Transcript Chapter 7
Chapter 7
Multilevel Security
What can everyone learn from military
and government application security
Military
Huge amount of money spent on
research for Computer Science
Products developed will find themselves
in commercial applications
Commercial systems use multilevel
security
Multilevel systems also applied where
not necessary or required
Security Policy
What it a Security Policy
Who determines need-to-know and how
How is it enforced what are the
consequences
How do we detect breaches
Bell-LaPadula Security Policy Model (BLP)
Classifications and Clearances
Rules and controls built around these clearances
including software
Known as MultiLevel Security (MLS)
Basic property is information can not flow
downward.
No Read Up (NRU)
No Write Down (NWD)
High Water Mark
Role based access Control (RBAC)
Biba Model
Confidentiality integrity are dual concepts
Often need to protect integrity with no concern
for confidentiality
Confidentiality who can read
Integrity who can write
Read up
Write down
Used to build many systems
Often called using low-water mark
LOMAC Linux extension uses it
MultiLevel security systems
Secure communications Processor
SCOMP 1983 DOD sponsored
MLS Unix
NRL Pump
Logistics information
Purple Penelope
Future
What goes wrong
Composability
Cascade problem
Covert channels
Threat from virus
Polyinstantiation
MLS systems very costly
Application software needs to re-written to run
on MLS system
Others issues pointed out pages 156-157
Broader implications of MLS
MLS and it’s development and funding
has spun off a lot of useful ideas
The biggest hole in secure systems
remain people
Government and it’s levels of
bureaucracy and secrecy will remain an
issue for any system
Discussion
What are some current security models
and how are they being used
LOMAC and Linux
MLS based firewalls
Discussion articles
http://www.cisilion.com/netforensics.htm
http://www.sans.org/rr/whitepapers/tools/408.php
- Firewalls, by "area"
- ecommerce
- inside out
- partners
- Intrusion detection
- 40,000 day one
- Forensic server product
- All outside web content cached
- check for malware before caching
- Level 7 switches for load balancing web traffic
Discussion articles
Google Chinese site:
IPv6
Interesting way to rebel against censorship…
http://www.eweek.com/article2/0,1895,1917739,00.asp
Current situation and stance: http://www.progressiveu.org/161618-googlechina-vs-google-usa
http://www.ipv6.ru/docs/ebsco/fulltext14.htm Privacy issues of IPv6
http://www.internetnews.com/infra/article.php/3570211 -- Cost of IPv6
http://www.larta.org/lavox/articlelinks/2004/041129_ipv6.asp -- Older article
but great reasons to adopt IPv6.
http://www.tcpipguide.com/free/t_IPv6InterfaceIdentifiersandPhysicalAddress
Mapping.htm IPv6 addressing scheme
Threat modeling
http://www.theserverside.net/news/thread.tss?thread_id=33973
http://blogs.msdn.com/ptorr/archive/2005/02/22/GuerillaThreatModelling.aspx
List of Resources
Bell-LaPadula
http://en.wikipedia.org/wiki/BellLaPadula_model
http://www.cs.unc.edu/~dewan/242/f96/note
s/prot/node13.html
http://courses.cs.vt.edu/~cs5204/fall99/prote
ction/harsh/
List of Resources
Multi Level Security
http://en.wikipedia.org/wiki/Multilevel_security
http://www.cs.stthomas.edu/faculty/resmith/r
/mls/index.html
http://nsi.org/Library/Compsec/sec0.html
http://www.smat.us/crypto/mls/index.html
List of Resources
Role Based Access Control
http://csrc.nist.gov/rbac/NIST-ITL-RBACbulletin.html
http://csrc.nist.gov/rbac/
http://en.wikipedia.org/wiki/RBAC
List of Resources
Biba model
http://en.wikipedia.org/wiki/Biba_model
http://en.wikipedia.org/wiki/Biba_Integrity_M
odel
http://www.answers.com/topic/biba-integritymodel
List of Resources
LOMAC
http://linas.org/mirrors/opensource.nailabs.c
om/2002.02.28/lomac/
http://alum.wpi.edu/~tfraser/Software/LOMA
C/index.html
http://freshmeat.net/projects/lomac
List of Resources
SCOMP
http://users.tkk.fi/~lhuovine/study/secbas98/
skernel.html
http://www.stsc.hill.af.mil/crosstalk/2005/08/
0508Vanfleet_etal.html
http://www.windowsecurity.com/whitepaper/
NCSCTG007_Burgundy_book_.html
List of Resources
MLS Unix
http://www.cs.dartmouth.edu/~doug/IX/
http://citeseer.ist.psu.edu/mcilroy92multilevel.html
NRL pump/Purple Penelope
http://www.networkpenetration.com/adv_steg_posix
_flock.html
http://www.securityprotocols.com/modules.php?name=News&file=print
&sid=1360