Small TCBs of policy-controlled operating systems
نویسنده
چکیده
IT systems with advanced security requirements increasingly apply problem-specific security policies for describing, analyzing, and implementing security properties. Security policies are a vital part of a system’s trusted computing base (TCB). Hence, both correctness and tamper-proofness of a TCB’s implementation are essential for establishing, preserving, and guaranteeing a system’s security properties. Today’s operating systems often show that implementing security policies is a challenge; for more than forty years, they have provided only a rather elementary support for discretionary, identity-based access control policies. As a consequence, major parts of the applications’ security policies are implemented by the applications themselves, resulting in large, heterogeneous, and distributed TCB implementations. Thus, precisely identifying a TCB’s functional perimeter is hard, which renders essential TCB properties – correctness, robustness, and tamper-proofness – difficult to achieve. Efforts have been made to re-collect the policy components of operating systems and applications into a central component. So called policy-controlled operating systems provide kernel abstractions for security policies along with a policy decision and enforcement environment to protect and enforce the policies. Current policy-controlled operating systems are based on monolithic architectures so that their policy enforcement mechanisms are distributed all over the kernel. Additionally, they share the ambition to provide support for a wide variety of security policies that leads to universal policy decision and enforcement environments. Both results in large, complex, and expensive operating system TCBs, whose functional perimeter can hardly be precisely identified. As a consequence, a TCB’s essential properties are hard to ensure in its implementation. This dissertation follows a different approach based on the idea of methodically engineering TCBs by tailoring their policy decision and enforcement environment to support only those security policies that are actually present in a TCB. A TCB’s functional perimeter is identified by exploiting causal dependencies between security policies and TCB functions, which results in causal TCBs that contain exactly those functions that are necessary to establish, enforce, and protect their policies. The precise identification of a TCB’s functional perimeter allows for implementing a TCB in a safe environment that indeed can be isolated from untrusted system components. Thereby, causal TCB engineering sets the course for implementations whose size and complexity pave the way for analyzing and verifying a TCB’s correctness and tamper-proofness. The application scenarios for causal TCB engineering range from embedded systems and policy-controlled operating systems to database management systems in large information systems.
منابع مشابه
Towards System Integrity Protection with Graph-Based Policy Analysis
Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...
متن کاملInformation flow control for secure web sites
Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on the off-the-shelf software that runs the site (e.g., the operating system, the application libraries, the Web server, etc.), but more frequently (as in the above references), t...
متن کاملQuery Process ing in LDV: A Secure Database System
This paper gives an overview of Query Processing of the Multilevel Secure Database Management System (MLSDBMS), LOCK Data Views (LDV), for the Secure Distributed Data Views contract. The prime contractor is Honeywell's Secure Computing Technology Center (SCTC) and the subcontractor is Honeywell's Corporate Systems Development Division (CSDD). The paper summarizes design issues such as data dist...
متن کاملComparison of direct-plating and enrichment methods for isolation of Vibrio cholerae from diarrhea patients.
A direct-plating method on thiosulfate citrate bile salts sucrose agar (DIR-TCBS) in conjunction with enrichment in alkaline peptone water (APW) incubated for both 6 h and 24 h followed by subculture onto TCBS (APW6h-TCBS and APW24h-TCBS, respectively) was performed on 16,034 rectal swab samples for isolating Vibrio cholerae. A total of 2,932 (18.3%) rectal swab samples were positive for V. cho...
متن کاملIntroduction of MO-GP algorithm and its application in basin management
The most important factor that should be considered in managing a watershed is, taking into account objectives under policies. In operating from water resources systems, in general, and in reservoir, in particular, operating rules should be extracted as multi-objective. In this paper, multi-objective genetic programming (MOGP) is developed and used. Then, after verification, it is used to extra...
متن کامل