lecture 2: security policy models

13
Lecture 2: Security Policy Models Fred Chong CS290N Architectural Support for Secure and Reliable Computing

Upload: howard

Post on 23-Feb-2016

19 views

Category:

Documents


0 download

DESCRIPTION

Lecture 2: Security Policy Models. Fred Chong CS290N Architectural Support for Secure and Reliable Computing. Multi-Level vs Multi-Lateral Policies. Bell-La Padua Policy. BLP vs BIBA. Biba. Example: BLP password file protection. Password file is “high” - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Lecture 2:  Security Policy Models

Lecture 2: Security Policy Models

Fred ChongCS290N Architectural Support for

Secure and Reliable Computing

Page 2: Lecture 2:  Security Policy Models

Multi-Level vs Multi-Lateral Policies

Page 3: Lecture 2:  Security Policy Models

Bell-La Padua Policy

Page 4: Lecture 2:  Security Policy Models

BLP vs BIBA

Page 5: Lecture 2:  Security Policy Models

Biba

Page 6: Lecture 2:  Security Policy Models

Example: BLP password file protection

• Password file is “high”• Network reads and writes are “low”• Malware from the network is “low,” can’t read

password file (read of “high” from “low”)• Even if Malware becomes “high” somehow,

can’t write password data to the network (write of “high” to “low”)

Page 7: Lecture 2:  Security Policy Models

Example: Biba protects system files

• System files are “high”• Malware from the network is “low”• Malware can’t write to system files (“low”

writes to “high”)• Hardware dynamic information flow tracking

techniques (taint tracking) implement Biba

Page 8: Lecture 2:  Security Policy Models

Chinese Wall

Page 9: Lecture 2:  Security Policy Models

BLP vs Chinese Wall

Page 10: Lecture 2:  Security Policy Models

Clark-Wilson

Page 11: Lecture 2:  Security Policy Models

BLP vs Clark-Wilson

Page 12: Lecture 2:  Security Policy Models

BLP with Codewords

• “Need to know”• A Lattice Model

Page 13: Lecture 2:  Security Policy Models

BMA medical record policy