a disciplined security specification for a high-assurance grid

26
1 A Disciplined Security Specification for a High-Assurance Grid by Ning Zhu, Jussipekka Leiwo, and Stephen John Turner Parallel Computing Centre Distributed Parallel and Distributed Computing Center, School of Computer Engineering, Nanyang Technological University, Singapore 639798

Upload: barbie

Post on 24-Jan-2016

40 views

Category:

Documents


0 download

DESCRIPTION

Parallel. Distributed. Computing Centre. A Disciplined Security Specification for a High-Assurance Grid. by Ning Zhu, Jussipekka Leiwo, and Stephen John Turner. Parallel and Distributed Computing Center, School of Computer Engineering , Nanyang Technological University , Singapore 639798. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Disciplined Security Specification for a High-Assurance Grid

1

A Disciplined Security Specification for a High-Assurance Grid

by

Ning Zhu, Jussipekka Leiwo, and Stephen John Turner

Parallel Computing Centre

Distributed Parallel and Distributed Computing Center,School of Computer Engineering,Nanyang Technological University,Singapore 639798

Page 2: A Disciplined Security Specification for a High-Assurance Grid

2

0. Outline

Introduction Background & Methodology A Common Criteria Compliant Generic

Security Framework for the Grid Security Environment and Objectives for the

Grid Security Requirements for the Grid Conclusions and Future Work

Page 3: A Disciplined Security Specification for a High-Assurance Grid

3

1. Introduction

Grid Computing Overview Grid is a hardware and software infrastructure that

provides dependable, consistent, pervasive and inexpensive access to heterogeneous high-end computing capabilities, knowledge bases and services.

It aims to provide flexible, secure, coordinated resource sharing and problem solving among dynamic distributed collections of individuals, institutions, and resources.

Security=Functionality + Assurance

Page 4: A Disciplined Security Specification for a High-Assurance Grid

4

1. Introduction

Problems of Current Grid Security Solutions GSI, UNICORE, CAS, PERMIS Inadequate functionality Non-systematic implementation without considering

security assurance

Our work A disciplined security specification toward a generic

security framework for the Grid Follow the generic framework to implement highly assured

trustworthy Grid security solution

Page 5: A Disciplined Security Specification for a High-Assurance Grid

5

2. Background & Methodology

Security Assurance Security can not be considered appropriate even if the

security techniques used are known to be theoretically highly resistant to attacks.

The extent of trustworthiness, the means of providing evidence of the appropriateness of security designs and for demonstrating that implementations meet the security objectives, must be considered.

Page 6: A Disciplined Security Specification for a High-Assurance Grid

6

2. Background & Methodology

Assurance Methods Assessment of the TOE (Target of Evaluation) directly Assessment of the processes to develop the TOE Assessment of the environment where the TOE is

developed

ISO/IEC 15408, the Common Criteria An internationally recognized standard for specifying and

evaluating security properties of IT products and systems Comparison with process assurance methods and

environment assurance methods

Page 7: A Disciplined Security Specification for a High-Assurance Grid

7

2. Background & Methodology

ClearingHouse Project A typical Grid platform providing a generic Grid-based

application execution and information sharing engine Resource management, automatic resource discovery, and

economy management of resources in a service-oriented environment are main issues addressed by ClearingHouse currently

Page 8: A Disciplined Security Specification for a High-Assurance Grid

8

3. A Common Criteria Compliant Generic Security Framework for the Grid

Systematically devised and highly assured based on the Common Criteria

Specific Grid security solutions are instantiated from the framework in a manner that preserves all dependencies between design artifacts and brings assurance that all relevant TOE and environmental elements are considered

Page 9: A Disciplined Security Specification for a High-Assurance Grid

9

4. Security Environment and Objectives for the Grid

Security environment: It describes the security aspects of the environment in which the TOE is intended to be used and the manner in which it is expected to be employed.

Security objectives: They reflect the stated intent to counter identified threats and/or comply with any organizational security policies and usage assumptions.

Page 10: A Disciplined Security Specification for a High-Assurance Grid

10

4.1 Security Environment for the Grid

Assets to be protected Subjects within the set of interactions occurring with

or within the TOE that causes operations to be performed

Assumptions that cannot be enforced by technical means to be met by the environment in order for the TOE to be considered secure

Organizational security policies Threats to security:

Page 11: A Disciplined Security Specification for a High-Assurance Grid

11

4.1 Security Environment for the Grid

T.Hack_Phys Attackers interact with the TOE to exploit vulnerabilities in the physicalenvironment.

T.RED_Insecure An attacker operates on AST.RED of the TOE without authorization.T.USD_Insecure Similar to T.RED_Insecure but on AST.USD.T.USD_Forgery An attacker forges valid user identity, role/attributes, and/or usage quota.T.JOD_Insecure Similar to T.RED_Insecure, but on AST.JOD.T.USD_JOD_Cheat An attacker forges a TOE interface to defraud the user of his useful

AST.USD and AST.JOD.T.INR_Misuse An attacker operates on the information resources without required

privileges.T.CPR_Misuse An attacker runs his programs on the computing resources without

authorization.T.INR_CPR_UnsecuredAn attacker personates one trusted by the TOE and contributes insecure,

potentially dangerous, and/or intrusive information/computing resource tothe Grid.

T.AUD_Insecure Attackers steal audit information of the TOE and even modify or delete thelog file.

Page 12: A Disciplined Security Specification for a High-Assurance Grid

12

4.2 Security Objectives for the Grid

Security objectives for the TOE:OT.Auth_TOE The TOE should enable the user to trust it as the true TOE he wants to

access.OT.AccessControl The TOE can only be used by properly authenticated and authorized users,

and the access control routine is non-bypassible.OT.RED_Secure Resource data should be protected and only operated by authorized TOE

users.OT.USD_Secure Sensitive user data is confidential and tamperproof, and has integrity in the

TOE.OT.JOD_Secure Job data can only be accessed by appropriately authorized users of the TOE.OT.INR_CPR_Secure The information/computing resource can only be operated by authorized

users.OT.INR_CPR_Trusted The TOE only contains trusted, secure, and available resources.OT.AUD_Secure Audit data of the TOE can only be read and utilized by an authorized user.OT.TOE_Secure The security and administrative mechanisms of the TOE are protected

securely.OT.Lifecycle_Security The TOE shall detect flaws during the initialization, personalization and

operational usage.

Page 13: A Disciplined Security Specification for a High-Assurance Grid

13

4.2 Security Objectives for the Grid

Security objectives for the IT-environment of the TOE Security objectives rationale

Demonstrating that the security objectives address all of the environmental aspects identified and the objectives are effective and provide complete coverage

Security environment to security objectives mapping for generating tracings:

Page 14: A Disciplined Security Specification for a High-Assurance Grid

14

4.2 Security Objectives for the GridThreats-Assumptions-Policies/Security Objectives

OT

.Auth_T

OE

OT

.AccessC

ontrol

OT

.RE

D_S

ecure

OT

.US

D_S

ecure

OT

.JOD

_Secure

OT

.INR

_CP

R_S

ecure

OT

.INR

_CP

R_T

rusted

OT

.AU

D_S

ecure

OT

.TO

E_S

ecure

OT

.Lifecycle_S

ecurity

OE

.SecureC

omm

OE

.US

D_P

rotect

OE

.StandardF

ormats

T.Hack_Phys X X X X XT.RED_Insecure X XT.USD_Insecure X XT.USD_Forgery X X X XT.JOD_Insecure X XT.USD_JOD_Cheat XT.INR_Misuse X XT.CPR_Misuse X XT.INR_CPR_Unsecured X X XT.AUD_Insecure X XA.SecureKey X XP.LocalSecureRe X XP.CredStandards X XP.HWSecurity X X

Page 15: A Disciplined Security Specification for a High-Assurance Grid

15

5. Security Requirements for the Grid

Security requirements are the refinement of the security objectives and if met, will ensure that the TOE can meet its security objectives.

Security functional requirements are levied on those functions of the TOE that are specifically in support of IT security and define the desired security behavior.

Security assurance requirements specify a minimum strength level consistent with the security objectives.

Page 16: A Disciplined Security Specification for a High-Assurance Grid

16

5.1 Security Functional Requirements for the Grid

A systematically drawn set of Grid security functional requirements conforming to the Common Criteria: FAU (Security Audit) FDP (User Data Protection) FIA (Identification and Authentication) FMT (Security Management) FPR (Privacy) FPT (Protection of the TSF) FTA (TOE Access)

Page 17: A Disciplined Security Specification for a High-Assurance Grid

17

5.1 Security Functional Requirements for the Grid

Each class consists of class introduction and functional families.

Functional components plus family behavior, component leveling, management requirements and audit requirements constitute a family specification.

Each component specification includes functional elements and the dependencies among functional components.

Page 18: A Disciplined Security Specification for a High-Assurance Grid

18

5.1 Security Functional Requirements for the Grid

A sample security functional requirement: User Data Protection: This class specifies requirements for

TOE security functions and TOE security function policies related to protecting user data. It includes six families: Access control policy (FDP_ACC), Access control functions (FDP_ACF), Data authentication (FDP_DAU), Import from outside TSF control (FDP_ITC), Residual information protection (FDP_RIP), and Stored data integrity (FDP_SDI).

FDP_ACC identifies the access control SFPs and defines the scope of control of the policies that form the identified access control portion of the TSP. This family has only one component FDP_ACC.1 Subset access control. No management activities or auditable events are foreseen.

Page 19: A Disciplined Security Specification for a High-Assurance Grid

19

5.1 Security Functional Requirements for the Grid

FDP_ACC.1 has only one element FDP_ACC.1.1: The TSF shall enforce the [assignment: access control SFP] on [assignment: list of subjects, objects, and operations among subjects and objects covered by the SFP]. It has the dependency on FDP_ACF.1 Security attribute based access control.

Page 20: A Disciplined Security Specification for a High-Assurance Grid

20

5.1 Security Functional Requirements for the Grid

We may make further operations on the security functional requirements including assignment, selection, refinement and iteration, to address different aspects of the security needs of the TOE in more detail.

Security requirements for the IT environment of the TOE can also be defined such as those for communication, cryptographic support, resource utilization and trusted path/channels.

Page 21: A Disciplined Security Specification for a High-Assurance Grid

21

5.2 Security Assurance Requirements for the Grid

Security assurance requirements are expressed as evaluation assurance levels (EALs).

EAL 2 - structurally tested, EAL 3 - methodically tested and checked, and EAL 4 - methodically designed, tested, and reviewed can be adopted as a basis to guide implementing and evaluating assurance of a Grid system/application.

Page 22: A Disciplined Security Specification for a High-Assurance Grid

22

5.3 Security Requirements Rationale

Demonstrating that the security requirements are suitable to meet and traceable to the IT security objectives

Mapping table can still be utilized to help express the rationale intuitively and clearly:

Page 23: A Disciplined Security Specification for a High-Assurance Grid

23

5.3 Security Requirements Rationale

SecurityFunctionalRequirements/SecurityObjectives

OT

.Auth_T

OE

OT

.AccessC

ontrol

OT

.RE

D_S

ecure

OT

.US

D_S

ecure

OT

.JOD

_Secure

OT

.INR

_CP

R_S

ecure

OT

.INR

_CP

R_T

rusted

OT

.AU

D_S

ecure

OT

.TO

E_S

ecure

OT

.Lifecycle_S

ecurity

… … … … … … … … … … …FDP_ACC X X X X X X X XFDP_ACF X X X X X X X X XFDP_DAU XFDP_ITC X XFDP_RIP X XFDP_SDI X

… … … … … … … … … … …

Page 24: A Disciplined Security Specification for a High-Assurance Grid

24

5.3 Security Requirements Rationale

Different subsets of the security functional requirements can be defined and tailored for different strengths of the security functionality.

Different original or augmented EALs can also be imposed to ensure the achievement of such different level security respectively.

Thus more flexible trustworthy Grid security solutions will be provided following the generic Grid security framework, to fulfill their specific security objectives correctly and effectively.

Page 25: A Disciplined Security Specification for a High-Assurance Grid

25

6. Conclusions and Future Work

A disciplined approach to specify and model security for the high-assurance Grids

A TOE summary specification to provide a high-level definition of the security functions and assurance measures

Accomplish a specific TOE implementation for Grid security

Page 26: A Disciplined Security Specification for a High-Assurance Grid

26

Thanks!