2-Security Architecture+Design
2-Security Architecture+Design
Review:
CISSP Common Body of Knowledge Review by Alfred Ouyang is licensed under the Creative Commons
Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://
creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900,
Mountain View, California, 94041, USA.
Learning Objectives
Topics
-3-
Computing Platforms
Enigma Cipher
Machine
Reference: http://www.mathcomp.leeds.ac.uk/turing2012/
-4-
Computing Platforms
Memory
Memory
Data
Register
(MDR)
Arithmetic
Logic
Unit
(ALU)
Control Unit
Accumulator
Input
Output
Reference:
http://en.wikipedia.org/wiki/Von_Neumann_architecture
Daybreak of the Digital Age (http://paw.princeton.edu/issues/2012/04/04/pages/5444/index.xml?page=3&)
-5-
Computing Platforms
Reference: http://en.wikipedia.org/wiki/Semi-Automatic_Ground_Environment
-6-
Computing Platforms
-7-
Computing Platforms
Computing Platforms
Reference:
IBM Archives: System/360 Model 50 (http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP2050.html)
PDP-11 (http://en.wikipedia.org/wiki/PDP-11)
-9-
Computing Platforms
Hardware Components
Central Processing Unit (CPU)
Registers (General-purpose, Dedicated)
Arithmetic Logical Unit (ALU)
Memory
Storage
Disk, Tape, Flash (USB Jump Drive + PCMCIA)
- 10 -
Computing Platforms
Hardware Components
Source:
AppleInsider (http://appleinsider.com/articles/10/10/30/
review_apples_new_11_6_inch_and_13_3_inch_macbook_air_late_2010/page/3)
- 11 -
Computing Platforms
Software Components
Operating System (OS)
Firmware (stored in ROM/EPROM/EEPROM)
BIOS
Device Firmware
Mobile Code
Java Virtual Machine (JVM)
Active X
Application Macro
Application A
Application
B
Operating
System
Computing Platforms
Software Components
Source:
Android Architecture (http://elinux.org/Android_Architecture)
- 13 -
Computing Platforms
Prevent leakage.
Accountability.
Audit security events.
Protection of audit logs.
Object 1
Object 2
Security Kernel
Subject
Trusted path.
Object 3
Auditing of Transactions:
- What, who, how and when
Intrusion detection.
Patterns, analysis, and recognition.
- 14 -
Computing Platforms
OS Process Scheduling
Multi-programming
Managing and coordinating the process operations to
multiple sets of programmed instructions e.g. VMS
(Mainframe)
Multi-tasking
Allows user to run multiple programs (tasks) e.g. Windows
2000, LINUX
Multi-threading
Managing the process operations by work/execution threads
(a series of tasks) using the same programmed instructions.
Which allows multiple users and service requests e.g. Mach
Kernel (BSD UNIX: Solaris, MacOS X, etc.)
Multi-processing
Managing and coordinating the process operations to
multiple sets of programmed instructions and multiple user
requests using multiple CPUs e.g. Windows 2000, LINUX,
UNIX
- 15 -
Computing Platforms
Application A
Application
B
Operating
System
- 16 -
Computing Platforms
Processing states
Stopped vs. Run state
Wait vs. Sleep state
Masked/interruptible state
E.g. if masked bit not set, interrupts are disabled (masked off)
known as IRQs in systems.
- 17 -
Computing Platforms
3. Relocation (Relative)
Provide pointers to the actual location in memory
4. Protection
Provide access control to protect integrity of memory segments
5. Sharing
Allowing access to memory segment
- 18 -
Computing Platforms
- 19 -
Computing Platforms
Types of storage:
Primary (Memory direct accessible to CPU e.g. Cache and
RAM)
Secondary (Non-volatile storage medium e.g. Disk Drives)
Disk Storage
CPU
Registers
Cache
Main
Memory
Swap
Space
Fastest
Slowest
Highest Cost
Lowest Cost
Lowest Capacity
Highest Capacity
- 20 -
Computing Platforms
Computing Platforms
Computing Platforms
Input/Output Devices
The I/O controller is responsible for moving data in
and out of memory.
An element of managing the I/O devices and thus
managing memory is through swapping or paging
files.
I/O Controller
I/O Controller
Memory
CPU
- 23 -
Computing Platforms
- 24 -
Topics
- 25 -
Security Models
Security Models
- 27 -
Security Models
- 28 -
Levels of Protection
1.
2.
3.
4.
5.
6.
7.
No sharing at all
Sharing copies of programs/
data files
Sharing originals of programs/
data files
Sharing programming systems/
subsystems
Permitting the cooperation of
mutually suspicious
subsystems, e.g., debugging/
proprietary subsystems
Providing memory-less
subsystems
Providing certified subsystems
Operations
How to securely create an object/
subject.
How to securely delete an object/
subject.
How to securely provide the read
access right.
How to securely provide the grant
access right.
How to securely provide the
delete access right.
How to securely provide the
transfer access right.
References: G.S.Graham and P.J. Denning, Protection Principles and Practice, AFIPS Conf. Proc., 1972.
- 29 -
Subjects
Objects
S1
S2
S3
S1
Cntrl
---
S2
---
S3
S4
S5
O1
O2
O3
O4
O5
---
rwx
rw-
---
---
---
Cntrl
---
---
---
--x
---
---
---
---
Cntrl
r-x
---
---
---
---
---
S4
---
---
---
Cntrl
---
r-x
---
---
r-x
S5
---
---
---
---
r-x
---
---
---
Cntrl
References: M. Harrison, W. Ruzzo, and J.D. Ullman, Protection in Operating Systems, Communications of
the ACM, August 1976
- 30 -
A
A
N/A
B
C
D
B
N/A
X
N/A
X
N/A
- 31 -
Reference: D. Bell, L. LaPadula , MTR-2997, Secure Computer System: Unified Exposition and Multics Interpretation, March 1976.
- 32 -
Object:
C
Simple Security
Property
Subject: Alfred
(Secret)
Object: B
Object:
C
* Star
Property
Top Secret
Object: A
Secret
Object: B
Read/Write
Object: A
Subject: Alfred
(Secret)
Confidential
Subject: Alfred
(Secret)
Secret
Object: A
Top Secret
Write
Confidential
Confidential
Secret
Top Secret
Read
Object: B
Object:
C
Strong *
Property
- 33 -
- 34 -
Reference: K. Biba, MTR-3153, Integrity Consideration for Secure Computing System, 1975
- 35 -
Invocation property
Subject cannot send messages (logical request for service) to
object of higher integrity.
Subject: Alfred
(Secret)
Object: B
Object:
C
Simple Integrity
Property
Middle
Object: A
High
Write
Low
Low
Middle
High
Read
Object: A
Subject: Alfred
(Secret)
Object: B
Object:
C
* Star Integrity
Property
- 36 -
Well-formed transaction
Preserve/ensure internal consistency
Subject can manipulate objects (i.e. data) only in ways that
ensure internal consistency.
Objects
Subject
Program
Reference: D. Clark, D. Wilson, A Comparison of Commercial and Military Computer Security Policies,
IEEE Symposium on Security and Privacy, 1987
- 37 -
Certification rules:
C1: When an integrity verification
procedure (IVP) is run, it must
ensure that all constrained data
items (CDIs) are in a valid state.
C2: For some associated set of CDIs, a
transformation procedure (TP) must
transform those CDIs in a valid stat
into a (possibly different) valid state.
C3: The allowed relations must meet the
requirements imposed by
separation-of-duties principle.
C4: All TP must append sufficient
information to reconstruct the
operation to an append-only CDI.
C5: Any TP that takes a un-constrained
data item (UDI) as input may
perform only valid transformations,
or none at all, for all possible values
of the UDI. The transformation
either rejects the UDI or transforms
it into a CDI.
Enforcement rules:
E1: The system must maintain the
certified relations, and must ensure
that only transformation processes
(TPs) certified to run on a
constrained data item (CDI)
manipulate that CDI.
E2: The system must associate a user
with each TP and set of CDIs. The
TP may access those CDIs on
behalf of the associated user.
E3: The system must authenticate each
user attempting to execute a TP.
E4: Only the certifier of a TP may
change the list of entities associated
with a TP. No certifier of a TP, or of
an entity associated with that TP,
may ever have execute permission
with respect to that entity.
Reference: D. Clark, D. Wilson, A Comparison of Commercial and Military Computer Security Policies,
IEEE Symposium on Security and Privacy, 1987
- 38 -
Reference: Secure Database Development and the Clark-Wilson Security Model, X.Ge,
F.Polack, R.Laleau, University of York, UK.
- 39 -
Client Beta
Corporate
Assets
Corporate
Assets
Corporate
Assets
Corporate
Assets
Corporate
Assets
Corporate
Assets
Corporate
Assets
Conflict of
Interest Class
Subject: Alfred
Reference: The Chinese Wall Security Policy, D.F.C. Brewer, M. Nash, Gama Secure Systems, UK.
- 40 -
- 41 -
A1
A
A2
B
A3
D
- 42 -
6
Grant or deny
the access
2 Activate the security policy
AEF
7
Access normally
(if granted)
Object
ADF
4 Send a reply with the new
attribute value if necessary
5
Update
ACI
3
Refers to
ACR
- 43 -
User Assignment
(UA)
User 123
User 456
Permission
Assignment (PA)
Local
Federal
Investigator
Investigator
State
Joint Task
Investigator
Force
User 789
USERS
ROLES
user_sessions
OPERATIONS
OBJECTS
PRIVILEGES
session_roles
SESSIONS
Reference: Role Based Access Control (RBAC) and Role Based Security, NIST. (http://
csrc.nist.gov/groups/SNS/rbac/)
- 44 -
Topics
- 45 -
Evaluation Criteria
Canadian
Criteria
(CTCPEC)
1993
Orange Book
(TCSEC) 1985
Federal
Criteria
Draft 1993
UK Confidence
Levels 1989
German
Criteria
ITSEC
1991
Evaluates Confidentiality
ISO 15408-1999
Common Criteria
(CC)
V1.0 1996
V2.0 1998
V2.1 1999
Information Technology
Security Evaluation Criteria
(ITSEC)
Evaluates Confidentiality,
Integrity and Availability
Evaluation Criteria
- 47 -
Evaluation Criteria
TCSEC Divisions
Division D: Minimal Protection
Division C: Discretionary Protection (DAC)
C1: Discretionary Security Protection
C2: Controlled Access Protection
- 48 -
Evaluation Criteria
Reference: DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), December 26, 1985.
- 49 -
Evaluation Criteria
Reference: DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), December 26, 1985.
- 50 -
Evaluation Criteria
Documentation: B1
Documentation: B2
Reference: DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), December 26, 1985.
- 51 -
Evaluation Criteria
Reference: DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), December 26, 1985.
- 52 -
Evaluation Criteria
Reference: Information Technology Security Evaluation Criteria (ITSEC), version 1.2, June 28, 1991.
- 53 -
Evaluation Criteria
Assurance (E)
E0
E1
E2
E3
E4
E5
E6
Inadequate assurance.
System in development.
Informal system tests.
Informal system + unit tests.
Semi-formal system + unit tests.
Semi-formal system + unit tests and source code review.
Formal end-to-end security tests + source code reviews.
Reference: Information Technology Security Evaluation Criteria (ITSEC), version 1.2, June 28, 1991.
- 54 -
Evaluation Criteria
TCSEC Rating
E0
D - Minimal Security
F-C1, E1
F-C2, E2
F-B1, E3
B1 - Labeled Security
F-B2, E4
B2 - Structured Protection
F-B3, E5
B3 - Security Domains
F-B3, E6
A1 - Verified Design
F6 - High integrity
N/A
F7 - High availability
N/A
N/A
N/A
- 55 -
Evaluation Criteria
Reference: Common Criteria Evaluation & Validation Scheme (CCEVS), Version 2.3, August 2005.
- 56 -
Evaluation Criteria
Security Assurance
Requirements
Evaluation
EAL Assigned
- 57 -
Evaluation Criteria
Functional
Requirements
For defining security
behavior of the IT
product or system.
Assurance
Requirements
For establishing
confidence that the
security function will
perform as intended.
- 58 -
Evaluation Criteria
Protection Profile
PP Introduction
Conformance claims
PP reference
TOE overview
CC conformance claim
PP claim
Package claim
Security problems
definition
Threats
Organizational security policies
Assumptions
Security objectives
Extended components
definition
Security requirements
Reference: Common Criteria Evaluation & Validation Scheme (CCEVS), Version 2.3, August 2005.
- 59 -
Evaluation Criteria
Security Target
ST Introduction
Conformance claims
ST reference
TOE reference
TOE overview
TOE description
CC conformance claim
PP claim
Package claim
Security problems
definition
Threats
Organizational security policies
Assumptions
Security objectives
Security requirements
TOE summary
specification
Reference: Common Criteria Evaluation & Validation Scheme (CCEVS), Version 2.3, August 2005.
- 60 -
Reference: Common Criteria Evaluation & Validation Scheme (CCEVS), Version 2.3, August 2005.
- 61 -
Topics
- 62 -
System-high
Entire system is operated at the highest security classification level,
and trusted to provide need-to-know to a specific user or role
(DAC)
Compartmentalized
A system which allows to operate and process information at
multiple compartmented information. Not all user have the needto-know on all information.
- 63 -
Mode
Clearance Level
Dedicated
System-High
Need-to-Know
Reference: DCID 6/3 Protecting Sensitive Compartmented Information Within Information Systems, 2000.
- 64 -
Security Architecture
Reference Monitor
A reference monitor is an abstract machine that
mediates all accesses to objects by subjects
Reference monitor is performed by a reference
validation mechanism where it is a system composed
of hardware, firmware, and software
Security Policy
Certification &
Enforcement Rules
Access Request
Reference
Access Permitted
Monitor Validation
Mechanism
Objects
Subject
Access Log
Log information
Security Architecture
Reference Monitor
Design requirements:
The reference validation mechanism must always be
invoked.
The reference validation mechanism must be tamper proof.
The reference validation mechanism must be small enough
to be subject to analysis and tests to assure that it is correct.
Security Architecture
Process activation
Execution domain switching
Memory protection
Input/Output operation
Reference: DoD 5200.28-STD, Trusted Computer System Evaluation Criteria (TCSEC), December 26, 1985.
- 67 -
Security Architecture
Ring 0
Operating System
(OS)
0
1
2
3
Ring 3
Applications
Questions:
Which information security model is for confidentiality
only?
- 69 -
Answers:
Which information security model is for confidentiality
only?
Bell-LaPadula
Questions:
What mediates all accesses to objects by subjects?
- 71 -
Answers:
What mediates all accesses to objects by subjects?
Reference monitor validation mechanism
- 72 -
Topics
Security Architecture & Models Domain
Computing Platforms
Security Models
Information Security Models
- 73 -
Vi e
al
ra t
ion
Op
e
al
nic View
ch
Te ards
nd
Security
Management
Controls
Sta
Security
Operational
Controls
Systems View
Security
Technical
Controls
Implementation Architecture
Security Architecture
Enterprise A collective of functional organizations /
units that is composed of multiple domain and
networks.
Architecture The highest level concept of a system
in its operating environment (Conceptual model)
Security Architecture A integrated view of system
architecture from a security perspective
Enterprise Security Architecture An integrated view
of enterprise system architecture from a perspective
of meeting the organizational security policy,
standards, and processes.
- 75 -
1
2
6
5
NIST SP 800-53
Recommended Security
Controls for Federal
Information Systems
B
Op usine
era ss
tio
ns
gie
olo
s
Security
Management
Controls
hn
Security
Operational
Controls
c
Te
System
Security
Technical
Controls
- 76 -
1
5
2
3
Security
Operational
Controls
rat
i
s
6
3
Security
Management
Controls
System
gie
Op
e
olo
hn
on
c
Te
Security
Technical
Controls
- 77 -
Implementation Architecture
- 78 -
Implementation Architecture
Zachman Framework
(1980s)
C4ISR Architecture
Framework (1990s)
DoD Architecture
Framework (DoD AF)
(2000s)
History of Architecture
Framework for
Information Systems
Operational View
Systems View
Technical Standards View
Service View
Capability View
- 79 -
Implementation Architecture
A.
Architecture
Vision
H.
Architecture
Change
Management
G.
Implementation
Governance
B.
Business
Architecture
Requirements
Management
F.
Migration
Planning
C.
Information
Systems
Architecture
D.
Technology
Architecture
E.
Opportunities
and
Solutions
Implementation Architecture
Implementation Architecture
Implementation Architecture
Implementation Architecture
Implementation Architecture
Implementation Architecture
Implementation Architecture
Implementation Architecture
- 88 -
Implementation Architecture
- 89 -
Implementation Architecture
- 90 -
Implementation Architecture
CV-1 Vision
CV-2 Capability Taxonomy
CV-3 Capability Phasing
CV-4 Capability Dependencies
CV-5 Capability to Organizational Development
Mapping
CV-6 Capability to Operational Activities Mapping
CV-7 Capability to Services Mapping
- 91 -
Implementation Architecture
- 92 -
Implementation Architecture
Intended use
Scope
Characteristics to be captured
Organization of data for designing a system
- 93 -
Implementation Architecture
- 94 -
Implementation Architecture
Measurement
Area
Measurement
Category
Measurement
Grouping
Measurement
Indicator
- 95 -
Implementation Architecture
Business
Area
Line of
Business
Sub-function
- 96 -
Implementation Architecture
Service Domain
Service Type
Component
- 97 -
Implementation Architecture
Service Area
Service
Category
Service
Standard
- 98 -
Implementation Architecture
Data Sharing
Data
Description
- 99 -
Implementation Architecture
Operations
People
Executing Operations
Supported by Technology
Technology
Information Assurance Technical Framework (IATF)
Overlapping Approaches & Layers of Protection
Defending the
Network &
Infrastructure
Defending the
Enclave
Boundary
Defending the
Computing
Environment
Supporting
the
Infrastructure
Security CONOPs,
Security Operations
Process & Procedure
Security mechanism,
System Architecture,
People
OSI Reference
Model
Presentation
Facility Security,
Protection of Critical
Infrastructure
Defense-In-Depth Strategy
Technical Countermeasures
Information Assurance
DEFENSE-IN-DEPTH
TCP/IP Protocol
Architecture
Information Assurance
Technical Framework
(IATF)
Application
Physical Sec.
Security
Operations
Application
Layer
Defending the
Computing
Environment
Session
Supporting the
Infrastructure
Transport
Host-to-Host
Transport
Layer
Defending the Enclave
Network
Internet Layer
Data-Link
Network
Access Layer
Physical
- 100 -
Implementation Architecture
Contextual-level (Architecture)
Conceptual-level (Architecture)
Logical-level (Design)
Physical-level (Specification)
Operational-level (CONOPS)
Component-level (Configuration)
- 101 -
System Requirements
Functional Requirements
Example:
System Requirements
Functional
Requirements
For defining functions or
behavior of the IT
product or system.
Performance
Requirements
For establishing
confidence that the
specified function will
perform as intended.
Performance Requirements
Example:
What extent the agency-wide security
configuration policy (i.e., NIST
Checklist Program [a.k.a. National
Checklist Program]) has been
implemented.
- 102 -
Functional Requirements
Example:
Functional
Requirements
For defining security
behavior of the IT
product or system.
Assurance
Requirements
For establishing
confidence that the
security function will
perform as intended.
- 103 -
Implementation Architecture
Security Controls
Security controls are the management, operational, and technical
safeguards/countermeasures prescribed for information systems or
organizations that are designed to:
1.
2.
Key questions:
What security controls are needed to satisfy the security
requirements and to adequately mitigate risk incurred by using
information and informaiton systems in the execution of
organizational missions and business functions?
Have the security controls been implemented, or is there an
implementation plan in place?
What is the desired or required level of assurance that the selected
security controls, as implemented are effective in their application?
Reference: NIST SP 800-53, Rev. 4, Security and Privacy Controls for Federal
Information Systems and Organizations.
- 104 -
Management
Operational
Technical
FAMILY
IDENTIFIER
Risk Assessment
RA
Planning
PL
SA
CA
Program Management
PM
Personnel Security
PS
PE
Contingency Planning
CP
Configuration Management
CM
Maintenance
MA
SI
Media Protection
MP
Incident Response
IR
AT
IA
Access Control
AC
AU
SC
CLASS
- 106 -
SUB-CATEGORY OF CONTROLS
Security Policy
Asset Management
Operational procedures and responsibilities; Third party service delivery management; System planning and
acceptance; Protection against malicious and mobile code; Back-up; Network security management; Media
handling; Exchange of information; Electronic commerce services; Monitoring
Access Control
Business requirement for access control; User access management; User responsibilities; Network access
control; Operating system access control; Application and information access control; Mobile computing and
teleworking
Reporting information security events and weaknesses; Management of information security incidents and
improvements
Compliance
Compliance with legal requirements; Compliance with security policies and standards, and technical
compliance; Information system audit considerations
- 107 -
Needs Analysis
Phase
Concept
Exploration Phase
Concept
Definition Phase
Operations analysis
Technology assessment
System studies
Concept synthesis
Feasibility experiments
Requirements definition
Trade-off analysis
Functional architecture
Subsystem definition
System studies
Technological opportunities
- 108 -
Questions:
What architecture framework is best for defining the
relationship between business investment and
system components?
- 109 -
Answers:
What architecture framework is best for defining the
relationship between business investment and
system components?
Federal Enterprise Architecture (FEA) Framework
- 110 -
Validation Time J
1. Class Exercise
2. Review Answers
- 111 -
- 112 -
Logical-level (Design)
Physical-level (Specification)
Operational-level (CONOPS)
Conceptual-level (Architecture)
Component-level (Configuration)
- 113 -