SlideShare a Scribd company logo
FRSecure 2017 CISSP
Mentor Program
EVAN FRANCEN, PRESIDENT & CEO – FRSECURE
BRAD NIGH, SENIOR INFORMATION SECURITY ANALYST - FRSECURE
CLASS SESSION #4
CISSP Mentor Program Session #4
Domain 2: Asset Security - Review
• Classifying Data
• Ownership
• Memory and Remanence
• Data Destruction
• Determining Data Security Controls
CISSP Mentor Program Session #4
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
Domain 2: Asset Security – Quiz Review
D
A
CISSP Mentor Program Session #4
Domain 2: Asset Security – Quiz Review
C
A
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
D
D
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
B
B
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
A
D
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
D
D
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
B
C
Domain 2: Asset Security – Quiz Review
CISSP Mentor Program Session #4
A
Piece of cake!
CISSP Mentor Program Session #4
Domain 2: Asset Security – Current Events
http://www.nytimes.com/2016/01/30/us/politics/22-clinton-emails-
deemed-too-classified-to-be-made-public.html?_r=0
http://www.usnews.com/news/articles/2016-05-04/panama-papers-
revelation-we-must-rethink-data-security-systems
http://www.databreaches.net/centene-discloses-missing-hard-drives-
contain-personal-information-of-950000-people/
CISSP Mentor Program Session #4
Domain 3: Security Engineering (Engineering and Management of
Security)
• Security Models
• Evaluation Methods, Certification and Accreditation
• Secure System Design Concepts
• Secure Hardware Architecture
• Secure Operating System and Software Architecture
• Virtualization and Distributed Computing
• System Vulnerabilities, Threats and Countermeasures
Formerly separate domains: Security Architecture, Cryptography, and Physical Security
CISSP Mentor Program Session #4
Security Models
What subjects and objects are permitted to
do (within a model or framework)
• Subject (often a user)
• Object (a resource)
• Managing relationship between subject
and object is access control
• Understand concepts of read up, read
down, write up, write down
CISSP Mentor Program Session #4
Security Models
Controls
• Discretionary access control (DAC)
• Defined in the Trusted Computer System Evaluation Criteria (TCSEC); Orange Book
• Means of restricting access to objects based on the identity of subjects and/or groups to which they belong
• A subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject
• Mandatory access control (MAC)
• Type of access control where the operating system constrains the ability of a subject to access or perform some sort of operation on an
object
• Authorization rule enforced by the operating system kernel
• Security policy is centrally controlled by a security policy administrator
• Rule-based access control (RBAC)
• Access is allowed or denied to objects based on a set of rules defined by a system administrator
• Access properties are stored in Access Control Lists (ACL) associated with each object
• Role-based access control (also RBAC)
• Also known as Non-discretionary Access Control
• Assigns permissions to particular roles in an organization
CISSP Mentor Program Session #4
Security Models
Understand the Fundamental Concepts of Security Models
• State Machine Model
• Bell-LaPadula Model
• Lattice-Based Access Controls
• Biba Model
• Clark-Wilson Model
• Information Flow Model
• Brewer and Nash Model (aka Chinese Wall)
• Take-Grant Model
• Access Control Matrix
• Zachman Framework for Enterprise Architecture
• Graham-Denning Model
• Harrison-Ruzzo-Ullman Model
CISSP Mentor Program Session #4
Security Models
State Machine Model
• State of a machine is captured in order to verify the security of a system
• State consists of all current permissions and all current instances of subjects
accessing the objects. If the subject can access objects only by means that are
concurrent with the security policy, the system is secure
• Always secure no matter what state it is in
• Finite state machine (FSM)
• State transition
• Secure state machine
• The basis for most other security models
CISSP Mentor Program Session #4
Security Models
State Machine Model
• State of a machine is captured in order to verify the security of a system
• State consists of all current permissions and all current instances of subjects
accessing the objects. If the subject can access objects only by means that are
concurrent with the security policy, the system is secure
• Always secure no matter what state it is in
• Finite state machine (FSM)
• State transition
• Secure state machine
• The basis for most other security models
CISSP Mentor Program Session #4
Security Models
Bell-LaPadula Model
• Originally developed for the U.S. Department of Defense
• Focused on maintaining the confidentiality of objects
• Two Access Rules:
• Simple Security Property – no read up
• * Security Property (“Star” Security Property) – no write down
• Two Object Label Rules:
• Strong and Weak Tranquility Property - security labels will not change while the system is
operating
• Weak Tranquility Property - security labels will not change in a way that conflicts with defined
security properties
CISSP Mentor Program Session #4
Security Models
Lattice-Based Access Controls
• Security controls for complex environments
• For every relationship between a subject and an
object, there are defined upper and lower access
limits implemented by the system
• Subjects have a Least Upper Bound (LUB) and
Greatest Lower Bound (GLB) of access to the objects
based on their lattice position
• A security lattice model combines multilevel and
multilateral security
CISSP Mentor Program Session #4
Security Models
Biba Model
• Developed after Bell-LaPadula model
• Focused on maintaining the integrity of objects
• Uses a lattice of integrity levels unlike Bell-LaPadula which
uses a lattice of security levels
• Two primary rules
• Simple Integrity Axiom – no read down
• * Integrity Axiom (“Star” Integrity Axiom) – no write up
• Essentially the reverse of Bell-LaPadula
CISSP Mentor Program Session #4
Security Models
Clark-Wilson Model
• Real-world integrity model
• Requires subjects to access objects via programs
• Programs have specific limitations to what they can and cannot do to objects
• Two primary concepts
• Well-Formed Transactions - ability to enforce control over applications; comprised of the “access
control triple:” user, transformation procedure (TP/well-formed transaction), and constrained
data item (CDI/data that requires integrity) - integrity verification procedures (IVPs) ensure that
data are kept in a valid state
• Separation of Duties - ensures that authorized users do not change data in an inappropriate way
Separation of duties and transformation procedures.
1) Authorized access and 2) Modification only in an authorized
manner
CISSP Mentor Program Session #4
Security Models
Information Flow Model
• In this model, data is thought of as being held in individual discrete
compartments
• Information is compartmentalized based on two factors; classification and
need to know
• Subject clearance has to dominate the object classification and the subject
security profile must contain the one of the categories listed in the object
label, which enforces need to know
CISSP Mentor Program Session #4
Security Models
Brewer and Nash Model (aka Chinese Wall)
• Designed to avoid conflicts of interest by prohibiting one person, such as a
consultant, from accessing multiple conflict of interest categories (CoIs)
• Provides access controls that can change dynamically depending upon a user’s
previous actions
• Model states that a subject can write to an object if, and only if, the subject
can not read another object that is in a different data set
• Initially designed to address the risks inherent with employing consultants
working within banking and financial institutions
CISSP Mentor Program Session #4
Security Models
Noninterference Models
• Model ensures that any actions that take place at a higher security level do
not affect, or interfere with, actions that take place at a lower level
• Not concerned with the flow of data, but rather with what a subject knows
about the state of the system
• Addresses the inference attack that occurs when some one has access to
some type of information and can infer(guess) something that he does not
have the clearance level or authority to know.
• Covert Channel – policy violation hidden from the system owner
CISSP Mentor Program Session #4
Security Models
Take-Grant Model
• Contains rules that govern the interactions between subjects and objects, and
permissions subjects can grant to other subjects
• Two rights occur in every instance of the model: take and grant
• Rules include take, grant, create, and remove
• take rule allows a subject to take rights of another object (add an edge originating at the subject)
• grant rule allows a subject to grant own rights to another object (add an edge terminating at the
subject)
• create rule allows a subject to create new objects (add a vertex and an edge from the subject to
the new vertex)
• remove rule allows a subject to remove rights it has over on another object (remove an edge
originating at the subject)
CISSP Mentor Program Session #4
Security Models
Access Control Matrix
• Commonly used in OS and applications
• Table that defines access permissions between specific subjects and objects
CISSP Mentor Program Session #4
Security Models
Zachman Framework for
Enterprise Architecture
• Six frameworks for providing
information security, asking what,
how, where, who, when, and why
CISSP Mentor Program Session #4
Security Models
Graham-Denning Model
• Defines a set of basic rights in terms of commands that a specific subject can execute
on an object
• Three parts; objects, subjects, and rules; focus on the eight (8) rules:
• R1: Transfer Access
• R2: Grant Access
• R3: Delete Access
• R4: Read Object
• R5: Create Object
• R6: Destroy Object
• R7: Create Subject
• R8: Destroy Subject
CISSP Mentor Program Session #4
Security Models
Harrison-Ruzzo-Ullman Model
• HRU is an operating system level computer security model which deals with the integrity of access
rights in the system
• Based around the idea of a finite set of procedures being available to edit the access rights of a
subject on an object
• Maps subjects, objects, and access rights to an access matrix
• Variation to the Graham-Denning Model
• Six primitive operations:
• Create object
• Create subject
• Destroy subject
• Destroy object
• Enter right into access matrix
• Delete right from access matrix
CISSP Mentor Program Session #4
Security Models
Modes of Operation
• There are four (4) modes of system/access control operation:
• Dedicated:
• Only one classification (label) for all objects in the system
• Subject must possess a clearance equal or greater than the system label
• Subjects must have 1) appropriate clearance, 2) formal access approval, and 3) a need to
know for all the objects in the system
CISSP Mentor Program Session #4
Security Models
Modes of Operation
• There are four (4) modes of system/access control operation:
• System High:
• System contains objects of mixed labels
• Subjects must possess a clearance equal to (or greater than) the highest object label
CISSP Mentor Program Session #4
Security Models
Modes of Operation
• There are four (4) modes of system/access control operation:
• Compartmented:
• Objects are placed into “compartments”
• Subjects must have a formal (system-enforced) need to know to access data in
compartment
• All subjects must have 1) Signed NDA for ALL information on the system, 2) clearance for
ALL information on the system, 3) formal access approval for SOME objects on the system,
and 4) valid need to know for SOME objects on the system
CISSP Mentor Program Session #4
Security Models
Modes of Operation
• There are four (4) modes of system/access control operation:
• Multilevel:
• System contains objects of varying labels
• Subjects with varying clearances can access the system
• Reference Monitor mediates access between subjects and objects
• All subjects must have 1) Signed NDA for ALL information on the system, 2) clearance for
SOME information on the system, 3) formal access approval for SOME objects on the
system, and 4) valid need to know for SOME objects on the system
CISSP Mentor Program Session #4
Evaluation Methods, Certification and
Accreditation
Trusted Computer System Evaluation
Criteria (TCSEC or Orange Book)
• Developed by the federal government; National
Computer Security Center (NCSC), part of the
National Institute of Standards and Technology
(NIST), and the National Security Agency (NSA)
• Developed in 1983 as part of the Rainbow Series
• One of the 1st evaluation frameworks
• Now used as part of U.S. Government Protection
Profiles within the International Common Criteria
framework
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
Trusted Computer System Evaluation Criteria (TCSEC or Orange Book)
• Download here http://csrc.nist.gov/publications/history/dod85.pdf
• Division D is the lowest form of security, and A is the highest:
• D: Minimal Protection
• C: Discretionary Protection
• C1: Discretionary Security Protection
• C2: Controlled Access Protection
• B: Mandatory Protection
• B1: Labeled Security Protection
• B2: Structured Protection
• B3: Security Domains
• A: Verified Protection
• A1: Verified Design
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
Trusted Network Interpretation (TNI)/Red Book
• Sort of like the Orange Book for network systems
• Can download it here http://ftp.fas.org/irp/nsa/rainbow/tg011.htm
• All of the Rainbow Books can be accessed here
http://ftp.fas.org/irp/nsa/rainbow.htm
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
Information Technology Security Evaluation Criteria (ITSEC)
• Used extensively in Europe (where it was developed)
• 1st successful international evaluation criteria
• References to the Orange Book, but added:
• F – Functionality
• Q – Effectiveness (part of assurance)
• E – Correctness (also part of assurance)
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
Information Technology Security Evaluation Criteria (ITSEC)
• Assurance correctness ratings range from E0 (inadequate) to E6 (formal model of
security policy)
• Functionality ratings range include TCSEC equivalent ratings (F-C1, F-C2, etc.)
• The equivalent ITSEC/TCSEC ratings are:
• 0: D
• F-C1,E1: C1
• F-C2,E2: C2
• F-B1,E3: B1
• F-B2,E4: B2
• F-B3,E5: B3
• F-B3,E6: A1
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
Information Technology Security Evaluation Criteria (ITSEC)
• Additional functionality ratings include:
• F-IN: High integrity requirements
• AV: High availability requirements
• DI: High integrity requirements for networks
• DC: High confidentiality requirements for networks
• DX: High integrity and confidentiality requirements for networks
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
International Common Criteria (“Common Criteria”)
• Internationally agreed upon standard for describing and testing the security of IT
products
• Primary objective of the Common Criteria is to eliminate known vulnerabilities of the
target for testing
• Terms:
• Target of Evaluation (ToE): the system or product that is being evaluated
• Security Target (ST): the documentation describing the TOE
• Protection Profile (PP): an independent set of security requirements and objectives for a specific
category of products or systems
• Evaluation Assurance Level (EAL): the evaluation score of the tested product or system
CISSP Mentor Program Session #4
Evaluation Methods, Certification and Accreditation
International Common Criteria (“Common Criteria”)
• There are seven (7) Levels of Evaluation (EALs):
• EAL1: Functionally tested
• EAL2: Structurally tested
• EAL3: Methodically tested and checked
• EAL4: Methodically designed, tested, and reviewed
• EAL5: Semi-formally designed, and tested
• EAL6: Semi-formally verified, designed, and tested
• EAL7: Formally verified, designed, and tested
• Latest version of Common Criteria (July 2009, Version 3.1, Rev.3);
http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
CISSP Mentor Program Session #4
Secure System Design Concepts
Layering
• Separates hardware and software functionality into modular tiers
• Actions that take place at one layer do not directly affect components in
another
• For networking types; OSI is an example of layering (covered later)
• Generic list of security architecture layers:
• Hardware
• Kernel (and system/device drivers)
• Operating system
• Applications
CISSP Mentor Program Session #4
Secure System Design Concepts
Abstraction – Complexity is the enemy of security
• Unnecessary details are hidden from the user
• Good example from the book:
A user double-clicks on an MP3 file containing music, and the music plays via the
computer speakers. Behind the scenes, tremendously complex actions are taking
place: the operating system opens the MP3 file, looks up the application associated
with it, and sends the bits to a media player. The bits are decoded by a media player,
which converts the information into a digital stream, and sends the stream to the
computer’s sound card. The sound card converts the stream into sound, sent to the
speaker output device. Finally, the speakers play sound. Millions of calculations are
occurring as the sound plays, while low-level devices are accessed.
Abstraction means the user simply presses play and hears music.
CISSP Mentor Program Session #4
Secure System Design Concepts
Security Domains
• A security domain is the list of objects a subject is allowed to access.
• A security domain is also a groups of subjects and objects with similar security
requirements
• Kernel - the central core of a computer's operating system; two domains (or modes)
• User mode – user accounts and processes
• Kernel mode (or supervisor mode) – the kernel itself; low-level access to memory and hardware
components
• The two domains are separated – an error in user mode should not affect kernel mode operation
• Operating systems run entirely in kernel mode
CISSP Mentor Program Session #4
Secure System Design Concepts
The Ring Model
• Form of CPU hardware layering used to separate and protect domains (user mode from kernel mode)
• Most CPUs (including Intel x86) have four rings
• Ring 0 – Kernel
• Ring 1 – Operating system components outside of Ring 0
• Ring 2 - Device drivers
• Ring 3 – User applications
• Processes communicate between the rings via system calls
• System calls are slow (compared to performing work within one ring), but provide security
• Ring model also provides abstraction
• Linux and Windows use rings 0 and 3 only
• Hypervisor mode allows virtual guests to operate in ring 0, controlled by the hypervisor one ring “below” (ring
-1)
CISSP Mentor Program Session #4
Secure System Design Concepts
The Ring Model
CISSP Mentor Program Session #4
Secure Hardware Architecture
Open and Closed Systems
• Open systems use open hardware and
standards, using standard components from
various vendors
• IBM-compatible PCs
• Closed systems use proprietary hardware or
software
CISSP Mentor Program Session #4
Secure Hardware Architecture
System Unit and Motherboard
• System unit is the computer case and
everything in it.
• The motherboard is the hardware board that
typically includes the Central Processing Unit
(CPU), memory slots, firmware, and peripheral
slots such as PCI (Peripheral Component
Interconnect) slots.
CISSP Mentor Program Session #4
Secure Hardware Architecture
Computer Bus
• Primary communication channel
on a computer system
• Communication between the
CPU, memory, and input/output
devices such as keyboard,
mouse, display, etc., occur via
the bus
CISSP Mentor Program Session #4
Secure Hardware Architecture
Computer Bus
• Northbridge – also called the Memory
Controller Hub (MCH), connects the
CPU to RAM and video memory;
directly connected to CPU, so it’s
faster
• Southbridge - also called the I/O
Controller Hub (ICH), connects
input/output (I/O) devices, such as
disk, keyboard, mouse, CD drive, USB
ports, etc.
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• The “brains” - capable of controlling and performing mathematical
calculations
• Everything a computer does is mathematical
• Rated by the number of clock cycles per second; a 2.4 GHz Pentium 4 CPU has
2.4 billion clock cycles per second.
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Arithmetic Logic Unit (ALU) -
performs mathematical calculations
• Control Unit (CU) – controls and send
instructions to the ALU
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Fetch & Execute, process actually takes
four steps (one CPU or clock cycle):
• Fetch Instruction 1
• Decode Instruction 1
• Execute Instruction 1
• Write (save) result 1
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Pipelining combines multiple steps into one combined process; simultaneous
fetch, decode, execute, and write steps
• Each part is called a pipeline stage
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Interrupts cause the CPU to stop processing its current task, save the state,
and process a new request. Once the interrupt task is complete, the CPU will
start where it left off.
• Interrupts are typically hardware related.
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Process – an executable program and its data loaded and running in memory
• Thread (also called a lightweight process or “LWP”) – a child process; where one
process has “spawned” another process. A heavyweight process (or “HWP”) is called
a task; one big advantage for threads is that they can share memory.
• Process states:
• New: a process being created
• Ready: process waiting to be executed by the CPU
• Running: process being executed by the CPU
• Blocked: waiting for I/O
• Terminate: a completed process
A zombie or orphan is a
process (or thread) where
the parent is terminated
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Multitasking allows multiple tasks (heavy weight processes) to run
simultaneously on one CPU
• Multiprocessing - multiple processes running on multiple CPUs
• Symmetric Multiprocessing (SMP) - one operating system to manage all CPUs
• Asymmetric Multiprocessing (AMP) - one operating system image per CPU
• Multiprogramming - multiple programs running simultaneously on one CPU
• Multithreading - multiple threads (light weight processes) running
simultaneously on one CPU
CISSP Mentor Program Session #4
Secure Hardware Architecture
The Central Processing Unit (CPU)
• Watchdog Timers are designed to recover a system by rebooting after critical
processes hang or crash
• Complex Instruction Set Computer (CISC)
• Reduced Instruction Set Computer (RISC)
CISSP Mentor Program Session #4
Secure Hardware Architecture
Memory Protection
• Preventing processes from accessing memory space belonging to another
• Memory protection is required for multi-user systems
Process Isolation
• Logical control that attempts to prevent one process from interfering with
another
• Object encapsulation - treats a process as a “black box”
• Time multiplexing - multiplexes system resources between multiple processes,
each with a dedicated slice of time
CISSP Mentor Program Session #4
Secure Hardware Architecture
Memory Protection
• Preventing processes from accessing memory space belonging to another
• Memory protection is required for multi-user systems
Hardware Segmentation
• Completely separate hardware
Virtual Memory
• Virtual address mapping between applications and hardware memory
CISSP Mentor Program Session #4
Secure Hardware Architecture
Memory Protection
• Preventing processes from accessing memory space belonging to another
• Memory protection is required for multi-user systems
Swapping and Paging
• Uses virtual memory to copy contents in primary memory (RAM) to or from
secondary memory (not directly addressable by the CPU, on disk)
• Kernel accessing memory in swap space results in a page fault
CISSP Mentor Program Session #4
Secure Hardware Architecture
BIOS
• Basic Input Output System
• contains code in firmware that is executed when a PC is powered on
• 1st thing it does is run the Power On Self-Test (POST)
• POST finds the boot sector that contains machine code for the OS kernel
• Kernel loads and executes into the OS
CISSP Mentor Program Session #4
Secure Hardware Architecture
In general, the MBR consists of 512 or more bytes located
in the first sector of the drive.
CISSP Mentor Program Session #4
Secure Hardware Architecture
WORM Storage
• Write Once Read Many
• Usually used for record retention and high integrity information
• CD-Rs, DVD-Rs, etc.
• Not CD-RWs or DVD-RWs
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Trusted Platform Module (or TPM)
• Developed and updated by the Trusted Computing Group; international
standard
• Processor that can provide additional security capabilities in hardware
• Usually on the motherboard
• Hardware-based encryption (fast)
• Boot integrity – protecting against rootkits and kernel bypass attacks
• Platform integrity and disk encryption (primary uses)
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Trusted Platform Module (or TPM)
Tidbit
The United States Department of Defense (DoD) specifies that "new computer assets
(e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant,
mobile phone) procured to support DoD will include a TPM version 1.2 or higher where
required by DISA STIGs and where such technology is available."
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Kernel
• Heart (or core) of the operating system, usually running at ring 0
• Interface between the operating system and hardware
• Monolithic kernel - compiled into one static executable and the entire kernel
runs in supervisor mode; requires recompiling to add new features
• Microkernel – a modular kernel; can add functionality via loadable kernel
modules
CISSP Mentor Program Session #4
Secure Operating System and
Software Architecture
Kernel
• Reference monitor – core function of
the kernel; mediates all access between
subjects and objects
• Always enabled and cannot be
bypassed
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Users and File Permissions
• Types of permissions available depend on the file system being used
• Linux and UNIX permissions
• Read (“r”)
• Write (“w”)
• Execute (“x”)
• permissions may be set separately to the owner, group, or world
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Users and File Permissions
Linux and UNIX permissions - output of a Linux “ls –la /etc”
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Users and File Permissions
• Types of permissions available depend on the file system being used
• Microsoft NTFS Permissions
• Read
• Write
• Read and execute
• Modify
• Full control (read, write, execute, modify, and in addition the ability to change the
permissions.)
CISSP Mentor Program Session #4
Secure Operating System and Software Architecture
Users and File Permissions
Questions?
We made it through Class #4!
We’re leaving off at “Virtualization and Distributed Computing”
No Quiz, so we’ll have no problem catching up…
Homework for Tuesday (4/11)
◦ Continue reading Chapter 4/Domain 3: Security Engineering (Engineering and
Management of Security) – We will cover the rest of this chapter and it will be
a lot of information!
◦ Come with questions!
Have a great evening, talk to you Tuesday!
Questions?
Hopefully about security.
Thank you!
Evan Francen
◦ FRSecure
◦ efrancen@frsecure.com
◦ 952-467-6384

More Related Content

PDF
Slide Deck CISSP Class Session 4
PPTX
Purple Teaming - The Collaborative Future of Penetration Testing
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
PPTX
Slide Deck CISSP Class Session 5
PPTX
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
PPTX
How to Prepare for the CISSP Exam
Slide Deck CISSP Class Session 4
Purple Teaming - The Collaborative Future of Penetration Testing
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 5
Slide Deck – Session 2 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
How to Prepare for the CISSP Exam

What's hot (20)

PDF
Slide Deck - CISSP Mentor Program Class Session 1
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 3
PPTX
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
PDF
2018 CISSP Mentor Program Session 2
PDF
Slide Deck CISSP Class Session 6
PDF
CISSP introduction 2016 Udemy Course
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Cissp cbk final_exam-answers_v5.5
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PPTX
Red team Engagement
PPTX
Persistence is Key: Advanced Persistent Threats
PDF
CISSP Summary V1.1
PPTX
How to Build a Successful Incident Response Program
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PDF
The Golden Rules - Detecting more with RSA Security Analytics
PPTX
Understanding advanced persistent threats (APT)
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 3
Slide Deck – Session 11 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 11 – FRSecure CISSP Mentor Program
2018 CISSP Mentor Program Session 2
Slide Deck CISSP Class Session 6
CISSP introduction 2016 Udemy Course
Advanced Persistent Threats (APTs) - Information Security Management
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Cissp cbk final_exam-answers_v5.5
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Red team Engagement
Persistence is Key: Advanced Persistent Threats
CISSP Summary V1.1
How to Build a Successful Incident Response Program
Ethical Hacking Conference 2015- Building Secure Products -a perspective
The Golden Rules - Detecting more with RSA Security Analytics
Understanding advanced persistent threats (APT)
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Ad

Viewers also liked (10)

PDF
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
PDF
Slide Deck CISSP Class Session 7
PPTX
HHS Ransomware and Breach Guidance - Brad Nigh
PPTX
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck CISSP Class Session 2
PPTX
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
PPTX
Slide Deck – Session 9 – FRSecure CISSP
PPTX
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
PDF
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Slide Deck CISSP Class Session 7
HHS Ransomware and Breach Guidance - Brad Nigh
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck CISSP Class Session 2
Slide Deck – Session 10 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck Class Session 10 – FRSecure CISSP Mentor Program
Ad

Similar to Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017 (20)

PPTX
CISSP - Chapter 3 - System security architecture
PPT
Cissp chapter-05ppt178
PPTX
Security Architecture-Security Models
PDF
3. Security Engineering
PDF
3. Security Engineering
PDF
3. Security Engineering
PDF
CNIT 125 Ch 4. Security Engineering (Part 1)
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
CNIT 125: Ch 4. Security Engineering (Part 1)
PDF
3. Security Engineering
PPT
Chapter 5-Security Mechanisms and Techniques.ppt
PPTX
CISSP Domain 03 Security Architecture and Engineering.pptx
PPT
Protection and Security in Operating Systems
ODP
CISSP Week 22
PPT
Security models
PPTX
Computer security concepts
PDF
2018 CISSP Mentor Program- Session 6
PPT
Access control3
PPT
Access control3
PPTX
resource security and protection in distributed system
CISSP - Chapter 3 - System security architecture
Cissp chapter-05ppt178
Security Architecture-Security Models
3. Security Engineering
3. Security Engineering
3. Security Engineering
CNIT 125 Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 4. Security Engineering (Part 1)
CNIT 125: Ch 4. Security Engineering (Part 1)
3. Security Engineering
Chapter 5-Security Mechanisms and Techniques.ppt
CISSP Domain 03 Security Architecture and Engineering.pptx
Protection and Security in Operating Systems
CISSP Week 22
Security models
Computer security concepts
2018 CISSP Mentor Program- Session 6
Access control3
Access control3
resource security and protection in distributed system

More from FRSecure (20)

PDF
2020 FRSecure CISSP Mentor Program - Class 11
PDF
2020 FRSecure CISSP Mentor Program - Class 10
PDF
2020 FRSecure CISSP Mentor Program - Class 9
PDF
2020 FRSecure CISSP Mentor Program - Class 8
PDF
2020 FRSecure CISSP Mentor Program - Class 7
PDF
2020 FRSecure CISSP Mentor Program - Class 6
PDF
2020 FRSecure CISSP Mentor Program - Class 5
PDF
2020 FRSecure CISSP Mentor Program - Class 4
PDF
2020 FRSecure CISSP Mentor Program - Class 3
PDF
2020 FRSecure CISSP Mentor Program - Class 2
PDF
2020 FRsecure CISSP Mentor Program - Class 1
PDF
2019 FRSecure CISSP Mentor Program: Class Eleven
PDF
2019 FRSecure CISSP Mentor Program: Class Ten
PDF
2019 FRSecure CISSP Mentor Program: Class Nine
PDF
2019 FRSecure CISSP Mentor Program: Class Eight
PDF
2019 FRSecure CISSP Mentor Program: Class Seven
PDF
2019 FRSecure CISSP Mentor Program: Class Six
PDF
2019 FRSecure CISSP Mentor Program: Class Four
PDF
2019 FRSecure CISSP Mentor Program: Class Three
PDF
2019 FRecure CISSP Mentor Program: Session Two
2020 FRSecure CISSP Mentor Program - Class 11
2020 FRSecure CISSP Mentor Program - Class 10
2020 FRSecure CISSP Mentor Program - Class 9
2020 FRSecure CISSP Mentor Program - Class 8
2020 FRSecure CISSP Mentor Program - Class 7
2020 FRSecure CISSP Mentor Program - Class 6
2020 FRSecure CISSP Mentor Program - Class 5
2020 FRSecure CISSP Mentor Program - Class 4
2020 FRSecure CISSP Mentor Program - Class 3
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRsecure CISSP Mentor Program - Class 1
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Eight
2019 FRSecure CISSP Mentor Program: Class Seven
2019 FRSecure CISSP Mentor Program: Class Six
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Three
2019 FRecure CISSP Mentor Program: Session Two

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
Renaissance Architecture: A Journey from Faith to Humanism
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
Week 4 Term 3 Study Techniques revisited.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Anesthesia in Laparoscopic Surgery in India
102 student loan defaulters named and shamed – Is someone you know on the list?
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Mark Klimek Lecture Notes_240423 revision books _173037.pdf

Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017

  • 1. FRSecure 2017 CISSP Mentor Program EVAN FRANCEN, PRESIDENT & CEO – FRSECURE BRAD NIGH, SENIOR INFORMATION SECURITY ANALYST - FRSECURE CLASS SESSION #4
  • 2. CISSP Mentor Program Session #4 Domain 2: Asset Security - Review • Classifying Data • Ownership • Memory and Remanence • Data Destruction • Determining Data Security Controls
  • 3. CISSP Mentor Program Session #4 Domain 2: Asset Security – Quiz Review
  • 4. CISSP Mentor Program Session #4 Domain 2: Asset Security – Quiz Review D A
  • 5. CISSP Mentor Program Session #4 Domain 2: Asset Security – Quiz Review C A
  • 6. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 D D
  • 7. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 B B
  • 8. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 A D
  • 9. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 D D
  • 10. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 B C
  • 11. Domain 2: Asset Security – Quiz Review CISSP Mentor Program Session #4 A Piece of cake!
  • 12. CISSP Mentor Program Session #4 Domain 2: Asset Security – Current Events http://www.nytimes.com/2016/01/30/us/politics/22-clinton-emails- deemed-too-classified-to-be-made-public.html?_r=0 http://www.usnews.com/news/articles/2016-05-04/panama-papers- revelation-we-must-rethink-data-security-systems http://www.databreaches.net/centene-discloses-missing-hard-drives- contain-personal-information-of-950000-people/
  • 13. CISSP Mentor Program Session #4 Domain 3: Security Engineering (Engineering and Management of Security) • Security Models • Evaluation Methods, Certification and Accreditation • Secure System Design Concepts • Secure Hardware Architecture • Secure Operating System and Software Architecture • Virtualization and Distributed Computing • System Vulnerabilities, Threats and Countermeasures Formerly separate domains: Security Architecture, Cryptography, and Physical Security
  • 14. CISSP Mentor Program Session #4 Security Models What subjects and objects are permitted to do (within a model or framework) • Subject (often a user) • Object (a resource) • Managing relationship between subject and object is access control • Understand concepts of read up, read down, write up, write down
  • 15. CISSP Mentor Program Session #4 Security Models Controls • Discretionary access control (DAC) • Defined in the Trusted Computer System Evaluation Criteria (TCSEC); Orange Book • Means of restricting access to objects based on the identity of subjects and/or groups to which they belong • A subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject • Mandatory access control (MAC) • Type of access control where the operating system constrains the ability of a subject to access or perform some sort of operation on an object • Authorization rule enforced by the operating system kernel • Security policy is centrally controlled by a security policy administrator • Rule-based access control (RBAC) • Access is allowed or denied to objects based on a set of rules defined by a system administrator • Access properties are stored in Access Control Lists (ACL) associated with each object • Role-based access control (also RBAC) • Also known as Non-discretionary Access Control • Assigns permissions to particular roles in an organization
  • 16. CISSP Mentor Program Session #4 Security Models Understand the Fundamental Concepts of Security Models • State Machine Model • Bell-LaPadula Model • Lattice-Based Access Controls • Biba Model • Clark-Wilson Model • Information Flow Model • Brewer and Nash Model (aka Chinese Wall) • Take-Grant Model • Access Control Matrix • Zachman Framework for Enterprise Architecture • Graham-Denning Model • Harrison-Ruzzo-Ullman Model
  • 17. CISSP Mentor Program Session #4 Security Models State Machine Model • State of a machine is captured in order to verify the security of a system • State consists of all current permissions and all current instances of subjects accessing the objects. If the subject can access objects only by means that are concurrent with the security policy, the system is secure • Always secure no matter what state it is in • Finite state machine (FSM) • State transition • Secure state machine • The basis for most other security models
  • 18. CISSP Mentor Program Session #4 Security Models State Machine Model • State of a machine is captured in order to verify the security of a system • State consists of all current permissions and all current instances of subjects accessing the objects. If the subject can access objects only by means that are concurrent with the security policy, the system is secure • Always secure no matter what state it is in • Finite state machine (FSM) • State transition • Secure state machine • The basis for most other security models
  • 19. CISSP Mentor Program Session #4 Security Models Bell-LaPadula Model • Originally developed for the U.S. Department of Defense • Focused on maintaining the confidentiality of objects • Two Access Rules: • Simple Security Property – no read up • * Security Property (“Star” Security Property) – no write down • Two Object Label Rules: • Strong and Weak Tranquility Property - security labels will not change while the system is operating • Weak Tranquility Property - security labels will not change in a way that conflicts with defined security properties
  • 20. CISSP Mentor Program Session #4 Security Models Lattice-Based Access Controls • Security controls for complex environments • For every relationship between a subject and an object, there are defined upper and lower access limits implemented by the system • Subjects have a Least Upper Bound (LUB) and Greatest Lower Bound (GLB) of access to the objects based on their lattice position • A security lattice model combines multilevel and multilateral security
  • 21. CISSP Mentor Program Session #4 Security Models Biba Model • Developed after Bell-LaPadula model • Focused on maintaining the integrity of objects • Uses a lattice of integrity levels unlike Bell-LaPadula which uses a lattice of security levels • Two primary rules • Simple Integrity Axiom – no read down • * Integrity Axiom (“Star” Integrity Axiom) – no write up • Essentially the reverse of Bell-LaPadula
  • 22. CISSP Mentor Program Session #4 Security Models Clark-Wilson Model • Real-world integrity model • Requires subjects to access objects via programs • Programs have specific limitations to what they can and cannot do to objects • Two primary concepts • Well-Formed Transactions - ability to enforce control over applications; comprised of the “access control triple:” user, transformation procedure (TP/well-formed transaction), and constrained data item (CDI/data that requires integrity) - integrity verification procedures (IVPs) ensure that data are kept in a valid state • Separation of Duties - ensures that authorized users do not change data in an inappropriate way Separation of duties and transformation procedures. 1) Authorized access and 2) Modification only in an authorized manner
  • 23. CISSP Mentor Program Session #4 Security Models Information Flow Model • In this model, data is thought of as being held in individual discrete compartments • Information is compartmentalized based on two factors; classification and need to know • Subject clearance has to dominate the object classification and the subject security profile must contain the one of the categories listed in the object label, which enforces need to know
  • 24. CISSP Mentor Program Session #4 Security Models Brewer and Nash Model (aka Chinese Wall) • Designed to avoid conflicts of interest by prohibiting one person, such as a consultant, from accessing multiple conflict of interest categories (CoIs) • Provides access controls that can change dynamically depending upon a user’s previous actions • Model states that a subject can write to an object if, and only if, the subject can not read another object that is in a different data set • Initially designed to address the risks inherent with employing consultants working within banking and financial institutions
  • 25. CISSP Mentor Program Session #4 Security Models Noninterference Models • Model ensures that any actions that take place at a higher security level do not affect, or interfere with, actions that take place at a lower level • Not concerned with the flow of data, but rather with what a subject knows about the state of the system • Addresses the inference attack that occurs when some one has access to some type of information and can infer(guess) something that he does not have the clearance level or authority to know. • Covert Channel – policy violation hidden from the system owner
  • 26. CISSP Mentor Program Session #4 Security Models Take-Grant Model • Contains rules that govern the interactions between subjects and objects, and permissions subjects can grant to other subjects • Two rights occur in every instance of the model: take and grant • Rules include take, grant, create, and remove • take rule allows a subject to take rights of another object (add an edge originating at the subject) • grant rule allows a subject to grant own rights to another object (add an edge terminating at the subject) • create rule allows a subject to create new objects (add a vertex and an edge from the subject to the new vertex) • remove rule allows a subject to remove rights it has over on another object (remove an edge originating at the subject)
  • 27. CISSP Mentor Program Session #4 Security Models Access Control Matrix • Commonly used in OS and applications • Table that defines access permissions between specific subjects and objects
  • 28. CISSP Mentor Program Session #4 Security Models Zachman Framework for Enterprise Architecture • Six frameworks for providing information security, asking what, how, where, who, when, and why
  • 29. CISSP Mentor Program Session #4 Security Models Graham-Denning Model • Defines a set of basic rights in terms of commands that a specific subject can execute on an object • Three parts; objects, subjects, and rules; focus on the eight (8) rules: • R1: Transfer Access • R2: Grant Access • R3: Delete Access • R4: Read Object • R5: Create Object • R6: Destroy Object • R7: Create Subject • R8: Destroy Subject
  • 30. CISSP Mentor Program Session #4 Security Models Harrison-Ruzzo-Ullman Model • HRU is an operating system level computer security model which deals with the integrity of access rights in the system • Based around the idea of a finite set of procedures being available to edit the access rights of a subject on an object • Maps subjects, objects, and access rights to an access matrix • Variation to the Graham-Denning Model • Six primitive operations: • Create object • Create subject • Destroy subject • Destroy object • Enter right into access matrix • Delete right from access matrix
  • 31. CISSP Mentor Program Session #4 Security Models Modes of Operation • There are four (4) modes of system/access control operation: • Dedicated: • Only one classification (label) for all objects in the system • Subject must possess a clearance equal or greater than the system label • Subjects must have 1) appropriate clearance, 2) formal access approval, and 3) a need to know for all the objects in the system
  • 32. CISSP Mentor Program Session #4 Security Models Modes of Operation • There are four (4) modes of system/access control operation: • System High: • System contains objects of mixed labels • Subjects must possess a clearance equal to (or greater than) the highest object label
  • 33. CISSP Mentor Program Session #4 Security Models Modes of Operation • There are four (4) modes of system/access control operation: • Compartmented: • Objects are placed into “compartments” • Subjects must have a formal (system-enforced) need to know to access data in compartment • All subjects must have 1) Signed NDA for ALL information on the system, 2) clearance for ALL information on the system, 3) formal access approval for SOME objects on the system, and 4) valid need to know for SOME objects on the system
  • 34. CISSP Mentor Program Session #4 Security Models Modes of Operation • There are four (4) modes of system/access control operation: • Multilevel: • System contains objects of varying labels • Subjects with varying clearances can access the system • Reference Monitor mediates access between subjects and objects • All subjects must have 1) Signed NDA for ALL information on the system, 2) clearance for SOME information on the system, 3) formal access approval for SOME objects on the system, and 4) valid need to know for SOME objects on the system
  • 35. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Trusted Computer System Evaluation Criteria (TCSEC or Orange Book) • Developed by the federal government; National Computer Security Center (NCSC), part of the National Institute of Standards and Technology (NIST), and the National Security Agency (NSA) • Developed in 1983 as part of the Rainbow Series • One of the 1st evaluation frameworks • Now used as part of U.S. Government Protection Profiles within the International Common Criteria framework
  • 36. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Trusted Computer System Evaluation Criteria (TCSEC or Orange Book) • Download here http://csrc.nist.gov/publications/history/dod85.pdf • Division D is the lowest form of security, and A is the highest: • D: Minimal Protection • C: Discretionary Protection • C1: Discretionary Security Protection • C2: Controlled Access Protection • B: Mandatory Protection • B1: Labeled Security Protection • B2: Structured Protection • B3: Security Domains • A: Verified Protection • A1: Verified Design
  • 37. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Trusted Network Interpretation (TNI)/Red Book • Sort of like the Orange Book for network systems • Can download it here http://ftp.fas.org/irp/nsa/rainbow/tg011.htm • All of the Rainbow Books can be accessed here http://ftp.fas.org/irp/nsa/rainbow.htm
  • 38. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Information Technology Security Evaluation Criteria (ITSEC) • Used extensively in Europe (where it was developed) • 1st successful international evaluation criteria • References to the Orange Book, but added: • F – Functionality • Q – Effectiveness (part of assurance) • E – Correctness (also part of assurance)
  • 39. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Information Technology Security Evaluation Criteria (ITSEC) • Assurance correctness ratings range from E0 (inadequate) to E6 (formal model of security policy) • Functionality ratings range include TCSEC equivalent ratings (F-C1, F-C2, etc.) • The equivalent ITSEC/TCSEC ratings are: • 0: D • F-C1,E1: C1 • F-C2,E2: C2 • F-B1,E3: B1 • F-B2,E4: B2 • F-B3,E5: B3 • F-B3,E6: A1
  • 40. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation Information Technology Security Evaluation Criteria (ITSEC) • Additional functionality ratings include: • F-IN: High integrity requirements • AV: High availability requirements • DI: High integrity requirements for networks • DC: High confidentiality requirements for networks • DX: High integrity and confidentiality requirements for networks
  • 41. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation International Common Criteria (“Common Criteria”) • Internationally agreed upon standard for describing and testing the security of IT products • Primary objective of the Common Criteria is to eliminate known vulnerabilities of the target for testing • Terms: • Target of Evaluation (ToE): the system or product that is being evaluated • Security Target (ST): the documentation describing the TOE • Protection Profile (PP): an independent set of security requirements and objectives for a specific category of products or systems • Evaluation Assurance Level (EAL): the evaluation score of the tested product or system
  • 42. CISSP Mentor Program Session #4 Evaluation Methods, Certification and Accreditation International Common Criteria (“Common Criteria”) • There are seven (7) Levels of Evaluation (EALs): • EAL1: Functionally tested • EAL2: Structurally tested • EAL3: Methodically tested and checked • EAL4: Methodically designed, tested, and reviewed • EAL5: Semi-formally designed, and tested • EAL6: Semi-formally verified, designed, and tested • EAL7: Formally verified, designed, and tested • Latest version of Common Criteria (July 2009, Version 3.1, Rev.3); http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
  • 43. CISSP Mentor Program Session #4 Secure System Design Concepts Layering • Separates hardware and software functionality into modular tiers • Actions that take place at one layer do not directly affect components in another • For networking types; OSI is an example of layering (covered later) • Generic list of security architecture layers: • Hardware • Kernel (and system/device drivers) • Operating system • Applications
  • 44. CISSP Mentor Program Session #4 Secure System Design Concepts Abstraction – Complexity is the enemy of security • Unnecessary details are hidden from the user • Good example from the book: A user double-clicks on an MP3 file containing music, and the music plays via the computer speakers. Behind the scenes, tremendously complex actions are taking place: the operating system opens the MP3 file, looks up the application associated with it, and sends the bits to a media player. The bits are decoded by a media player, which converts the information into a digital stream, and sends the stream to the computer’s sound card. The sound card converts the stream into sound, sent to the speaker output device. Finally, the speakers play sound. Millions of calculations are occurring as the sound plays, while low-level devices are accessed. Abstraction means the user simply presses play and hears music.
  • 45. CISSP Mentor Program Session #4 Secure System Design Concepts Security Domains • A security domain is the list of objects a subject is allowed to access. • A security domain is also a groups of subjects and objects with similar security requirements • Kernel - the central core of a computer's operating system; two domains (or modes) • User mode – user accounts and processes • Kernel mode (or supervisor mode) – the kernel itself; low-level access to memory and hardware components • The two domains are separated – an error in user mode should not affect kernel mode operation • Operating systems run entirely in kernel mode
  • 46. CISSP Mentor Program Session #4 Secure System Design Concepts The Ring Model • Form of CPU hardware layering used to separate and protect domains (user mode from kernel mode) • Most CPUs (including Intel x86) have four rings • Ring 0 – Kernel • Ring 1 – Operating system components outside of Ring 0 • Ring 2 - Device drivers • Ring 3 – User applications • Processes communicate between the rings via system calls • System calls are slow (compared to performing work within one ring), but provide security • Ring model also provides abstraction • Linux and Windows use rings 0 and 3 only • Hypervisor mode allows virtual guests to operate in ring 0, controlled by the hypervisor one ring “below” (ring -1)
  • 47. CISSP Mentor Program Session #4 Secure System Design Concepts The Ring Model
  • 48. CISSP Mentor Program Session #4 Secure Hardware Architecture Open and Closed Systems • Open systems use open hardware and standards, using standard components from various vendors • IBM-compatible PCs • Closed systems use proprietary hardware or software
  • 49. CISSP Mentor Program Session #4 Secure Hardware Architecture System Unit and Motherboard • System unit is the computer case and everything in it. • The motherboard is the hardware board that typically includes the Central Processing Unit (CPU), memory slots, firmware, and peripheral slots such as PCI (Peripheral Component Interconnect) slots.
  • 50. CISSP Mentor Program Session #4 Secure Hardware Architecture Computer Bus • Primary communication channel on a computer system • Communication between the CPU, memory, and input/output devices such as keyboard, mouse, display, etc., occur via the bus
  • 51. CISSP Mentor Program Session #4 Secure Hardware Architecture Computer Bus • Northbridge – also called the Memory Controller Hub (MCH), connects the CPU to RAM and video memory; directly connected to CPU, so it’s faster • Southbridge - also called the I/O Controller Hub (ICH), connects input/output (I/O) devices, such as disk, keyboard, mouse, CD drive, USB ports, etc.
  • 52. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • The “brains” - capable of controlling and performing mathematical calculations • Everything a computer does is mathematical • Rated by the number of clock cycles per second; a 2.4 GHz Pentium 4 CPU has 2.4 billion clock cycles per second.
  • 53. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Arithmetic Logic Unit (ALU) - performs mathematical calculations • Control Unit (CU) – controls and send instructions to the ALU
  • 54. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Fetch & Execute, process actually takes four steps (one CPU or clock cycle): • Fetch Instruction 1 • Decode Instruction 1 • Execute Instruction 1 • Write (save) result 1
  • 55. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Pipelining combines multiple steps into one combined process; simultaneous fetch, decode, execute, and write steps • Each part is called a pipeline stage
  • 56. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Interrupts cause the CPU to stop processing its current task, save the state, and process a new request. Once the interrupt task is complete, the CPU will start where it left off. • Interrupts are typically hardware related.
  • 57. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Process – an executable program and its data loaded and running in memory • Thread (also called a lightweight process or “LWP”) – a child process; where one process has “spawned” another process. A heavyweight process (or “HWP”) is called a task; one big advantage for threads is that they can share memory. • Process states: • New: a process being created • Ready: process waiting to be executed by the CPU • Running: process being executed by the CPU • Blocked: waiting for I/O • Terminate: a completed process A zombie or orphan is a process (or thread) where the parent is terminated
  • 58. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Multitasking allows multiple tasks (heavy weight processes) to run simultaneously on one CPU • Multiprocessing - multiple processes running on multiple CPUs • Symmetric Multiprocessing (SMP) - one operating system to manage all CPUs • Asymmetric Multiprocessing (AMP) - one operating system image per CPU • Multiprogramming - multiple programs running simultaneously on one CPU • Multithreading - multiple threads (light weight processes) running simultaneously on one CPU
  • 59. CISSP Mentor Program Session #4 Secure Hardware Architecture The Central Processing Unit (CPU) • Watchdog Timers are designed to recover a system by rebooting after critical processes hang or crash • Complex Instruction Set Computer (CISC) • Reduced Instruction Set Computer (RISC)
  • 60. CISSP Mentor Program Session #4 Secure Hardware Architecture Memory Protection • Preventing processes from accessing memory space belonging to another • Memory protection is required for multi-user systems Process Isolation • Logical control that attempts to prevent one process from interfering with another • Object encapsulation - treats a process as a “black box” • Time multiplexing - multiplexes system resources between multiple processes, each with a dedicated slice of time
  • 61. CISSP Mentor Program Session #4 Secure Hardware Architecture Memory Protection • Preventing processes from accessing memory space belonging to another • Memory protection is required for multi-user systems Hardware Segmentation • Completely separate hardware Virtual Memory • Virtual address mapping between applications and hardware memory
  • 62. CISSP Mentor Program Session #4 Secure Hardware Architecture Memory Protection • Preventing processes from accessing memory space belonging to another • Memory protection is required for multi-user systems Swapping and Paging • Uses virtual memory to copy contents in primary memory (RAM) to or from secondary memory (not directly addressable by the CPU, on disk) • Kernel accessing memory in swap space results in a page fault
  • 63. CISSP Mentor Program Session #4 Secure Hardware Architecture BIOS • Basic Input Output System • contains code in firmware that is executed when a PC is powered on • 1st thing it does is run the Power On Self-Test (POST) • POST finds the boot sector that contains machine code for the OS kernel • Kernel loads and executes into the OS
  • 64. CISSP Mentor Program Session #4 Secure Hardware Architecture In general, the MBR consists of 512 or more bytes located in the first sector of the drive.
  • 65. CISSP Mentor Program Session #4 Secure Hardware Architecture WORM Storage • Write Once Read Many • Usually used for record retention and high integrity information • CD-Rs, DVD-Rs, etc. • Not CD-RWs or DVD-RWs
  • 66. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Trusted Platform Module (or TPM) • Developed and updated by the Trusted Computing Group; international standard • Processor that can provide additional security capabilities in hardware • Usually on the motherboard • Hardware-based encryption (fast) • Boot integrity – protecting against rootkits and kernel bypass attacks • Platform integrity and disk encryption (primary uses)
  • 67. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Trusted Platform Module (or TPM) Tidbit The United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by DISA STIGs and where such technology is available."
  • 68. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Kernel • Heart (or core) of the operating system, usually running at ring 0 • Interface between the operating system and hardware • Monolithic kernel - compiled into one static executable and the entire kernel runs in supervisor mode; requires recompiling to add new features • Microkernel – a modular kernel; can add functionality via loadable kernel modules
  • 69. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Kernel • Reference monitor – core function of the kernel; mediates all access between subjects and objects • Always enabled and cannot be bypassed
  • 70. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Users and File Permissions • Types of permissions available depend on the file system being used • Linux and UNIX permissions • Read (“r”) • Write (“w”) • Execute (“x”) • permissions may be set separately to the owner, group, or world
  • 71. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Users and File Permissions Linux and UNIX permissions - output of a Linux “ls –la /etc”
  • 72. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Users and File Permissions • Types of permissions available depend on the file system being used • Microsoft NTFS Permissions • Read • Write • Read and execute • Modify • Full control (read, write, execute, modify, and in addition the ability to change the permissions.)
  • 73. CISSP Mentor Program Session #4 Secure Operating System and Software Architecture Users and File Permissions
  • 74. Questions? We made it through Class #4! We’re leaving off at “Virtualization and Distributed Computing” No Quiz, so we’ll have no problem catching up… Homework for Tuesday (4/11) ◦ Continue reading Chapter 4/Domain 3: Security Engineering (Engineering and Management of Security) – We will cover the rest of this chapter and it will be a lot of information! ◦ Come with questions! Have a great evening, talk to you Tuesday!
  • 75. Questions? Hopefully about security. Thank you! Evan Francen ◦ FRSecure ◦ efrancen@frsecure.com ◦ 952-467-6384