E N D
1. Secure Access Management for SECRET Operational Networks(SAMSON) Dr. Daniel Charlebois
DRDC Ottawa Network Information Operations Section
March 3rd, 2009 Good Morning.
I would like to present some thoughts on how enabling secure access and sharing of information will involve disruptive technologies.Good Morning.
I would like to present some thoughts on how enabling secure access and sharing of information will involve disruptive technologies.
2. Objective The current DND environment enforces community of interest (caveat) separation using physically separate networks.
There are three possible levels of separation, with different mechanisms:
Level 1 separation Different Security Classifications are separated using High-Grade Crypto devices to isolate domains
Level 2 separation Within a single level of classification different Warning Terms (Caveats) are separated using separate networks
Level 3 Need-to-Know separation may be possible using Application, O/S Security? e.g. Entrust
Problems with this approach:
Inhibits information sharing
Inefficient and costly system, network, user administration
Lack of synchronization can introduce security vulnerabilities
The target environment is a single network encompassing all users and caveats, at least for a single security level. The ultimate goal is to extend to multiple security levels (MLS).
Level 1 separation Different Security Classifications are separated using High-Grade Crypto devices (separate networks for different classifications)
Level 2 separation Warning Terms (Caveats) separation using content-based security
Level 3 Need-to-Know separation using content-based security
Advantages:
Facilitates information sharing
Efficient and cost-effective system, network, user administration
Reduces potential for security vulnerabilities
The current DND environment enforces community of interest (caveat) separation using physically separate networks.
There are three possible levels of separation, with different mechanisms:
Level 1 separation Different Security Classifications are separated using High-Grade Crypto devices to isolate domains
Level 2 separation Within a single level of classification different Warning Terms (Caveats) are separated using separate networks
Level 3 Need-to-Know separation may be possible using Application, O/S Security? e.g. Entrust
Problems with this approach:
Inhibits information sharing
Inefficient and costly system, network, user administration
Lack of synchronization can introduce security vulnerabilities
The target environment is a single network encompassing all users and caveats, at least for a single security level. The ultimate goal is to extend to multiple security levels (MLS).
Level 1 separation Different Security Classifications are separated using High-Grade Crypto devices (separate networks for different classifications)
Level 2 separation Warning Terms (Caveats) separation using content-based security
Level 3 Need-to-Know separation using content-based security
Advantages:
Facilitates information sharing
Efficient and cost-effective system, network, user administration
Reduces potential for security vulnerabilities
3. Network-based Separation In the current separate network environment, a single user that belongs to the four different communities must be registered separately on each network.
This imposes an administrative burden to maintain synchronization of the users account credentials across all networks.
But, most important, if the user is a CANADIAN national on the CANUS network, but needs access to some CEO information, he cannot have access to this information without changing networks.
So this configuration actually enforces inefficiency by inhibiting information sharing.
In the current separate network environment, a single user that belongs to the four different communities must be registered separately on each network.
This imposes an administrative burden to maintain synchronization of the users account credentials across all networks.
But, most important, if the user is a CANADIAN national on the CANUS network, but needs access to some CEO information, he cannot have access to this information without changing networks.
So this configuration actually enforces inefficiency by inhibiting information sharing.
4. Content-based Separation The new environment is a single network for all users and caveats, for a single security level.
Separation is provided by content-based encryption. All information is labelled and protected according to its label information.
Release is controlled by a secure access management system.
The new environment is a single network for all users and caveats, for a single security level.
Separation is provided by content-based encryption. All information is labelled and protected according to its label information.
Release is controlled by a secure access management system.
5. Content-based Separation The new environment is a single network for all users and caveats, for a single security level.
Separation is provided by content-based encryption. All information is labelled and protected according to its label information.
Release is controlled by a secure access management system.
The new environment is a single network for all users and caveats, for a single security level.
Separation is provided by content-based encryption. All information is labelled and protected according to its label information.
Release is controlled by a secure access management system.
6. Content-based Separation All users on a single network Characteristics of content-based separation environmentCharacteristics of content-based separation environment
7. Defence-in Depth Architecture Without content-based separation, in system-high mode, an authenticated user has access to all information.
On a network with content-based separation, access to information is controlled by multiple security layers working together to provide a defence-in-depth approach. The security mechanisms ensure that access is granted only in after ensuring that user clearances and privileges and information label markings comply with security policy.
Without content-based separation, in system-high mode, an authenticated user has access to all information.
On a network with content-based separation, access to information is controlled by multiple security layers working together to provide a defence-in-depth approach. The security mechanisms ensure that access is granted only in after ensuring that user clearances and privileges and information label markings comply with security policy.
8. Identity Management Centrally controlled
Assign roles and privileges
Assign Caveat or COI membership
Automatic provisioning to all domains
PKI enrolment Now we look a little closer at these defence in depth components starting with identity management.
These are the basic required characteristics.Now we look a little closer at these defence in depth components starting with identity management.
These are the basic required characteristics.
9. Strong Authentication Public key digital credentials
Two-factor authentication:
Smartcard protected by Passphrase or Personal Identification Number (PIN)
Biometric authentication:
Smartcard protected by biometric property
Single authentication process authenticates for all services and applications
Single Signon Strong authentication involves the use of public key digital credentials and can be combined with another mechanism to improve the strength of the authentication.Strong authentication involves the use of public key digital credentials and can be combined with another mechanism to improve the strength of the authentication.
10. Information Management All information objects must be labelled
Label content reflects information properties
Trusted label binding
Information protected (encrypted) according to label content An essential condition for controlling access in this environment is to label all information objects in a trusted manner.An essential condition for controlling access in this environment is to label all information objects in a trusted manner.
11. Content-based Protection Information objects are labelled and encrypted when created
Access to an information object is governed by:
User identity attributes, roles, privileges
Information label content
Security policy
Access mediated by Policy Manager (Policy Decision Point)
12. Policy-based Authorization - 1 This slide and the next illustrate the concept of policy-based authorization (i.e., access control) which is key to the integrated environment.
All user requests for access to an information resource on a server are mediated by a policy server.
On each information server a Policy Enforcement Point (PEP) intercepts each access request and sends the request to the policy server.
This slide and the next illustrate the concept of policy-based authorization (i.e., access control) which is key to the integrated environment.
All user requests for access to an information resource on a server are mediated by a policy server.
On each information server a Policy Enforcement Point (PEP) intercepts each access request and sends the request to the policy server.
13. Policy-based Authorization - 2 If access is granted or denied, the decision is communicated to the PEP which enforces the result.
If access is granted or denied, the decision is communicated to the PEP which enforces the result.
14. SAMPOC I & II Demonstrators Secure Access Management Proof of Concept (SAMPOC) Demonstrations
Built from COTS products with the support of industry
Demonstrated:
Identity management and provisioning
Secure policy-based access control to documents, web pages and database records
Policy-based access control decision based on:
Authenticated user credentials
Resource labels
Security policy
15. SAMSON TDP Vision Demonstrate a security infrastructure using integrated COTS components
Demonstrate separation of CEO, CANUS caveats on a single network
Open standards
Leverage COTS evergreening principle The SAMSON TDP will demonstrate how this environment will work for two basic communities: CEO and CANUSThe SAMSON TDP will demonstrate how this environment will work for two basic communities: CEO and CANUS
16. SAMSON Project Objectives Integrate state-of-the-art components
Demonstration in a live network environment
Scaling and performance
Trustable solutions
Certification and accreditation
Integration with DND applications
Deployment considerations to the SECRET operational environment Align demonstrator with NOS project targets for DND
Needs to fit into existing DND environment: e.g. Entrust PKI, Datakey Smartcards, MS AD
DND moving to uniform environment but still needs interoperability with allies and other environments
System evaluation and accreditation needs to be addressedAlign demonstrator with NOS project targets for DND
Needs to fit into existing DND environment: e.g. Entrust PKI, Datakey Smartcards, MS AD
DND moving to uniform environment but still needs interoperability with allies and other environments
System evaluation and accreditation needs to be addressed
17. Disruptive Technology Enterprise-wide security infrastructure
New Security policies: merged networks
All information labelled
Information protected, managed according to content
All information accesses mediated, logged
No phased transition cold turkey cutover This technology is disruptive for a number of reasons.This technology is disruptive for a number of reasons.
18. SAMSON Project Overview SOW
TDP/Options TD
Options Services & S/W licenses
Unique IP ownership
Contract AWARDED ? Bell
Technical
Architecture - complete
Functional Specification -complete
Con Ops complete
C&A
Unlike other projects, C&A is baked-in (part of the recipe)
CSE providing system security engineering support for C&A activities
Targeting Demo IAP Phase 3 CNet Demonstration
Mandated to review C&A issues for the enterprise
19. Thank You