IS_Module4_Chap1_Operating_System_Security_Models_ksz1yXNKXz
Operating System Security Models
Overview of Security Models
Operating System Security Model (Trusted Computing Base, TCB)
Set of rules or protocols governing security functionality.
Security begins at the network protocol level, extending up to OS operations.
Effective security protects the entire host, including all software and hardware.
Modern OS use a compartmentalized approach to enhance security.
Microkernel Approach
Definition: Built around a compact kernel managing a common hardware level.
Key Advantages:
Smaller and easier to port across systems.
Supports a compartmentalized security strategy, which isolates damage potential.
Security Risks of Underlying Protocols
TCP/IP Vulnerabilities
If underlying protocols are insecure, the entire OS is at risk.
Main TCP/IP issues include:
Vulnerable to spoofing.
Vulnerable to session hijacking.
Predictable sequence guessing.
Lack of authentication and encryption.
Susceptible to SYN flooding.
Benefits of TCP/IP Version 6
Security Improvements with IPv6:
Incorporates IPSEC for enhanced security.
Includes authentication and encryption features.
Provides resilience against spoofing and safeguards for data integrity.
Ensures confidentiality and privacy for data exchanges.
Access Control Lists (ACLs)
Purpose of ACLs
An ACL defines the access rights each user possesses for objects like files or file directories.
Access is determined when the server receives a request based on predefined rules.
Structure of ACLs
Entries: Each object has a security attribute identifying its ACL, with entries for each user’s access privileges.
Common Privileges:
Read access to files or directories.
Write access to files.
Execute permission for executable files.
Implementation in Windows
Each object associates with an ACL containing access control entries (ACEs), listing user or group names and their access rights defined by an access mask.
Security Descriptors
An object's security descriptor can contain two ACLs:
Discretionary Access Control List (DACL): Identifies users/groups allowed or denied access.
System Access Control List (SACL): Controls access auditing.
Unix Systems: Also utilize access control based on user permissions and defined group roles.
Mandatory vs. Discretionary Access Control (MAC vs. DAC)
Key Differences
Discretionary Access Control (DAC):
Users can assign access privileges.
Common in commercial and academic sectors; not suited for military.
Allows flexible access controls, suitable for individual users.
Mandatory Access Control (MAC):
Access control cannot be influenced by individual object owners and is strictly governed.
Provides stringent security suitable for secure environments where sensitive information management is critical.
Security Models Summary
Primary Security Models
Bell-LaPadula:
Prevents users from reading data above their security level; focuses on data classification.
Prevents writing to lower classification data.
Biba:
Focus on integrity rather than confidentiality; prevents unauthorized modifications.
Ensures that no lower integrity data can be modified by higher integrity users.
Clark-Wilson:
Defined to support well-formed transactions, ensuring steps are performed in specified order and authenticated.
Trusted Computer System Evaluation Criteria (TCSEC)
Overview of TCSEC
Heavily influenced by the Bell-LaPadula model; aimed at classifying systems (levels A through D).
Three objectives in TCSEC development:
Provide assessment yardstick for users on trusted computer systems.
Guide manufacturers on building secure products.
Set a basis for specifying security requirements for software/hardware acquisitions.
TCSEC Ratings and Classifications
D - Minimal Protection:
No security requirements; basic systems such as MS-DOS fall here.
C1 - Discretionary Protection:
Limited user access control; familiar user groups.
C2 - Controlled Access Protection:
Enhanced with auditing and more formal user roles and security.
B1 - Labeled Security Protection:
Mandatory security labeling and integrity checks on objects.
B2 - Structured Protection:
Advanced security model, tighter operational control.
B3 - Security Domains:
Comprehensive controls with mandated access and covert channel analysis.
A1 - Verified Design:
Highest certification demanding formal verification methods.
Labels in TCSEC
Role of Labels
Security labels contain critical classification information related to files, processes, and devices.
Sensitivity labels establish classification levels with potential categories.
Integrity labels determine the reliability of data for users.
Reference Monitor Concept
Overview
Developed in 1972 by a U.S. Air Force panel to address security issues in shared environments.
Acts as an access control point enforcing security policies.
Key Features of Reference Monitor
Always active; immune to preemption.
Designed to be tamper-proof and lightweight.
Windows Security Reference Monitor
Validates access permissions for processes against security descriptors for objects, ensuring compliance of access requests.
Trustworthy Computing Initiative
Goals
Focused on security, privacy, reliability, and business integrity.
Framework developed to ensure products are secure by design, default, and deployment.
Secure by Design Requirements
Build a secure architecture with security features.
Reduce vulnerabilities in code.
Ongoing protection post-deployment.
International Standards for Operating System Security
Common Criteria
Established to standardize information security evaluation.
Provides objective measures for assessing the security of IT products and systems.
Structure of Common Criteria
Part 1: Introduction.
Part 2: Security functional requirements.
Part 3: Security assurance requirements.
Protection Profiles and Security Targets
Defines standard security requirements for product types.
Ensures thorough documentation of product implementation and security threats.
Challenges of Common Criteria
Administrative overhead and expense leading to labor-intensive certification.
Required knowledgeable analysts and limited testing laboratories.
Extended timelines to establish evaluation labs.