Security Architecture and Design Flashcards
Security Model Concepts
Confidentiality
Integrity
Availability
Defense in depth
System Architecture
Process of describing, representing components that make up the planned system and interrelationships between components.
Answer questions like:
what is the purpose of system?
who will use it?
what environment will it operate in?
System Architecture Steps
- System Design Phase - gather system requirements, and manner in which requirements will be met
- Development Phase - HW, SW components assigned for development
- Maintenance Phase - System and Security architecture are evaluated to ensure system operates properly and security is maintained
ISO / IEC 42010:2011 Terminology
Architecture
Describes organization of system including its components and their interrelationships along with principles that guide its design and evolution
ISO / IEC 42010:2011 Terminology
AD - Architectural Description
Set of documents that convey the architecture in a formal manner
ISO / IEC 42010:2011 Terminology
Stakeholder
Individuals, teams, departments including groups outside organization with interests or concerns to consider
ISO / IEC 42010:2011 Terminology
View
Representation of the system from the perspective of a stakeholder or set of stakeholders
ISO / IEC 42010:2011 Terminology
Viewpoint
Template used to develop individual views that establish the audience, techniques and assumptions made
Computing Platforms
Mainframe / Thin Clients
power is on mainframe, clients just used to access it
Computing Platforms
Distributed Systems (Client / Server)
devices have client software that interact with server software
Computing Platforms
Middleware
software that talks between two different systems
ex. Users connect to software that provides interface which accesses databases
Computing Platforms
Embedded Systems
Platform in another system.
System within a system
Embedded in hardware or software
Computing Platforms
Mobile Computing
software running on tablets, phones, etc
Virtual Computing and Security Services
Running multiple instances of operating system on a single server
Security Services
Boundary Control
Placing components in security zones and maintaining boundary control among them
Security Services
Access Control Services
Gives users only the access required to do their jobs
Security Services
Integrity Services
Ensures data moving through OS or application can be verified as not damaged or corrupted
Security Services
Cryptography Services
Encrypting information in transit
Security Services
Auditing and Monitoring Services
Method of tracking the activities of users and of the operations of the system processes
System Components
CPU
Executes all instructions in the code
Multiprocessing allows executing multiple instructions in parallel
CPUs have their own memory
Can work in user mode (user or app) or privileged mode (for operating system)
If instruction for CPU is marked to be performed in privileged mode, it must be a trusted OS Process and is given functionality not available in user mode
System Components
RAM
Desktop SDRAM - Synchronous Dynamic RAM DDR SDRAM - Double Data Rate SDRAM DDR 2 SDRAM - Double Data Rate 2 SDRAM DDR 3 SDRAM - Double Data Rate 3 SDRAM
Laptop
SODIMM - Small Outline DIMM
System Components
ROM
Flash Memory - electronically programmable ROM
PLD - Programmable Logic Device, integrated circuit with internal logic gates that can be changed programmatically
FPGA - Field Programmable Gate Array, a type of PLD programmed by blowing fuse connections on the chip, or using an antiques that makes connection when high voltage applied to junction
Firmware - type of ROM where a program or low-level instructions are installed
Memory Concepts
Associative Memory
Searches for specific data value in memory rather than by specific memory address
Memory Concepts
Implied Addressing
Refers to registers usually contained inside the CPU
Memory Concepts
Absolute Addressing
Addresses the entire primary memory space. CPU uses the physical memory addresses that are called absolute addresses
Memory Concepts
Cache
Small amount of high-speed RAM that holds the instructions and data from primary memory and that has high probability of being accessed during currently executed portion of a program
Memory Concepts
Indirect Addressing
The address location specified in the program instruction contains the address of the final desired location
Memory Concepts
Logical Address
Address at which a memory cell or storage element appears to reside from the perspective of an executing program
Memory Concepts
Relative Address
Specifies its locations by indicating its distance from another address
Memory Concepts
Virtual memory
Location on hard drive used for temporary storage when memory space is low
Memory Concepts
Memory Leak
Occurs when computer program incorrectly manages memory allocations which can exhaust available system memory as an application runs
Rings of privilege
0, 1, 2, 3, 4
Ring 0 - Most privileged Ring 1 Ring 2 Ring 3 Ring 4 - least privileged etc
Multitasking Types
Symmetric, Asymmetric
Symmetric Multitasking
Two processes divide the same work
Asymmetric Multitasking
One processor is dedicated to the OS, other(s) dedicated to user operations
System Security Architecture
Views components that comprise a system from a security perspective
Should be derived from the organization security policy
System-specific policy must be more detailed. It addresses level security required on a device, OS or application
Trusted Computer System Evaluation Criteria
(Orange Book Concepts)
TCB - Trusted Computer Base
Composed of components (HW, firmware, SW) that are trusted to enforce the security policy of the system
Security Perimeter - dividing line between trusted parts of system and untrusted parts
Reference Monitor - any system component that enforces access controls on an object
Security Kernel - The HW, firmware, SW elements of a TCB that implements the reference monitor concept
Security Architecture Frameworks
Zachman Framework
2D model that intersects communication interrogatives (what, why, where, etc) with viewpoints like planner, owner, designer, etc
Security Architecture Frameworks
SABSA - Sherwood Applied Business Security Architecture
Attempts to enhance communication process between stakeholders
Security Architecture Frameworks
ITIL - IT Infrastructure Library
Set of best practices which have become de facto standard for IT Service Management
TOGAF
The Open Group Architecture Framework
Calls for an ADM (architectural development method) that uses an iterative process which continuously monitors and updates individual requirements
Security Architecture Documentation
ISO / IEC 27000 Series
Establishes information security standards published jointly by the International Organization for Standardization (ISO) and the Electrotechnical Commission (IEC)
Security Architecture Documentation
CobiT
Control Objectives for Information and Related Technology
Derived from the COSO framework created by the Committee of Sponsoring Organizations of the Treadway Commission.
Deals with IT Governance
Security Models
State Machine Model
Examines every possible state that system could be in and ensures the system maintains proper security relationships between objects and subjects in each state
Security Models
Multilevel Lattice Models
Assigns each security subject a label defining upper and lower bounds of the subjects access to the system.
Applies controls to all objects by organizing them into levels or lattices
Security Models
Matrix-based models
Organizes tables of subjects and objects indicating what actions individual subjects can take upon individual objects, often implemented as a control matrix
Security Models
Non-Interference Models
Concerned with subject’s knowledge of the state of the system at a point in time.
Concentrates on preventing actions that take place at one level from altering state presented to another level
Security Models
Information Flow Models
Attempts to prevent flow of information from one entity to another that violates or negates the security policy
Security Models
Bell-LaPadula Model
Incorporates 3 basic rules regarding flow of information in a system
Simple Security Rule
A subject cannot read data located at higher security level than that possessed by the subject (aka no read up)
- Property Rule
A subject cannot write to a lower level than that possessed by the subject (aka no write down or confinement rule)
- Property Rule
Strong Star Property Rule
A subject can perform both read and write functions only at the same level possessed by the subject
Security Models
Bell-LaPadula Model Limitations
No provision for changing data access control. Only works well with access systems that are static in nature
Doesn’t address covert channels. Low-level subject can sometimes detect existence of a high-level object when it’s denied access. Sometimes it’s not enough to hide the content of an object, the existence may also need to be hidden
Main contribution at expense of other concepts is confidentiality
Security Models
Biba Model
Applies series of properties or axioms to guide protection of integrity
Integrity Axiom
A subject cannot write to a higher integrity level than that which he has access (no write up)
Simple Integrity Axiom
Subject cannot read to a lower integrity level than that which he has access (no read down)
Invocation Property
A subject cannot invoke (request service) of higher integrity
Security Models
Clark-Wilson Integrity Model
Describes series of elements used to control integrity of data
User - an active agent
TP (Transformation Procedure) - An abstract operation like read, write, modify implemented via programming
CDI (Constrained Data Item) - Item that can be manipulated only through a TP
UDI (Unconstrained Data Item) - An item that can be manipulated by a user via read and write operations
IVP (Integrity Verification Procedure) - A check of the consistency of data with the real world
Security Models
Clark-Wilson Integrity Model part 2
Enforces its elements by allowing data to be altered only through programs and not directly by users. Goals are separation of duties and well-formed transactions
Separation of duties - ensures certain operations require additional verification
Well-Formed Transaction - Ensures all values checked before and after transaction by carrying out particular operations to complete change of data from one state to another
Security Models
Lipner Model
Combines elements of Bell-LaPadula and Biba