slide

advertisement
Security Policies
Reading

For this class:
– Information Security Policy - A Development Guide for
Large and Small Companies,
http://www.sans.org/reading_room/whitepapers/policyissues
/information-security-policy-development-guide-largesmall-companies_1331
– S. De Capitani di Vimercati, P. Samarati, S. Jajodia:
Policies, Models, and Languages for Access Control,
http://seclab.dti.unimi.it/Papers/2005-DNIS.pdf

Look at the Information Security Program - USC,
http://uts.sc.edu/itsecurity/program/index.shtml
Information Warfare - Farkas
2
Why Do We Need Security
Policies?

Basic Purpose of Policy
 Policy and Legislative Compliance
 Policies as Catalysts for Change
 Policies Must be Workable
Information Warfare - Farkas
3
Purpose

Protect people and information
 Set the rules for expected behaviour by users, system
administrators, management, and security personnel
 Authorize security personnel to monitor, probe, and
investigate
 Define and authorize the consequences of violation1
 Define the company consensus baseline stance on security
 Help minimize risk
 Help track compliance with regulations and legislation
Information Warfare - Farkas
4
Legislative Compliance
Showing what the company’s stance
 Common legislations: HIPAA (Health
Insurance Accountability and Portability
Act), GLB (Gramm-Leach-Bliley Act) and
Sarbanes Oxley, Family Educational Rights
and Privacy Act (FERPA)
 Mapping policy statements to legislative
requirements

Information Warfare - Farkas
5
Catalysts for Change

Drive forward new company initiatives
 Move towards better security and general
practices
 Must be read and known by everyone
Information Warfare - Farkas
6
Must be Workable

Security policy is useful, useable, realistic
 Fits the company’s existing policy
 Involve and get buy-in from major players
Information Warfare - Farkas
7
Who Will Use the Policy?

Audience groups
– Management
– Technical staff
– End users

Audience and policy content
– Include relevant information only
– Multiple ways of using the policy
Information Warfare - Farkas
8
Policy Type

Policy Hierarchy
 Governing Policy (single document)
 Technical Policies (multiple documents)
 Job Aids / Guidelines (support to apply
technical policies)
Information Warfare - Farkas
9
Policy Development

Development Process Maturity
 Top-Down Versus Bottom-Up
 Current Practice Versus Preferred Future
 Consider All Threat Types

Policy Development Life Cycle
Information Warfare - Farkas
10
Governing Policy

Cover information security concepts at a
high level
– Define, describe, explain

Mainly for managers and end users
 Aligned with existing and future
organizational requirements
 Supported by the technical policies
Information Warfare - Farkas
11
Technical Policies

Used by technical custodians carrying out
technical responsibilities
 More detailed than the governing policy
 System and issue specific
 Describe what must be done NOT how to
do it
 Address: what, who, when, where to secure
Information Warfare - Farkas
12
Job Aid/Guidelines

Procedural, step-by-step directions
 Addresses: How?
 Support particular technical policies
 Not required for all policies
Information Warfare - Farkas
13
Prioritizing Policy Topics

Legally obliged to protect
 Critical decision-making by your organization
or your customers
 Supports organizational goals
Information Warfare - Farkas
14
Governing Policy Outline

Appendix 1
 http://www.sans.org/readingroom/whitepapers/policyissues/informationsecurity-policy-development-guide-largesmall-companies-1331?show=informationsecurity-policy-development-guide-largesmall-companies-1331&cat=policyissues
Information Warfare - Farkas
15
Technical Policy Outline

Appendix 2
 http://www.sans.org/readingroom/whitepapers/policyissues/informationsecurity-policy-development-guide-largesmall-companies-1331?show=informationsecurity-policy-development-guide-largesmall-companies-1331&cat=policyissues
Information Warfare - Farkas
16
Policy Development Team


Primary Involvement
– Information Security Team
– Technical Writer(s)
Secondary Involvement
– Technical Personnel
– Legal Counsel
– Human Resources
– Audit and Compliance
– User Groups
Information Warfare - Farkas
17
Security Policy Research
Information Warfare - Farkas
18
Policy, Model,
Mechanism

Policy: High-level rules (governing policy)
 Model: formal representation – proof of
properties (governing policy)
 Mechanism: low-level specifications
(technical policy)
Separation of policy from the implementation!
Information Warfare - Farkas
19
System Architecture
and Policy

Simple monolithic system
 Distributed homogeneous system
under centralized control
 Distributed autonomous systems
homogeneous domain
 Distributed heterogeneous system
Information Warfare - Farkas
Complexity
Of
Policy
20
Traditional Access
Control

Protection objects: system resources for which
protection is desirable
– Memory, file, directory, hardware resource, software
resources, etc.

Subjects: active entities requesting accesses to
resources
– User, owner, program, etc.

Access mode: type of access
– Read, write, execute
Information Warfare - Farkas
21
Access Control Models

See CSCE 522 for details
 Been around for a while:
– Discretionary Access Control
– Mandatory Access Control
– Role-Based Access Control

Relatively new:
– Usage-Based Access Control
– Capabilities-Based Access Control
Information Warfare - Farkas
22
Closed vs. Open Systems
Closed system
Open System
(minimum privilege)
(maximum privilege)
Access req.
Access req.
Exists Rule?
yes
Access
permitted
Allowed
accesses
Exists Rule?
no
Access
denied
no
Access
permitted
Information Warfare - Farkas
Disallowed
accesses
yes
Access
denied
23
Negative Authorization

Traditional systems: Mutual exclusion
 New systems: combined use of positive and
negative authorizations
– Support exceptions
– Problems: How to deal with
Incompleteness – Default policy
 Inconsistencies – Conflict resolution

Information Warfare - Farkas
24
Negative Authorization
What is the effect of adding new access
control rules to the policy?
• Positive authorizations only
• Negative and positive authorizations
Information Warfare - Farkas
25
What is the effect of adding new access
control rules to the policy?

Positive authorizations only
– (John, +read, 727-materials) , (John, +write, 727-exams)
– Add: (John, +write, 727-final)

–
Negative and positive authorizations
(John, +read, 727-materials) , (John, +write, 727-exams)
–
Add: (John, -write, 727-midterm)
Information Warfare - Farkas
26
Conflict Resolution








Denial takes precedence
Most specific takes precedence
Most specific along a path takes precedence
Priority-based
Positional
Grantor and Time-dependent
Single strategy vs. combination of strategies
Any new suggestions???
Information Warfare - Farkas
27
Policy Specification
Language

Express policy concepts
 Required properties of policy languages:
– Support access control, delegation, and obligation
– Provide structuring constructs to handle large systems
– Support composite policies
– Must be able to analyze policies for conflicts and
inconsistencies
– Extensible
– Comprehensible and easy to use
Information Warfare - Farkas
28
What are the trade offs between the
authorization language requirements?
Information Warfare - Farkas
29
Policy Specification
Language Approaches

Logic-based approach
–
–
–

Graphical approach
–
–
–

Adv: supports visual understanding
Disadv: Scope is limited
E.g., Hoagland et al., Security Policy Specification using a Graphical Approach, 1998
Event-Based language
–
–
–

Adv: Precise and expressive
Disadv: not intuitive, difficulty and complexity of implementation
e.g., Jojodia et al., A logical language for expressing authorizations, 1997
Adv: clear semantics and architecture
Disadv: limited scope
E.g.,Lobo et al., A Policy Description Language, 1999
Object-Oriented, declarative language
–
–
–
Adv: clear semantics, expressiveness, easy to use
Disadv: support of domain specific semantics
E.g., Damianou et al., The Ponder Policy Specification Language, 2000
Information Warfare - Farkas
30
Provisions and
Obligations

Yes/no response to every request is just not
enough
 Provisions: Conditions to be satisfied before
permission is considered
 Obligations: Conditions to be fulfilled as a
consequence of accesses
Author: D. Wijesekera
Information Warfare - Farkas
31
Delegation Policies

Supports temporary transfer of access rights
 Must be tightly controlled by security
policy
 Always associated with authorization policy
 Not intended for security administrators
 Constraints!
 New area: delegation of obligations
Information Warfare - Farkas
32
Policy Development

Policy maker:
– Start with high-level policies
– Refine high-level policies to low-level policy
specification



determine resources required to satisfy the policy
translate high-level policies into enforceable
versions
support analysis that verifies that lower level
policies actually meet the needs of higher level ones.
Information Warfare - Farkas
33
Policy Refinement
“If there exists a set of policies Prs: P1, P2 ..
Pn, such that the enforcement of a
combination of these policies results in a
system behaving in an identical manner to a
system that is enforcing some base policy
Pb, it can be said that Prs is a refinement of
Pb. The set of policies Prs: P1, P2 .. Pn is
called the refined policy set.” (Bandra)
Modified from slides of A. K Bandara
Information Warfare - Farkas
34
Policy Refinement
Properties

A policy refinement is complete iff:
– Correct: there is a subset of the refined policy set such
that a conjunction of the subset is also a refinement of
the base policy
– Consistent: there are no conflicts between any of the
policies in the refined policy set
– Minimal: if removing any policy from the refined
policy set causes the refinement to be incorrect
Modified from slides of A. K Bandara
Information Warfare - Farkas
35
Policies for Integrated,
Heterogeneous Systems

Providing Security and Interoperation of
Heterogeneous Systems” by S. Dawson, S. Qian,
and P. Samarati; in Distributed and Parallel
Databases, vol. 8, no 1, January 2000
(http://homes.dsi.unimi.it/~samarati)
Demand for information sharing

–
–
–
Heterogeneous systems
Local access control
Need interoperation
Information Warfare - Farkas
36
Automated Policy Translation Architecture
Security
Policy
1
Security
Policy
2
Security
Policy
n
Automated Translation Modules
ACL
ATM
BLP
ATM
Other
ATM
Unified Security Policy in ASL
Information Warfare - Farkas
37
Federated Databases
•
•
•
•
Set of autonomous and (possibly) heterogeneous
databases participating together
• Loosely coupled
• Tightly coupled
Logical data storage
Federated schema, data model, and federated users
Access control
• Full authorization autonomy
• Medium authorization autonomy
• Low authorization autonomy
Information Warfare - Farkas
38
Mediation-based Databases
• Mediator provides controlled accesses to
local databases (resources)
• No need for federated schema and multidatabase language
Information Warfare - Farkas
39
Need
– Transparent access
– Autonomy
– Security
Information Warfare - Farkas
40
Mediation-based
Interoperation

Architecture
 Security policy specifications
– Application and source security lattices
– Correctness of specifications: consistency, non-
ambiguity, non-redundancy

Access control
– Mediator: accesses on virtual relation – limiting the
number of applicable rules
– Local sources: on local data (labeled) and translated
application user label
Information Warfare - Farkas
41
Next Class

Insider’s threat
Information Warfare - Farkas
42
Download