270 likes | 452 Views
Computer and Information Security. OS Security Functions. Separation: keep users/processes separate Physical, Temporal, Logical, Cryptographic separation Memory protection: Ensures that one user’s process cannot access others’ memory Fence Base/bounds register Tagging Segmentation
E N D
OS Security Functions • Separation: keep users/processes separate • Physical, Temporal, Logical, Cryptographic separation • Memory protection: • Ensures that one user’s process cannot access others’ memory • Fence • Base/bounds register • Tagging • Segmentation • Paging • Access control: • Authentication and Authorization
Trusted Operating System • An OS is trusted if we rely on it for • Memory protection • Separation • Access control • Every OS does these things • But if a trusted OS fails to provide these, our security fails. Part 4 Software 3
Trust vs Security • Security is a judgment of effectiveness of a particular mechanisms. • Security depends on trust. • Trust impliesreliance • Trust is binary: trust or we don’ t. Part 4 Software 4
Trusted Systems • Trust implies reliance • A trusted system is one that we relied on for security. • An untrusted system is not one that we relied on for security • Only a trusted system can break your security! Part 4 Software 5
Trusted OS • OS mediates interactions between subjects (users) and objects (resources) • Trusted OS must decide • Which objects to protect and how • Which subjects are allowed to do what Part 4 Software 6
Trusted OS design principles. • Least privilege: • S/O takes minimum necessary set of privileges. • Economy of mechanism (simplicity): • security mechanisms should be as simple as possible. • Open design:Avoid security by obscurity. • Secret keys or passwords, but not secret algorithms • Complete mediation: • Every access to every object must be checked.
Trusted OS design principles. • Separation of privileges: • A system should not grant permission based on one conditions. • Failsafe Defaults: No access by default. • Least common mechanism: • Mechanisms used to access resources should not be shared. • Psychological Acceptability (ease of use) • If protection mechanism is difficult, nobody will use it, or it will be used in the wrong way.
Assurance • “Degree of confidence that the security controls operate correctly and protect the system as intended” • Applies to: • product security requirements, security policy, product design, implementation, operation. • various approaches analyzing, checking, testing various aspects
System Certification • Government attempt to certify “security level” of products • Still required today if you want to sell your product to the government Part 2 Access Control 10
Orange Book • Trusted Computing System Evaluation Criteria (TCSEC), 1983 • Universally known as the “orange book” • Name is due to color of it’s cover • About 115 pages • Developed by DoD (NSA) • Orange book generated a pseudo-religious fervor among some people Part 2 Access Control 11
Orange Book Outline • Goals • Provide way to assess security products • Provide guidance on how to build more secure products. • Four divisions labeled D thru A • D is lowest, A is highest • Divisions split into numbered classes Part 2 Access Control 12
Common Criteria (CC) • Successor to the orange book (ca. 1998) • Due to inflation, more than 1000 pages • An international government standard • CC is relevant in practice, but only if you want to sell to the government • Evaluation Assurance Levels (EALs) • 1 thru 7, from lowest to highest security Part 2 Access Control 13
EAL 1 thru 7 • EAL 1: functionally tested • EAL 2: structurally tested • EAL 3: methodically tested and checked • EAL 4: methodically designed, tested, and reviewed (high level to low level vulnerability analysis) • EAL 5: semiformally designed and tested • EAL 6: semiformally verified design and tested • EAL 7: formally verified design and tested (formal analysis and formally showing correspondence)
EAL • Note: product with high EAL may not be more secure than one with lower EAL • Why? • Also, because product has EAL doesn’t mean it’s better than the competition • Why? Part 2 Access Control 15
EAL • EAL4 is most commonly sought • Minimum needed to sell to government • EAL7 requires formal proofs • Who performs evaluations? • Government accredited labs, of course • For a hefty fee (like, at least 6 figures) Part 2 Access Control 16
Evaluation Process • ensure security features correct & effective • performed during/after target of evaluation (TOE) development • input: security target, evidence, actual TOE • result: confirm security target satisfied for TOE • process relates security target to some of TOE: • high-level design, low-level design, functional spec, source code, object code, hardware realization • higher levels need semiformal/formal models • higher levels need greater rigor and cost
Evaluation Parties & Phases • Evaluation parties: • sponsor - customer or vendor • developer - provides evidence for evaluation • evaluator - confirms requirements satisfied • certifier - agency monitoring evaluation process • Phases: • preparation (initial contact) • conduct of evaluation (structured process) • conclusion (final evaluation) • Government agency regulates: NIST, NSA jointly operate Common Criteria Eval and Validation Scheme (US CCEVS)
Virtualization • A technology that provides an abstraction of the resources used by some software which runs in a simulated environment called a virtual machine (VM) • Benefits include better efficiency in the use of the physical system resources • Provides support for multiple distinct operating systems and associated applications on one physical system • To Download VirtualBox and use it: • https://www.youtube.com/watch?v=sB_5fqiysi4
Full Virtualization Variations 1- Native virtualization: the hypervisor executes directly on the underlying hardware • Hosted OS is just another app • More secure: fewer layers
Full Virtualization Variations 2- Hosted virtualization: Hosted OS run along other apps • Adds additional layers: increased security concerns
Virtualization Security Issues • Security concerns include: • Guest OS isolation: ensuring that programs executing within a guest OS may only access and use the resources allocated to it • Guest OS monitoring by the hypervisor: has privileged access to the programs and data in each guest OS and must be trust • Virtualized environment security: particularly image and snapshotmanagement which attackers may attempt to view or modify
Summary • Trusted OS: Trust vs Security • Trusted OS design principles • Assurance. • Orange Book • Common Criteria (CC) • EAL • Evaluation process, parties & phases • Virtualization.