26

Design for security in operating system

Embed Size (px)

Citation preview

Page 1: Design for security in operating system
Page 2: Design for security in operating system

Types of security in system. Theory of design for security Os. Security hidden troubles in Linux Os. Security policy 1.Audit module 2.Access control module 3.Role based access control module. Architecture

Page 3: Design for security in operating system

Least privilege Efficiency Open System Complete coordination Privilege separation Simplicity

Page 4: Design for security in operating system

Access control mode is simple:Access control lists and mandatory access control lists are not

supported.

Security audit mechanism is insecuritySecurity audit mechanism of the present Linux is insecurity

Super user right is greatIf the password is purloined, the system will be not safe at all.

Page 5: Design for security in operating system

Enforced by organizational polices or security mechanism.

Security mechanism and access control policy for os security design.

1.Audit module 2.Acess control module 3.Role based access control module.

Page 6: Design for security in operating system

Invasive technology can attack the Kernel of Linux.

Linux security audit module should be designed and applied independently.

Security audit module for kernel.

Page 7: Design for security in operating system

Event Collect Parser Alerting

Record

Audit log library

Page 8: Design for security in operating system

Ability to permit or deny the use of particular resource.

It manages physical ,logical or digital resources. To advance security it adds security access control

and Integrated access control sub module.

Page 9: Design for security in operating system
Page 10: Design for security in operating system

Subject: Entity that perform action in system.

Object: Entities representing resources to which access may need to controlled .

Subject access an object must pass through Security, Integrated and Discretionary access control modules.

Subject access corresponding security tag library when it through each access control subsystems.

Page 11: Design for security in operating system

It base on Bell-La padula(BLP) model. It can operate MAC i.e Mandatory access

control and DAC i.e Discretionary access control.

MAC : os provide ability to subject to access or perform some operations on subject.

When subject sends a request to an object , extract security tag of subject and object from security tag library.

Page 12: Design for security in operating system

 Security Labels assigned to all objects,contain two pieces of information - a classification and a category.

When a user access a resource Os checks the user's classification and categories and compares them to the properties of the object's security label. If the user's credentials match the MAC security label properties of the object access is allowed.

Examples: SE Linux, by NSA, trusted Solaris

Page 13: Design for security in operating system

The control of access is based on the discretion (wish) of the owner.

Access to system resources is controlled by the operating system.

Each resource object on a DAC based system has an Access Control List (ACL).,contains a list of users and groups to which the user has permitted access.

For example, User A may provide read-only access on one of her files to User B, read and write access on the same file to User C and full control to any user belonging to Group 1.

Examples: Unix, Linux, Windows access control.

Page 14: Design for security in operating system

It based on Biba Integrity model, that  describes a set of access control  rules designed to ensure data integrity.

It used to add security tag for subjects and objects.

When subject sends a request to object the Biba integrity model extract integrated attributes of subject and object from security tag library to match.

Page 15: Design for security in operating system

Model Access Control Owner Security Control Policy

DAC Data Owner ACL.MAC Operating System Security Labels.RBAC Administrator Role/Function Positions.

Page 16: Design for security in operating system

Subject

System call

Access control model

Security tag library

Audit model

Object

Audit log library

Page 17: Design for security in operating system

RBAC is access policy determined by system.

Used in applications where multilevel security requirement may exists.

Roles are created for various job function and user are assigned roles based on their qualifications.

Page 18: Design for security in operating system

Role assignment : A subject can execute a transaction only if the subject has selected or been assigned a role.

Role authorization : A subject's active role must be authorized for the subject. 

Transaction authorization : A subject can execute a transaction only if the transaction is authorized through the subject's role memberships

Page 19: Design for security in operating system

It uses the role-based access control mechanism to control unauthorised access to patient medical information in KDIS.

permissions are not assigned to users but to the roles, thus providing great flexibility in administration and cost reduction

Page 20: Design for security in operating system
Page 21: Design for security in operating system
Page 22: Design for security in operating system

Principle of least privilege

System administrator

Security administrator

Security audit administrator

Page 23: Design for security in operating system

Principle of least privilege

System administrator

Security administrator

Security audit administrator

Page 24: Design for security in operating system

Hence the access control module, audit module and role based access control module improve the operating system security.

The group of this three module can prevent the lost and misses of data to improve stability, processing speed of Os.

Page 25: Design for security in operating system
Page 26: Design for security in operating system