FreeBSD Mandatory Access Control Usage for Implementing Enterprise Security Policies
نویسندگان
چکیده
Security needs of organizations are becoming more and more sophisticated nowadays. Most general-purpose operating systems (GPOS) provide access control policies to meet these needs. There are cases when the traditionally deployed Discretionary Access Control (DAC) rules are not sufficient: they tend to quickly become unmanageable in the case of large installations, and also are not enough for controlling information flows. This is when the Mandatory Access Control (MAC) comes in: it provides for better manageability and directly targets the information flows. In their turn, the information flows address the confidentiality and integrity needs of information security within an organization. Until very recently, the GPOSes tended to provide various flavors of DAC only. The FreeBSD OS [1] was one of the first widely deployed open source GPOSes to support MAC [2], [3]. In this paper, a number of organizational policy examples are implemented in the environment of the FreeBSD MAC. The authors strongly believe that in order to implement a sound MAC policy it is important to understand MAC’s mathematical foundations. These foundations were set by Denning in [4]. There also exists a terminology confusion between MAC and LBAC (lattice-based access control). These models are the same, because MAC security labels [5] directly correspond to security classes of lattice-based models (this was also pointed to by Sandhu [6] and Osborn [7]). Let us first address the definition of the information flow. According to Denning and Sandhu, the security policies regulate how the information “flows from one object to another”. A typical object is a shared memory segment, a file system object or a network packet. Obviously, controlling the information flows is important to prevent the leakage of the confidential information, the one usually sought by insiders. Another goal is the forgery prevention, so that no untrusted reports are ever submitted to the top level of the organization hierarchy, and no top-ranking company officers take any unchecked or untrusted information into account during decision making. To implement the information flow control, every object is assigned a security label (also called a security classification), implemented by the FreeBSD file label. When the information flows from one object into another, an information flow from the security class of the first object to the security class of the second one also takes place. Whether the information flow is allowed is regulated by the relation between the object security classes. The subjects are the entities performing the information transfer between the objects. In our case, a subject appears when a user logs in to the system and is assigned a set of privileges. As we are considering MAC, the set of privileges is rendered as security clearance. It is implemented by the FreeBSD user label. This paper is organized as follows. In the next section an example of an organization and its document flow is described. The following sections implement organization’s information security goals, which gradually increase in complexity. The information security goals specify the target effect: preserving data and process integrity, restricting access to the confidential information, or implementing a consulting services policy. For every security goal, a corresponding classic MAC model or a combination of them is chosen. The models are then implemented in the FreeBSD MAC framework.
منابع مشابه
CAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملPersonalized Security Approaches in E-banking Employing Flask Architecture over Cloud Environment
Personalized security in E-banking is an important issue for many individuals and companies that are looking for achieving the proper level of security. The cloud environment is a suitable infrastructure to implement personalized security mechanisms for many big companies such as banks. Employing mandatory access controls boosts the security of E-banking to a high level. Flask architecture is t...
متن کاملAn Approach for Cross-Domain Intrusion Detection
Network-based monitoring and intrusion detection has grown into an essential component of enterprise security management. Monitoring potentially malicious activities across a set of networks classified at different security levels, however, presents subtle and complicated challenges. Analysis of intrusion alerts collected on an individual network only reveals malicious attempts to compromise th...
متن کاملxESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distributed across domains, but does not offer any concrete solution to integrate this security functionality so that it works across security services for organization-wide policies. In this paper, we propose xESB, an enhance...
متن کاملA Survey of Usage Control in Computer Security
Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit or deny the access rights to a particular resource (object) by a particular entity (subject). The three most widely implemente...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0706.1755 شماره
صفحات -
تاریخ انتشار 2007