Operating System Security Security Polic
Operating System Security Security Polic
“a secure system is a system on which enough trust can be put to use it together with sensitive
information” Olovsson (1992)
“concerned with the protection of valuable assets from harm, which is a significant negative
consequence to the asset … security deals with malicious harm, which is harm resulting from attacks or
probes by someone or something playing the role of attacker” Firesmith (2004)
Operating System
Security
Scheduling
Resource mechanism
Figure: An operating system runs security, scheduling, and resource mechanisms to provide processes with access to the computer
system’s resources.
Secret
Compartment 1
Compartment 2
Confidential
Restricted
Compartment 3
Unclassified
Combination of rank and compartment is called class or we can say classification of piece of information.
Class = <rank, compartments>
Now we introduce a relation ≤, called dominance, on the sets of sensitive objects and subjects. For a subject
d1 and an object d2,
d1 ≤ d2 iff rank1 ≤ rank2
Compartment1 compartment 2
For e.g. <restricted, Pakistan > ≤ <secret, India >
Military security enforces both sensitivity requirements and need-to-know requirements. This security policy
applied to subjects and objects means users and documents.
Unclassified
Restricted
Least sensitive
Confidential
Secret
Top
Secret
Most sensitive
B. Commercial security policy: Commercial world is less hierarchical structured than the military world.
There are many same concept as military policy in commercial. Commercial enterprises have always
security concern. They always worry about that any industry will reveal the information about their new
product that is under development. For e.g. a large university may be divided into department, each
responsible for number of projects. There may be some responsibilities such as accounting and personnel
activities. There are different degree of sensitivity such as public, proprietary or internal.
Public < proprietry < internal
Means public is less sensitive than proprietry and proprietary is less sensitive than internal. Internal have the
highest sensitivity degree.
Accounting
Personnel
In commercial security policy projects introduce a degree of sensitivity. Staff members on old standby project
have no need to know about the new projects but staff members on the new projects have access to all the data
from old standby project.
There are basically two difference between military and commercial security policy:
Outside the military, there is no formalized notion of clearances.
When there is no clearance concept so rules of allowing access are less regularized.
Integrity is as important as confidentiality. In many instances military security policy provides confidentiality
and commercial security policy provides integrity of data. Policies for integrity are less significant than for
confidentiality. There are some examples of commercial security policy:-
1) Clark Wilson commercial security policy: Integrity is as important as confidentiality. Clark and Wilson
introduce a policy for well formed transaction, which they assert are as important in their field as is
confidentiality in military realm.
For understanding this policy we consider a company that orders and pays for goods. Process for this will be:
A purchasing clerk creates an order for a supply, sending copies of the order to both the supplier and
the receiving department.
The supplier ships the goods, which arrive at the receiving department. A receiving clerk checks the
delivery, ensures that the correct quantity of the right item has been received, and signs a delivery form.
The delivery form and the original order go to the accounting department.
The supplier sends an invoice to the accounting department. An accounting clerk compares the invoice
with the original order (as to price) and the delivery form (as to quantity) and issues a check to the
supplier.
In this the sequence of activities are important. Performing these steps in order and authenticated the individuals
who performed the steps constitute a well-formed transaction. The goal of Clark Wilson policy is to maintain
consistency between the internal data and external user’s expectations of those data.
2) Separation of duty: It is the second commercial security policy. It involves separation of responsibilities.
Lee , Nash and Poland added into Clark and Wilson security policy.
For understanding the policy we consider an example of small company ordering goods. In the company there
must be many people who are authorized to order goods, receive the goods and write a check. In this policy we
would not want the same people to do the these three tasks so we establish a policy that specifies the three
authorized persons for doing three tasks such as ordering the goods, receive the goods and write a check, even
though any of three might be authorized to do any of three task. But at a time only one person is assigned to
perform one task. This required division of duties or responsibilities that is called seperation of duty.
3) Chinese wall security policy: It is defined by Nash and Brewer. It is used for commercial needs for
information access protection. A conflict of interest exists when a person in one company and obtain a personal
and important data about products of another company or competitive company.
In this security policy there are three levels of abstractions.
Objects (lowest level): lowest level is objects such as files. Each file contains information about a
particular company.
Company groups (middle level): in this object concerning about a particular company grouped
together.
Conflict classes (highest level): in this all groups of objects for competing companies are grouped
together.
For e.g. with this model, we can form conflict classes with one or more company groups. Suppose you are in
advertising company with many clients in several fields like chocolate, bank and airlines. You want to store data
and you also want to prevent your employees from revealing information about a client to the competitor client.
So establish a rule that nobody can see the sensitive information about competitive companies.
Using this security policy we can create three conflict classes with six company groups.
Conflict classes= {Cadbury, Kitkat} and {PNB, SBI, RBI} and {Indian airlines}
In this, there is a simple access policy: - a person can access any information as long as that person has never
accessed information about a different company in the same conflict class. Means access is allowed if either the
object requested is in the same company group.
Chinese wall confidential policy is inspired by commercial policy. It is not like other policies which focus on the
integrity. In this access permissions change dynamically. If a subject accesses some objects, other objects that
have been previously accessed are subsequently denied.