320 likes | 331 Vues
Government Security. Objectives. Define trust, trustworthy environment, assurance, clearance, two-person integrity, no lone zone, certification, accreditation, emergency destruction, humint . Define the four stages of operational planning. Define operations security, unclassified indicator.
E N D
Objectives • Define trust, trustworthy environment, assurance, clearance, two-person integrity, no lone zone, certification, accreditation, emergency destruction, humint. • Define the four stages of operational planning. • Define operations security, unclassified indicator. • Define two types of TEMPEST zoning. • Define the meaning of red and black labels. • Define computer/transmission emanation protections: shielding, filtering, masking, attenuation, zoning, and protection distribution system. • Define checks in a security clearance • Determine access by security level and compartment. • Define Resource monitor, and differentiate between types of computers: Dedicated, Compartmented, Multilevel Resource, System-High. • Define threats: jamming, traffic analysis, and transmission security techniques: spread spectrum, burst transmissions, low power, directional antenna. • Define 3 techniques the government uses to secure encryption keys. • Define protection of voice communication. Italic has yet to be included.
Trust Trustworthy environment: Safe equipment, reliable boundary, safe people • Assurance: Behavior complies with policy • Formal methods can use proofs • Clearance: Trusted person • Two-Person Integrity: No Lone Zone
Trust Trustworthy environment: Safe equipment, reliable boundary, safe people • Safe Communications • Safe Processing • Safe Storage
Stages of OPSEC Planning • Identify critical resources (e.g., information) • Assess risk • Identify policy goals • Apply security measures
Security Clearances Secure People
Trusted People: Security Clearance • Clearance: Enables trust • Background investigation may include: • Ask person about: drug use, work history, criminal history. • Third party checks on employment, habits. • Criminal background check • Credit check • Confidential Clearance: Low level clearance • Secret Clearance: High level clearance
TEMPEST Zoning – Unclassified Indicators Secure Boundaries
Operations Security Sometimes plans are broadcast unintentionally This is known as ‘unclassified indicators’. • Before a major offensive attack, to-go pizza orders go up in DC/Pentagon, pizza vendors recognize.
TEMPEST Protects Against Emanations Protecting against radio emanations • Shielding: Put shields around equipment or wiring. • Best if built with shielding • Filtering: limiting radio emanations from power lines and outbound transmissions • Banding: Filters limit specific frequency bands • Masking: Cause radiation using a uniform signal • Attenuation: Reduce the transmit power level to minimize emanations • Zoning: Build a physical buffer between vulnerable equipment and threat agents.
Protected Distribution System • Purpose: Control access to cables • Means: Conduit or pipe that carries cables • Often in plain site, so that tampering can be observed • Seams completely sealed • Can be airtight where pressure change = penetration attempt. • Often camera protected • Alarm sounds when penetration occurs • Protects against radio emanations, too.
TEMPEST: Zoning Vary by Agency & Project • Zone A: 20 Meters or less • Zone B: 100 Meters • Zone C: > 100 Meters • Communications Center requires 60 Meters (200 Feet)
TEMPEST Zoning Threat: Crosstalk or Coupling Solution: Separation Separation between Cables: 2 inches: shielded components 6 inches: unshielded components 3 feet: crypto equipment & shielded components Power Filtering: 2 inches from shielded components 6 inches from other components Red & Black grounds maintained separately. Labeling: Red & Black
Access Control - Secure Processing
Trusted Computing:High Assurance Trustworthy: Never enters insecure state • Formal design specification • Formal methods: proofs show never enters insecure state • Secure, unsecure states defined • Code must match formal specifications Drawbacks: • Expensive to produce: can double cost • Very few systems achieve TCB
Trusted Computer System Trusted Computing Base Reference Monitor Enforces security policy Not bypassable Tamperproof Verified Simple easiest • Formally verified to enforce mandatory protection policy • Verified (Tested) Drawbacks • Cannot assure high availability • Not easy to obtain: MS Word has been used
Bell and La Padula Model (BLP) Property of Confinement: • Read Down: if Subject’s class is >= Object’s class • Write Up: if Subject’s class is <= Object’s class Tranquility Principle: Object’s class cannot change Declassification: Subject can lower his/her own class write read & write read read Joe => (Secret)
Military Security Policy (Secret, Eng) (Confid., Finance) • Person has an Authorization Level or Level of Trust • (S,D) = (sensitivity, domain) for Subject • Object has a Security Class • Compartment defines secure projects: Project X, Project Y, Project Z (e.g, Finance) • Confidentiality Property: Subject can access object if it dominates the object’s classification level
Need to Know ClearancesWho has access to what? Top Secret Top Secret DOGGY JONES Secret Secret JONES Secret DOGGY Secret DOGGY JONES Level: Secret Compartments: DOGGY JONES Level: Top Secret Compartments: JONES
Need to Know ClearancesWho has access to what? Top Secret Top Secret DOGGY JONES Secret Secret JONES Secret DOGGY Secret DOGGY JONES Level: Secret Compartments: DOGGY JONES Level: Top Secret Compartments: JONES
Dedicated Computer • Dedicated computer: Dedicated to project and security level • All people have a Need-to-Know access • Common security level associated with computer • Requires physical controls • May timeshare: Project X in morning; Y in afternoon • Must clear storage in between
Computer Classifications • Dedicated: Single compartment • Compartmented: Supports multiple Compartments • Everyone is authorized for same security level (e.g., Top Secret) • Multilevel: Supports multiple security levels and compartments • Can store data that some people cannot read • Guard: a firewall controls data between compartments and security levels
Encryption – Masking Secure Communications
Over the Air Rekeying • Electronic keys are preferred over paper keys Data Transfer Device: Distributes keys • Tracks key distribution • Seed key: A nonsecret key used to generate other keys • Operational Key: A secret key used for operations Crypto equipment uses operational key • Initialized with Seed Key or Black Key (encoded) • Op. key replaced periodically
Communication Threats Threats: • Traffic Analysis: Sense where data is coming/going • Jamming: Loud transmission blocks other transmissions Solutions: • Burst transmissions: Small bursts vary frequency • Spread Spectrum: Single bits vary frequency unpredictably • Low Power: Can be unnoticed • Directional Antenna: Transmit in one direction only
Example: Nuclear Secure Operations