Dieter Gollmann. Computer Security. Chichester, New York, Weinheim, Brisbane, Singapore, Toronto: John Wiley & Sons, 1999. pp. 30-54 49