slide1 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for PowerPoint Presentation
Download Presentation
The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for

Loading in 2 Seconds...

play fullscreen
1 / 9

The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for - PowerPoint PPT Presentation


  • 225 Views
  • Uploaded on

The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio May 2009 ravi.sandhu@utsa.edu www.profsandhu.com Presented by: Ram Krishnan, GMU

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for' - bernad


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

The PEI Framework for

Application-Centric Security

Prof. Ravi Sandhu

Executive Director and Endowed Chair

Institute for Cyber Security

University of Texas at San Antonio

May 2009

ravi.sandhu@utsa.edu

www.profsandhu.com

Presented by:

Ram Krishnan, GMU

PEI = Policy, Enforcement, Implementation

application context
Application Context
  • Our Basic Premise

There can be no security without application context

  • Orange Book and Rainbow Series era (1983-1994)

Opposite Premise

Application context makes high assurance security impossible to achieve

    • May need to settle for “reasonable” assurance or “good-enough” security
    • Its about “mission assurance” not “information assurance”
rainbow series
Rainbow Series
  • 34 titles listed in Wikipedia as the “most significant Rainbow series books”
  • Only 1 addresses applications
    • Trusted Database Interpretation (TDI)
    • Scope: “Trusted Applications in general and database management system in particular”
application context4
Application Context

Software-

Architect Project % Time Label

Alice Win7 25% U

Alice SecureWin7 75% S

Bob Vista 100% U

  • What precisely is Secret?
    • There exists a SecureWin7 project
    • Alice works on SecureWin7
    • Alice’s effort on SecureWin7 is 75%
    • All or some of the above
  • How do we maintain integrity of the database?
    • Depends

Much work and $$$ by researchers and vendors, late 80’s-early 90’s

orange rainbow fatal flaws
Orange/Rainbow Fatal Flaws
  • Enforcement of 1-way information flow in a lattice is not the dominant concern for most applications
  • Avoiding covert channels is not the highest priority for most applications
  • Exclusion of cryptography probably not the right decision for securing distributed systems
post orange era
Post-Orange Era
  • Firewalls, patch cycle, vulnerability scanners, intrusion detection, intrusion prevention, Identity Management, Federation, SSL, VPNs, PKI, etc
  • Emergence and dominance of RBAC over MAC/DAC
  • Emergence of highly motivated, sophisticated and innovative attackers
emerging application centric era ace
Emerging Application-Centric Era (ACE)

ECE

Enterprise-Centric Era

(Orange/Rainbow Era

Post-Orange Era)

ACE

Application-Centric Era

  • Applications are cyber analogs of
  • previously existing enterprise-centric
  • applications
  • on-line banking
  • brokerage
  • e-retail
  • auctions
  • search engines
  • Future applications will be
  • fundamentally different
  • ?
  • ?
  • ?
  • ?
  • ?

. Social Networking Websites?

ace characteristics
ACE Characteristics
  • Multi-party interests
  • Fuzzy security objectives
  • Attack/threat models
pei models
PEI Models

Security and system goals

(objectives/policy)

  • Necessarily informal
  • Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting.
  • Security analysis (objectives, properties, etc.).

Policy models

  • Approximated policy realized using system architecture with trusted servers, protocols, etc.
  • Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.).

Enforcement models

  • Technologies such as Cloud Computing, Trusted Computing, etc.
  • Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.)

Implementation models

Concrete System

  • Software and Hardware