1 / 12

Chapter 13: Design Principles

Chapter 13: Design Principles. Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least Common Mechanism Psychological Acceptability. Overview. Simplicity Less to go wrong Fewer possible inconsistencies

chiko
Download Presentation

Chapter 13: Design Principles

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 13: Design Principles • Overview • Principles • Least Privilege • Fail-Safe Defaults • Economy of Mechanism • Complete Mediation • Open Design • Separation of Privilege • Least Common Mechanism • Psychological Acceptability ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  2. Overview • Simplicity • Less to go wrong • Fewer possible inconsistencies • Easy to understand • Restriction • Minimize access • Inhibit communication ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  3. Examples • The program sendmail • reads configuration data from a binary file • It is generated by compiling a text file • 3 interfaces: • edit the text file, compile the file, read the binary file by sendmail • May be different assumptions! • Examples: Prisoners communications ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  4. Least Privilege • A subject should be given only those privileges necessary to complete its task • Function, not identity, controls • Rights added as needed, discarded after use • Minimal protection domain • Example: • in UNIX, root can do every thing! • user who creates system backups can also delete files! ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  5. Fail-Safe Defaults • Default action is to deny access • If action fails, system as secure as when action began ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  6. Economy of Mechanism • Keep it as simple as possible • KISS Principle • Simpler means less can go wrong • And when errors occur, they are easier to understand and fix • testing process is less complex • Interfaces and interactions • Example: finger protocol ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  7. Complete Mediation • Check every access • Usually done once, on first action • UNIX: access checked on open, not checked thereafter • If permissions change after, may get unauthorized access ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  8. Open Design • Security should not depend on secrecy of design or implementation • Popularly misunderstood to mean that source code should be public • “Security through obscurity” • Does not apply to information such as passwords or cryptographic keys ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  9. Separation of Privilege • Require multiple conditions to grant privilege • Separation of duty: • if two or more steps are required to perform a critical function, at least two different people should perform the steps • Defense in depth ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  10. Least Common Mechanism • Mechanisms should not be shared • Information can flow along shared channels • Covert channels • Isolation • Virtual machines • Sandboxes ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  11. Psychological Acceptability • Security mechanisms should not add to difficulty of accessing resource • Hide complexity introduced by security mechanisms • Ease of installation, configuration, use • Human factors critical here ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

  12. Key Points • Principles of secure design underlie all security-related mechanisms • Require: • Good understanding of goal of mechanism and environment in which it is to be used • Careful analysis and design • Careful implementation ©2002-2004 Matt Bishop [Changed by Hamid R. Shahriari]

More Related