1 / 19

TOPIC

TOPIC. THE CHINESE WALL LATTICE Ravi Sandhu. Example of a commercial security policy for confidentiality Mixture of free choice (discretionary) and mandatory controls Requires some kind of dynamic labelling Introduced by Brewer-Nash in Oakland '89. CHINESE WALL POLICY.

flann
Download Presentation

TOPIC

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TOPIC THE CHINESE WALL LATTICE Ravi Sandhu

  2. Example of a commercial security policy for confidentiality Mixture of free choice (discretionary) and mandatory controls Requires some kind of dynamic labelling Introduced by Brewer-Nash in Oakland '89 CHINESE WALL POLICY

  3. A consultant can access information about at most one company in each conflict of interest class CHINESE WALL POLICY ALL OBJECTS CONFLICT OF INTEREST CLASSES COMPANY DATASETS INDIVIDUAL OBJECTS

  4. CHINESE WALL EXAMPLE OIL COMPANIES BANKS X Y A B

  5. BREWER-NASH SIMPLE SECURITY S can read O only if O is in the same company dataset as some object previously read by S (i.e., O is within the wall) or O belongs to a conflict of interest class within which S has not read any object (i.e., O is in the open) READ ACCESS

  6. BREWER-NASH STAR-PROPERTY S can write O only if S can read O by the simple security rule and no object can be read which is in a different company dataset to the one for which write access is requested WRITE ACCESS

  7. cooperating Trojan Horses can transfer Bank A information to Bank B objects, and vice versa, using Oil Company X objects as intermediaries REASON FOR BN STAR-PROPERTY ALICE'S WALL BOB'S WALL Bank A Bank B Oil Company X Oil Company X

  8. Either S cannot write at all or S is limited to reading and writing one company dataset IMPLICATIONS OF BN STAR-PROPERTY

  9. Failure to clearly distinguish user labels from subject labels. WHY THIS IMPASSE?

  10. USERS, PRINCIPALS, SUBJECTS PRINCIPAL1's SUBJECTS PRINCIPAL1 PRINCIPALi's SUBJECTS PRINCIPALi USER PRINCIPALn's SUBJECTS PRINCIPALn

  11. Principals are subjects Users are not subjects Users are collections of principals (subjects) USERS, PRINCIPALS, SUBJECTS

  12. USERS, PRINCIPALS, SUBJECTS ALICE.BANK A & OIL COMPANY X ALICE.OIL COMPANY X ALICE ALICE.BANK A ALICE.nothing USER PRINCIPALS

  13. dynamic creation of principals rather than dynamic labelling of subjects LATTICE INTERPRETATION

  14. CHINESE WALL EXAMPLE OIL COMPANIES BANKS X Y A B

  15. The high water mark of a user's principal can float up so long as it remain below SYSHIGH CHINESE WALL LATTICE SYSHIGH A, Y A, X B, X B, Y B, - -, X -, Y A, - SYSLOW

  16. USERS, PRINCIPALS, SUBJECTS ALICE.BANK A & OIL COMPANY X ALICE.OIL COMPANY X ALICE ALICE.BANK A ALICE.nothing USER PRINCIPALS

  17. USERS, PRINCIPALS, SUBJECTS JOE.TOP-SECRET JOE.SECRET JOE JOE.CONFIDENTIAL JOE.UNCLASSIFIED USER PRINCIPALS

  18. The Bell-LaPadula star-property is applied not to Joe but rather to Joe's principals Similarly, the Brewer-Nash star-property applies not to Alice but to Alice's principals USERS, PRINCIPALS, SUBJECTS

  19. The Chinese Wall policy is just another lattice-based information flow policy To properly understand and enforce Information Security policies we must distinguish between policy applied to users, and policy applied to principals and subjects CONCLUSION

More Related