new-trusted-os.PDF

Similar documents
CIA+

2006/6/ /9/1 2007/11/9 () 2011/4/ ( ()) ii

A B C B C ICT ICT ITC ICT

評論・社会科学 84号(よこ)(P)/3.金子

内閣官房情報セキュリティセンター(NISC)

Web Web Web Web Web, i

.N..

JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25

7,, i

2

"CAS を利用した Single Sign On 環境の構築"

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE

<95DB8C9288E397C389C88A E696E6462>

橡セキュリティポリシー雛形策定に関する調査報告書

Frequently Asked Questions (FAQ) About Sunsetting the SW-CMMR

Information Security Management System ISO/IEC 27001:2005 ISMS A Copyright JIPDEC ISMS,

日本国憲法における「社会福祉」

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

A5 PDF.pwd

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

21 Key Exchange method for portable terminal with direct input by user

YUHO

MRI | 所報 | 分権経営の進展下におけるグループ・マネジメント

2 94

Bull. of Nippon Sport Sci. Univ. 47 (1) Devising musical expression in teaching methods for elementary music An attempt at shared teaching

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~


大学における原価計算教育の現状と課題

,,,,., C Java,,.,,.,., ,,.,, i

情報セキュリティの現状と課題

"CAS を利用した Single Sign On 環境の構築"

etrust Access Control etrust Access Control UNIX(Linux, Windows) 2



産業構造におけるスポーツ産業の範囲に関する研究Ⅰ



2 Web Security for the Enterprise

第33回鋼構造基礎講座 鋼橋の架設および解体撤去工法-より一層の安全性と品質の向上に向けて-

Vol. 48 No. 3 Mar PM PM PMBOK PM PM PM PM PM A Proposal and Its Demonstration of Developing System for Project Managers through University-Indus

FA FA FA FA FA 5 FA FA 9

Systemwalker IT Service Management Systemwalker IT Service Management V11.0L10 IT Service Management - Centric Manager Windows

3_23.dvi

スライド 1

* 1 e CD-ROM e e e 3 e e e CD-ROM DVD CBT(Computer Based Training) e 2002 e e electronic( ) WBT Web Based Training on-demand IT e e 1 y

16_.....E...._.I.v2006

Microsoft PowerPoint - #07 Quiz Are you still with me .pptx

Copyright SATO International All rights reserved. This software is based in part on the work of the Independen

08_中嶋真美.indd

企業内システムにおけるA j a x 技術の利用

Web Basic Web SAS-2 Web SAS-2 i


ITSM.PDF

unix.dvi

デフレの定義(最新版).PDF

soturon.dvi

Phonetic Perception and Phonemic Percepition

L3 Japanese (90570) 2008

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

5005-toku3.indd

日本看護管理学会誌15-2




07_伊藤由香_様.indd

) ,

(2) IPP Independent Power Producers IPP 1995 NCC(New Common Carrier NCC NTT NTT NCC NTT NTT IPP 2. IPP (3) [1] [2] IPP [2] IPP IPP [1] [2]

Appropriate Disaster Preparedness Education in Classrooms According to Students Grade, from Kindergarten through High School Contrivance of an Educati

今企業が取るべきセキュリティ対策とは策

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

Transcription:

security 101 TCSEC BLS (B level security) / US DoD CMWEC (Compartmented Mode Workstation) / TAC4 for US NAVY Post Bell-La Padula model 2002 Slide 1 1986 ( ) International R&D 1990 ( ) 1993 2 1996 1997 ( ) (www.ipsj.or.jp/) (www.jnsa.org/) (www.ipa.go.jp/) (www.fisc.or.jp/) (www.itscj.ipsj.or.jp/) SC 27/WG 1 Slide 2 Copyright 2001,2002 HP Page 1

http://www.ipa.go.jp/security/awareness/vendor/programming/intro.html Slide 3 DMZ 1 2 TCSEC-BLS, CMWEC 3 Slide 4 Copyright 2001,2002 HP Page 2

OS OpenHack 2 (Y2000) OpenHack 3 (Y2001) Slide 5 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 6 Copyright 2001,2002 HP Page 3

subject access object Slide 7 illegal access unauthorized access abuse of authorization Slide 8 Copyright 2001,2002 HP Page 4

Slide 9 CLASSIFICATION DESIGN CLASSIFICATION MODEL clearances sensitivity levels + compartments markings - (worst practice: floating label) HOW TO BE HANDLED (not based on attribute) CRITERIA TO CLASSIFY when? at creation (concern about 1:N) who? by creator (concern about 1:N) what? Just Enough (is better than Baseline) Slide 10 Copyright 2001,2002 HP Page 5

Step 1.4 Classification (Level, Compartment & Marking) Slide 11 security strength depends on audit enforced by integrity ex) WRITE UP makes containment against abuse of authorization / Slide 12 Copyright 2001,2002 HP Page 6

CLASSIFICATION AUTHENTICATION ACCESS CONTROL INFORMATION FLOW CONTROL LEAST PRIVILEGE AUTHORIZATION (DUAL LOCK) AUDITING covert channel Audit Trail Slide 13 DUAL LOCKED AUTHORIZATION sysadmin i.s. system officer (user) (owner) (custodian) (guardian) Slide 14 Copyright 2001,2002 HP Page 7

Slide 15 Step 4.1 awareness Step 4.2 education Step 4.3 training Slide 16 Copyright 2001,2002 HP Page 8

PREVENTION PROTECTION penetration detection REACTION REPORT proactive X X x x plan in advance incident reactive improve X X * trap (pitfall on the term REACTION ) Slide 17 ISO/IEC 15408 (JIS X5070) TOE - Target of Evaluation - PP - Protection Profile - ST - Security Target - EAL - Evaluation Assurance Level EAL Slide 18 Copyright 2001,2002 HP Page 9

ISO/IEC 15408 JIS X 5070 CC V2.1 CCRA Slide 19 Partnership with ISO Common Criteria development group made significant effort to get criteria adopted as an international standard (ISO/IEC 15408) Need to maintain regular and consistent coordination/liaison with ISO SC 27 Working Group 3 but this effort requires resources which tend to be limited : CCRA History, Implementation, Future E`xpansion, and International Experiences Dr. Stuart Katzke / National Institute of Standards and Technology Slide 20 Copyright 2001,2002 HP Page 10

No new versions until April 2003 (at the earliest) Request for Interpretations (as of February 2002) 206 Total Requests for Interpretation Final interpretation is a change to the CC/CEM 16 months average time to process Labor intensive: requires significant preparation/coordination Limited resources Requires unanimous consent : Future Directions of the Common Criteria (CC) and the Common Evaluation Methodology (CEM) Dr. Stuart Katzke / National Institute of Standards and Technology Slide 21 Bell-La Padula Slide 22 Copyright 2001,2002 HP Page 11

Bell-La Padula hp secure linux Slide 23 SYSTEM HIGH DB Internet eth0 Web eth1 intranet Mail System Slide 24 Copyright 2001,2002 HP Page 12

HOST * -> COMPARTMENT web PORT 80 METHOD tcp NETDEV lan_eth0 COMPARTMENT web -> COMPARTMENT tomcat1 PORT 8007 METHOD tcp NETDEV lan_lo COMPARTMENT web -> COMPARTMENT tomcat2 PORT 8008 METHOD tcp NETDEV lan_lo COMPARTMENT tomcat1 -> HOST server1 PORT 8080 METHOD tcp NETDEV lan_eth1 SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 25 web /compt/web read active web /compt/web/tmp read,write active web /compt/web/apache/logs append active web / none active Slide 26 Copyright 2001,2002 HP Page 13

SYSTEM HIGH tomcat1 Internet eth0 Web System tomcat2 eth1 intranet server1 Slide 27 hp secure linux # ls -ln -rw-r--r-- 1 0 0 348 Nov 16 04:45 access.conf -rw-r--r-- 1 0 0 43796 Nov 16 04:45 httpd.conf -rw-r--r-- 1 0 0 11317 Nov 16 04:45 mime.types -rw-r--r-- 1 0 0 357 Nov 16 04:45 srm.conf -rwxrwxrwx 1 0 0 46 Dec 24 23:32 openfile # echo abc > httpd.conf sh: httpd.conf: Operation not permitted # who root tty1 Dec 25 03:10 # echo abc >> openfile sh: openfile: Operation not permitted # rm access.conf rm: cannot unlink access.conf : Operation not # Slide 28 Copyright 2001,2002 HP Page 14

Bell-La Padula hp secure linux ppt PDF http://www.ipa.go.jp/security/fy13/report/secure_os/secure_os.html Slide 29 Bell-La Padula SYSTEM HIGH tomcat1 Internet eth0 Web tomcat2 eth1 intranet System server1 Slide 30 Copyright 2001,2002 HP Page 15

Bell-La Padula Bell-La Padula Slide 31 BLS 5A Authentication Access Control Authorization Auditing Assurance User authentication Terminal authentication Server authentication Slide 32 Copyright 2001,2002 HP Page 16

Slide 33 subject access object Slide 34 Copyright 2001,2002 HP Page 17

Slide 35 Military grade C I A Military C I A (A) Slide 36 Copyright 2001,2002 HP Page 18

Word from MORPHEUS http:// / Slide 37 Slide 38 Copyright 2001,2002 HP Page 19