Domain 3, Security architectures, designs, solution elements Flashcards
Modes of Operation (security)
Way of an operating system to work at certiain levels of security.
Dedicated Mode
System contains objects of only one classification label. All subs must have clearance at least as high as the object
System High mode
contains mixed object levels. All subs must have clearance equal to the highest object classification.
Compartmented mode
Ass subs have necessary clearance, but also are required to get formal access approval. Need to know. Compartmented information better allows for need to know access.
Multilevel mode
Contains mixed object classes. The Reference Monitor controlls access between subjects and objects. Ensures subjects can only access info at their level.
Orange book
TCSEC, first security standard. Most concepts still in use today.
TCSEC
Trusted Comp System Evaluation Criteria
Orange Book - Divisions
D- lowest
C
B
A - highest
Classes
i.e. C1, C2, A1, A2. Higher is more secure
TNI/Red book
Trusted Network INterpretation. Uses orange book concepts to apply to networks.
ITSEC
Information tech security evaluation criteria
ITSEC
first successful internation eval model
ITSEC Assurance ratings
E0 - E6
ITSEC Functionality rating
F-C1, F-c2, F-b1, F-b2, F-b3
International Common Criterai
replaces ITSEC and TCSEC. Designed to evaluate commercial and govt systems.
Common Criteria ToE
Target of evaluation. System or product being evaluated
Common Criteria ST
Security Target. Documentation that describes the ToE, including sec requirements and operational env.
Protective Profile
unique set of sec. reqs for a specific category of products (i.e. firewall, end user pc, intrusion detect.)
Eval Assurance Levvel
EAL = score of the tested product or system
EAL Levels
EAL1 through EAL7
EAL1
Functionally tested
EAL2
Structurally tested
EAL3
Methodically tested and checked
EAL4
methodically designed, tested, and and checked
EAL5
semi formally designed and tested
EAL6
semi formally verified, designed, and tested
EAL7
Formally verified, designed, and tested.
Layering
separates hardware and software functionality into tiers
Example sec. architecture layers
- Hardware
- Kernel and drivers
- OS
- Apps
Abstraction
Hides unnecessary details from the user.
Sec. domains
list of objects a subject is allowed to access. Erros between domains don’t affect each other.
Kernel Mode
sec. domain. where the kernel lives. allows low level access to memory, cpu, disk, etc.
User mode
sec. domain where users live.
Ring model
CPU Hardware layering that separates and protects domains.
Rings in the ring model
0 - kernel
1 - OS components not fitting in ring 0
2 - Device drivers
3 - User apps
System Call
Method for a process to communicate between rings.
Hypervisor ring
HV lives in ring 0
Open and closed systems
Open - windows, linux
Closed - MAC-OS
Sec Hardware Architecture
Focuses on applying CIA to physical components of a computer.
System Unit
Computer case