Security Architecture and Design
Security Architecture and Design
Design: Part II
Le
o r y arn
e
Th by ing
ce Do
ac ti ing
Pr
IST 515
The Transformation Process
The security policy provides the abstract goals and the security
model provides the do’s and don’ts necessary to fulfill the goals
Example
Security Model
Divulging Divulging
Χ Secrets Χ Secrets
Layer of
Lower Secrecy Simple Strong
Star (*)
Security Star (*)
Property
Property Property
Biba Security Model
• Developed in 1977, the Biba integrity model
mathematically describes read and write
restrictions based on integrity access classes of
subjects and objects. It is the first model to
address integrity.
• Is an information flow model as it is concerned
about data flowing from one level to another.
• The model looks similar to the Bell-LaPadula
Model; however, the read-write conditions are
reversed.
Biba Integrity Model Axiom
• The Simple Integrity Axiom: States that a subject at
one level of integrity is not permitted to observe
(read) an object of a lower integrity. No Read Down.
• The * (Star) Integrity Axiom: States that an object at
one level of integrity is not permitted to modify
(write to) an object of a higher level of integrity. No
Write Up.
• Invocation property states that a subject at one level
of integrity cannot invoke (call up) a subject at a
higher level of integrity.
The Biba Model
Layer of
Higher Secrecy Χ Contamination
Read Write
Get
Contaminated
Layer of Χ
Lower Secrecy Simple Integrity
Integrity Star (*)
Property Property
The Invocation Property
Users
UDI
CDI
CDI 1
CDI 2
TP IVP
CDI 3
Log CDI
Clark-Wilson Model
• Security. • Functionality.
• Cost. • Effectiveness.
• Flexibility. • Assurance.
• Environmental.
• User interface.
• System
administration.
• Future development
of a product.
• Process.
Security / System Evaluation
• A security evaluation examines the security-relevant
parts of a system including:
– Trusted computing base (TCB)
– Access control mechanisms.
– Reference monitor
– Kernel
– Protection mechanisms.
• There are different methods of evaluating and assigning
assurance levels to systems, as various parts of the
world look at computer security differently and rate
some aspects of security differently.
Security Evaluation Standards
• Trusted Computer Security Evaluation Criteria (TCSEC):
– 1985 by the National Computer Security Center (NCSC)
– Also known as Orange Book of the Rainbow Series.
– Address Confidentiality.
• The Trusted Network Interpretation (TNI):
– 1987, known as Red Book
– Address network and telecommunications
• Information Technology Security Evaluation Criteria (ITSEC):
– Drafted in 1990 and endorsed by the Council of the European
Union in 1995.
– Include integrity and availability as well as confidentiality as
security goals.
• The Common Criteria (CC):
– Based on the U.S. Federal Criteria that expanded on the ITSEC.
– An international standard to evaluate trust.
Orange Book - TCSEC