Transcript
Transcript
We often think about this idea of what's known as complete mediation and
relation to access control. When no subject can gain access to any object
without authorization, we are said to have a complete mediation solution. In
other words, any user or process that wants to see any piece of data can only
do so if they go through an access control mechanism, and the system will
record their place they're coming from, who they are, what they're up to, what
they mean to do, and how they do it. In cybersecurity engineering, that is
complete mediation.
The security kernel normally implements this through what's known as the
reference monitor. The reference monitor is the logical abstraction that the
security kernel, the security function of the operating system, implements the
reference monitor is going to be implemented by the security kernel. It's what
it implements in order to allow for the complete mediation solution to take
place. A reference monitor examines any and all attempts, as you can see, by
subjects to access objects that determine if it should or should not, meaning
the access should or should not be allowed. The reference monitor is the
crucible we examine all interactions between subjects and objects through. It
is created logically through the security kernel inside of the operating system.
Data hiding
Data hiding allows us to be able to separate levels of activity from each other.
We can effectively screen data that exists in one level in the system from data
at other levels, preventing processes from seeing lower level or higher level
data as a result. We got another cybersecurity engineering mechanism that
the operating system and the kernel architecture can employ. Any or all of
these things can be implemented through the operating system, and in
combination with the operating system and the CPU architecture, we can
achieve these end results. Remember that data hiding will allow us to be able
to make sure that security is implemented at all the different levels of process
execution and that we don't expose data at a different level just because the
process is going to be executing there. We only allow the data in question to
be seen at levels that are appropriate for the process to access it from.
By the way, and storage systems, if you know anything about storage in
virtualization, you can think of data hiding as something that's commonly
referred to as masking, where we will only allow LANs to be presented to
people that provide the appropriate credential and have a requirement to see
them. This is done in multi-tenant hosting environments where ISPs, internet
service providers, that are providing cloud-based services, for instance, will
provide the ability to mount storage and a common backend storage array, but
then give multiple customers access to that array, isolating their individual
learner LANs that they're paying for from everybody else using the masking
concept. Data hiding is a very similar approach, but done individually within
the individual computer using the operating system, the kernel mode, and the
access to the CPU to drive that in tandem with each other. Very similar
concept, but scaled out to an enterprise storage-based cloud solution, we will
call that masking.
Virtualization
When we think about virtualization and its implications for cybersecurity
engineering, we also want to think about again at a high level introducing
concepts here. The fact that virtual machines are going to be running in their
own little isolated sandbox environment. The beautiful thing
about virtualization as a technology is that we can group multiple logical guest
operating systems, commonly referred to as virtual machines, together on one
physical or a group of physical hosts. And, as a result of that, we are then able
to go ahead, and we're able to run them on that host. And, as a result of
running them there, we then can isolate what they do and how they work. The
applications that run inside the virtual machines are running on that virtual
instance. They are potentially networked, created, and, of course, connected
to other systems if we allow them to be, but the resources that that virtual
machine is consuming from the host are dedicated to it. And we can shut
down, remove, start up, and replace those virtual machines at will very quickly
and very easily to allow for the deployment of infrastructure to scale up and
scale out on demand.
What’s next?
As we wrap up our conversations in this area of cybersecurity engineering,
we've introduced a lot of topics in one or two statements, a couple of minutes
of discussion in some cases. We'll be revisiting most of these introductory
topics again in depth in upcoming conversations in this domain and across
other domains. As we get into operational discussions later on, we'll be seeing
a lot of the discussions around firewalls, virtualization, cloud computing, and
IDS, IPS systems, for instance. We'll be taking on cryptography in one of the
later conversations in the security engineering domain as we continue on
here, and a lot of these topics will continue to pop up again and again in other
areas.
So keep in mind that, just because we talk about something very short and a
very, very quick introduction to one area, it doesn't mean it's not important. It
simply means we're previewing it in many cases and we will revisit that
technology, revisit that discussion, building depth, and clarity, and focus as we
go. It is up to you as a CISSP candidate to understand the value of the
information in our discussions, to apply it to your systems as needed in the
real world to make them more secure, but also to extract the knowledge
necessary to qualify to take the exam and be successful.
In other words, you have to study, you have to think about how you apply the
knowledge in the real world. Go out and do but also go out and study so that
you can answer is really what we're trying to make sure you're aware of. And
studying the cybersecurity engineering topics that we're discussing, putting
stress on the ones that have a lot of material to support them and
understanding that those discussions that we spend a lot of time on will be
valuable for you in helping you to review, and obviously focusing your
attention on those areas will prove to be helpful for you as you look to prepare
for the exam.