L2 - Securicy Policies Flashcards
What is a security policy
It is a (set of) document(s) in which an organization’s - philosophy - strategy - practices with regard to - confidentiality, - integrity, and - availability of information systems are laid out
What is Discretionary Access Control (DAC)?
Each data object is owned by a user and user can decide freely which other users are allowed to access data object Many operating systems follow this line
What is Mandatory Access Control (MAC)?
Access is controlled by a system-wide policy with no say by the users Military systems often use this kind of control
What Access Control Groupings exist in UNIX/Linux system?
self: owner of a file group: a group of users sharing common access other: everyone else
What is an Access Control Matrix?
- specifies permissions on an abstract level
- limits the damage that certain subjects can cause
- This is organized in a matrix: subjects are in the rows,
objects in the columns, and the rights in the cells
How does the Bell-La Padula Model work?
- every document (or information object) has a security classification
- The more sensitive the information, the higher the classification level
- Examples for typical levels are: top secret (ts), secret (s), confidential (c), and unclassified (uc)
- Every user of the system has a clearance (level)
- Classification and clearance levels are not decided by the users, some certified entity has to do this
- To be able to access a document, a user must have at least the level of the document
What is write-down?
more highly classified information is passed to a lower classified object
What are the two ‘properties’ enforced by Bell-La Padula?
- Simple Security Property
- a subject at a given security level may not read an object at a higher security level
- The * (star) Property
- states that a subject at a given security level may not write to any object at a lower security level
- The Discretionary Security Property
* states that use of an access matrix to specify the discretionary access control.
What is the difference between the Bell-La Padula and Clark-Wilson Integrity Model?
BLP protects data against unauthorized users The Clark-Wilson (CW) integrity model also tries to protect data against authorized users
What are two especially important mechanisms in Clark-Wilson Integrity Model?
1) Well-formed transaction: user is constrained in the way they can manipulate data, e.g. record a log of changes, double entry bookkeeping 2) Separation of duty: executing different subparts of a task by different persons, e.g. authorizing purchase order, recording arrival, recording arrival of invoice, authorizing payment
What are Constrained Data Items (CDIs) within the Clark-Wilson Integrity Model?
These are data items for which integrity has to be upheld Not all data items need to be CDIs, other data items are called Unconstrained Data Items (UDIs)
What two main classes of procedures exist in the Clark-Wilson Integrity Model?
1) Integrity Verification Procedures (IVPs) 2) Transformation Procedures (TPs)
What are Integrity Verification Procedures (IVPs) within the Clark-Wilson Integrity Model?
IVPs check that all CDIs in the system conform to integrity constraints On successful completion this confirms that at the time of running an IVP, the integrity constraints were satisfied Example for accounting: Audit functions are typical IVPs For example, an auditor confirms that the books are balanced and reconciled
What are transformation Procedures (TPs) within the Clark-Wilson Integrity Model?
TPs correspond to the concept of a well-formed transaction Applying a TP to a CDI in a valid state will result in a CDI that is still in a valid state Example for accounting: A double entry transaction is a TP
Which two important parts ensure integrity in the CW model?
- Enforcement (which is done by a system)
- Certification (which is done by a human)