47
SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University [email protected] www.list.gmu.edu

SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University [email protected]

Embed Size (px)

Citation preview

Page 1: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

SECURING CYBERSPACE:THE OM-AM, RBAC AND PKI

ROADMAP

Prof. Ravi SandhuLaboratory for Information Security Technology

George Mason University

[email protected]

www.list.gmu.edu

Page 2: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

2© Ravi Sandhu 2000

INTERNET INSECURITY

Internet insecurity spreads at Internet speed Morris worm of 1987 Password sniffing attacks in 1994 IP spoofing attacks in 1995 Denial of service attacks in 1996 Email borne viruses 1999 Distributed denial of service attacks 2000

Internet insecurity grows at super-Internet speed security incidents are growing faster than the Internet (which

has roughly doubled every year since 1988)

Page 3: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

3© Ravi Sandhu 2000

INTERNET INSECURITY

Its only going to get worse

Page 4: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

4© Ravi Sandhu 2000

INTERNET SECURITY

There are no clear cut boundaries in modern cyberspace AOL-Microsoft instant messaging war of

1999 Hotmail password bypass of 1999 Ticketmaster deep web links ebay versus auction aggregators

Page 5: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

5© Ravi Sandhu 2000

SECURITY OBJECTIVES

INTEGRITYmodification

AVAILABILITYaccess

CONFIDENTIALITYdisclosure

USAGE-CONTROLpurpose

Page 6: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

6© Ravi Sandhu 2000

AUTHORIZATION, TRUST AND RISK

Information security is fundamentally about managing authorization and trust

so as to manage risk

Page 7: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

7© Ravi Sandhu 2000

SECURITY DOCTRINE

Prevent Detect Correct Accept

Page 8: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

8© Ravi Sandhu 2000

SECURITY DOCTRINE

absolute security is impossible does not mean absolute insecurity is acceptable

security is a journey not a destination

Page 9: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

9© Ravi Sandhu 2000

SOLUTIONS

OM-AM RBAC PKI and others

Page 10: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

10© Ravi Sandhu 2000

THE OM-AM WAY

Objectives

Model

Architecture

Mechanism

What?

How?

Assurance

Page 11: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

11© Ravi Sandhu 2000

LAYERS AND LAYERS

Multics rings Layered abstractions Waterfall model Network protocol stacks OM-AM

Page 12: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

12© Ravi Sandhu 2000

OM-AM AND MANDATORY ACCESS CONTROL (MAC)

What?

How?

No information leakage

Lattices (Bell-LaPadula)

Security kernel

Security labels

Assurance

Page 13: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

13© Ravi Sandhu 2000

OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)

What?

How?

Owner-based discretion

numerous

numerous

ACLs, Capabilities, etc

Assurance

Page 14: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

14© Ravi Sandhu 2000

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Policy neutral

RBAC96

user-pull, server-pull, etc.

certificates, tickets, PACs, etc.

Assurance

Page 15: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

15© Ravi Sandhu 2000

ROLE-BASED ACCESS CONTROL (RBAC)

A user’s permissions are determined by the user’s roles rather than identity or clearance roles can encode arbitrary attributes

multi-faceted ranges from very simple to very

sophisticated

Page 16: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

16© Ravi Sandhu 2000

RBAC SECURITY PRINCIPLES

least privilege separation of duties separation of administration and

access abstract operations

Page 17: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

17© Ravi Sandhu 2000

RBAC96IEEE Computer Feb. 1996

Policy neutral can be configured to do MAC

roles simulate clearances (ESORICS 96) can be configured to do DAC

roles simulate identity (RBAC98)

Page 18: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

18© Ravi Sandhu 2000

RBAC96 FAMILY OF MODELS

RBAC0BASIC RBAC

RBAC3ROLE HIERARCHIES +

CONSTRAINTS

RBAC1ROLE

HIERARCHIES

RBAC2CONSTRAINTS

Page 19: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

19© Ravi Sandhu 2000

RBAC0

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

Page 20: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

20© Ravi Sandhu 2000

RBAC1

ROLES

USER-ROLEASSIGNMENT

PERMISSION-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

Page 21: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

21© Ravi Sandhu 2000

HIERARCHICAL ROLES

Health-Care Provider

Physician

Primary-CarePhysician

SpecialistPhysician

Page 22: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

22© Ravi Sandhu 2000

HIERARCHICAL ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

Page 23: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

23© Ravi Sandhu 2000

PRIVATE ROLES

Engineer

HardwareEngineer

SoftwareEngineer

SupervisingEngineer

HardwareEngineer’

SoftwareEngineer’

Page 24: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

24© Ravi Sandhu 2000

EXAMPLE ROLE HIERARCHY

Employee (E)

Engineering Department (ED)

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Director (DIR)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 25: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

25© Ravi Sandhu 2000

EXAMPLE ROLE HIERARCHY

Employee (E)

Engineering Department (ED)

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 26: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

26© Ravi Sandhu 2000

EXAMPLE ROLE HIERARCHY

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Director (DIR)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 27: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

27© Ravi Sandhu 2000

EXAMPLE ROLE HIERARCHY

Project Lead 1(PL1)

Engineer 1(E1)

Production 1(P1)

Quality 1(Q1)

Project Lead 2(PL2)

Engineer 2(E2)

Production 2(P2)

Quality 2(Q2)

PROJECT 2PROJECT 1

Page 28: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

28© Ravi Sandhu 2000

RBAC3

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 29: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

29© Ravi Sandhu 2000

CONSTRAINTS

Mutually Exclusive Roles Static: The same individual can never hold both roles Dynamic: The same individual can never activate both

roles in the same context

Mutually Exclusive Permissions Cardinality Constraints on User-Role Assignment Cardinality Constraints on Permissions-Role

Assignment

Page 30: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

30© Ravi Sandhu 2000

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Policy neutral

RBAC96

user-pull, server-pull, etc.

certificates, tickets, PACs, etc.

Assurance

Page 31: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

31© Ravi Sandhu 2000

CLIENT-SERVERSERVER-PULL ARCHITECTURE

Client Server

AuthorizationServer

AuthenticationServer

Page 32: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

32© Ravi Sandhu 2000

CLIENT-SERVER USER-PULL ARCHITECTURE

Client Server

AuthorizationServer

AuthenticationServer

Page 33: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

33© Ravi Sandhu 2000

CLIENT-SERVER PROXY OR THREE-TIER

Client ServerAuthorization

Server

AuthenticationServer

Page 34: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

34© Ravi Sandhu 2000

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Policy neutral

RBAC96

user-pull, server-pull, etc.

certificates, tickets, PACs, etc.

Assurance

Page 35: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

35© Ravi Sandhu 2000

Related Mechanisms

Cookies in widespread current use for maintaining

state of HTTP becoming a standard not secure

Public-Key Certificates (X.509) support security on the Web based on PKI standard simply, bind users to keys have the ability to be extended

Page 36: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

36© Ravi Sandhu 2000

Cookies

Page 37: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

37© Ravi Sandhu 2000

Security Threats to Cookies

Cookies are not secure No authentication No integrity No confidentiality

can be easily attacked by Network Security Threats End-System Threats Cookie Harvesting Threats

Page 38: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

38© Ravi Sandhu 2000

How to Use Secure Cookies

Page 39: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

39© Ravi Sandhu 2000

Secure Cookies on the Web

Page 40: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

40© Ravi Sandhu 2000

Applications of Secure Cookies

User Authentication Electronic Transaction Pay-Per-Access Attribute-based Access Control

Page 41: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

41© Ravi Sandhu 2000

X.509 Certificate Digitally signed by a certificate authority

to confirm the information in the certificate belongs to the holder of the corresponding private key

Contents version, serial number, subject, validity period,

issuer, optional fields (v2) subject’s public key and algorithm info. extension fields (v3) digital signature of CA

Binding users to keys Certificate Revocation List (CRL)

Page 42: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

42© Ravi Sandhu 2000

X.509 Certificate

Page 43: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

43© Ravi Sandhu 2000

Smart Certificates

Short-Lived Lifetime More secure

typical validity period for X.509 is months (years)

the longer-lived certificates have a higher probability of being attacked

– users may leave copies of the corresponding keys behind

No Certificate Revocation List (CRL) supports simple and less expensive PKI

Page 44: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

44© Ravi Sandhu 2000

Smart Certificates

Containing Attributes Securely Web servers can use secure attributes for

their purposes Each authority has independent control

on the corresponding information basic certificate (containing identity

information) each attribute can be added, changed,

revoked, or re-issued by the appropriate authority

– e.g., role, credit card number, clearance, etc.

Page 45: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

45© Ravi Sandhu 2000

Applications of Smart Certificates

Very similar to applications of secure cookies

Page 46: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

46© Ravi Sandhu 2000

THE OM-AM WAY

Objectives

Model

Architecture

Mechanism

What?

How?

Assurance

Page 47: SECURING CYBERSPACE: THE OM-AM, RBAC AND PKI ROADMAP Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University sandhu@gmu.edu

47© Ravi Sandhu 2000

INTERNET INSECURITY

Its only going to get worse But security is a fun and profitable

business and will get more so