Lecture 10 Notes Flashcards
reference monitor
part of the TCB that validates access to every resource prior to granting access requests
stands between each subject and object
may be a conceptual part of the TCB
security kernel
The collection of components in the TCB that work together to implement reference monitor functions
security perimeter
imaginary boundary that separates the TCB from the rest of the system
trusted paths
For the TCB to communicate with the rest of the system, it must create secure channels called, also called
TCSEC guidelines on trusted paths
B2 and higher systems
State Machine Model
The state machine model describes a system that is secure in every of its possible states, and it is based on the notion of Finite State Machine (FSM)
A state is a snapshot of a system at a specific moment in time
Next state and output are a function of current state and input
Information Flow Model
The information flow model focuses on the flow of information
Based on a state machine model
Designed to prevent unauthorized, insecure, or restricted information flow
Bell-LaPadula and Biba Model Type
Information Flow Model
Bell-LaPadula
preventing information from flowing from a high security level to a low security level
This is accomplished by blocking lower-classified subjects from accessing higher-classified objects
With these restrictions, the model is focused on maintaining the confidentiality of objects, but it does not address integrity and availability
Biba
preventing information from flowing from a low security level to a high security level
Noninterference Model
The noninterference model is loosely based on the information flow model
However, it is concerned with how the actions of a subject at a higher security level affect the system state or actions of a subject at a lower security level
The actions of a higher level subject A should not affect the actions of lower level subject B or even be noticed by B
composition theories
explain how outputs from one system relate to inputs to another system
Cascading
Input for one system comes from the output of another system
Feedback
One system provides input to another system, and vice versa
Hookup
One system sends input to another system and also to external entities
Take-Grant Model
The Take-Grant model employs a directed graph to dictate how rights can be passed
from one subject to another
from a subject to an object
Access Control Matrix
An access control matrix is a table of subjects and objects indicating the actions or functions that each subject can perform on each object
access control list (ACL)
An ACL is tied to the object: it lists valid actions each subject can perform
Each column of the matrix is an access control list (ACL)
capabilities list
A capability list is tied to the subject: it lists valid actions that can be taken on each object
From an administration perspective, using only capability lists for access control is a management nightmare
To remove access to a particular object, every user (subject) that has access to it must be individually manipulated
Each row of the matrix is a capabilities list
Properties of Bell-LaPadula State Machine
Focused on Confidentiality
The Simple Security Property states that a subject may not read information at a higher sensitivity level (no read up)
The * (star) Security Property states that a subject may not write information to an object at a lower sensitivity level (no write down)
This is also known as the confinement property
The Discretionary Security Property states that the system uses an access matrix to enforce discretionary access control (need-to-know)
Properties of Biba State machine
Focused on integrity
The Simple Integrity Property states that a subject cannot read an object at a lower integrity level (no read down)
The * (star) Integrity Property states that a subject cannot modify an object at a higher integrity level (no write up)
As with Bell-LaPadula, Biba requires that all subjects and objects have a classification label
Brewer and Nash Model
AKA Chinese Wall
Creates security domains that are sensitive to conflict of interest
Closed System
Designed to work with a narrow range of other systems, generally all from the same manufacturer
Standards for closed systems are often proprietary and not normally disclosed
In closed-source (or commercial) solutions source code and internal logic are hidden from the public
Open System
Designed using agreed-upon industry standards
Much easier to integrate with systems from different manufacturers
In open-source solutions source code and internal logic are exposed to the public
Confinement
Process confinement allows a process to read from and write to only certain memory locations and resources
Bounds
Each process that runs on a system is assigned an authority level (e.g., user and kernel)
Isolation
When a process is confined through enforcing access bounds, that process runs in isolation