SecurityArchitecture PDF
SecurityArchitecture PDF
Level - EAL EAL1 - Functionally Tested EAL2 - Structurally Tested EAL3 - Methodically tested and checked EAL4 - Methodically designed, tested and reviewed EAL5 - Semi-formally designed and tested EAL6 - Semi-formally verified design and tested EAL7 - Formally verified design and tested Operating (or Run) Control Unit - Coordinates other CPU components
CPU Components
Common Criteria
CPU States
Evaluates on Functionality and Assurance Functionality rating F1 - F10 Assurance rating E0 - E6
ITSEC
Multiprogramming - can load more than one program in memory at one time
Trusted Computer Systems Evaluation Criteria - TCSEC A1 - Verified Design B1 - Labeled Security - Objects are classified B2 - Structured Protection B3 - Secure Domains C1 - Discretionary Security C2 - Controlled Access - reasonable commercial apps C - Discretionary Protection B - Mandatory Protection A - Verified Protection
OS Terms
Multitasking - can handle requests from several different processes loaded into memory at the same time Multithreading - can run multiple threads simultaneously Multiprocessing - has more than one CPU
1973 - First formal confidentiality model State-machine model Simple security property - no read up Bell-LaPadula * property - no write down Strong star property - subject's = object's clearance for RW Discretionary property and trusted subject 1977 - First integrity lattice based model
D - Minimal Security
Covert channels Race conditions Emanations Maintenance hooks Reveal as little as possible Limit access - need to know Disable unused services and accounts Use strong authentication Countermeasures
Biba
Simple integrity property - no read down * integrity property - no write up 1987 - commercial, e.g. banking Unconstrained Data Item - UDI
Clarke-Wilson
Constrained Data Item - CDI Integrity Verification Procedures - IVPs Transformation Procedures - TPs
Object access rights to subjects Rights a subject can transfer to/from another subject or object create, revoke, take, grant
Trusted Computer Base - TCB - the total combination of protection mechanisms within a computer system, including hardware, firmware and software to enforce security policy. Access Control - ability to permit or deny the use of an object by a subject Reference Monitor - system component that enforces access controls on an object Mediate all accesses Be protected from modification Be verified as correct Security Kernel - hardware, firmware and software that implement the reference monitor concept
Information Flow Model Noninterference Model Brewer and Nash Model - dynamically changing access controls
Terms
Graham-Denning Model - How subjects and objects should be created and deleted - access rights Confidentiality - Bell-LaPadula, Access Matrix and Take-Grant Integrity - Biba and Clarke-Wilson 1. Prevent unauthorized modifications Three goals of integrity 2. Prevent authorized users from improper modifications 3. Maintain internal and external consistency - well-formed transaction