61
INFORMATION SECURITY MANAGEMENT LECTURE 6: SECURITY MANAGEMENT MODELS You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Embed Size (px)

Citation preview

Page 1: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

INFORMATION SECURITY MANAGEMENT

LECTURE 6: SECURITY MANAGEMENT MODELS

You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Page 2: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Access Control Models

• Access controls– Regulate the admission of users into trusted

areas of the organization

• Key principles of access control – Least privilege– Need to Know– Separation of Duties

Page 3: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

How to measure the value of information - CIA Triangle

IdentificationAuthentication AuthorizationPrivacyAccountability

Expanded toinclude

The value of information comes from the characteristics it possesses

Page 4: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Privacy

Information collected, used, and stored by an organization is to be used only for the purposes stated to the data owner at the time it was collected

Privacy as a characteristic of information does not signify freedom from observation

Means that information will be used only in ways known to the person providing it

Page 5: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Accountability

Exists when a control provides assurance that every activity undertaken can be attributed to a named person or automated process

Page 6: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Identification and Authentication

Identification– An information system possesses the characteristic

of identification when it is able to recognize individual users

– Identification and authentication are essential to establishing the level of access or authorization that an individual is granted

Authentication – Occurs when a control proves that a user possesses

the identity that he or she claims

Page 7: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Authorization

Assures that the user has been specifically and explicitly authorized by the proper authority to access, update, or delete the contents of an information asset

Authorization occurs after authentication

Page 8: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Controlling Access

Page 9: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Identification and Authentication

Identification: unproven assertion of identity “My name is…” Userid

Authentication: proven assertion of identity Userid and password Userid and PIN Biometric

Page 10: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Authentication Methods

What the user knows What the user has What the user is

Page 11: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

How Information Systems Authenticate Users Request userid and password

Hash password Retrieve stored userid and hashed password Compare

Make a function call to a network based authentication service

Page 12: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

How a System Stores Userids and Passwords

Typically stored in a database table Application database or authentication database Userid stored in plaintext Password stored encrypted or hashed

Page 13: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Password Hashes

LM hash is weak, no longer used in Win 7 NT hash is stronger, but not salted

http://www.emc.com/collateral/software/white-papers/h11013-rsa-dcp-0812-wp.pdf

Page 14: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Strong Authentication

Traditional userid + password authentication has known weaknesses

Stronger types of authentication available, usually referred to as “strong authentication”

Page 15: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Token: Two Factor Authentication

First factor: what user knows

Second factor: what user has

Without the second factor, user cannot log in

Page 16: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Token: Two Factor Authentication

Page 17: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Biometric Authentication

Stronger than userid + password

Stronger than two-factor? Can be hacked

Page 18: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Authentication Issues

Password quality Consistency of user credentials across

multiple environments Too many userids and passwords Handling password resets Dealing with compromised passwords Staff terminations

Page 19: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Categories of Access Control

Page 20: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Categories of Access Control

• Preventative• Deterrent• Detective• Corrective• Recovery• Compensating

Page 21: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Preventive Controls

Block or control specific events Firewalls Anti-virus software Encryption Key card systems Bollards stop cars (as shown)

Page 22: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Deterrent/Detective Controls

Deterrent Controls Highly visible Prevent offenses by influencing

choices of would-be intruders

Detective Controls Monitor and record specific types

of events Does not stop or directly influence

events

Page 23: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Corrective/Recovery Controls

Corrective Controls Post-event controls to prevent recurrence “Corrective” refers to when it is implemented Examples (if implemented after an incident)

Spam filter Anti-virus on e-mail server WPA Wi-Fi encryption

Recovery Control Post-incident controls to recover systems

Page 24: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Compensating Controls

Control that is introduced that compensates for the absence or failure of a control

“Compensating” refers to why it is implemented

Examples Daily monitoring of anti-virus console Monthly review of administrative logins Web Application Firewall used to protect buggy

application

Page 25: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Another Approach:Types of Controls Technical Operational (aka Physical) Management (aka Administrative)

Page 26: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Another Approach:Degree of Authority

Mandatory Access Controls

Discretionary Access Controls

Role Based Access Controls

Page 27: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

• Data classification scheme

• Rates collection of info and user with sensitivity levels

• When implemented, users and data owners have limited control over access

Mandatory Access Control (MAC) Security Model

Page 28: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

• Data classification scheme/model– Data owners classify the information assets – Reviews periodically

• Security clearance structure – Each user assigned an authorization level– Roles and corresponding security clearances

Mandatory Access Control (MAC) Security Model

Page 29: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Discretionary Access Control (DAC) Security Model

The owner of an object controls who and what may access it.

Access is at the owner’s discretion.

Most personal computer operating systems are designed based on the DAC model

Page 30: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Role-based Access Control (RBAC) Security Model Nondiscretionary Controls

An improvement over the mandatory access control (MAC) security model• Role-based controls • Task-based controls

Simplifies management in a complex system with many users and objects

Page 31: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Access Control Technologies

Page 32: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Testing Access Controls

Page 33: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Testing Access Controls

Access controls are the primary defense that protect assets

Types of tests: Penetration tests Application vulnerability tests Code reviews

http://secunia.com/community/

Page 34: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Penetration Testing

Automatic scans to discover vulnerabilities

Example tools: Nessus, Nikto, SAINT, Superscan, Retina, ISS, Microsoft Baseline Security Analyzer

Page 35: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Application Vulnerability Testing

Discover vulnerabilities in an application

Automated tools and manual tools

Example vulnerabilities Cross-site scripting, injection flaws, malicious

file execution, broken authentication, broken session management, information leakage, insecure use of encryption, and many more

Page 36: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Audit Log Analysis

Regular examination of audit and event logs Detect unwanted events Audit log protection

Page 37: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Access Control Attacks

Page 38: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Access Control Attacks

Intruders will try to defeat, bypass, or trick access controls in order to reach their target

Attack objectives Guess credentials Malfunction of access controls Bypass access controls Replay known good logins Trick people into giving up credentials

Page 39: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Buffer Overflow

Cause malfunction in a way that permits illicit access

Send more data than application was designed to handle properly

Countermeasure: “safe” coding that limits length of input data; filter input data to remove unsafe characters

Page 40: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Script Injection

Insertion of scripting language characters into application input fields Execute script on server side Execute script on client side – trick user or

browser

Countermeasures: strip “unsafe” characters from input

Page 41: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Data Remanence

Literally: data that remains after it has been “deleted”

Examples Deleted hard drive files Erased files Discarded / lost media: USB keys, backup

tapes, CDs

Countermeasures: improve media physical controls (e.g. post Wikileaks controls)

Page 42: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Denial of Service (DoS)

Actions that cause target system to fail, thereby denying service to legitimate users Distributed Denial of Service (DDoS)

Countermeasures: input filters, patches, high capacity

Page 43: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Eavesdropping

Interception of data transmissions

Methods

Countermeasures: encryption, stronger encryption

Page 44: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Spoofing and Masquerading

Specially crafted network packets that contain forged address of origin

Countermeasures: router / firewall configuration to drop forged packets, judicious use of e-mail for signaling or data transfer

http://www.techrepublic.com/blog/security/how-to-spoof-a-mac-address/395

Page 45: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Social Engineering

Tricking people into giving out sensitive information by making them think they are helping someone

Methods

Schemes

Countermeasures: security awareness training

Page 46: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Phishing

Incoming, fraudulent e-mail messages designed to give the appearance of origin from a legitimate institution

Tricks user into providing sensitive data via a forged web site (common) or return e-mail (less common)

Countermeasure: security awareness training

Page 47: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Pharming

Redirection of traffic to a forged website

Countermeasures: user awareness training, patches, better controls

Page 48: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Malicious Code

Viruses, worms, Trojan horses, spyware, key logger

Harvest data or cause system malfunction

Countermeasures: anti-virus, anti-spyware, security awareness training

Page 49: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Security Architecture Models

Page 50: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Security Architecture Models

• Can help organizations quickly make improvements through adaptation

• Can focus on:– computer hardware and software– policies and practices– the confidentiality of information– the integrity of the information

Pick one and go with it

Page 51: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Bell-LaPadula Confidentiality Model

• A state machine model that helps ensure the confidentiality of an information system– Using mandatory access controls (MACs),

data classification, and security clearances

Page 52: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Biba Integrity Model

• Provides access controls to ensure that objects or subjects cannot have less integrity as a result of read/write operations

• Ensures no information from a subject can be passed on to an object in a higher security level– This prevents contaminating data of higher

integrity with data of lower integrity

Page 53: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Clark-Wilson Integrity Model

• Built upon principles of change control rather than integrity levels

• Its change control principles– No changes by unauthorized subjects– No unauthorized changes by authorized

subjects – The maintenance of internal and external

consistency

Page 54: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Graham-Denning Access Control Model

• Composed of three parts– A set of objects– A set of subjects (a process and a domain)– A set of rights

• • Primitive protection rights

– Create or delete object, create or delete subject

– Read, grant, transfer and delete access rights

Page 55: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Harrison-Ruzzo-Ullman Model

• Defines a method to allow changes to access rights and the addition and removal of subjects and objects– Since systems change over time, their

protective states need to change

• Built on an access control matrix

• Includes a set of generic rights and a specific set of commands

Page 56: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Brewer-Nash Model (aka Chinese Wall)• Designed to prevent a conflict of interest

between two parties

• Requires users to select one of two conflicting sets of data, after which they cannot access the conflicting data

Page 57: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

The ISO 27000 Series

• Information Technology – Code of Practice for Information Security Management– One of the most widely referenced and

discussed security models– Originally published as British Standard 7799

and then later as ISO/IEC 17799– Since been renamed ISO/IEC 27002

• Establishes guidelines for initiating, implementing, maintaining, and improving information security management

Page 58: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

The ISO 27000 Series (cont’d.)

Page 59: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

Control Objectives for Information and Related Technology (COBIT)• Control Objectives for Information and

Related Technology (COBIT)– Provides advice about the implementation of

sound controls and control objectives for InfoSec

– Created by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI) in 1992

Page 60: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

COSO

• A U.S. private-sector initiative– Major Objective: identify factors that cause

fraudulent financial reporting and to make recommendations to reduce its incidence

– Has established a common definition of internal controls, standards and criteria

– Helps organizations comply with critical regulations like Sarbanes-Oxley

Page 61: INFORMATION SECURITY MANAGEMENT L ECTURE 6: S ECURITY M ANAGEMENT M ODELS You got to be careful if you don’t know where you’re going, because you might

COSO (cont’d.)

• Built on five interrelated components:– Control environment– Risk assessment– Control activities– Information and communication– Monitoring