Lesson I. Basic Security Concepts Principles and Strategy
Lesson I. Basic Security Concepts Principles and Strategy
LESSON I:
1. BASIC SECURITY CONCEPTS, PRINCIPLES AND STRATEGY
When it is all boiled down, information can be represented in mental thought and speech,
written documentation, and electronic communications/computer formats. Information also
comes in three states, analogous to the three states of water—liquid (water); solid (ice); or gas
(steam). Similarly, at any given moment, information is being transmitted, processed, or stored.
This happens irrespective of the medium in which it resides (McCumber, 1994).
Threats to these states of information basically fall into three categories: compromise by
unauthorized disclosure; corruption through unauthorized modification; and unavailability
through a denial of service. Regardless of its format, information that is worth protecting will
possess one or more critical attributes that will dictate what kind of safeguards are required to
adequately provide protection against these threats.
3. Physical limitations—a retina scan won’t work with users who are blind or have cataracts;
finger or hand recognition would not be practical in an environment that required protective
gloves; voice recognition may be affected by throat problems.
To ensure that individuals are held accountable for their actions, auditing and monitoring of
the information system must be accomplished in a way that, consistent with applicable laws
and regulations, assesses the adequacy of security features and generates an audit trail of
security-relevant events for all users.
There are two basic approaches to applying access controls within systems and networks: one
is to permit anything that is not explicitly denied; the second is to deny anything that is not
explicitly permitted. In other words, either open up all access to everyone, denying access
only by exception, or else turn off all access to everyone by default, opening up access only
by exception. The former is called the “Default Permit” stance; the latter approach is known
as the principle of minimalism, or the “Default Deny” stance.
Benefits:
• Access control for the entire facility or specified areas.
• Limited access to areas by date/time and individual cardholder.
• Controlled access to elevators and parking facilities.
• Supports multiple access technologies.
• Utilizes existing system investment.
4
Features and Options:
• Local or wide area network connectivity
• Remote access software
• Graphical user interface
• CCTV integration
• Video badging
Independence of control and subject: “The person charged with designing, implementing,
and/or operating a control should not be the same person who is to be controlled thereby”
(Wood, 1990, p. 17). In any system, it is good practice to ensure independence between the
person charged with designing a security control and the person(s) who are to be controlled
by it. Likewise, those responsible for enforcing security controls must be empowered and
autonomous to perform unbiased reviews and objective evaluations. The individual
responsible for overseeing the security management of information systems, for example,
should not report directly to the audit department or the systems operations department in
order to eliminate any real or perceived conflict of interest.
Least privilege: Considered by many “the most fundamental principle of security (any kind
of security, not just computer and network security),” the least privilege principle requires
that each individual be granted the most restrictive set of privileges or accesses needed for
the performance of authorized tasks (Chapman and Zwicky, 1995, p. 45). Users are given
just the access or privileges they need to do their jobs, but no more than required. For
example, normal users are granted only the subset of privileges necessary to perform
normal user functions. A system administrator may require a much larger subset of all
privileges, or in some cases, the full set of privileges available. Enforcement of least
privilege is often easier said than done, particularly when it comes to operating systems that
are not designed to enforce separation of functions.
Control: Control is the nontechnical principle that all access to the system must be
regulated. No one should gain access to an organization’s information system(s) without
the explicit knowledge and authorization of a control officer (e.g., Information Systems
Security Officer).
Discretionary Access Controls (DAC): DAC are a technical means of restricting access to
objects (e.g., files, directories, data entities) based on the identity and need-to-know of
users or processes and/or the groups to which the object belongs. For example, access can
be regulated or mediated by comparing file types to predefined rules or access lists. The
controls are discretionary in the sense that a subject with certain access permission is
capable of directly or indirectly passing that permission on to another user or process. DAC
roughly equate to Identity-Based Access Control (IBAC) within international standards.
Mandatory Access Controls (MAC): Unlike DAC, MAC prevent this ability to pass on
permissions. Instead, they require formal authorization (i.e., clearance, formal access, need-
5
to-know verification) and restrict access to objects based on the sensitivity of the objects
(e.g., via object labeling), focusing on data confidentiality. In these cases, access is
regulated/mediated by comparing file contents (e.g., based on data labels) to a predefined
rule set for each classification level. Within international standards, MAC roughly equate
to Rule-Based Access Control (RBAC).
All information is not equal: organizations typically possess multiple levels of information
sensitivity. Some information has no confidentiality requirement; it is deemed public domain
and represents an organization’s contribution to the universe of information available to
everyone. Other information is more tightly controlled and only shared among organizational
allies. Still other information is deemed so sensitive that it only may be made accessible to a
small subset of individuals within the organization.
6
b. The Perimeter Defense Strategy
This strategy is more of a concentrated effort of defense and is predominantly technical in
nature. Also, this strategy basically focuses on threats from those that are outside the bounds
of authorized users to the organization’s IA baseline and Critical Objects. The organization’s
IA capabilities are primarily located within a “zone” or “border” of defense between the
“insiders” and the “outsiders.” This strategy has been compared to the “Maginot Line” that
existed as a defensive perimeter or border between the allied nations and Germany during
World War I. An example of this concentrated strategy involves a firewall device that is
connected to both the Internet (i.e., outside) side of an organizational border and what is
considered to be the organization’s own trusted internal network. A public access server is
connected to the cables above the firewall and a Web proxy server is connected to the cable
below the firewall. The term “demilitarized zone (DMZ)” has been used to describe the
defensive perimeter that includes these three devices. The intent of this perimeter is to control
the flow of information between the organization’s internal trusted network and the untrusted
external Internet.
The Perimeter Defense Strategy has two critical weaknesses. First, this strategy does very
little or nothing to protect an organization’s internal systems from an attack by an authorized
inside user such as an employee or contractor. Second, if the perimeter defenses (e.g.,
firewalls and routers) fail, then the organization’s internal systems are open to attack.
The Defense in Depth strategy does not imply that protection is required at every possible
point in the IA baseline. The allocation of the IA capabilities can be focused, based on the
unique needs of an organization’s threats. Further, adopting a layered approach can allow
lower assurance solutions (which are generally more cost effective and more user friendly) to
be used in many environments, permitting the applications of higher assurance solutions at
critical locations (e.g., network boundaries). The implementation of a Defense in Depth
strategy is complicated by the fact that many organizations employ multiple types of external
network connections through the enclave boundary. These include encrypted connections to
other enclaves, connections to access data on hostile networks (such as the Internet),
connections to remote dial-in users, and, if required, connections to other local networks
operating at different classification levels. There is a requirement for different types of
solutions for each of these connections that satisfy both operational and IA requirements.
Four reasons will be cited to support this conclusion, although it is recognized that many other
justifications could be cited.
First, the use of electronic commerce (e-commerce) provides both an opportunity for the
organization and some inherent risks. E-commerce could affect every application and database
within the organization. The security of the Web server host within the DMZ is not sufficient to
address the risks posed by e-commerce transactions. One such risk is that the Web server could
start opening sessions to other servers within the organization, thereby providing paths into
organizational enclaves. Also, hackers could gain access to the internal organizational network
and traverse all internal segments at will.
There may be a belief that sufficient defenses exist beyond the firewall within the
organizational enclaves. However, the architecture of internal organizational enclaves has been
driven by several factors: historical accident (we needed it, we added it), performance (based on
user complaints, we moved the servers to their own internal segment), and/or reliability
(someone will get fired if there’s a problem with this application, so we’ll buy two of
everything). E-commerce is an example of an application that requires the same degree of
security behind the firewall as is traditionally applied to the DMZ. This requires an expansion of
the depth of the defense to within the organization.
Third, the Open System Interconnection (OSI) Basic Reference Model represents the process
of communications based on layers. These layers, from the lowest layer to the highest layer,
involve the Physical, Data Link, Network, Transport, Session, Presentation, and Application
Layers. Each layer represents a task within the communication process required for the
movement of information between information systems that are connected to a network.
Fourth, there are many possible types of attacks that could be used to exploit organizational
information systems. The following represents examples of these possible types of attacks:
Passive intercepts and attacks on the wide-area network (WAN): These attacks include network
traffic analysis, monitoring of unprotected (plain-text) communications, decrypting weakly
encrypted communications, and capturing identification numbers and passwords.
Insider attacks are performed by a person who is authorized to be within the physical boundaries
of the information system security processing system and/or has direct access to the information
security processing system.
8
Hardware/software distribution attacks: This type of attack focuses on modifications of
hardware or software at the factory, or modifications or substitutions during distribution.
Malicious code can be easily imported into a protected enclave through shrink-wrapped
software, users swapping media with machines outside the enclave, or other paths that are
implemented to import information from outside a protected network. The hardware/software
distribution attack refers to the potential for malicious modifications of hardware or software
between the time it is produced by a developer and the time it is installed and used. If a user has
a remote access capability, these attacks could occur while the remote user’s computer is being
configured, if it is left unattended (i.e., without proper physical security), or while software is
passed to it either over the network or via physical means (e.g., floppy disks).
9
10