chapter 2 access control fundamentals. chapter overview protection systems mandatory protection...

15
Chapter 2 Access Control Fundamentals

Post on 21-Dec-2015

226 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Chapter 2

Access Control Fundamentals

Page 2: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Chapter Overview

• Protection Systems

• Mandatory Protection Systems

• Reference Monitors

• Definition of a Secure Operating System

• Assessment criteria to be used against each operating system.

Page 3: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Protection Systems

• Recall the concepts of subjects, objects and permissions from the previous chapter.

• The most complete description, at given point in time, of what is allowed within a given computer system is given by a function which tells us, for a given subject and object, what the subject may do with the object.

• The best way to represent this function is by means of a matrix called an access matrix.

Page 4: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

An access matrix

Page 5: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

So, what is a protection system?

• Informally, a protection system is a description of what is allowed in a computer system, together with a set of rules that allow us to modify a description.

• Formally:

– A protection system consists of a protection state, and a set of protection state operations which enable modifications to that state.

Page 6: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

More Formal Definitions:

• An access matrix consists of a set of subjects S a set of objects O a set of operations OP and a function ops(s,o) OP⊂ , which determines the operations that subject s can perform on object o.

• A protection domain specifies the set of resources (objects) that a process can access and the operations that a process may use to access such resources.

Page 7: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Alternate representations for the access matrix

• Instead of storing the whole matrix, which is usually occupied mostly by empty permissions, other representations are often used:

– Each object with its associated column, called its access control list or ACL.

– By rows, with each subject: called a capability list or C-List

Page 8: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Mandatory Protection Systems

Page 9: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Mandatory Protection Systems

• A mandatory protection system is a protection system that can only be modified by trusted administrators via trusted software, consisting of the following state representations:

– A mandatory protection state is a state where subjects and objects are represented by labels where the state describes the operations that subject labels may take upon object labels.

– A labeling state for mapping processes and system resource objects to labels.

– A transition state that describes the legal ways that processes and system resource objects may be relabeled.

Page 10: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

How it works

• The labels are fixed and define the access relations.

• Subjects and objects are assigned different labels according to need.

• When circumstances changes, labels may change also.

• However, permissions are constrained to those defined by the labels

• In addition, label assignment/reassignment is a “privileged operation”.

Page 11: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

In Pictures....

Page 12: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Reference Monitors

• A reference monitor is the classical access enforcement mechanism. It takes a request as input and returns a positive or negative response (authorization).

• Three components:

– Interface

– Authorization module

– Policy store

Page 13: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating
Page 14: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

What is a Secure Operating System?

• A secure operating system is an operating system where its access enforcement mechanism satisfies the reference monitor concept:

– Complete mediation: all security security- sensitive operations are checked.

– Tamper-proof: Cannot be modified by untrusted processes

– Verifiable.

Page 15: Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating

Assessment Criteria

• Complete Mediation

– Correctness of subjects/objects

– Completeness

– Formal verification

• Tamperproof

– Protection of reference monitor.

– Protection of the Trusted Computing Base

• Verifiable

– Basis for the correctness of the TCB.

– Enforcement of the system's security goals?