23
Chapter 13 Processing Controls

Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Embed Size (px)

Citation preview

Page 1: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Chapter 13

Processing Controls

Page 2: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Operating System Integrity

• Operating system -- the set of programs implemented in software/hardware that permits sharing and use of resources within a computer system

• There are many cases in which serious losses have occurred through breaches of operating system controls

Page 3: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Some Features of OP Systems

• Capable of managing resources• Good managers vs. bad mangers• There is a cost associated with mis-

management of op systems– Exposure to risks– Loss of integrity

• What is an interrupt in op systems? Op systems demand respect by using interrupts.

Page 4: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Nature of a Reliable Operating System

1. Must be protected from user processes2. Must prevent one user corrupting another

user’s processes3. Must protect users from themselves4. Must protect itself from corruption of

another module or sub-process5. Must be robust when environmental

failures occur

Page 5: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Operating System Integrity Threats

• Accidental– hardware, software, and environmental failures

that cause the operating system to crash or to process erroneously

• Deliberate– usually aim at unauthorized removal of assets,

breaches of data integrity, or disruption of operations

Page 6: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Penetration Techniques

• Browsing (checking residue)• Masquerading • Piggybacking (tapping messages)• Between-lines entry (inactive users)• Spoofing (fooling the user as if op system is

interacting)• Backdoors/Trapdoors (use it as if you are already in

the system)• Trojan horse (unknown to user, user runs the

penetrator’s program)

Page 7: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Other Penetration Techniques

• Covert Storage Channels– one process communicates confidential

information to another process by changing the values of system state variables

• Covert Timing Channels– one process communicates confidential

information to another process by changing the time period that a system takes to perform some function

Page 8: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Operating System Integrity Flaws

• Penetrations result when integrity flaws exist in operating systems. These flaws arise for two reasons:1. The access control policy designed for the

operating system is defective2. Even if a secure access control policy is

designed for the operating system, it might be implemented incorrectly in the operating system

Page 9: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Integrity Flaws (no details)

• Incomplete parameter validation

• Inconsistent parameter validation

• Implicit sharing of data

• Asynchronous validation

• Inadequate access control

• Violable limits

Page 10: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Reference Monitors and Kernels

• A reference monitor is an abstract mechanism that checks each request by a subject to access and use an object to ensure that the request complies with a security policy.

• A reference monitor is implemented via a security kernel, which is a hardware, software, firmware mechanism

Page 11: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Reference Monitor Abstraction

Page 12: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Validation Checks

• Primarily ensure that computations performed on numeric fields are authorized, accurate, and complete

• Processing associated with alphabetic or alphanumeric fields typically is minimal

Page 13: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Rounding Validation Check Process

Page 14: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Other Software Controls

• Print Run-to-Run Control Totals– provide evidence that all input data has been

processed accurately

• Minimize Human Intervention– because human intervention is error-prone,

minimizing it will reduce incorrect processing

• Use Redundant Calculations– additional calculations can be used as “checks”

Page 15: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Audit Trail Controls

• Accounting Audit Trail– allows auditors to trace and to replicate the

processing performed on a data item

• Operations Audit Trail– data is often critical to effective management of

shared system resources

Page 16: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Operations Audit Trail

Page 17: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Content of the Operations Audit Trail• Resource Consumption Data

– identifies which user consumed a resource

• Security-Sensitive Events– creates audit trail entries for all changes to password or

access privileges files or failed access attempts

• Hardware Malfunctions– records processor or memory parity errors

• User-Specified Events– allows users to write their own programs to collect

operations data

Page 18: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Interrogating the Operations Audit Trail

1. Specifying audit objectives

2. Extracting data from the operations audit trail that will allow auditors to meet these objectives

3. Sorting the data extracted into the required order

4. Formatting and presenting the results

Page 19: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Existence Controls

• Nature of Checkpoint/Restart Controls– allow programs to be reestablished at

some prior, valid intermediate point in their processing and restarted form that point

– cannot guard against long-term or global failures

Page 20: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Functions of Checkpoint Facilities

• Processor-based Scheme– when a transient fault occurs, this scheme rolls

the processor back a small number of instruction and then restarts the processor

• Memory-based Scheme– relies on having two memory banks for each

address. Successful operations are copied from the first memory bank to the second

Page 21: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Processor-based Checkpoint/Restart facility

Page 22: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Memory-based Checkpoint/Restart facility

Page 23: Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing

Auditors Concerns with Checkpoint/Restart Facilities

• Information written to a log must be secure

• Facilities must be effective and efficient

• Facilities should be well documented

• Facilities should work reliably