1 / 15

Chapter 2

Access Control Fundamentals. Chapter 2. Chapter Overview. Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating System Assessment criteria to be used against each operating system. Protection Systems.

ferrell
Download Presentation

Chapter 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Access Control Fundamentals Chapter 2

  2. Chapter Overview • Protection Systems • Mandatory Protection Systems • Reference Monitors • Definition of a Secure Operating System • Assessment criteria to be used against each operating system.

  3. Protection Systems • Recall the concepts of subjects, objects and permissions from the previous chapter. • The most complete description, at given point in time, of what is allowed within a given computer system is given by a function which tells us, for a given subject and object, what the subject may do with the object. • The best way to represent this function is by means of a matrix called an access matrix.

  4. An access matrix

  5. So, what is a protection system? • Informally, a protection system is a description of what is allowed in a computer system, together with a set of rules that allow us to modify a description. • Formally: • A protection system consists of a protection state, and a set of protection state operations which enable modifications to that state.

  6. More Formal Definitions: • An access matrix consists of a set of subjects S a set of objects O a set of operations OP and a function ops(s,o)⊂OP, which determines the operations that subject s can perform on object o. • A protection domain specifies the set of resources (objects) that a process can access and the operations that a process may use to access such resources.

  7. Alternate representations for the access matrix • Instead of storing the whole matrix, which is usually occupied mostly by empty permissions, other representations are often used: • Each object with its associated column, called its access control list or ACL. • By rows, with each subject: called a capability list or C-List

  8. Mandatory Protection Systems

  9. Mandatory Protection Systems • A mandatory protection system is a protection system that can only be modified by trusted administrators via trusted software, consisting of the following state representations: • A mandatory protection state is a state where subjects and objects are represented by labels where the state describes the operations that subject labels may take upon object labels. • A labeling state for mapping processes and system resource objects to labels. • A transition state that describes the legal ways that processes and system resource objects may be relabeled.

  10. How it works • The labels are fixed and define the access relations. • Subjects and objects are assigned different labels according to need. • When circumstances changes, labels may change also. • However, permissions are constrained to those defined by the labels • In addition, label assignment/reassignment is a “privileged operation”.

  11. In Pictures....

  12. Reference Monitors • A reference monitor is the classical access enforcement mechanism. It takes a request as input and returns a positive or negative response (authorization). • Three components: • Interface • Authorization module • Policy store

  13. What is a Secure Operating System? • A secure operating system is an operating system where its access enforcement mechanism satisfies the reference monitor concept: • Complete mediation: all security security- sensitive operations are checked. • Tamper-proof: Cannot be modified by untrusted processes • Verifiable.

  14. Assessment Criteria • Complete Mediation • Correctness of subjects/objects • Completeness • Formal verification • Tamperproof • Protection of reference monitor. • Protection of the Trusted Computing Base • Verifiable • Basis for the correctness of the TCB. • Enforcement of the system's security goals?

More Related