0% found this document useful (0 votes)
12 views36 pages

Lecture 6

The document outlines key concepts in information security and privacy, focusing on security policies, confidentiality, and integrity models. It discusses the Bell-LaPadula model for confidentiality, emphasizing access control mechanisms and the importance of trust in security policies. Additionally, it introduces Biba's integrity model, which is concerned with maintaining data integrity and preventing unauthorized alterations.

Uploaded by

drashtipatel5811
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views36 pages

Lecture 6

The document outlines key concepts in information security and privacy, focusing on security policies, confidentiality, and integrity models. It discusses the Bell-LaPadula model for confidentiality, emphasizing access control mechanisms and the importance of trust in security policies. Additionally, it introduces Biba's integrity model, which is concerned with maintaining data integrity and preventing unauthorized alterations.

Uploaded by

drashtipatel5811
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 36

IS 2150 / TEL 2810

Information Security & Privacy


James Joshi
Associate Professor, SIS

Lecture 6
Oct 2-9, 2013

Security Policies
Confidentiality Policies

1
Objectives
 Understanding/defining security policy
and nature of trust
 Overview of different policy models
 Define/Understand existing Bell-
LaPadula model of confidentiality
 how lattice helps?
 Understand the Biba integrity model

2
Security Policies

3
Security Policy
 Defines what it means for a system
to be secure
 Formally: Partitions a system into
 Set of secure (authorized) states
 Set of non-secure (unauthorized)
states
 Secure system is one that
 Starts in authorized state
 Cannot enter unauthorized state
4
Confidentiality Policy
 Also known as information flow

Transfer of rights

Transfer of information without transfer of
rights

Temporal context
 Model often depends on trust

Parts of system where information could flow

Trusted entity must participate to enable flow
 Highly developed in Military/Government

5
Integrity Policy
 Defines how information can be altered
 Entities allowed to alter data
 Conditions under which data can be altered
 Limits to change of data
 Examples:
 Purchase over $1000 requires signature
 Check over $10,000 must be approved by
one person and cashed by another

Separation of duties : for preventing fraud
 Highly developed in commercial world
6
Security Model
 A model that represents a
particular policy or set of policies
 Abstracts details relevant to analysis
 Focus on specific characteristics of
policies

E.g., Multilevel security focuses on
information flow control

7
Security policies
 Military security policy

Focuses on confidentiality
 Commercial security policy

Primarily Integrity

Transaction-oriented

Begin in consistent state

“Consistent” defined by specification

Perform series of actions (transaction)

Actions cannot be interrupted

If actions complete, system in consistent state

If actions do not complete, system reverts to
beginning (consistent) state

8
Access Control
 Discretionary Access Control (DAC)
 Owner determines access rights
 Typically identity-based access
control: Owner specifies other users
who have access
 Mandatory Access Control (MAC)
 Rules specify granting of access
 Also called rule-based access control

9
Access Control
 Originator Controlled Access
Control (ORCON)
 Originator controls access
 Originator need not be owner!
 Role Based Access Control (RBAC)
 Identity governed by role user
assumes

10
Confidentiality Policies

11
Confidentiality Policy
 Also known as information flow policy
 Integrity is secondary objective
 Eg. Military mission “date”
 Bell-LaPadula Model
 Formally models military requirements

Information has sensitivity levels or classification

Subjects have clearance

Subjects with clearance are allowed access
 Multi-level access control or mandatory access
control

12
Bell-LaPadula: Basics
 Mandatory access control
 Entities are assigned security levels
 Subject has security clearance L(s) = ls
 Object has security classification L(o) = lo
 Simplest case: Security levels are arranged
in a linear order li < li+1
 Example
Top secret > Secret > Confidential
>Unclassified
13
“No Read Up”
 Information is allowed to flow up, not
down
 Simple security property:

s can read o if and only if
 lo ≤ ls and

s has discretionary read access to o
- Combines mandatory (security levels) and
discretionary (permission required)
- Prevents subjects from reading objects at
higher levels (No Read Up rule)
14
“No Write Down”
 Information is allowed to flow up, not
down
 *property

s can write o if and only if
 ls ≤ lo and

s has write access to o
- Combines mandatory (security levels) and
discretionary (permission required)
- Prevents subjects from writing to objects at
lower levels (No Write Down rule)
15
Example
security level subject object
Top Secret Tamara Personnel Files
Secret Samuel E-Mail Files
Confidential Claire Activity Logs
Unclassified Ulaley Telephone Lists

• Tamara can read which objects? And write?


• Claire cannot read which objects? And write?
• Ulaley can read which objects? And write?
16
Access Rules
 Secure system:
 One in which both the properties hold
 Theorem:
 Let Σ be a system with secure initial state σ0,

T be a set of state transformations
 If every element of T follows rules, every
state σi secure
 Proof - induction

17
Categories
 Total order of classifications not flexible enough
 Alice cleared for missiles; Bob cleared for

warheads; Both cleared for targets


 Solution: Categories
 Use set of compartments (from power set of

compartments)
 Enforce “need to know” principle

 Security levels (security level, category set)


(Top Secret, {Nuc, Eur, Asi})

(Top Secret, {Nuc, Asi})

18
Lattice of categories
 Combining with clearance:
 (L,C) dominates (L’,C’) 

L’ ≤ L and C’  C
 Induces lattice of security
Exercise: Hesse diagram
for:
levels compartments: NUC,
 Examples of levels US, EU;
 (Top Secret, {Nuc,Asi}) dom

(Secret, {Nuc}) ? Exercise: Hesse diagram


 (Secret, {Nuc, Eur}) dom
for:
Security levels: TS, S, C
(Topsecret, {Nuc,Eur}) ? Compartments US, EU;
 (Top Secret, {Nuc}) dom

(Confidential, {Eur}) ?

19
Access Rules
 Simple Security Condition: S can read O if and
only if
 S dominate O and
 S has read access to O
 *-Property: S can write O if and only if
 O dom S and
 S has write access to O
 Secure system: One with above properties
 Theorem: Let Σ be a system with secure initial
state σ0, T be a set of state transformations

If every element of T follows rules, every state σi
secure
20
Communication across
level
 Communication is needed between
 Subject at higher level and a subject
at the lower levels

Need write down to a lower object
 One mechanism
 Subjects have max and current levels

max must dominate current
 Subjects decrease clearance level
21
Read & write
 Conventional use

“Read” – allowing information to flow from
object being read to the subject reading
 Read includes Execute

“Write” – allowing information to flow from
the subject writing to the object being written
 Write includes Append

 Could change based on the requirement


and the model instantiated based on that.

22
Problem: No write-down
Cleared subject can’t communicate to non-
cleared subject
 Any write from li to lk, li > lk, would violate *-
property

Subject at li can only write to li and above
 Any read from lk to li, lk < li, would violate simple
security property

Subject at lk can only read from lk and below
 Subject at level li can’t write something
readable by subject at lk
 Not very practical
23
Principle of Tranquility
 Should we change classification levels?
 Raising object’s security level
 Information once available to some
subjects is no longer available
 Usually assumes information has already
been accessed
 Simple security property violated?
Problem?

24
Principle of Tranquility
 Lowering object’s security level
 Simple security property violated?
 The declassification problem
 Essentially, a “write down” violating *-
property
 Solution: define set of trusted subjects
that sanitize or remove sensitive
information before security level is
lowered

25
Types of Tranquility
 Strong Tranquility
 The clearances of subjects, and the
classifications of objects, do not change
during the lifetime of the system
 Weak Tranquility
 The clearances of subjects, and the
classifications of objects, do not change in
a way that violates the simple security
condition or the *-property during the
lifetime of the system
26
Example
 DG/UX System
 Only a trusted user (security
administrator) can lower object’s
security level
 In general, process MAC labels cannot
change

If a user wants a new MAC label, needs to
initiate new process

Cumbersome, so user can be designated as
able to change process MAC label within a
specified range
27
DG/UX Labels
 Lowest upper bound: IMPL_HI
 Greatest lower bound: IMPL_LO

28
DG/UX
 Once you login
 MAC label that of user in
Authorization and Authentication
(A&A) Databases
 When a process begins
 It gets its parent’s MAC label
 Reading up and writing up not
allowed
29
DG/UX
 S:MAC_A creates O

If O:MAC_B already exists

Fails if MAC_B dom MAC_A

 Creating files in a directory



Only programs with the same level as the directory can create
files in the directory

Problems with /tmp and /var/mail


Solution: use multilevel directory:

a directory with a subdirectory for each level (hidden)

If process with MAC_A creates a file – put in
subdirectory with label MAC_A

Reference to parent directory of a file refers to the
hidden directory

30
DG/UX
 Provides a range of MAC labels

Called MAC Tuples: [Lower, Upper]

[(S, {Europe}), (TS, {Europe})]

[(S, ), (TS, {Nuclear, Europe, Asia})]


Objects can have a tuple as well as a required MAC
label

Tuple overrides

A process can read an object if its MAC label grants it
read access to the upper bound

A process can write an object if its MAC label grants it
write access to any label in the MAC tuple range

31
Integrity Policies

32
Biba’s Integrity Policy
Model
 Based on Bell-LaPadula
 Subject, Objects have

Integrity Levels with dominance relation
 Higher levels

more reliable/trustworthy

More accurate

33
Biba’s model
 Strict Integrity Policy (dual of Bell-
LaPadula)
 s can read o  i(s) ≤ i(o) (no read-
down)

Why?

s can write o  i(o) ≤ i(s) (no write-up)

Why?
 s1 can execute s2  i(s2) ≤ i(s1)

Why?
34
Low-water-mark
 Low-Water-Mark Policy
 s can write o  i(o) ≤ i(s)

Why?
 s reads o  i’(s) = min(i(s), i(o))

i’(s) is the integrity level of s after “read”
op

Why?
 s1 can execute s2  i(s2) ≤ i(s1)

35
Summary
 Trust assumptions should be
properly understood
 Lattice structure provides basis for
representing information flow or
confidentiality policies
 Need to know

36

You might also like