domain 6 security architecture and models. 9-8-992 domain objective the objective of this domain is...

35
Domain 6 Security Architecture and Models

Upload: hortense-julia-thomas

Post on 20-Jan-2016

225 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

Domain 6

Security Architecture and Models

Page 2: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 2

Domain Objective

The objective of this domain is to understand:• security models in terms of confidentiality, integrity,

availability, operations, and government versus commercial requirements

• system models and the different industry standards that apply to them

• the technical platforms that security operates on in

terms of hardware, firmware, and software

Page 3: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 3

Availability

ConfidentialityIntegrity

A-I-C Triad

Page 4: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 4

Domain Summary

The information for this domain represents 10% of the CISSP exam content. This domain contains information on security architecture concepts, principles, structures, and standards. Computer and network organizations that work with the security architecture. Also, architecture along with some of the common security issues pertaining to security models and system application.

Page 5: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

Information Technology

Technical Platforms

Page 6: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 6

Operating System Utilities and Software

Application Programs

Utilities

Operating System

Computer Hardware

Page 7: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 7

Computer Hardware(SRV Theory 601.1)

• Central Processing Unit (CPU) – the control unit, arithmetic and logic unit, and primary storage unit- Supervisor state – program can access entire system - Problem state – only non-privileged instructions executed

• Memory Types- real – main storage area in virtual computer memory, real

and main storage are identical - virtual – storage space on a computer used as addressable

memory - random memory – all of the computer’s primary working

memory

Page 8: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 8

Computer Hardware(SRV Theory 601.1)

• Bus - the internal connection inside the computer between devices, power, and internal circuit boards

• Channels - the path which data can be sent between main memory and a peripheral device

• Storage - computer memory, disks, or tapes used for holding data during processing

Page 9: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 9

Page 10: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 10

Computer Software(SRV Theory 601.2)

Operating System Software four components:• process management - controls program execution to

make sure that programs share resources• I/O device management - issues commands to

devices that read and write to the system • memory management - keeps track of which parts of

memory are in use or not in use• system file management - read, write, erase functions

that the operating system uses to manage files

Page 11: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 11

System Recovery(SRV Theory 601.3)

There are three general operating system failure recovery actions:

• system reboot - system is shutdown in a controlled manner and is restarted to free up resources

• emergency system restart - system is locked and is unresponsive; a system maintenance mode is started and system is recovered with a restart

• system cold start - system is locked and will not restart; physical intervention is needed to reset system and load system from bootstrap

Page 12: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

Information Security Architecture

Framework and Concepts

Page 13: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 13

IT Architecture(SRV Theory 602.2)

Information Technology (IT) architecture is an integrated framework for managing IT goals and business

• Logical architecture - provides high-level description of a company’s functional requirements for information and system processing

• Technical architecture - defines specific IT standards and rules that are physically used to implement the logical architecture

Page 14: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 14

Security System Architecture

• Execution domain – OS system area protected from both deliberate tampering and inadvertent modification

• Enforcement of least privilege:- processes have no more privilege than needed to perform

functions- only modules needing complete system privileges are

located in kernel- other modules call on more privileged routines only as

needed and as long as needed

Page 15: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 15

Security System Architecture

• Protection mechanisms:- layering – processes constructed in layers where each layer

deals with specific activity- abstraction – establishment of specific set of permissible

values and operations- data hiding – layer in one hierarchy has no access to data in

another layer

• Process isolation – ensures multiple processes run concurrently without conflicting with each other

• Resource access control - process of limiting access to resources of a system

Page 16: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 16

Security System Architecture

• Token – a specific privilege or capability conferred based on authentication from an electronically coded device (SRV Theory 602.2)

• Capability – a defined representation (i.e. token) of the resource and access rights to a resource (SRV Theory 602.2)

• Security labels - a designation assigned to a resource used to identify a security purpose (SRV Theory 602.2)

Page 17: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 17

Open and Closed Systems(SRV Theory 602.4)

• Open system - is not a secure system- system employing standard user interfaces- user provided with access to total system capability- system open to spiteful acts- most computer systems operate in a open environment

• Closed system - is a secure system - system without standard user interfaces- user limited to single proprietary language or application- Lacks interoperability with other vendor systems

Page 18: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 18

Objects and Subjects(SRV Theory 602.10)

Important concepts to remember for this domain:

• Object - a passive entity that contains or receives information– can be hardware, software, and well as system processes

• Subject - is an active entity that causes information to flow among objects– can be a person, process, or device

Page 19: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 19

Access Controls(SRV Theory 602.5)

• Mandatory - restrict access to objects based on sensitivity of information and subject’s authorization– mandatory access is usually controlled through security

labels– a subject cannot delegate their access to another

• Discretionary - restrict access to objects based on subject’s identity and need-to-know– a subject can delegate their access to another– system has the ability to control information on an individual

basis

Page 20: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 20

Reference Monitor(SRV Theory 602.11)

• Reference monitor – conceptual access control device that mediates all accesses to objects by subjects; a kernel– security kernel – the hardware, firmware, and software elements of a

trusted computing base that implement the reference monitor concept– Trusted Computing Base (TCB) – all protection mechanisms within a

computer system used for enforcing a security policy

• Security perimeter - a boundary in which a reference monitor operates- the security kernel as well as other security related system functions, are

within the (imaginary) boundary of the TCB - system elements outside the security perimeter need not be trusted

• (SRV Theory 602.1)

Page 21: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 21

Architectural Foundation(SRV Theory 602.1)

• Elements of computer trustworthiness– trusted computing base– enforcement of security policy– domain separation

• domain is the set of objects that a subject can access

• separation is the mechanism that protects objects in the system

– defined subset - only TCB controlled subjects can access all objects

– resource isolation - the containment of subjects and objects to assure TCB control is maintained

Page 22: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 22

Architectural Foundation(SRV Theory 602.1)

• Elements of computer trustworthiness (continued)

– hardware isolation – TCB separated from untrusted parts of the system

– software isolation – containment of subjects and objects to an application

– software meditation – control of subject access to system resources

Page 23: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 23

Modes of Operation(SRV Theory 602.14)

Operation modes are the conditions a computer security system functions based on authorization and data sensitivity:

• Dedicated security mode - all users have access to all data• System high mode – all personnel have passed clearance and

formal access approval but not necessarily the need-to-know for all data

• Partitioned (compartmented) mode – each user with access needs must meet security criteria for area

• Multilevel secure (MLS) mode – not all personnel have the same clearance or formal access approval, individuals have the multiple levels of clearance to information

Page 24: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 24

Certification and Accreditation (SRV Theory 602.3)

Certification and accreditation – are a set of procedures and judgements regarding suitability of a system to securely operate in its intended environment

• Certification - technical evaluation of system security features for the purpose of accreditation – ideally it is an ongoing set of validation processes

– should be reviewed whenever a major change occurs

• Accreditation - official management decision to operate the system- approval of given operational concept and environment

- risks formally accepted

Page 25: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

Information Security Structures

Standards and Models

Page 26: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 26

IETF Security Architecture (SRV Theory 602.6)

IP security architecture (IPSEC) RFC 2401- IP security is designed to provide interoperable, high-quality, cryptographical based security for IP v4 and v6- Not developed as an overall Internet security architecture- Addresses security at the Internet protocol layer – gateway

and firewall systems- Critically dependent on security of environment

- operating system security

- system management

- random number sources

- system time variations

Page 27: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 27

IETF Security Architecture(SRV Theory 602.6)

IPSEC protocols for communications security:• IP Authentication Header (AH)

- provides connectionless integrity, data origin authentication, and an optional anti-replay service

• Encapsulating Security Payload (ESP)- provides confidentiality (encryption) and limited traffic flow

confidentiality- may provide connectionless integrity, data origin

authentication, and anti-replay service

Page 28: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 28

Security Association (SA)

• All IPSEC implementations must support a security association

• Simplex - (one-way) connection that affords security services to the IP traffic carried by it

• Security services are afforded by the use of AH or ESP protocol but not both

• A security association is uniquely identified by a triple relationship- security parameter index (SPI), an IP destination address,

and a security protocol (AH or ESP)

Page 29: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 29

Security Association (SA)

• Security associations may be combined in 2 ways- transport adjacency – applying more than one security

protocol to the same IP datagram, without invoking tunneling- allows for only one level of combination

- processing is performed at one IPSec instance

- iterated tunneling – application of multiple layers of security protocols

- allows for multiple levels of security protocol nesting

- each tunnel can originate or terminate at a different IPSec site along the transmission path

Page 30: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 30

ITSEC Standard(SRV Theory 602.7)

Information Technology Security Evaluation Criteria (ITSEC) - European standard for IT security criteria

• Scope - addresses three basic threats, has three functional levels, eight basic security functions, ten functionality classes, eight hierarchical assurance levels, and seven levels of correctness of security mechanisms– IT product - off-the-shelf hardware or software package – IT system - designed and built product for specific needs– criteria is not a design guide for secure products or systems

– Target of Evaluation (TOE) - refers to product or system to be evaluated

– closely maps to Orange book criteria

Page 31: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 31

TCSEC Standard(SRV Theory 602.8)

Trusted Computer System Evaluation Criteria (TCSEC) - US DoD standard for security criteria (Orange book)

• Scope - six fundamental security requirements and four evaluation criteria divisions– standard has been superseded, no longer in use– Classes:

• D - minimal protection, has only one class • C - discretionary protection, has two classes• B - mandatory protection, has three classes• A - verified protection, has only one class

Page 32: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 32

Security Models(SRV Theory 602.12)

• Bell – LaPadula - information flow security model

- abstract formal treatment of DoD security policy- uses mathematics and set theory to define

concept of secure state- explicitly defines fundamental modes of access

(read, write)- rules for controlling subjects access to objects- information will not flow to an object of lesser

classification

Page 33: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 33

Security Models(SRV Theory 602.12)

• Biba - integrity model in which no subject may depend on a less trusted object, including another subject

- first to address integrity in computer systems- based on hierarchical lattice of integrity levels- elements

- set of subjects (active, information processing)- set of objects (passive, information repository)- addresses first goal of integrity – prevent unauthorized

users from making modifications- mathematical dual confidentiality policy

Page 34: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 34

Security Models(SRV Theory 602.12)

• Clark & Wilson - data integrity model for common commercial activities- addresses all 3 integrity goals

- preventing unauthorized users from making modifications

- maintaining internal and external consistency

- preventing authorized from making improper modifications

- well-formed transaction- preserve/ensure internal consistency

- user can manipulate data only in ways that ensure internal consistency

Page 35: Domain 6 Security Architecture and Models. 9-8-992 Domain Objective The objective of this domain is to understand: security models in terms of confidentiality,

9-8-99 35

Common Flaws(SRV Theory 603)

Security flaws within system architectures and designs:• Covert channels - a valid communication path

misused by a subject to cover an unauthorized transfer of information

• Asynchronous attacks - an attack that exploits the interval between a defensive act and a normal operation in order to gain operational control– TOCTOU - Time of check vs. time of use – a class of

asynchronous attack