Security Enhanced Linux and the Path Forward



Similar documents
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction

SELinux. Security Enhanced Linux

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL

Database Security Part 7

Mandatory Access Control

White Paper Levels of Linux Operating System Security

Securing Data in a RHEL SELinux Multi-Level Secure Environment

Mandatory Access Control in Linux

RHS429 - Red Hat Enterprise SELinux Policy Administration

Access Control Intro, DAC and MAC. System Security

Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.

ENTERPRISE LINUX SECURITY ADMINISTRATION

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Secure computing: SELinux

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center

NSA Security-Enhanced Linux (SELinux)

SELinux Policy Management Framework for HIS

Linux OS-Level Security Nikitas Angelinas MSST 2015

Confining the Apache Web Server with Security-Enhanced Linux

Red Hat. By Karl Wirth

Red Condor Syslog Server Configurations

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Security Management Practices. Keith A. Watson, CISSP CERIAS

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

KVM Security - Where Are We At, Where Are We Going

RBAC and HIPAA Security

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

GL550 - Enterprise Linux Security Administration

How To Achieve Pca Compliance With Redhat Enterprise Linux

A Survey of Access Control Policies

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Introduction to Computer Security

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

05.0 Application Development

How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or

Firewalls CSCI 454/554

Reference Guide for Security in Networks

Protection profile of an industrial firewall

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Trusted RUBIX TM. Version 6. Installation and Quick Start Guide Red Hat Enterprise Linux 6 SELinux Platform. Revision 6

Survey on Linux Security and Vulnerabilities

Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006

CMPT 471 Networking II

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Networking in NSA Security-Enhanced Linux

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Advanced Systems Security: Retrofitting Commercial Systems

Likewise Security Benefits

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

ISSECO Syllabus Public Version v1.0

Rule Set Based Access Control (RSBAC)

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Linux Distributed Security Module 1

CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

HIPAA Compliance Evaluation Report

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Red Hat Enterprise Linux 7 Virtualization Security Guide

Access Control Lists in Linux & Windows

Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls

Lecture VII : Public Key Infrastructure (PKI)

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

ENTERPRISE LINUX SECURITY ADMINISTRATION

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

OpenHRE Security Architecture. (DRAFT v0.5)

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Bastille Linux: Security Through Transparency

INFOBrief. Red Hat Enterprise Linux 4. Key Points

System Security Policy Management: Advanced Audit Tasks

Red Hat Identity Management

Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall Lake

Chapter 1 The Principles of Auditing 1

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SECURITY ARCHITECTURE

SIP-DECT Knowledge Base SIP-DECT System Update

Taking the Open Source Road

Microsoft Technologies

Understand Troubleshooting Methodology

Integrigy Corporate Overview

Nipper Studio Beginner s Guide

Implementing Cisco IOS Network Security

The Flask Security Architecture A Flexible Mandatory Access Control Mechanism For Use in Multiple Secure Systems

<Insert Picture Here> How to protect sensitive data, challenges & risks

IINS Implementing Cisco Network Security 3.0 (IINS)

Where can I install GFI EventsManager on my network?

Oracle Linux Advanced Administration

Transcription:

Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat

Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary Access Control and Mandatory Access Control What is Security Enhanced Linux? Security Enhanced Linux in Red Hat Enterprise Linux 4 GUI based SELinux utilities The Path Forward: Multi Level Security Futures Additional resources

System security in an insecure world What are crackers after? Resources for sending bulk email Personal information credit card numbers and identity theft Classified secrets and trade secrets Any other information or resources of value New challenges forced by regulatory compliance Sarbanes Oxley HIPAA Authorized users can be just as dangerous as unauthorized users Intentional and unintentional actions 0 Day Exploits

Red Hat Enterprise Linux Security Features (non SELinux) Built in firewall Modular OS architecture Kickstart %post Support for No execute (NX) and execute Disable (XD) technologies Exec Shield Position Independent Executables (PIE) GCC and GLIBC enhancements New audit subsystem

An overview of DAC and MAC Discretionary Access Control Mandatory Access Control model used by most operating systems secure applications require a secure OS users have control (discretion) over their files principle of least privilege and programs supplements DAC programs run as a user have that user's privileges security policy is the final arbiter of all access decisions; users cannot override the policy root/superuser has complete control Multiple models: Type Enforcement, RBAC, attacker's goal is to exploit program running Multi Level Security with root privileges Benefits: integrity and/or confidentiality

What is Security Enhanced Linux? Security Enhanced Linux Strong, flexible MAC architecture Flask architecture allows for alternative security policies and models Initially a research prototype out of NSA; now part of the upstream Linux 2.6 kernel Growing community of use and development Without SELinux With SELinux

SELinux in Red Hat Enterprise Linux 4 Fully integrated into Red Hat Enterprise Linux 4 Benefits of MAC in a modern, mainstream operating system Not a separate set of extensions or a completely separate OS Provides Type Enforcement (TE) flexible policy model Map security policy to operational and functionality requirements example applications Lock down web servers, DNS servers, and other networklistening services Cross Domain Solutions (guards) Default Targeted Policy targets 10 different daemons Future releases target 50+ services

SELinux in Red Hat Enterprise Linux 4 Default targeted policy isolate commonly attacked, network listening services e.g., Apache, BIND, portmap, NTP, etc. By default, enabled in enforcing mode Useful compromise between enhanced security while not overly impacting functionality Optional strict policy locks down additional applications and user privileges

GUI based SELinux Utilities system config security Change booleans Select policy Enable relabeling setool gui package seaudit Audit log file analysis Create specific views using filters apol SELinux policy analysis Investigate all aspects of a running or non loaded policy

The path forward: Multi Level Security Some critical scenarios require Multi Level Security (MLS) Bell LaPadula (BLP) model Focus is on confidentiality Ensures users and programs on a system can only access resources for which they have been appropriately cleared Maintains the separation between different sensitivity (Top Secret, Secret, Confidential, Unclassified) and categorization levels No read up; no write down Formerly the exclusive province of expensive, niche trusted operating systems

MLS in Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5 will include support for Multi Level Security SELinux will be used as the foundation Pursuing a Common Criteria evaluation EAL4+/CAPP/LSPP/RBACPP Incorporated in the main product no separate trusted version Users will be able to choose the security policy that meets their functional and operational requirements targeted strict MLS Users requiring MLS or other MAC capabilities no longer have to choose between a fully featured OS and a separate trusted version One OS, rather than multiple, can be used for a variety of roles

MLS Futures Targeted policy: 50+ services with policy Data Labeling Audit sensitive data access Control printing of data Network Labeling Multiple data classifications over single link Protocol not expected to be compatible with CIPSO, which is used in other Trusted OSs

Additional Resources Red Hat Global Learning Services https://www.redhat.com/training/ RHS427 Introduction to SELinux and Red Hat Targeted Policy RHS429 Red Hat Enterprise SELinux Policy Administration Whitepapers Red Hat Enterprise Linux 4 Security Features http://www.redhat.com/f/pdf/rhel4/rhel4securityfeatures.pdf The Path to Multi Level Security in Red Hat Enterprise Linux Mailing List http://www.redhat.com/f/pdf/sec/path_to_mlsec.pdf https://www.redhat.com/mailman/listinfo/redhat lspp