Information Assurance IATF

Download Report

Transcript Information Assurance IATF

Information Assurance
IATF
IATF


Information Assurance Technical Framework
Security System Engineering methodology
Lecturer: Lynn Ackler
Date:10/28/08
1
Information Systems Security Engineering
ISSE
Art and science of discovering users' information
protection needs.
Designing systems with economy and elegance,
so that safely resists the forces to which they
will be subjected.
Building and testing such systems.
Lecturer: Lynn Ackler
Date:10/28/08
2
SE versus ISSE
SE Activities
ISSE Activities
Discover needs
Define system requirements
Design system architecture
Develop detailed design
Implement system
Assess effectiveness
Discover information protection needs
Define system security requirements
Design system security architecture
Develop detailed security design
Implement system security
Assess system security effectiveness
Lecturer: Lynn Ackler
Date:10/28/08
3
Technical Security Countermeasures
Determination of the appropriate technical
security measures to address attacks at
all layers in the information system.
Lecturer: Lynn Ackler
Date:10/28/08
4
Security Services

Services that safeguard information and
information systems.
 Authentication
 Confidentiality
 Integrity
 Availability
 Non-repudiation
 Robustness
 Interoperability
Lecturer: Lynn Ackler
Date:10/28/08
5
Potential Adversaries









Nation States
Hackers
Terrorists
Organized crime
Other criminal elements
International press
Industrial competitors
Disgruntled employees
Careless employees
Lecturer: Lynn Ackler
Date:10/28/08
6
Motivations








Access to sensitive information
Track operations
Disrupt operations
Steal money, products or services
Free use
Embarrassment
Overcome technical challenge
Compromise
Lecturer: Lynn Ackler
Date:10/28/08
7
Classes of Attacks





Passive attacks
Active attacks
Close-in attacks
Insider attacks
Distribution attacks
Lecturer: Lynn Ackler
Date:10/28/08
8
Passive Attacks

Monitoring open communication


Decrypting weak encryption



Ethernet sniffing
WEP
Password sniffing
Traffic analysis
Lecturer: Lynn Ackler
Date:10/28/08
9
Active Attacks

Modify data in transit



Replay
Session hijacking


Modify financial transactions
Privileges of established session
Masquerading

Unauthorized access
Lecturer: Lynn Ackler
Date:10/28/08
10
Active Attacks (cont'd)

Exploiting app's or OS


Outlook Express
Exploit trust

Transitive trust, e.g. PGP
Lecturer: Lynn Ackler
Date:10/28/08
11
Active Attacks (cont'd)

Data execution


Inserting and exploiting code


Open an attachment that is a script
Trojan horse, back door
Denial of service
Lecturer: Lynn Ackler
Date:10/28/08
12
Close-in Attacks


Access to comm's wires, RF, visual, etc.
Information gathering


System tampering


IP addresses, IDs, passwords
Bugging, keyboard sniffing SW
Physical compromise
Lecturer: Lynn Ackler
Date:10/28/08
13
Insider Attacks

Malicious





Modify/destroy data and security mechanisms
Establish unauthorized access
Cover channels
Physical damage/alteration
Non-malicious


Modification of data/configuration
Physical damage
Lecturer: Lynn Ackler
Date:10/28/08
14
Distribution Attacks



Attacks on the distribution chain of
products or services
Modification at vendor's facility
Modification during distribution
Lecturer: Lynn Ackler
Date:10/28/08
15
Primary Security Services





Access control
Confidentiality
Integrity
Availability
Nonrepudiation
Lecturer: Lynn Ackler
Date:10/28/08
16
Access Control

Limiting access to information, services and
communications
 Identity and authentication


Authorization


Access rights
Decision


You are who you say you are.
Rights match demand
Enforcement

Grant/deny and log/notify
Lecturer: Lynn Ackler
Date:10/28/08
17
Confidentiality

Information state


Data type



Transmission, storage, proccessing
Crypto keys, config files, text
Amounts or parts of data
Value and life of data
Lecturer: Lynn Ackler
Date:10/28/08
18
Elements of Confidentiality



Data protection
Data separation
Traffic flow protection
Lecturer: Lynn Ackler
Date:10/28/08
19
Integrity



Prevention of unauthorized data
modification
Detection and notification of unauthorized
modification
Logging all modifications
Lecturer: Lynn Ackler
Date:10/28/08
20
Availability



Protection from attack
Protection from unauthorized use
Resistance to routine failures
Lecturer: Lynn Ackler
Date:10/28/08
21
Non-repudiation

Repudiation:
Denial by one entity in a multi-entity exchange that it
participated.

Non-repudiation:
Proof of origin, proof of identity, time of origination
Proof of delivery, time of delivery
Audit trail
Lecturer: Lynn Ackler
Date:10/28/08
22
Security Technologies








APIs
CryptoAPI
Cryptographic Service Providers
File Encryptors
Hardware tokens
Intrusion detectors
IPSec
IKE
Lecturer: Lynn Ackler
Date:10/28/08
23
Security Technologies
(cont'd)








Packet filter
Stateful packet filter
PKI
SSL
S/MIME
Trusted Computing Base
Virus detectors
Tripwire
Lecturer: Lynn Ackler
Date:10/28/08
24
Robustness Strategy

Determine the Degree of Robustness


Strength of Mechanism
Levels of Assurance
Lecturer: Lynn Ackler
Date:10/28/08
25
Purpose




Security engineering guidance
Levels of security mechanisms
Security services appropriate to mission
Levels of assurance
Lecturer: Lynn Ackler
Date:10/28/08
26
Robustness Strategy
Functions




Assessment of strength mechanisms
Definition of product requirements
Subsequent risk assessments
Recommend security requirements
Lecturer: Lynn Ackler
Date:10/28/08
27
Robustness Strategy
Process
1. Assess value
2. Assess threat
3. Determine strength level appropriate
4. Determine implementation necessary
Lecturer: Lynn Ackler
Date:10/28/08
28
Degree of Robustness
Lecturer: Lynn Ackler
Date:10/28/08
29
Degree of Robustness
Determination


Level of strength and assurance
recommended for a potential security
mechanism
Depends on:
1. Value of information
2. Perceived threat environment
Lecturer: Lynn Ackler
Date:10/28/08
30
Information Value Levels
.VI. Violation of the information protection policy would have negligible adverse effects
or consequences.
.V2. Violation of the information protection policy would adversely affect and/or cause
minimal damage to the security, safety, financial posture, or infrastructure of the
organization.
.V3. Violation of the information protection policy would cause some damage to the
security, safety, financial posture, or infrastructure of the organization.
.V 4. Violation of the information protection policy would cause serious damage to the
security, safety, financial posture, or infrastructure of the organization.
.V5. Violation of the information protection policy would cause exceptionally grave
damage to the security, safety, financial posture, or infrastructure of the organization.
Lecturer: Lynn Ackler
Date:10/28/08
31
Threat Levels
.TI. Inadvertent or accidental events ( e.g., tripping over a power cord).
.T2. Passive, casual adversary with minimal resources who is willing to take little risk
( e.g., listening).
.T3. Adversary with minimal resources who is willing to take significant risk ( e.g.,
unsophisticated hackers).
.T4. Sophisticated adversary with moderate resources who is willing to take little risk
(e.g., organized crime, sophisticated hackers, international corporations).
.T5. Sophisticated adversary with moderate resources who is willing to take significant
risk (e.g., international terrorists).
.T6. Extremely sophisticated adversary with abundant resources who is willing to take
little risk (e.g., well-funded national laboratory, nation-state, international corporation).
.T7. Extremely sophisticated adversary with abundant resources who is willing to take
extreme risk (e.g., nation-states in time of crisis).
Lecturer: Lynn Ackler
Date:10/28/08
32
Strength of Mechanism Levels
.SMLl is defined as basic strength or good commercial practice. It is resistant to
unsophisticated threats (roughly comparable to TI to T3 threat levels) and is used to
protect low-value data. Examples of countered threats might be door rattlers, ankle
biters, and inadvertent errors.
.SML2 is defined as medium strength. It is resistant to sophisticated threats (roughly
comparable to T4 to TS threat levels) and is used to protect medium-value data. It would
typically counter a threat from an organized effort (e.g., an organized group of hackers).
.SML3 is defined as high strength or high grade. It is resistant to the national laboratory
or nation-state threat (roughly comparable to T6 to T7 threat levels) and is used to protect
high-value data. Examples of the threats countered by this SML are an extremely
sophisticated, well-funded technical laboratory and a nation-state adversary.
Lecturer: Lynn Ackler
Date:10/28/08
33
Assurance Levels
EAL 1
EAL 2
EAL 3
EAL 4
EAL 5
EAL 6
EAL 7
Functionally Tested
Structurally Tested
Methodically Tested and Checked
Methodically Designed, Tested and Reviewed
Semiformally Designed and Tested
Semiformally Verified Design and Tested
Formally Verified Design and Tested
Lecturer: Lynn Ackler
Date:10/28/08
34
Security Mechanisms
1.
2.
3.
4.
5.
6.
7.
8.
Security Management
Confidentiality
Integrity
Availability
Identification & Authentication
Access Control
Accountability
Non-repudiation
Lecturer: Lynn Ackler
Date:10/28/08
35
Security Management
Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
36
Confidentiality Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
37
Integrity Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
38
Availability Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
39
Identification & Authentication
Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
40
Access Control Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
41
Accountability Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
42
Non-Repudiation Mechanisms
Lecturer: Lynn Ackler
Date:10/28/08
43
Interoperability



Contemporary Systems involve multiple
networks as well as multiple heterogeneous
computer systems
All systems depend on communication
Security must be as transparent as
possible in such a compute environment
Lecturer: Lynn Ackler
Date:10/28/08
44
Elements of Interoperability
1.
2.
3.
4.
5.
Architecture
Security Protocols
Standards Compliance
Interoperable Certificate Management
Agreement on Security Policies
Lecturer: Lynn Ackler
Date:10/28/08
45
Interoperability Strategy
1. Foster Standards
2. Security Negotiation
3. Support Open Standards
Lecturer: Lynn Ackler
Date:10/28/08
46