21
COMPOSITION MILS SECURE GATEWAY SUMMARY S E S A M CC Compositional Certification for MILS Virtualization Platforms Werner Stephan*, Sergey Tverdyshev + , Holger Blasum + , Bruno Langenstein*, Kevin Müller**, Andreas Nonnengart*, Michael Paulitsch**, Reinhard Schwarz ++ *DFKI, **EADS Innovation Works, ++ Fraunhofer IESE, + SYSGO September 18, 2012 WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 1

CC Compositional Certification [1ex] for MILS Virtualization

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

COMPOSITION MILS SECURE GATEWAY SUMMARY

S E S A M

CC Compositional Certificationfor MILS Virtualization Platforms

Werner Stephan*, Sergey Tverdyshev+, Holger Blasum+,Bruno Langenstein*, Kevin Müller**, Andreas Nonnengart*,

Michael Paulitsch**, Reinhard Schwarz++

*DFKI, **EADS Innovation Works, ++Fraunhofer IESE, +SYSGO

September 18, 2012

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 1/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

OutlineS E S A M

1. From Components to Compositionality

2. Multiple Independent Levels of Security

3. Secure Gateway

4. Summary

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 2/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

ComponentsS E S A M

- Structuring systems into components is the main meansfor

• the reuse of certain parts,• an efficient change management, and• the reduction of complexity (avoid possible exponential

growth of complexity).

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 3/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Components (ctd.)S E S A M

- Boundaries of components.- Interfaces between components and to the environment.- How to exploit structure in design, analysis, and

evaluation?

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 4/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

CompositionalityS E S A M

- Frege’s principle of compositionality for the semantics oflanguage constructs: [str(c0, c1)] = compstr ([c0], [c1])

- In software development one needs to associateimport/export descriptions (specifications) withcomponents.

- Allows for an independent treatment of components.

Export(guaranteed)

Export(guaranteed)

Import(required)

Import(required)

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 5/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

CompositionS E S A M

- Reasoning about composition only in terms ofexport/import descriptions (as an additional step).

- Required imports may be pruned if guaranteed by othercomponents or remain for further (iterated) compositions.

entails

- When is this (ideal) approach possible in securityengineering?

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 6/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Compositional EvaluationS E S A M

- Two approaches:1. CAP2. CCDB-2007-09-001

- Both consider a base and a dependent system that uses"services" from the base system.

- First approach can be made to cover more generalschemes and iteration (according to CC Part 3, B).

- Our interest: Instantiation of these schemes for MILSarchitectures.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 7/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

CAPS E S A M

- Two (independent) security targets and an additionaldocument for composition.

- Level A, B, C: Rigor in analyzing the composition.- Emphasis on interactions between dependent and base

system to guarantee objectives of the composed system.- Restriction:

CC Part 3 Para 141: The CAPs only consider resistance against an attacker with an attack potential up to

Enhanced-Basic. This is due to the level of design information that can be provided through the ACO_DEV,

limiting some of the factors associated with attack potential (knowledge of the composed TOE) and

subsequently affecting the rigour of vulnerability analysis that can be performed by the evaluator. Therefore,

the level of assurance in the composed TOE is limited, although the assurance in the individual components

within the composed TOE may be much higher.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 8/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

CCDB-2007-09-001S E S A M

- Two steps: Platform and dependent system on theplatform.

- A more restricted generic interaction between base anddependent system.15 The hardware platform has no ’strictly functional’ properties related to security. It provides mechanisms

to protect the composite product assets, but the composite product behaviour depends widely on the

software application having to use, to configure and activate these security mechanisms.

- Motivated by hardware platforms.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 9/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Compositionality for SecurityS E S A M

- Assurance for security goals cannot always bedecomposed.

1. Conceptual (logical) limitations like for the composition ofprotocols and policies.

2. Technical problems: Shared resources make it difficult toground logical valid designs on existing platforms.

Multiple Independent Levels of Security (Rushby 1981)solves (2).

• Provides support for compositional evaluations.• Layered architecture: (MILS-) separation platform as a

base component other components depend on.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 10/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

MILS ApproachS E S A M

- Global security policies (like MLS type policies) are difficultto enforce (analyze, verify, evaluate) and often inadequatefor large monolithic systems.

- Separation of concerns: MILS separation kernels allow forthe implementation of architectures with manageable localpolicies that interact (only) through well defined(controllable) channels.

- Formalizations by information flow analysis and relatedapproaches: Rushby, Di Vito, Greve&Wilding&Vanfleet.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 11/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Integration and Security inAvionics

S E S A M

- Integration drives security concerns in avionics.- Functional integration: Formerly autonomous components

are combined to create new functionality (old functionalitylargely remains).

- Architectural integration (IMA): Common hardwareplatform.

- Security concerns (example): air gap.- Look for an "evaluation friendly" approach: Ongoing work

in SeSaM funded by the German Federal Ministry ofEducation and Research (BMBF) under fundingID 01BY112[0-3].

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 12/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Security Gateway - OverviewS E S A M

- Purpose: Control the information flow betweenapplications of different security domains.

• outbound component: protection against informationleakage (confidentiality)

• inbound component: protection against compromising data(integrity)

- Conceptual structure:

outbd inbdAP1 AP2

Environment

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 13/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

PikeOS as a ComponentS E S A M

- Started to work on compositional treatment: (CAPACO_REL1.1/CCDB ASE_COMP.1-1, CAPACO_REL.1.2/CCDB ASE_COMP.1-2).

- A closer look at the interaction between PikeOS and thegateway:

outbdTOE2

inbdTOE2

AP1non TOE

AP2non TOE

PikeOS TOE1

API

Partitions

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 14/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Observations - Lessons LearnedS E S A M

- Communication with PikeOS always uses the PikeOS API.- PikeOS always offers the same generic security services

to all applications running on it.• The only application-specific aspect of the interaction is

(explicitly, declaratively) given by a PikeOS channel-flowpolicy.

• Policies as export descriptions.• PikeOS (will be) evaluated for arbitrary policies based on

the given (fixed) PikeOS API.• Formal model provides semantics of policies.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 15/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Observations -Lessons Learned (ctd.)

S E S A M

- Only PikeOS configuration has to be assessed from anapplication-specific point of view.

- Guarantees (semantics) of policies are part of PikeOS STand require no further context-dependent analysis.

- An instance of the ideal case.- Therefore in our view: Reasons for CAP restrictions do

not apply here.- Situation similar to (hardware) platforms treated by

CCDB-2007-09-001.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 16/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

PikeOS Security ServicesS E S A M

- PikeOS flow policy (abstract view)

ch1 ch2 ch3allowed flow

partitionchannel access

- Main service: Applications in a partition perceive (andinfluence) the environment (all other partitions) onlythrough declared interfaces (to channels).

- Ongoing work on formalization.- (Formal) export specification for PikeOS to be used for

compositional reasoning at the application level.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 17/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Import to Gateway ScenarioS E S A M

- Integrity of gateway data (configuration) as far as access(dependencies) from outside are concerned.

- No direct communication between green and brownapplication (no bypass).

- Instantiation of PikeOS (for the gateway scenario) byconfiguration of a policy.

- Contribution of PikeOS can be expressed in a formal way.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 18/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Objectives of the GatewayS E S A M

- Filtering mechanism: O.ADDRESS_FILTERING,O.CLEAN_PROTOCOL_HEADER,O.RESIDUAL_INFORMATION

- Implementation uses functionality of the platform.• no security services• application-independent• execution mechanism (similar to hardware platforms)

- In general several local security mechanisms may interactthrough PikeOS channels.

• modular architectures to be supported by MILS• CCDB-2007-09-001 possibly not general enough• But role of PikeOS remains the same.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 19/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

Hardware as a ComponentS E S A M

- Open Question: Consider hardwareplatform as a separate component?

- Use of hardware might lead to illicitinformation flows.

- Need assumptions (import) forhardware.

- More complex configuration issues:Requirements from the application (forthe final PikeOS flow policy) might forcecertain hardware constellations (tomeet the assumptions).

Hardware    

Separa*on  kernel  

Security  Gateway  

Compositional Certification in SeSaM

Another (ACO|CCDB?) Compositional Certification to be done (?)

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 20/21

COMPOSITION MILS SECURE GATEWAY SUMMARY

SummaryS E S A M

- CAP scheme captures (many/all) essential aspects ofcompositional design.

- Flexible enough for MILS architectures as opposed toCCDB-2007-09-001.

- There are situations (as in case of PikeOS) where reasonsfor restrictions do not apply.

- Worthwhile to characterize these situations wherecomposition can be fully analyzed in terms ofexport/import?

- May be useful for composition on top of the separationplatform.

WS,ST,HB,BL,KM,AN,MP,RS 09/18/2012 21/21