490 likes | 652 Views
Secure Information Sharing Manager (SIS-M) Thesis 2007. Stephen D. Wise swise@uccs.edu. Background Enterprise Management Problem Project Motivation SIS-M Objectives CIM/WBEM Standards RBAC Standards Architecture Observations WBEM Implementations Authorization Manager SIS-M Architecture.
E N D
Secure Information Sharing Manager (SIS-M) Thesis2007 Stephen D. Wise swise@uccs.edu
Background Enterprise Management Problem Project Motivation SIS-M Objectives CIM/WBEM Standards RBAC Standards Architecture Observations WBEM Implementations Authorization Manager SIS-M Architecture InformationAccess Monitor Systems Manage Users Manage RBAC RBAC Violations InformationSharing Performance Observations Lessons Learned Future Research Conclusions Agenda
Background • NISSC Grant For Secure Information Sharing (SIS) • Purpose • Utilize Role Based Access Control (RBAC) Implemented With a LDAP and Web Server Application, and RBAC Policies To Share Information Securely • Project Objectives • Create Web-based Proof of Concept to Share Information Securely using Public Key Certificates (PKC) and Attribute Certificates (AC) • Develop Easy-to-Use Installer • Develop Web-based Management Interface The SIS-M Prototype Is A Web-based Management Capability
The Enterprise ManagementProblem • The Expansion And Maturation Of Corporate Enterprises Is Increasing Corporate Overhead Costs Required To Manage Multiple Unique Systems And Applications • System Administrators Are Responsible For… • User Administration, Security Policy, Performance Monitoring, Problem Detection & Resolution, etc. • These Tasks Are Typically Accomplished With Vendor Or Organically Built Proprietary Tools
Project Motivation • The System I Work On Contains Dozens Of Servers And Hundreds Of Clients • Servers • Solaris & Windows Based • Clients • Solaris & Windows Based • Multiple Vendor Products Are Required • Security Policy Enforcement • Monitor & Manage The Assets • Manage Users
SIS-M Objectives • The Research And Associated Prototype Are To Demonstrate Web-based Management Capability For A Windows 2003 Server Enterprise To Include… • System Health And Status Monitoring • User Account Management • Role Based Access Control • Automated Client-side Certificate Distribution
CIM/WBEM Standards • Distributed Management Task Force (DMTF) Is An Industry Organization Responsible For The Development Of Enterprise Management Standards
RBAC Standards • The Organization For The Advancement Of Structured Information Standards (OASIS) • Extensible Access Control Markup Language (XACML) • CORE RBAC Elements • Users Implemented as XACML Subjects • Roles Expressed Using XACML Subject Attributes • Objects Expressed Using XACML Resources • Operations Expressed Using XACML Actions • Permission Expressed Using XACML Role Policy Sets And Permission Policy Sets
Architecture Observations(WBEM) • The CIM Client Is Used To Obtain Management Information By Querying CIM/WBEM Servers • The CIM/WBEM Server Provides CIM Data, Upon Request, to CIM Clients • The CIMOM Maintains A Repository of CIM Data On The CIM/WBEM Servers • The Providers Implement Aspects Of The CIM Schema That Abstracts The Hardware And Software Implementation Away From The CIM Clients The WMI Implementation Includes More Provider Fidelity For Windows 2003 Server
Architecture Observations(RBAC) • Authorization Manager Components • Operation: A low-level permission that a resource manager uses to identify security procedures • Task: A collection of low-level operations • Role Definition: A collection of permissions that are needed for a particular role, where permissions can be tasks or operations • Role: The set of permissions that users must have to be able to do their job • BizRules: The set of rules / scripts that are attached to a task object that is run at the time of the access request • Scope: A collection of objects or resources with a distinct authorization policy
Web-based Application • InformationAccess • System Health And Status Monitoring • Uses WMI And CIM Query Language (CQL) To Obtain Management Information From Each Server • Evaluates The WMI Information To Determine Status Of Each Monitored Element • Provides The Capability Through CQL To Retrieve Details About Elements That Fall Out Of Limits
Web-based Application • InformationAccess • User Account Management • Uses An ASP.Net CreateUserWizard Server Control To Create Accounts Within The SISMTHESIS Domain • Uses Active Directory Membership Provider And The Membership Class In The System.Web.Security Namespace To Delete Accounts And Retrieve Account Details
Web-based Application • Certificate Services • Automated Client-side Certificate Distribution • Uses Windows Server 2003 Server Components And Certificate Services To Distribute And Remotely Install Client-side Certificates Issued By The Server Named Secure
Web-based Application • InformationAccess • RBAC Management • Uses Authorization Store Role Provider And The Roles Class Contained Within The System.Web.Security Namespace To Manage RBAC Permissions
Web-based Application • InformationAccess • RBAC Violations • Uses the EventLog classes in the System.Diagnostics namespace. RBAC Policy Access Violation from InformationAccess and InformationSharing Write to the custom Event Log on the server SISDC
Web-based Application • InformationSharing
Web-based Application • InformationSharing RBAC Violation
Performance Observations Server Trend For Retrieving One WMI Object The Server Trend For Retrieving One WMI Object observation shows response time increase for querying one WMI Object relative to the number of WMI namespaces queried Overall 7.9% Delay In HTTPS Response Time
Performance Observations Server Trend For Retrieving Five WMI Objects The Server Trend For Retrieving Five WMI Objects observation shows response time increase for querying five WMI Objects relative to the number of WMI namespaces queried Overall 8.1% Delay In HTTPS Response Time
Lessons Learned • System Health & Status • Defining Appropriate User Credentials For WMI Namespace Access Is Critical • The Information Value Contained Within The CIMOM Is Directly Related To The Provider Implementation Maturity Within WBEM • User Account Management • User Account Management Within Windows 2003 Server Is Primarily Accomplished By The Active Directory Users & Computers Management Console And ADSI • The Win32_UserAccount Does Not Inherit From The CIM_UserAccount Defined In The CIM Schema
Lessons Learned • RBAC Management • The AzMan Capability Is Not Completely Supported Through The ASP.Net Services And Some Membership Methods Throw A Not Supported Exception • AzMan Policy Enforcement Requires User Principal Name (UPN) Formatted User Accounts, <username>@domain.com • Client-side Certificate Distribution • PKI Best Practices State That Root CAs Should Never Be Connected To The Network To Raise The Security Level Of The CAs Private Key • A PKI In Most Cases Should Be Architected With An Offline Root CA, One Or More Offline Intermediate CAs, and One Or More Netoworked Issuing Enterprise CAs
Future Research • Update SIS-M Architecture To Include A UNIX Server • Update The SIS-M Prototype To The .Net 3.0 Framework • Modify Certificate Authority Architecture • Implement Client-side Certificate Mapping
Conclusion • The SIS-M Research And Prototype Enabled • System Health And Status Monitoring Using WMI • User Account Management Using The Active Directory Membership Provider • RBAC Management Using AzMan • Client-side Certificate Distribution Using Certificate Services • The CIM / WBEM Standards Appear To Be More Mature Than The Vendor Products Attempting To Comply With The DMTF Standards • May Be Due To The Cost Of Integrating A New Standard Into An Existing Vendor Product Line
Backup Backup
DMTF • Distributed Management Task Force Common Information Model Web Based Enterprise Management
CIM 1 2 3
WBEM URI XML CIM-XML CLP Discovery CQL CLP – Command Line Protocol CQL – CIM Query Language
WBEM Architecture WBEM Client CIM Client Application CIM Query Language, CIM-XML WBEM Server CIM Repository CIMOM Provider Abstraction Proprietary Layer
SIS-M Client SIS Client Secure SISDC Manager SIS-M Network Topology 192.168.184.129 192.168.184.132 SISMThesis Domain Virtual Network 192.168.184.130 192.168.184.131 192.168.184.128
System Health & Status Window 2003 Server Operating System Status CPU Status Disk Status
Backup Code Backup
System Health & StatusMonitoring WMI Namespace Connection WMI Queries
User Account Management Active Directory Connection Membership Class
RBAC Management Authorization Manager Policy Store Connection
RBAC Management (Cont.) Create Role Get Users In Role
RBAC Violation Archive Create Archive Write Violation
Backup Performance Backup
RBAC Violation Log Access The objective of this measurement is to observe the performance of the Windows Event Log during a custom archive data retrieval request
RBAC Mgt Access(Authorization Manager) The objective of this measurement is to observe the performance of Authorization Manager Accesses
WMI 1X1 Response Time The One Server Retrieving One WMI Object observation captures the time required for one WMI query requesting a single WMI object to execute against the WMI namespace on SISDC
WMI 2X1 Response Time The Two Servers Retrieving One WMI Object observation captures the time required for one WMI query requesting a single WMI object to execute against the WMI namespaces on SISDC and Secure servers
WMI 3X1 Response Time The Three Servers Retrieving One WMI Object observation captures the time required for one WMI query requesting a single WMI object to execute against the WMI namespaces on the SISDC, Secure, and Manager servers
WMI 1X5 Response Time The One Server Retrieving Five WMI Objects observation captures the time required for five WMI queries requesting a single WMI object to execute against the WMI namespace on SISDC
WMI 2X5 Response Time The Two Servers Retrieving Five WMI Objects observation captures the time required for five WMI queries requesting a single WMI object to execute against the WMI namespaces on SISDC and Secure servers
WMI 3X5 Response Time The Three Servers Retrieving Five WMI Objects observation captures the time required for five WMI queries requesting a single WMI object to execute against the WMI namespaces on SISDC, Secure, and Manager servers