SlideShare una empresa de Scribd logo
1 de 68
Descargar para leer sin conexión
Implementing
Trusted Extensions
Kevin Mayo
CTO
Global Government

Sun Microsystems
What is Solaris Trusted Extensions?
• An extension of the Solaris 10 security foundation
providing access control policies based on the
sensitivity/label of objects
• A set of additional software packages added to a
standard Solaris 10 system.
• A set of label-aware services which implement
multilevel security
• A secure design to meet the Government set of
security standards
Secure S10 Foundation
Solaris 10 Security
Digital Certificates Everywhere
Secure Execution*
User Rights Management
Process Rights Management
Cryptographic Framework
IPFilter
Kerberos Single Sign On
Secure By Default
* Coming in future update
Network Protection
• IP Filter firewall
> Sun supported stateful firewall
> Allows selective access to ports based on IP addr.
> Compatible/manageable like open source IPF
• TCP Wrappers
> Limit access to TCP/UDP service by domain name
• Limiting Networking Services
> Reduced Networking MetaCluster – Ultra small Solaris
> Generic Limited Networking Service Profile
> Will be enhanced in Solaris 10 update to include better 'out-ofthe-box' security, full function desktop and no exposed network
svcs
Cryptographic Framework
●

●

Extensible cryptographic interfaces.
> A common kernel and user-land framework for providing
and using cryptographic functionality.
> A common interface for cryptographic functions whether
completed in hardware or software.
> Extensible framework for vendors to provide
custom functionality.
By default, supports major algorithms.
> Encryption: AES, RC4, DES, 3DES, RSA
> Hashing: MD5, SHA-1
> MAC: DES MAC, MD5 HMAC, SHA-1 HMAC
> Optimized for both SPARC, Intel and AMD
Remote Access and Auditing
• Solaris Secure Shell
> Standards-based encrypted remote access
• Kerberos Single Sign On
> Standards-based enterprise single sign on
> Optional encryption of NFSv3 and NFSv4 file shares
• IPSec/IKE
> Transparently encrypted communications
• Auditing of activities
> Audit records for all activities track users and roles
> Output in XML format for parsing and analyzing
> Centralized auditing and per-container audits
User Access and Rights
• User Rights Management
> Roles defined with specific commands and
authorizations they can perform
> Users associated with roles. All audit logs record specific
user and what role they were in at the time
> Roles and non-logins can be used for system services
• Password Management
> New password capabilities prevent easily guessed or reused passwords and provide account lockout
> Pluggable Authentication Modules for expansion
Zones Example
• Highly secure
• Invisible to each
other
• Very efficient
• No performance
penalty
• Separated file
systems
• 8,000 per OS
instance
• Resource mgmt
globally and per
container
File Integrity and Secure Execution
• BART – Basic Audit and Reporting Tool
> Checksums compared periodically against known good
list of files that customer generates
> Can be used with Sun-supplied Fingerprint Database
• Solaris Secure Execution*
> Almost all applications are signed in Solaris 10
> Sys-admins can manually verify them today
> Future update will verify integrity at load time
>Customers can sign their own files, or 3rd party
>Can customize EXACTLY which apps can be run on
whole system, preventing ANY unauthorized app from
running
Encrypted File Systems
• Loopback-based
> One physical file on disk, contents encrypted
> Mounted as file system via loopback
> No application modification required
> Works with NFS & local file sharing
> Early update of Solaris 10
• ZFS Module for Encryption
> ZFS offers modular structure for enhancements
> Would encrypt a full ZFS file system on disk
> No application modification required
> All other aspects of management preserved
> Sometime after ZFS is released in Solaris update
Solaris 10 Privileges
“contract_event”

Request reliable delivery of events

“contract_observer”
users
"cpc_cpu”
"dtrace_kernel"
"dtrace_proc"
"dtrace_user"
"file_chown"
"file_chown_self"
"file_dac_execute"
"file_dac_read"
"file_dac_search"
"file_dac_write"
perms
"file_link_any"
"file_owner"
ops
"file_setid"
"ipc_dac_read"
Mem perms
"ipc_dac_write"
Mem perms
"ipc_owner"
"net_icmpaccess"
"net_privaddr"
(<1023+extras)
"net_rawaccess”
"proc_audit”
"proc_chroot”

Observe contract events for other
Access to per-CPU perf counters
DTrace kernel tracing
DTrace process-level tracing
DTrace user-level tracing
Change file's owner/group IDs
Give away (chown) files
Override file's execute perms
Override file's read perms
Override dir's search perms
Override (non-root) file's write
Create hard links to diff uid files
Non-owner can do misc owner
Set uid/gid (non-root) to diff id
Override read on IPC, Shared
Override write on IPC, Shared
Override set perms/owner on IPC
Send/Receive ICMP packets
Bind to privilege port
Raw access to IP
Generate audit records
Change root

"proc_lock_memory"
"proc_owner"
"proc_priocntl"
"proc_session"
process
"proc_setid"
"proc_taskid"
“proc_zone”
zones
“sys_acct”
(acct)
“sys_admin
(node/domain name)
"sys_audit"
"sys_config"
"sys_devices"
(exclusive)
"sys_ipc_config"
"sys_linkdir"
"sys_mount"
"sys_net_config"
interfaces,routes,stack
"sys_nfs"
"sys_res_config"
"sys_resource"
"sys_suser_compat"
"sys_time"

Lock pages in physical memory
See/modify other process states
Increase priority/sched class
Signal/trace other session
Set process UID
Assign new task ID
Signal/trace processes in other
Manage accounting system
System admin tasks
Control audit system
Manage swap
Override device restricts
Increase IPC queue
Link/unlink directories
Filesystem admin (mount,quota)
Config net
Bind NFS ports and use syscalls
Admin processor sets, res pools
Modify res limits (rlimit)
3rd party modules use of suser
Change system time
Kerberos and Secure Shell
●

●

Kerberos Enhancements
● MIT Kerberos 1.3.2 Refresh
● KDC Incremental Propagation
● Migration Tools
● Kerberized network clients (telnet, rcmds, etc.)
● Interoperability Fixes
Secure Shell Enhancements
● OpenSSH 3.6p2 Refresh
● GSS-API Support
● Keyboard “Break” Sequence Support
● X11 Forwarding “on” by default
● ARCfour, AES CTR mode Encryption Support
● /etc/default/login Synchronization
● SSH2 Rekeying, Service Side Keepalives, etc...
Auditing
• Solaris Auditing
> Updated to support output to SYSLOG

Oct 29 01:52:56 lennox audit: [ID 225229 audit.notice] su ok session 3285174027 by
root as root:root from lennox text success for user sys

> Updated to support translation to XML (praudit -x)
<record version="2" event="su" host="lennox" iso8601="2004-10-29 01:52:56.862 -04:00">
<subject audit-uid="root" uid="root" gid="root" ruid="root" rgid="root" pid="234" sid="3285174027" tid="0 0 lennox"/>
<text>success for user sys</text>
<return errval="success" retval="0"/>
</record>

• What do I need to know?
>
>
>
>

SYSLOG is not a guaranteed protocol
Subset of audited events can be sent via SYSLOG
Using SYSLOG events can be sent off-host.
Beta XML Audit Parser available (unsupported)
Access Management
• Account Access
> Users versus Roles
>Leverage 'roles' for service and shared accounts!
> Non-Login versus Locked Accounts
>New passwd(1) options to manage
> Account Lockout (Global or per-User)
>“Three strikes” requires administrator to unlock.
• File system Object Access
> Unix Permissions and ACLs
>Same as previous Solaris releases
> New mount option - “noexec”
>Useful for file systems containing only data.
User Rights Management
• Decompose superuser
into less powerful roles
based on job
requirements.
• Assign rights to roles;
and roles to users.
• Audit user actions.
• In Solaris 8, 9, 10
• In Trusted Solaris &
Trusted Extensions
• Centralized mgmt.

S
Rights

R

U

U

U

R
User/Password Management
• Password Complexity Checks
> Login Name, White Space
> Minimum Alpha, Non-Alpha, Upper, Lower,
(Consecutive) Repeats, Special, Digits, etc.
• Password History (0 – 26 passwords)
• Banned Password List (Dictionary)
• What do I need to understand?
> Complexity checks apply to everyone - but 'root'
> Password history is 'files' only.
> Password aging is 'files', NIS+ and LDAP only.
Solaris Secure Execution
• Verifies integrity of the executable portion of almost all
applications, drivers, modules
• Customers can sign their own or 3rd party applications – no changes
needed

• Manual verification in Solaris 10 03/05
> $ elfsign verify -e /usr/bin/login
> elfsign: verification of /usr/bin/login passed.

• Automatic run-time verification in update
> User selectable rules for checking
> Prevents modified or unsigned code from running
> Customized systems can now be signed and secured
Solaris System Auditing
• Audits all system events
• Records actual userid and what role and application
issued which system calls, command line or data access
• Captures complete command line and environment
variables for later analysis
• Audit compliance is required by Common Criteria
Controlled Access Protection Profile
• Same audit system used in Solaris 8, 9, 10
> Solaris 9 & 10 offer XML output & selective filtering of
system read-only activities
> Solaris 10 offers syslog channel for audit logs
Who Needs more?

The World is Changing!
What TX is NOT
• It is NOT Trusted Solaris 8 ported to Solaris 10
> It will NOT run Trusted Solaris 8 applications
• It is NOT a new operating system nor a new kernel
> Works with all Solaris patches
> Patches for TX added pkgs through normal patch site
• It does not have additional “commercial” security features
over and about standard Solaris
• It is NOT limited to SPARC processors
> Runs on SPARC, x86, x64
• Closed and proprietary
Multi-Level Labeled Security
Trusted Extensions
Adds labeled security to Solaris 10
Multi-level networking, printing
Multi-level GUI
Leverages User & Process RM
Uses Containers
Compatible with all Solaris apps
Target of CAPP, RBACPP, LSPP @
EAL 4+
Trusted Extensions in a Nutshell
• Every object has a label associated with it
> Files, windows, printers, devices, network packets,
network interfaces, processes, etc...
• Accessing or sharing data is controlled by the objects'
label relationship to each other
> Lower label objects do not see higher label objects
• Administrators utilize Roles for duty separation
> Security admin, user admin, backup, restore, etc...
• Programs/processes are granted privileges rather than
full superuser access

• Strong independent certification of security
Goals and Benefits
• Runs all Solaris applications
> It's still Solaris, with Containers
> It's still Solaris, just with extended security policy
> It's still Solaris, same kernel
> It's still Solaris, all Solaris patches work
• Runs all infrastructure software
> Backup, Web, middle-ware, dev tools, etc.
> Database, file systems, devices/drivers, etc.
• Preserve and transition
> CDE User interface, single and multi-level JDS/GNOME
> Solaris Mgmt. Cnsle with LDAP naming service
What are Label-Aware Services?
• Services which are trusted to protect multilevel
information according to predefined policy
• Trusted Extensions Label-aware service include:
> Labeled Desktops
> Labeled Printing
> Labeled Networking
> Labeled Filesystems
> Label Configuration and Translation
> System Management Tools
> Device Allocation
Mandatory Access Control and
Security Labels
• Users cleared at multiple security levels can
work on them simultaneously
• Compartmentalization of information is
possible with Security labels and MAC thus
facilitating server virtualization
Non-hierarchical

Commercial
Hierarchy

Government
Hierarchy

Internet

Exec Mgmt

Top Secret

VP & above

Secret

Directors

Confidential

All Employees

Unclassified
Trusted Extens.

Music
Net Inc. Online

Daisy's
Florists

Solaris 10 or Trusted Extensions

Trusted Extens.
Strong Enforcement!
Multilevel Architecture
Need-toknow
(local zone)

Internal Use

Public

(local zone)

(local zone)

Multilevel Desktop Services
(Global Zone)

Solaris Kernel
SPARC, x86 or x64 Hardware
Local or Sun Ray display

• Layered
architecture
implements:
> mandatory
access
control
> hierarchical
labels
> principle of
least privilege
> trusted path
> role-based
access
Trusted Extensions Implementation
• Each zone has a label
> Labels are implied by process zone IDs
> Processes are isolated by label (and zone ID)
> Files in a zone assume that zone's label
• Global zone is unique
> Parent of all other zones
> Exempt from all labeling policies
>No user processes—just TCB
>Trusted path attribute is applied implicitly
> Provides services to other zones
• Common naming service to all zones
Filesystem MAC policies
• Labels derived from a filesystem owner's label
• Mount policy is always enforced
> No reading-up
> Read-write mounts require label equality in labeled zones
> Reading-down
> Read-only mounts require dominance by client
> Can be restricted via zone's limit set and network label range
> Writing-up
> Cannot write-up to regular files
> Limited write-up to label-aware services (via TCP and doors)
> Writing-down
> Restricted to privileged label-aware global zone services
NFS Support for Zones
• NFS clients:
> Each zone has its own automounter
> Kernel enforces MAC policy for NFS mounts
• NFS servers:
> Global zone administrators a share table per zone
> Kernel enforces MAC policy for NFS requests
• The global zone administrator can export filesystems
from labeled zones
> Each export must be a single-level filesystem
> Zone's label automatically applied to each export
Networking:
Option 1: Per-Zone IP addresses
Need-toknow

Internal Use

Public

Multilevel Desktop Services
(Global Zone)

Solaris Kernel
1.2.3.10

1.2.4.10

1.2.5.10

1.2.6.10

• Each zone has
a unique IP
address
• Network
Interface may
be virtualized to
share a single
hardware NIC or
use multiple
NICs
Option 2: All-Zone IP addresses
Need-toknow

Internal Use

Public

Multilevel Desktop Services
(Global Zone)

Solaris Kernel
1.2.3.4

1.2.3.4

1.2.3.4

1.2.3.4
1.2.6.10

• All zones share
a single address
• Shared network
Interface may
be physical or
logical
• Both per-zone
and all-zone
assignment
strategies can
be used
concurrently
Multi-Level Desktop
• Trusted CDE standard
> Similar to Trusted Solaris 8
> Included in initial Common Criteria Evaluation
• Java Desktop System (GNOME)
> Single Level desktop
>Full accessibility requirements
>More modern look-and-feel to customers
> Multi-level desktop
>Included in initial release
>Test as part of the Common Criteria LSPP
Multilevel Session
●

●

An authorized user can work at multiple sessions
concurrently.
The user can be authorized to do cut-and-paste
operations.
Security Policy Enforced
●
●

System queries for upgrade/downgrade of information
Seeing data isn't enough to allow you to change or move
it
Trusted Java Desktop System
Trusted Java Desktop System Details
Workplace switcher

Task switcher

Trusted stripe and Trusted Path menu
Trusted Extensions Privileges
file_downgrade_sl
file_upgrade_sl
net_bindmlp
port
net_mac_aware
read-down
sys_trans_label
dominated labels
win_colormap
pseudo-colors
win_config
defaults
win_dac_read
X resources
win_dac_write
user's X resources
win_devices
pointer policies
win_dga
win_downgrade_sl
X resources
win_fontpath
win_mac_read
X resources
win_mac_write
resources
win_selection
selection manager
win_upgrade_sl
resources

file downgrade label
file upgrade label
bind to a multilevel
required for NFS
translate nonload custom
set X server
read another user's

modify another
set keyboard and
write to framebuffer
downgrade label of

install custom fonts
read hon-dominated
modify dominated X
bypass trusted

upgrade label of X

The privilege limit set for zones
will be configurable
Any of these privileges may be
assigned to zones
Benefits of Trusted Extensions
• Leveraging Solaris functionality:
> Process & User Rights Management, auditing, zones
> Make use of existing Solaris kernel enhancements
• Elimination of patch redundancy:
> All Solaris patches apply, hence available sooner
> No lag in hardware platform availability
• Extend Solaris Application Guarantee
• Full hardware and software support
> File systems (UFS, VxFS, ZFS, SAM-FS, QFS, etc.)
> Processors (SPARC, x86, AMD64)
> Infrastructure (Cluster, Grid, Directory, etc.)
Benefits?

Assurance + Mainstream Unix
What is Common Criteria EAL?
●

CC Evaluation Assurance Levels (EAL)
●
●
●
●
●

●
●

●

EAL1
EAL2
EAL3
EAL4
EAL5
EAL6
EAL7

Functionally Tested
Structurally Tested
Methodically Tested and Verified
Methodically Designed, Tested and Verified
Semi-formally Designed and Tested
Semi-formally Verified Design and Tested
Formally Verified Design and Tested

These are used to measure how well a
protection profile has been tested
Common Criteria Certifications
• Targets include : SPARC, x86/x64 based systems, full
networking, LDAP naming service, full GUI
• Solaris 10 3/05:
> CAPP, RBACPP @ EAL 4+
> Completed in December 2006
• Solaris 10 11/06:
> CAPP, RBACPP, LSPP @ EAL 4+
> Officially “In evaluation” as of June 2006
> Expected to complete by Summer 2007
• US-based upcoming requirements
> Basic, Single-Level Medium, Multilevel Medium
Some Common Customer Problems
• Allowing access to the coalition network from the national
network, but not vice versa
• Erect a “Chinese wall” between investment and brokerage
departments
• Prevent accidental disclosure of confidential information
• Data assurance – guarantee that a service does what it
claims to do
• Meeting privacy laws e.g. healthcare
A Smarter Solution!
Desktop consolidation - SNAP
• Desktop consolidation
> Permits access to those networks for which the user is
cleared or do not need to know about
> Denies transferring information from one network to the
other, unless the user is authorised to upgrade or
downgrade information
> Provides concurrent access to different classifications
• Based on configuration
> Can be used to prevent accidental disclosure (relabeling
requires confirmation)
> Provides access to only those networks for which the
user is cleared (Chinese wall)
Desktop Consolidation
RDP
(or other
protocol)
server

Secure Net
Apps 1,2,3
Secure Net
Apps 1,2,3
Secure Net
Apps 1,2,3
Secure Net
Apps 1,2,3

RDP (or...) client on Sun Ray
Session Server

Office #1

Office #1
Office #1

Secure Net A-Z
on One Terminal
Web-browsing
• Allow web-access from one network to other networks, but not vice
versa

• This can be done using a firewall, a well-configured “regular” Solaris
with a web proxy, or some variation on this theme
• Using Trusted Extensions
> in high-assurance environments to improve confidence
> In any environment to provide additional controls (protect against
misconfiguration)
Web-browsing
• Label-configuration has the different networks
“disjoint”, so TX will permit no communication
between them
Coalition Network 1
National
network

Coalition Network 2
Coalition Network 3
Web-publishing
• In the same environment the customer wants to be
able to publish documents to web-servers on the
coalition networks
C1

C2
NATIONAL NETWORK

C3
TX
Web-publishing
• Scripted (and thus easily updated)
> Document retrieval
> Document validation
> Document publishing
• Coded (but generic, so reusable)
> The communication code in the global zone daemon
> The relabeling and application invocation is scripted, so
easily extended (but only by an admin, as it exists in the
global zone which is inaccessible to “regular” users)
• Work in progress (but will be built this fiscal year)
Desktop sessions
> Users start an X server (e.g. Exceed) on their PC,
> They use Secure Shell to log-in on the TX system
> Once authenticated they get access to a text-based

menu that allows them to select a “destination” host
C1
C2

NATIONAL NETWORK

C3
TX
TX as A Trusted Router
TX Trusted Router
Architecture Level 1
Browser

CIPSO

Port 80
Port 80

PUBLIC

Port 80

Browser

CIPSO

INTERNAL

Browser

CIPSO

NEEDTOKNOW

Browser
RESTRICTED

CIPSO

Proxy Server Port
8080
(Reverse)

App Server

Port 80
Proxy Filter gets
client label from TX
and adds to http
header

Servlets get label
from http header
using
getHeader()

RESTRICTED Zone
Proxy Server listening
on an MLP
Architecture Level 2 - HTML
Client
http

JClientLabelFilter

JFileLabelFilter

Obtains remote connection label
(direct or from http header)
Obtains HTML file label
WSDL

JfilePEPFilter
(XACML)

JAX-RPC (Soap)

PDPservice
(XACML)

JLabelhtml

Static
HTML
File

(NEEDTOKNOW)

policy.xml
Architecture Level 2 - Tearline
Client
http

JClientLabelFilter

Obtains remote connection label
XML File

Apply XSLT to
XML file,
generates HTML

JLabelxml
(JAXP)

XALAN

XSLT File
XSD File

PEP Function
(XCML)
JAX-RPC

PDPservice
(XACML)

WSDL
Under Development
Web Service Example - [public]
Web Service Example - [confidential]
Web Service Example - [restricted]

Note level of detail
not available at
[public]
Other Large Network Architectures
SIMA – Secure Delivery of
eGovernment Services
Mobile
users

SSL over
IPSEC

Wireless
SSL over
IPSEC
Mobile
phone

SSL + VoIP
over IPSEC

Internet

SSL
SSL

Personal
Computer

SSL over
IPSEC

SUN Rays

Portal Server

Sun eGov
Applications

Applications
Large Government Networks
Recap
• Solaris with Trusted Extensions is
> Just another configuration of Solaris 10
> But one which has some extra policy enforcement
capabilities (and courtesy of these is being evaluated
against stricter Common Criteria protection profiles)
> Traditionally used as a desktop system, with Trusted
CDE or Trusted JDS as a desktop environment
> Equally usable for a “suspenders-and-a-belt” approach to
servers in any environment
> Where you can make a nice web proxy server, an
application-access-controlling gateway, or a controlled
publishing system (and much more) out of it...
Other References
• Other articles, url's:
> Desktop System Streamlines Analysis Work,
SIGNAL, Henry S. Kenyon

http://www.afcea.org/signal/articles/anmviewer.asp?a=427&z=39

> USS Mt. Whitney exercise
http://www.jfcom.mil/newslink/storyarchive/2004/pa062104.htm
> JEDI page describing DoDIIS Trusted Workstation
(DTW) https://extranet.if.afrl.af.mil/jedi/
> Super-Secure Systems Gain in Private Sector,

Investor's Business Daily, 10/12/04; Donna Howell
http://www.investors.com/editorial/tech01.asp?v=10/12
References
• Desktop System Streamlines Analysis Work,
SIGNAL, Henry S. Kenyon

http://www.afcea.org/signal/articles/anmviewer.asp?a=427&z=39

• USS Mt. Whitney exercise

http://www.jfcom.mil/newslink/storyarchive/2004/pa062104.htm

• JEDI page describing DoDIIS Trusted Workstation
(DTW)
> https://extranet.if.afrl.af.mil/jedi/
> http://www.rl/tech/programs/afdi

• Super-Secure Systems Gain in Private Sector, Investor's
Business Daily, 10/12/04; Donna Howell
http://www.investors.com/editorial/tech01.asp?v=10/12
Related Information

• Sun Security Home Page
–

http://www.sun.com/security

• Solaris Patches & Finger Print Database
–

http://sunsolve.sun.com/

• Sun Security Coordination Team
–

http://sunsolve.sun.com/security

• Sun BluePrints for Security
–

http://www.sun.com/blueprints
● Developing a Security Policy
● Trust Modelling for Security Arch. Development
● Building Secure n-Tier Environments
● How Hackers Do It: Tricks, Tips and Techniques
Related Service Information
• Sun Consulting Security Services
–

http://www.sun.com/service/sunps/security

• Sun Education Security Services
–

http://suned.sun.com/US/catalog

• Sun Support Services
> http://www.sun.com/service/support

• Network and Security Products
–

http://www.humanfirewall.org
kevin.mayo@sun.com

Más contenido relacionado

La actualidad más candente

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 
SQL Server Security - Attack
SQL Server Security - Attack SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
EnclaveSecurity
 

La actualidad más candente (20)

Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Acs 52 rn
Acs 52 rnAcs 52 rn
Acs 52 rn
 
Oracle security 08-oracle network security
Oracle security 08-oracle network securityOracle security 08-oracle network security
Oracle security 08-oracle network security
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 
SQL Server Security - Attack
SQL Server Security - Attack SQL Server Security - Attack
SQL Server Security - Attack
 
Oracle security 02-administering user security
Oracle security 02-administering user securityOracle security 02-administering user security
Oracle security 02-administering user security
 
Recommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityRecommended Software and Modifications for Server Security
Recommended Software and Modifications for Server Security
 
Technology to Stop Hackers
Technology to Stop Hackers Technology to Stop Hackers
Technology to Stop Hackers
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Certified Pre-Owned
Certified Pre-OwnedCertified Pre-Owned
Certified Pre-Owned
 
hacking and crecjing
hacking and crecjinghacking and crecjing
hacking and crecjing
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
What's New in AlienVault v3.0?
What's New in AlienVault v3.0?What's New in AlienVault v3.0?
What's New in AlienVault v3.0?
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
An Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security AssessmentsAn Introduction to PowerShell for Security Assessments
An Introduction to PowerShell for Security Assessments
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
Deploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual ApplianceDeploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual Appliance
 

Destacado

G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
Kevin Mayo
 
WorldFree Direct Sales
WorldFree Direct SalesWorldFree Direct Sales
WorldFree Direct Sales
WorldFreeds
 
3 leccion
3 leccion3 leccion
3 leccion
07leo
 
Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359
effiesyr
 

Destacado (17)

Skazka pro tochku
Skazka pro tochkuSkazka pro tochku
Skazka pro tochku
 
Имиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтовИмиджевый аспект государственных сайтов
Имиджевый аспект государственных сайтов
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
 
Digital branding: Теория и практика малых дел
Digital branding: Теория и практика малых делDigital branding: Теория и практика малых дел
Digital branding: Теория и практика малых дел
 
WorldFree Direct Sales
WorldFree Direct SalesWorldFree Direct Sales
WorldFree Direct Sales
 
3 leccion
3 leccion3 leccion
3 leccion
 
Старикам тут не место.
Старикам тут не место.Старикам тут не место.
Старикам тут не место.
 
Брифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этаповБрифование и проектирование. Важность предварительных этапов
Брифование и проектирование. Важность предварительных этапов
 
Сайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагированияСайт как инструмент оперативного реагирования
Сайт как инструмент оперативного реагирования
 
17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепции17 принципов создания идеальной дизайн-концепции
17 принципов создания идеальной дизайн-концепции
 
G snap security-solution
G snap security-solutionG snap security-solution
G snap security-solution
 
Как создать государственный интернет-ресурс
Как создать государственный интернет-ресурсКак создать государственный интернет-ресурс
Как создать государственный интернет-ресурс
 
Gebeurtenis
GebeurtenisGebeurtenis
Gebeurtenis
 
Massage Therapy
Massage TherapyMassage Therapy
Massage Therapy
 
Полезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазинаПолезные модули DEFA для автоматизации работы интернет-магазина
Полезные модули DEFA для автоматизации работы интернет-магазина
 
Современный музейный сайт
Современный музейный сайтСовременный музейный сайт
Современный музейный сайт
 
Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359Siadima anastasia 1508 syrigou eythymia 1359
Siadima anastasia 1508 syrigou eythymia 1359
 

Similar a Trusted extensions-gdansk-v1 0

0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
Sandesh Sonar
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
Giuseppe Paterno'
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 

Similar a Trusted extensions-gdansk-v1 0 (20)

Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Enterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentEnterprise Node - Securing Your Environment
Enterprise Node - Securing Your Environment
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet ExplorerHack.Lu 2010 - Escaping Protected Mode Internet Explorer
Hack.Lu 2010 - Escaping Protected Mode Internet Explorer
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Dominique
DominiqueDominique
Dominique
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
Security 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and ReportingSecurity 101: IBM i Security Auditing and Reporting
Security 101: IBM i Security Auditing and Reporting
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Trusted extensions-gdansk-v1 0

  • 2. What is Solaris Trusted Extensions? • An extension of the Solaris 10 security foundation providing access control policies based on the sensitivity/label of objects • A set of additional software packages added to a standard Solaris 10 system. • A set of label-aware services which implement multilevel security • A secure design to meet the Government set of security standards
  • 3. Secure S10 Foundation Solaris 10 Security Digital Certificates Everywhere Secure Execution* User Rights Management Process Rights Management Cryptographic Framework IPFilter Kerberos Single Sign On Secure By Default * Coming in future update
  • 4. Network Protection • IP Filter firewall > Sun supported stateful firewall > Allows selective access to ports based on IP addr. > Compatible/manageable like open source IPF • TCP Wrappers > Limit access to TCP/UDP service by domain name • Limiting Networking Services > Reduced Networking MetaCluster – Ultra small Solaris > Generic Limited Networking Service Profile > Will be enhanced in Solaris 10 update to include better 'out-ofthe-box' security, full function desktop and no exposed network svcs
  • 5. Cryptographic Framework ● ● Extensible cryptographic interfaces. > A common kernel and user-land framework for providing and using cryptographic functionality. > A common interface for cryptographic functions whether completed in hardware or software. > Extensible framework for vendors to provide custom functionality. By default, supports major algorithms. > Encryption: AES, RC4, DES, 3DES, RSA > Hashing: MD5, SHA-1 > MAC: DES MAC, MD5 HMAC, SHA-1 HMAC > Optimized for both SPARC, Intel and AMD
  • 6. Remote Access and Auditing • Solaris Secure Shell > Standards-based encrypted remote access • Kerberos Single Sign On > Standards-based enterprise single sign on > Optional encryption of NFSv3 and NFSv4 file shares • IPSec/IKE > Transparently encrypted communications • Auditing of activities > Audit records for all activities track users and roles > Output in XML format for parsing and analyzing > Centralized auditing and per-container audits
  • 7. User Access and Rights • User Rights Management > Roles defined with specific commands and authorizations they can perform > Users associated with roles. All audit logs record specific user and what role they were in at the time > Roles and non-logins can be used for system services • Password Management > New password capabilities prevent easily guessed or reused passwords and provide account lockout > Pluggable Authentication Modules for expansion
  • 8. Zones Example • Highly secure • Invisible to each other • Very efficient • No performance penalty • Separated file systems • 8,000 per OS instance • Resource mgmt globally and per container
  • 9. File Integrity and Secure Execution • BART – Basic Audit and Reporting Tool > Checksums compared periodically against known good list of files that customer generates > Can be used with Sun-supplied Fingerprint Database • Solaris Secure Execution* > Almost all applications are signed in Solaris 10 > Sys-admins can manually verify them today > Future update will verify integrity at load time >Customers can sign their own files, or 3rd party >Can customize EXACTLY which apps can be run on whole system, preventing ANY unauthorized app from running
  • 10. Encrypted File Systems • Loopback-based > One physical file on disk, contents encrypted > Mounted as file system via loopback > No application modification required > Works with NFS & local file sharing > Early update of Solaris 10 • ZFS Module for Encryption > ZFS offers modular structure for enhancements > Would encrypt a full ZFS file system on disk > No application modification required > All other aspects of management preserved > Sometime after ZFS is released in Solaris update
  • 11. Solaris 10 Privileges “contract_event” Request reliable delivery of events “contract_observer” users "cpc_cpu” "dtrace_kernel" "dtrace_proc" "dtrace_user" "file_chown" "file_chown_self" "file_dac_execute" "file_dac_read" "file_dac_search" "file_dac_write" perms "file_link_any" "file_owner" ops "file_setid" "ipc_dac_read" Mem perms "ipc_dac_write" Mem perms "ipc_owner" "net_icmpaccess" "net_privaddr" (<1023+extras) "net_rawaccess” "proc_audit” "proc_chroot” Observe contract events for other Access to per-CPU perf counters DTrace kernel tracing DTrace process-level tracing DTrace user-level tracing Change file's owner/group IDs Give away (chown) files Override file's execute perms Override file's read perms Override dir's search perms Override (non-root) file's write Create hard links to diff uid files Non-owner can do misc owner Set uid/gid (non-root) to diff id Override read on IPC, Shared Override write on IPC, Shared Override set perms/owner on IPC Send/Receive ICMP packets Bind to privilege port Raw access to IP Generate audit records Change root "proc_lock_memory" "proc_owner" "proc_priocntl" "proc_session" process "proc_setid" "proc_taskid" “proc_zone” zones “sys_acct” (acct) “sys_admin (node/domain name) "sys_audit" "sys_config" "sys_devices" (exclusive) "sys_ipc_config" "sys_linkdir" "sys_mount" "sys_net_config" interfaces,routes,stack "sys_nfs" "sys_res_config" "sys_resource" "sys_suser_compat" "sys_time" Lock pages in physical memory See/modify other process states Increase priority/sched class Signal/trace other session Set process UID Assign new task ID Signal/trace processes in other Manage accounting system System admin tasks Control audit system Manage swap Override device restricts Increase IPC queue Link/unlink directories Filesystem admin (mount,quota) Config net Bind NFS ports and use syscalls Admin processor sets, res pools Modify res limits (rlimit) 3rd party modules use of suser Change system time
  • 12. Kerberos and Secure Shell ● ● Kerberos Enhancements ● MIT Kerberos 1.3.2 Refresh ● KDC Incremental Propagation ● Migration Tools ● Kerberized network clients (telnet, rcmds, etc.) ● Interoperability Fixes Secure Shell Enhancements ● OpenSSH 3.6p2 Refresh ● GSS-API Support ● Keyboard “Break” Sequence Support ● X11 Forwarding “on” by default ● ARCfour, AES CTR mode Encryption Support ● /etc/default/login Synchronization ● SSH2 Rekeying, Service Side Keepalives, etc...
  • 13. Auditing • Solaris Auditing > Updated to support output to SYSLOG Oct 29 01:52:56 lennox audit: [ID 225229 audit.notice] su ok session 3285174027 by root as root:root from lennox text success for user sys > Updated to support translation to XML (praudit -x) <record version="2" event="su" host="lennox" iso8601="2004-10-29 01:52:56.862 -04:00"> <subject audit-uid="root" uid="root" gid="root" ruid="root" rgid="root" pid="234" sid="3285174027" tid="0 0 lennox"/> <text>success for user sys</text> <return errval="success" retval="0"/> </record> • What do I need to know? > > > > SYSLOG is not a guaranteed protocol Subset of audited events can be sent via SYSLOG Using SYSLOG events can be sent off-host. Beta XML Audit Parser available (unsupported)
  • 14. Access Management • Account Access > Users versus Roles >Leverage 'roles' for service and shared accounts! > Non-Login versus Locked Accounts >New passwd(1) options to manage > Account Lockout (Global or per-User) >“Three strikes” requires administrator to unlock. • File system Object Access > Unix Permissions and ACLs >Same as previous Solaris releases > New mount option - “noexec” >Useful for file systems containing only data.
  • 15. User Rights Management • Decompose superuser into less powerful roles based on job requirements. • Assign rights to roles; and roles to users. • Audit user actions. • In Solaris 8, 9, 10 • In Trusted Solaris & Trusted Extensions • Centralized mgmt. S Rights R U U U R
  • 16. User/Password Management • Password Complexity Checks > Login Name, White Space > Minimum Alpha, Non-Alpha, Upper, Lower, (Consecutive) Repeats, Special, Digits, etc. • Password History (0 – 26 passwords) • Banned Password List (Dictionary) • What do I need to understand? > Complexity checks apply to everyone - but 'root' > Password history is 'files' only. > Password aging is 'files', NIS+ and LDAP only.
  • 17. Solaris Secure Execution • Verifies integrity of the executable portion of almost all applications, drivers, modules • Customers can sign their own or 3rd party applications – no changes needed • Manual verification in Solaris 10 03/05 > $ elfsign verify -e /usr/bin/login > elfsign: verification of /usr/bin/login passed. • Automatic run-time verification in update > User selectable rules for checking > Prevents modified or unsigned code from running > Customized systems can now be signed and secured
  • 18. Solaris System Auditing • Audits all system events • Records actual userid and what role and application issued which system calls, command line or data access • Captures complete command line and environment variables for later analysis • Audit compliance is required by Common Criteria Controlled Access Protection Profile • Same audit system used in Solaris 8, 9, 10 > Solaris 9 & 10 offer XML output & selective filtering of system read-only activities > Solaris 10 offers syslog channel for audit logs
  • 19. Who Needs more? The World is Changing!
  • 20. What TX is NOT • It is NOT Trusted Solaris 8 ported to Solaris 10 > It will NOT run Trusted Solaris 8 applications • It is NOT a new operating system nor a new kernel > Works with all Solaris patches > Patches for TX added pkgs through normal patch site • It does not have additional “commercial” security features over and about standard Solaris • It is NOT limited to SPARC processors > Runs on SPARC, x86, x64 • Closed and proprietary
  • 21. Multi-Level Labeled Security Trusted Extensions Adds labeled security to Solaris 10 Multi-level networking, printing Multi-level GUI Leverages User & Process RM Uses Containers Compatible with all Solaris apps Target of CAPP, RBACPP, LSPP @ EAL 4+
  • 22. Trusted Extensions in a Nutshell • Every object has a label associated with it > Files, windows, printers, devices, network packets, network interfaces, processes, etc... • Accessing or sharing data is controlled by the objects' label relationship to each other > Lower label objects do not see higher label objects • Administrators utilize Roles for duty separation > Security admin, user admin, backup, restore, etc... • Programs/processes are granted privileges rather than full superuser access • Strong independent certification of security
  • 23. Goals and Benefits • Runs all Solaris applications > It's still Solaris, with Containers > It's still Solaris, just with extended security policy > It's still Solaris, same kernel > It's still Solaris, all Solaris patches work • Runs all infrastructure software > Backup, Web, middle-ware, dev tools, etc. > Database, file systems, devices/drivers, etc. • Preserve and transition > CDE User interface, single and multi-level JDS/GNOME > Solaris Mgmt. Cnsle with LDAP naming service
  • 24. What are Label-Aware Services? • Services which are trusted to protect multilevel information according to predefined policy • Trusted Extensions Label-aware service include: > Labeled Desktops > Labeled Printing > Labeled Networking > Labeled Filesystems > Label Configuration and Translation > System Management Tools > Device Allocation
  • 25. Mandatory Access Control and Security Labels • Users cleared at multiple security levels can work on them simultaneously • Compartmentalization of information is possible with Security labels and MAC thus facilitating server virtualization Non-hierarchical Commercial Hierarchy Government Hierarchy Internet Exec Mgmt Top Secret VP & above Secret Directors Confidential All Employees Unclassified Trusted Extens. Music Net Inc. Online Daisy's Florists Solaris 10 or Trusted Extensions Trusted Extens.
  • 27. Multilevel Architecture Need-toknow (local zone) Internal Use Public (local zone) (local zone) Multilevel Desktop Services (Global Zone) Solaris Kernel SPARC, x86 or x64 Hardware Local or Sun Ray display • Layered architecture implements: > mandatory access control > hierarchical labels > principle of least privilege > trusted path > role-based access
  • 28. Trusted Extensions Implementation • Each zone has a label > Labels are implied by process zone IDs > Processes are isolated by label (and zone ID) > Files in a zone assume that zone's label • Global zone is unique > Parent of all other zones > Exempt from all labeling policies >No user processes—just TCB >Trusted path attribute is applied implicitly > Provides services to other zones • Common naming service to all zones
  • 29. Filesystem MAC policies • Labels derived from a filesystem owner's label • Mount policy is always enforced > No reading-up > Read-write mounts require label equality in labeled zones > Reading-down > Read-only mounts require dominance by client > Can be restricted via zone's limit set and network label range > Writing-up > Cannot write-up to regular files > Limited write-up to label-aware services (via TCP and doors) > Writing-down > Restricted to privileged label-aware global zone services
  • 30. NFS Support for Zones • NFS clients: > Each zone has its own automounter > Kernel enforces MAC policy for NFS mounts • NFS servers: > Global zone administrators a share table per zone > Kernel enforces MAC policy for NFS requests • The global zone administrator can export filesystems from labeled zones > Each export must be a single-level filesystem > Zone's label automatically applied to each export
  • 31. Networking: Option 1: Per-Zone IP addresses Need-toknow Internal Use Public Multilevel Desktop Services (Global Zone) Solaris Kernel 1.2.3.10 1.2.4.10 1.2.5.10 1.2.6.10 • Each zone has a unique IP address • Network Interface may be virtualized to share a single hardware NIC or use multiple NICs
  • 32. Option 2: All-Zone IP addresses Need-toknow Internal Use Public Multilevel Desktop Services (Global Zone) Solaris Kernel 1.2.3.4 1.2.3.4 1.2.3.4 1.2.3.4 1.2.6.10 • All zones share a single address • Shared network Interface may be physical or logical • Both per-zone and all-zone assignment strategies can be used concurrently
  • 33. Multi-Level Desktop • Trusted CDE standard > Similar to Trusted Solaris 8 > Included in initial Common Criteria Evaluation • Java Desktop System (GNOME) > Single Level desktop >Full accessibility requirements >More modern look-and-feel to customers > Multi-level desktop >Included in initial release >Test as part of the Common Criteria LSPP
  • 34. Multilevel Session ● ● An authorized user can work at multiple sessions concurrently. The user can be authorized to do cut-and-paste operations.
  • 35. Security Policy Enforced ● ● System queries for upgrade/downgrade of information Seeing data isn't enough to allow you to change or move it
  • 37. Trusted Java Desktop System Details Workplace switcher Task switcher Trusted stripe and Trusted Path menu
  • 38. Trusted Extensions Privileges file_downgrade_sl file_upgrade_sl net_bindmlp port net_mac_aware read-down sys_trans_label dominated labels win_colormap pseudo-colors win_config defaults win_dac_read X resources win_dac_write user's X resources win_devices pointer policies win_dga win_downgrade_sl X resources win_fontpath win_mac_read X resources win_mac_write resources win_selection selection manager win_upgrade_sl resources file downgrade label file upgrade label bind to a multilevel required for NFS translate nonload custom set X server read another user's modify another set keyboard and write to framebuffer downgrade label of install custom fonts read hon-dominated modify dominated X bypass trusted upgrade label of X The privilege limit set for zones will be configurable Any of these privileges may be assigned to zones
  • 39. Benefits of Trusted Extensions • Leveraging Solaris functionality: > Process & User Rights Management, auditing, zones > Make use of existing Solaris kernel enhancements • Elimination of patch redundancy: > All Solaris patches apply, hence available sooner > No lag in hardware platform availability • Extend Solaris Application Guarantee • Full hardware and software support > File systems (UFS, VxFS, ZFS, SAM-FS, QFS, etc.) > Processors (SPARC, x86, AMD64) > Infrastructure (Cluster, Grid, Directory, etc.)
  • 41. What is Common Criteria EAL? ● CC Evaluation Assurance Levels (EAL) ● ● ● ● ● ● ● ● EAL1 EAL2 EAL3 EAL4 EAL5 EAL6 EAL7 Functionally Tested Structurally Tested Methodically Tested and Verified Methodically Designed, Tested and Verified Semi-formally Designed and Tested Semi-formally Verified Design and Tested Formally Verified Design and Tested These are used to measure how well a protection profile has been tested
  • 42. Common Criteria Certifications • Targets include : SPARC, x86/x64 based systems, full networking, LDAP naming service, full GUI • Solaris 10 3/05: > CAPP, RBACPP @ EAL 4+ > Completed in December 2006 • Solaris 10 11/06: > CAPP, RBACPP, LSPP @ EAL 4+ > Officially “In evaluation” as of June 2006 > Expected to complete by Summer 2007 • US-based upcoming requirements > Basic, Single-Level Medium, Multilevel Medium
  • 43. Some Common Customer Problems • Allowing access to the coalition network from the national network, but not vice versa • Erect a “Chinese wall” between investment and brokerage departments • Prevent accidental disclosure of confidential information • Data assurance – guarantee that a service does what it claims to do • Meeting privacy laws e.g. healthcare
  • 45. Desktop consolidation - SNAP • Desktop consolidation > Permits access to those networks for which the user is cleared or do not need to know about > Denies transferring information from one network to the other, unless the user is authorised to upgrade or downgrade information > Provides concurrent access to different classifications • Based on configuration > Can be used to prevent accidental disclosure (relabeling requires confirmation) > Provides access to only those networks for which the user is cleared (Chinese wall)
  • 46. Desktop Consolidation RDP (or other protocol) server Secure Net Apps 1,2,3 Secure Net Apps 1,2,3 Secure Net Apps 1,2,3 Secure Net Apps 1,2,3 RDP (or...) client on Sun Ray Session Server Office #1 Office #1 Office #1 Secure Net A-Z on One Terminal
  • 47. Web-browsing • Allow web-access from one network to other networks, but not vice versa • This can be done using a firewall, a well-configured “regular” Solaris with a web proxy, or some variation on this theme • Using Trusted Extensions > in high-assurance environments to improve confidence > In any environment to provide additional controls (protect against misconfiguration)
  • 48. Web-browsing • Label-configuration has the different networks “disjoint”, so TX will permit no communication between them Coalition Network 1 National network Coalition Network 2 Coalition Network 3
  • 49. Web-publishing • In the same environment the customer wants to be able to publish documents to web-servers on the coalition networks C1 C2 NATIONAL NETWORK C3 TX
  • 50. Web-publishing • Scripted (and thus easily updated) > Document retrieval > Document validation > Document publishing • Coded (but generic, so reusable) > The communication code in the global zone daemon > The relabeling and application invocation is scripted, so easily extended (but only by an admin, as it exists in the global zone which is inaccessible to “regular” users) • Work in progress (but will be built this fiscal year)
  • 51. Desktop sessions > Users start an X server (e.g. Exceed) on their PC, > They use Secure Shell to log-in on the TX system > Once authenticated they get access to a text-based menu that allows them to select a “destination” host C1 C2 NATIONAL NETWORK C3 TX
  • 52. TX as A Trusted Router
  • 54. Architecture Level 1 Browser CIPSO Port 80 Port 80 PUBLIC Port 80 Browser CIPSO INTERNAL Browser CIPSO NEEDTOKNOW Browser RESTRICTED CIPSO Proxy Server Port 8080 (Reverse) App Server Port 80 Proxy Filter gets client label from TX and adds to http header Servlets get label from http header using getHeader() RESTRICTED Zone Proxy Server listening on an MLP
  • 55. Architecture Level 2 - HTML Client http JClientLabelFilter JFileLabelFilter Obtains remote connection label (direct or from http header) Obtains HTML file label WSDL JfilePEPFilter (XACML) JAX-RPC (Soap) PDPservice (XACML) JLabelhtml Static HTML File (NEEDTOKNOW) policy.xml
  • 56. Architecture Level 2 - Tearline Client http JClientLabelFilter Obtains remote connection label XML File Apply XSLT to XML file, generates HTML JLabelxml (JAXP) XALAN XSLT File XSD File PEP Function (XCML) JAX-RPC PDPservice (XACML) WSDL
  • 57. Under Development Web Service Example - [public]
  • 58. Web Service Example - [confidential]
  • 59. Web Service Example - [restricted] Note level of detail not available at [public]
  • 60. Other Large Network Architectures
  • 61. SIMA – Secure Delivery of eGovernment Services Mobile users SSL over IPSEC Wireless SSL over IPSEC Mobile phone SSL + VoIP over IPSEC Internet SSL SSL Personal Computer SSL over IPSEC SUN Rays Portal Server Sun eGov Applications Applications
  • 63. Recap • Solaris with Trusted Extensions is > Just another configuration of Solaris 10 > But one which has some extra policy enforcement capabilities (and courtesy of these is being evaluated against stricter Common Criteria protection profiles) > Traditionally used as a desktop system, with Trusted CDE or Trusted JDS as a desktop environment > Equally usable for a “suspenders-and-a-belt” approach to servers in any environment > Where you can make a nice web proxy server, an application-access-controlling gateway, or a controlled publishing system (and much more) out of it...
  • 64. Other References • Other articles, url's: > Desktop System Streamlines Analysis Work, SIGNAL, Henry S. Kenyon http://www.afcea.org/signal/articles/anmviewer.asp?a=427&z=39 > USS Mt. Whitney exercise http://www.jfcom.mil/newslink/storyarchive/2004/pa062104.htm > JEDI page describing DoDIIS Trusted Workstation (DTW) https://extranet.if.afrl.af.mil/jedi/ > Super-Secure Systems Gain in Private Sector, Investor's Business Daily, 10/12/04; Donna Howell http://www.investors.com/editorial/tech01.asp?v=10/12
  • 65. References • Desktop System Streamlines Analysis Work, SIGNAL, Henry S. Kenyon http://www.afcea.org/signal/articles/anmviewer.asp?a=427&z=39 • USS Mt. Whitney exercise http://www.jfcom.mil/newslink/storyarchive/2004/pa062104.htm • JEDI page describing DoDIIS Trusted Workstation (DTW) > https://extranet.if.afrl.af.mil/jedi/ > http://www.rl/tech/programs/afdi • Super-Secure Systems Gain in Private Sector, Investor's Business Daily, 10/12/04; Donna Howell http://www.investors.com/editorial/tech01.asp?v=10/12
  • 66. Related Information • Sun Security Home Page – http://www.sun.com/security • Solaris Patches & Finger Print Database – http://sunsolve.sun.com/ • Sun Security Coordination Team – http://sunsolve.sun.com/security • Sun BluePrints for Security – http://www.sun.com/blueprints ● Developing a Security Policy ● Trust Modelling for Security Arch. Development ● Building Secure n-Tier Environments ● How Hackers Do It: Tricks, Tips and Techniques
  • 67. Related Service Information • Sun Consulting Security Services – http://www.sun.com/service/sunps/security • Sun Education Security Services – http://suned.sun.com/US/catalog • Sun Support Services > http://www.sun.com/service/support • Network and Security Products – http://www.humanfirewall.org