Operating System Security Model (Trusted Computing Base, TCB)
Set of rules or protocols governing security functionality.
Security begins at the network protocol level, extending up to OS operations.
Effective security protects the entire host, including all software and hardware.
Modern OS use a compartmentalized approach to enhance security.
Definition: Built around a compact kernel managing a common hardware level.
Key Advantages:
Smaller and easier to port across systems.
Supports a compartmentalized security strategy, which isolates damage potential.
If underlying protocols are insecure, the entire OS is at risk.
Main TCP/IP issues include:
Vulnerable to spoofing.
Vulnerable to session hijacking.
Predictable sequence guessing.
Lack of authentication and encryption.
Susceptible to SYN flooding.
Security Improvements with IPv6:
Incorporates IPSEC for enhanced security.
Includes authentication and encryption features.
Provides resilience against spoofing and safeguards for data integrity.
Ensures confidentiality and privacy for data exchanges.
An ACL defines the access rights each user possesses for objects like files or file directories.
Access is determined when the server receives a request based on predefined rules.
Entries: Each object has a security attribute identifying its ACL, with entries for each user’s access privileges.
Common Privileges:
Read access to files or directories.
Write access to files.
Execute permission for executable files.
Each object associates with an ACL containing access control entries (ACEs), listing user or group names and their access rights defined by an access mask.
An object's security descriptor can contain two ACLs:
Discretionary Access Control List (DACL): Identifies users/groups allowed or denied access.
System Access Control List (SACL): Controls access auditing.
Unix Systems: Also utilize access control based on user permissions and defined group roles.
Discretionary Access Control (DAC):
Users can assign access privileges.
Common in commercial and academic sectors; not suited for military.
Allows flexible access controls, suitable for individual users.
Mandatory Access Control (MAC):
Access control cannot be influenced by individual object owners and is strictly governed.
Provides stringent security suitable for secure environments where sensitive information management is critical.
Bell-LaPadula:
Prevents users from reading data above their security level; focuses on data classification.
Prevents writing to lower classification data.
Biba:
Focus on integrity rather than confidentiality; prevents unauthorized modifications.
Ensures that no lower integrity data can be modified by higher integrity users.
Clark-Wilson:
Defined to support well-formed transactions, ensuring steps are performed in specified order and authenticated.
Heavily influenced by the Bell-LaPadula model; aimed at classifying systems (levels A through D).
Three objectives in TCSEC development:
Provide assessment yardstick for users on trusted computer systems.
Guide manufacturers on building secure products.
Set a basis for specifying security requirements for software/hardware acquisitions.
D - Minimal Protection:
No security requirements; basic systems such as MS-DOS fall here.
C1 - Discretionary Protection:
Limited user access control; familiar user groups.
C2 - Controlled Access Protection:
Enhanced with auditing and more formal user roles and security.
B1 - Labeled Security Protection:
Mandatory security labeling and integrity checks on objects.
B2 - Structured Protection:
Advanced security model, tighter operational control.
B3 - Security Domains:
Comprehensive controls with mandated access and covert channel analysis.
A1 - Verified Design:
Highest certification demanding formal verification methods.
Security labels contain critical classification information related to files, processes, and devices.
Sensitivity labels establish classification levels with potential categories.
Integrity labels determine the reliability of data for users.
Developed in 1972 by a U.S. Air Force panel to address security issues in shared environments.
Acts as an access control point enforcing security policies.
Always active; immune to preemption.
Designed to be tamper-proof and lightweight.
Validates access permissions for processes against security descriptors for objects, ensuring compliance of access requests.
Focused on security, privacy, reliability, and business integrity.
Framework developed to ensure products are secure by design, default, and deployment.
Build a secure architecture with security features.
Reduce vulnerabilities in code.
Ongoing protection post-deployment.
Established to standardize information security evaluation.
Provides objective measures for assessing the security of IT products and systems.
Part 1: Introduction.
Part 2: Security functional requirements.
Part 3: Security assurance requirements.
Defines standard security requirements for product types.
Ensures thorough documentation of product implementation and security threats.
Administrative overhead and expense leading to labor-intensive certification.
Required knowledgeable analysts and limited testing laboratories.
Extended timelines to establish evaluation labs.