Transcript Chapter 7
Chapter 7 Multilevel Security What can everyone learn from military and government application security Military Huge amount of money spent on research for Computer Science Products developed will find themselves in commercial applications Commercial systems use multilevel security Multilevel systems also applied where not necessary or required Security Policy What it a Security Policy Who determines need-to-know and how How is it enforced what are the consequences How do we detect breaches Bell-LaPadula Security Policy Model (BLP) Classifications and Clearances Rules and controls built around these clearances including software Known as MultiLevel Security (MLS) Basic property is information can not flow downward. No Read Up (NRU) No Write Down (NWD) High Water Mark Role based access Control (RBAC) Biba Model Confidentiality integrity are dual concepts Often need to protect integrity with no concern for confidentiality Confidentiality who can read Integrity who can write Read up Write down Used to build many systems Often called using low-water mark LOMAC Linux extension uses it MultiLevel security systems Secure communications Processor SCOMP 1983 DOD sponsored MLS Unix NRL Pump Logistics information Purple Penelope Future What goes wrong Composability Cascade problem Covert channels Threat from virus Polyinstantiation MLS systems very costly Application software needs to re-written to run on MLS system Others issues pointed out pages 156-157 Broader implications of MLS MLS and it’s development and funding has spun off a lot of useful ideas The biggest hole in secure systems remain people Government and it’s levels of bureaucracy and secrecy will remain an issue for any system Discussion What are some current security models and how are they being used LOMAC and Linux MLS based firewalls Discussion articles http://www.cisilion.com/netforensics.htm http://www.sans.org/rr/whitepapers/tools/408.php - Firewalls, by "area" - ecommerce - inside out - partners - Intrusion detection - 40,000 day one - Forensic server product - All outside web content cached - check for malware before caching - Level 7 switches for load balancing web traffic Discussion articles Google Chinese site: IPv6 Interesting way to rebel against censorship… http://www.eweek.com/article2/0,1895,1917739,00.asp Current situation and stance: http://www.progressiveu.org/161618-googlechina-vs-google-usa http://www.ipv6.ru/docs/ebsco/fulltext14.htm Privacy issues of IPv6 http://www.internetnews.com/infra/article.php/3570211 -- Cost of IPv6 http://www.larta.org/lavox/articlelinks/2004/041129_ipv6.asp -- Older article but great reasons to adopt IPv6. http://www.tcpipguide.com/free/t_IPv6InterfaceIdentifiersandPhysicalAddress Mapping.htm IPv6 addressing scheme Threat modeling http://www.theserverside.net/news/thread.tss?thread_id=33973 http://blogs.msdn.com/ptorr/archive/2005/02/22/GuerillaThreatModelling.aspx List of Resources Bell-LaPadula http://en.wikipedia.org/wiki/BellLaPadula_model http://www.cs.unc.edu/~dewan/242/f96/note s/prot/node13.html http://courses.cs.vt.edu/~cs5204/fall99/prote ction/harsh/ List of Resources Multi Level Security http://en.wikipedia.org/wiki/Multilevel_security http://www.cs.stthomas.edu/faculty/resmith/r /mls/index.html http://nsi.org/Library/Compsec/sec0.html http://www.smat.us/crypto/mls/index.html List of Resources Role Based Access Control http://csrc.nist.gov/rbac/NIST-ITL-RBACbulletin.html http://csrc.nist.gov/rbac/ http://en.wikipedia.org/wiki/RBAC List of Resources Biba model http://en.wikipedia.org/wiki/Biba_model http://en.wikipedia.org/wiki/Biba_Integrity_M odel http://www.answers.com/topic/biba-integritymodel List of Resources LOMAC http://linas.org/mirrors/opensource.nailabs.c om/2002.02.28/lomac/ http://alum.wpi.edu/~tfraser/Software/LOMA C/index.html http://freshmeat.net/projects/lomac List of Resources SCOMP http://users.tkk.fi/~lhuovine/study/secbas98/ skernel.html http://www.stsc.hill.af.mil/crosstalk/2005/08/ 0508Vanfleet_etal.html http://www.windowsecurity.com/whitepaper/ NCSCTG007_Burgundy_book_.html List of Resources MLS Unix http://www.cs.dartmouth.edu/~doug/IX/ http://citeseer.ist.psu.edu/mcilroy92multilevel.html NRL pump/Purple Penelope http://www.networkpenetration.com/adv_steg_posix _flock.html http://www.securityprotocols.com/modules.php?name=News&file=print &sid=1360