17873 lines
800 KiB
Plaintext
17873 lines
800 KiB
Plaintext
|
|
NCSC-TG-005
|
|
Library No. S228,526
|
|
Version 1
|
|
|
|
|
|
|
|
|
|
FOREWORD
|
|
|
|
|
|
|
|
This publication is issued by the National Computer
|
|
Security Center (NCSC) as part of its program to promulgate
|
|
technical computer security guidelines. The interpretations
|
|
extend the evaluation classes of the Trusted Systems Evalua-
|
|
tion Criteria (DOD 5200.28-STD) to trusted network systems
|
|
and components.
|
|
|
|
This document will be used for a period of at least one
|
|
year after date of signature. During this period the NCSC
|
|
will gain experience using the Trusted Network Interpreta-
|
|
tion in several network evaluations. In addition, the NCSC
|
|
will conduct a series of tutorials and workshops to educate
|
|
the community on the details of the Trusted Network
|
|
Interpretation and receive feedback. After this trial
|
|
period, necessary changes to the document will be made and a
|
|
revised version issued.
|
|
|
|
Workshops and tutorials will be open to any member of
|
|
the network security community interested in providing feed-
|
|
back. Anyone wishing more information, or wishing to pro-
|
|
vide comments on the usefulness or correctness of the
|
|
Trusted Network Interpretation may contact: Chief, Techni-
|
|
cal Guidelines Division, National Computer Security Center,
|
|
Ft. George G. Meade, MD 20755-6000, ATTN: C11. The tele-
|
|
phone number is (301) 859-4452.
|
|
|
|
|
|
|
|
|
|
______________________________________________
|
|
PATRICK R. GALLAGHER, JR. 31 July 1987
|
|
Director
|
|
National Computer Security Center
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ACKNOWLEDGMENT
|
|
______________
|
|
|
|
|
|
|
|
|
|
|
|
Acknowledgment is extended to the members of the Work-
|
|
ing Group who produced this Interpretation. Members were:
|
|
Alfred Arsenault, National Computer Security Center (Chair);
|
|
Dr. Roger Schell, Gemini Computers; Stephen Walker, Trusted
|
|
Information Systems; Dr. Marshall Abrams, MITRE; Dr.
|
|
Jonathan Millen, MITRE; Leonard LaPadula, MITRE; Robert
|
|
Morris, NCSC; and Jack Moskowitz, NCSC. Also due ack-
|
|
nowledgement for their many inputs to this interpretation
|
|
are Steve Padilla and William Shockley, Gemini Computers.
|
|
|
|
|
|
|
|
|
|
Introduction
|
|
____________
|
|
|
|
|
|
|
|
|
|
|
|
|
|
I.1. Scope
|
|
_ _ _____
|
|
|
|
Part I of this document provides interpretations of the
|
|
Department of Defense Trusted Computer System Evaluation
|
|
Criteria (TCSEC) (DOD-5200.28-STD), for trusted
|
|
computer/communications network systems. The specific secu-
|
|
rity feature, the assurance requirements, and the rating
|
|
structure of the TCSEC are extended to networks of computers
|
|
ranging from isolated local area networks to wide-area
|
|
internetwork systems.
|
|
|
|
Part II of this document describes a number of addi-
|
|
tional security services (e.g., communications integrity,
|
|
denial of service, transmission security) that arise in con-
|
|
junction with networks. Those services available in
|
|
specific network offerings, while inappropriate for the
|
|
rigorous evaluation applied to TCSEC related feature and
|
|
assurance requirements, may receive qualitative ratings.
|
|
|
|
The TCSEC related feature and assurance requirements,
|
|
and the additional security services described herein are
|
|
intended for the evaluation of trusted network systems
|
|
designed to protect a range of sensitive information. As
|
|
such, they require that physical, administrative, pro-
|
|
cedural, and related protection measures adequate to the
|
|
sensitivity of the information being handled are already in
|
|
place. It is possible, and indeed common practice, to
|
|
operate a network in a secure manner at a single system high
|
|
sensitivity level without meeting any trust related feature
|
|
or assurance requirements described herein. The full range
|
|
of physical and administrative security measures appropriate
|
|
to the highest sensitivity level of information on the net-
|
|
work must be in place in order to operate a trusted network
|
|
as described in this Interpretation.
|
|
|
|
It is important to note that this Interpretation does
|
|
not describe all the security requirements that may be
|
|
imposed on a network. Depending upon the particular
|
|
environment, there may be communications security (COMSEC),
|
|
emanations security, physical security, and other measures
|
|
required.
|
|
|
|
An environmental evaluation process, such as that
|
|
described in the ``Computer Security Requirements--Guidance
|
|
for Applying the DoD TCSEC in Specific Environments'' (CSC-
|
|
STD-003-85), can be used to determine the level of trust
|
|
required by specific system environments. Similar analyses
|
|
are applicable to networks evaluated under these Interpreta-
|
|
tions.
|
|
|
|
I.2. Purpose
|
|
_ _ _______
|
|
|
|
As with the TCSEC itself, this Interpretation has been
|
|
prepared for the following purposes:
|
|
|
|
|
|
1. To provide a standard to manufacturers as to what
|
|
security features and assurance levels to build into
|
|
their new and planned, commercial network products
|
|
in order to provide widely available systems that
|
|
satisfy trust requirements for sensitive applica-
|
|
tions
|
|
|
|
2. To provide a metric by which to evaluate the degree
|
|
of trust that can be placed in a given network sys-
|
|
tem for processing sensitive information
|
|
|
|
3. To provide a basis for specifying security require-
|
|
ments in acquisition specifications.
|
|
|
|
|
|
With respect to the second purpose for development of
|
|
the criteria, i.e., providing a security evaluation metric,
|
|
evaluations can be delineated into two types: an evaluation
|
|
can be performed on a network product from a perspective
|
|
that excludes the application environment, or an evaluation
|
|
can be done to assess whether appropriate security measures
|
|
have been taken to permit the system to be used operation-
|
|
ally in a specific environment. The former type of evalua-
|
|
tion is done by the National Computer Security Center
|
|
through the Commercial Product Evaluation Process.
|
|
|
|
The latter type of evaluation, those done for the pur-
|
|
pose of assessing a system's security attributes with
|
|
respect to a specific operational mission, is known as a
|
|
certification evaluation. It must be understood that the
|
|
completion of a formal product evaluation does not consti-
|
|
tute certification or accreditation for the system to be
|
|
used in any specific application environment. On the con-
|
|
trary, the evaluation report only provides a trusted network
|
|
system's evaluation rating along with supporting data
|
|
describing the product system's strengths and weaknesses
|
|
from a computer security point of view. The system security
|
|
certification and the formal approval/accreditation pro-
|
|
cedure, done in accordance with the applicable policies of
|
|
the issuing agencies, must still be followed before a net-
|
|
work can be approved for use in processing or handling clas-
|
|
sified information. Designated Approving Authorities (DAAs)
|
|
remain ultimately responsible for specifying the security of
|
|
systems they accredit.
|
|
|
|
This Interpretation can be used directly and indirectly
|
|
in the certification process. Along with applicable policy,
|
|
it can be used directly as technical guidance for evaluation
|
|
of the total system and for specifying system security and
|
|
certification requirements for new acquisitions. Where a
|
|
system being evaluated for certification employs a product
|
|
that has undergone a Commercial Product Evaluation, reports
|
|
from that process will be used as input to the certification
|
|
evaluation. Technical data will be furnished to designers,
|
|
evaluators, and the DAAs to support their needs for making
|
|
decisions.
|
|
|
|
The fundamental computer security requirements as
|
|
defined in the TCSEC apply to this Interpretation.
|
|
|
|
I.3. Background
|
|
_ _ __________
|
|
|
|
The term ``sponsor'' is used throughout this document
|
|
to represent the individual or entity responsible for
|
|
presenting a component or network system for evaluation. The
|
|
sponsor may be a manufacturer, vendor, architect, developer,
|
|
program manager, or related entity.
|
|
|
|
A network system is the entire collection of hardware,
|
|
firmware, and software necessary to provide a desired func-
|
|
tionality.
|
|
|
|
A component is any part of a system that, taken by
|
|
itself, provides all or a portion of the total functionality
|
|
required of a system. A component is recursively defined to
|
|
be an individual unit, not useful to further subdivide, or a
|
|
collection of components up to and including the entire sys-
|
|
tem.
|
|
|
|
Because the term integrity has been used in various
|
|
contexts to denote specific aspects of an overall issue, it
|
|
is important for the reader to understand the context in
|
|
which the term is used in this document. Within Part I, as
|
|
in the TCSEC itself, the use of this term is limited to (1)
|
|
the correct operation of NTCB hardware/firmware and (2) pro-
|
|
tection against unauthorized modification of labels and
|
|
data. Specifically, all NTCBs that support sensitivity
|
|
labels (viz., Divisions A and B) must, as detailed in the
|
|
Label Integrity section of the TCSEC, protect the labels
|
|
that represent the sensitivity of information (contained in
|
|
objects) and the corresponding authorizations of users (with
|
|
subjects as surrogates). In addition, for network systems
|
|
with a defined data integrity policy, the NTCB must control
|
|
the accesses of users that modify information-. As part of
|
|
the NTCB itself, such integrity policies will be supported
|
|
by access control mechanisms based on the identity of indi-
|
|
viduals (for discretionary integrity) and/or sensitivity
|
|
levels (for mandatory integrity). In contrast, within Part
|
|
II the term integrity relates to the mechanisms for informa-
|
|
tion transfer between distinct components. This communica-
|
|
tions integrity includes the issues for correctness of mes-
|
|
sage transmission, authentication of source/destination,
|
|
data/control/protocol communication field correctness and
|
|
related areas.
|
|
_________________________
|
|
- See, for example, K. J. Biba, Integrity Considera-
|
|
_________ _________
|
|
tions for Secure Computer Systems, MTR-3153, The MITRE
|
|
_____ ___ ______ ________ _______
|
|
Corporation, Bedford, MA, June 1975.
|
|
|
|
|
|
In many network environments, encryption can play an
|
|
essential role in protecting sensitive information. In Part
|
|
I of this document, encryption is referenced as a basis for
|
|
providing data and label integrity assurance. In Part II,
|
|
encryption is described as a tool for protecting data from
|
|
compromise or modification attacks. Encryption algorithms
|
|
and their implementation are outside the scope of this docu-
|
|
ment. This document was prepared from a DoD perspective and
|
|
requires NSA approval relative to the use of encryption. In
|
|
other contexts, alternate approval authority may exist.
|
|
|
|
As with the TCSEC itself, this is a reference document
|
|
and is not intended to be used as a tutorial. The reader is
|
|
assumed to be familiar with the background literature on
|
|
computer security and communications networks=. Part II
|
|
assumes a familiarity with the terminology used within ISO
|
|
Security Services documentation.
|
|
|
|
|
|
|
|
_________________________
|
|
= See, for example, M. D. Abrams and H. J. Podell,
|
|
Tutorial: Computer and Network Security, IEEE Computer
|
|
________ ________ ___ _______ ________
|
|
Society Press, 1987.
|
|
* ISO 7498/Part 2 - Security Architecture, ISO / TC
|
|
___ ____ ____ _ ________ ____________
|
|
97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
|
|
Project 97.21.18, September 1986.
|
|
|
|
|
|
|
|
I.3.1. Trusted Computer System Evaluation Criteria
|
|
_ _ _ _______ ________ ______ __________ ________
|
|
|
|
The DoD TCSEC was published in December 1985 to provide
|
|
a means of evaluating specific security features and
|
|
assurance requirements available in ``trusted commercially
|
|
available automatic data processing (ADP) systems,''
|
|
referred to in this document as Automated Information System
|
|
(AIS). The rating scale of the TCSEC extends from a rating
|
|
which represents a minimally useful level of trust to one
|
|
for ``state of the art'' features and assurance measures.
|
|
These technical criteria guide system builders and evalua-
|
|
tors in determining the level of trust required for specific
|
|
systems. When combined with environmental guidelines,
|
|
minimum security protection requirements, and appropriate
|
|
accreditation decisions for specific installations can be
|
|
determined. The philosophy of protection embodied in the
|
|
TCSEC requires that the access of subjects (i.e., human
|
|
users or processes acting on their behalf) to objects (i.e.,
|
|
containers of sensitive information) be mediated in accor-
|
|
dance with an explicit and well defined security policy.
|
|
|
|
In order to ensure strict compatibility between TCSEC
|
|
evaluated AIS and networks and their components, and to
|
|
avoid the possible evolution of incompatible evaluation cri-
|
|
teria, Part I of this document has been specifically
|
|
prepared as an INTERPRETATION of the TCSEC for networks. It
|
|
is based entirely on the principles of the TCSEC, uses all
|
|
TCSEC basic definitions, and introduces new concepts only
|
|
where essential to understanding the TCSEC in a network con-
|
|
text. Unless otherwise stated, the TCSEC requirements apply
|
|
as written. The approach of interpreting the TCSEC for net-
|
|
works in general has already been successfully employed in a
|
|
number of specific complex network and AIS applications.
|
|
|
|
There are several security policy models that may be
|
|
used with the reference monitor concept. The Bell-LaPadula
|
|
model is commonly used but is not mandated. Similarly for
|
|
integrity policy, models such as Biba have been proposed but
|
|
are not mandated. For this network interpretation, no
|
|
specific access control policy is required; however, it is
|
|
necessary that either a secrecy policy, an integrity policy,
|
|
or both be specified for enforcement by the reference moni-
|
|
tor.
|
|
|
|
In the context of network systems, there are a number
|
|
of additional security services that do not normally arise
|
|
in individual AIS, and are not appropriate to the detailed
|
|
feature and assurance evaluation prescribed by the TCSEC.
|
|
These security services, which may or may not be available
|
|
in specific network offerings, include provisions for com-
|
|
munications security, denial of service, transmission secu-
|
|
rity, and supportive primitives, such as encryption mechan-
|
|
isms and protocols. Part II of this document describes
|
|
these services and provides a qualitative means of evaluat-
|
|
ing their effectiveness when provided.
|
|
|
|
Evaluation of Part II offered services is dependent
|
|
upon the results of the system's Part I evaluation or
|
|
component's Appendix A evaluation. A Part II evaluation
|
|
rating of good in a component or system which has a low Part
|
|
I trust rating is of limited value. The sponsor must iden-
|
|
tify which security services are offered by a system or com-
|
|
ponent for evaluation against Part II. The evaluators will
|
|
normally give a none, minimum, fair or good rating for those
|
|
services offered. In some cases, a rating of present is all
|
|
that can be given or a quantitative measure of strength may
|
|
be used as the basis for rating. A not applicable rating
|
|
will be given for services not offered by the product. Part
|
|
II services may be provided by mechanisms outside the NTCB.
|
|
|
|
|
|
I.3.2. Two Network Views
|
|
_ _ _ ___ _______ _____
|
|
|
|
DoD Directive 5200.28 (and similar policies elsewhere
|
|
in government) establishes the concept of a DAA, an indivi-
|
|
dual who is responsible for approving the use of an AIS for
|
|
processing classified information. For stand-alone AIS,
|
|
this approval process and the technical advisory role to the
|
|
DAA provided by the TCSEC are well understood. The same
|
|
approval process applies to networks of AIS and plays a key
|
|
role in determining how and when networks can be evaluated
|
|
using this Interpretation.
|
|
|
|
Depending upon the operational and technical charac-
|
|
teristics of the environment in which a network exists,
|
|
either of two views for accreditation and evaluation pur-
|
|
poses applies: as a collection of two or more intercon-
|
|
nected separately accredited AIS or as a single unified sys-
|
|
tem the security accreditation of which is the responsibil-
|
|
ity of a single authority.
|
|
|
|
The security feature and assurance requirements of a
|
|
specified network, and hence its suitability for evaluation
|
|
under this Interpretation, is greatly impacted by which view
|
|
of the network is appropriate.
|
|
|
|
I.3.2.1. Interconnected Accredited AIS View
|
|
_ _ _ _ ______________ __________ ___ ____
|
|
|
|
The interconnected accredited AIS view is an opera-
|
|
tional perspective that recognizes that parts of the network
|
|
may be independently created, managed, and accredited.
|
|
Where different accrediting jurisdictions are involved, the
|
|
joint approval process is required, describing the handling
|
|
practices and classification levels that will be exchanged
|
|
between the components involved.
|
|
|
|
Interconnected accredited AIS consist of multiple sys-
|
|
tems (some of which may be trusted) that have been indepen-
|
|
dently assigned operational sensitivity ranges (the highest
|
|
and lowest sensitivity levels of information that may be
|
|
simultaneously processed on that system). In this view, the
|
|
individual AIS may be thought of as ``devices'' with which
|
|
neighboring systems can send and receive information. Each
|
|
AIS is accredited to handle sensitive information at a sin-
|
|
gle level or over a range between a minimum and maximum
|
|
level.
|
|
|
|
The range of sensitive information that may be
|
|
exchanged between two such AIS is a range, agreed upon by
|
|
each system's approving authorities, which cannot exceed the
|
|
maximum sensitivity levels in common between the two sys-
|
|
tems.
|
|
|
|
Because of the complex structure of a network consist-
|
|
ing of interconnected accredited AIS, it may not be practi-
|
|
cal to evaluate such a network using this Interpretation or
|
|
to assign it a trusted system rating. In this case, the
|
|
accreditor is forced to accept the risk of assessing the
|
|
security of the network without the benefit of an evaluation
|
|
against the principles of the TCSEC as interpreted in Part I
|
|
of the document. Appendix C describes the rules for con-
|
|
necting separately accredited AIS and the circumstances in
|
|
which these rules apply.
|
|
|
|
I.3.2.2. Single Trusted System View
|
|
_ _ _ _ ______ _______ ______ ____
|
|
|
|
The policy enforcement by trusted components in a
|
|
``single trusted system'' exhibits a common level of trust
|
|
throughout. A single trusted system is accredited as a sin-
|
|
gle entity by a single accrediting authority. (In certain
|
|
circumstances where a system will process information from
|
|
multiple sensitive sources, more then one accrediting
|
|
authority may be involved, but their responsibility will be
|
|
for accrediting the whole system as a single entity for use
|
|
processing the information for which they have authority.)
|
|
Networks such as these can be evaluated against this
|
|
Interpretation and given a rating compatible with trusted
|
|
AIS evaluated by the TCSEC itself.
|
|
|
|
A ``single trusted system'' network implements a refer-
|
|
ence monitor to enforce the access of subjects to objects in
|
|
accordance with an explicit and well defined network secu-
|
|
rity policy. The network has a single trusted computing
|
|
base, referred to as the Network Trusted Computing Base
|
|
(NTCB), which is partitioned (see section I.4.2) among the
|
|
network components in a manner that ensures the overall net-
|
|
work security policy is enforced by the network as a whole.
|
|
|
|
Every component that is trusted must enforce a
|
|
component-level security policy that may contain elements of
|
|
the overall network security policy. The sum of all
|
|
component-level security policies must be shown to enforce
|
|
the overall network security policy.
|
|
|
|
There is no requirement that every component in the
|
|
network have an NTCB partition nor that any such partition
|
|
comprise a complete TCB (e.g., a network component could be
|
|
dedicated to supporting the audit function and implement
|
|
only that portion of the NTCB). Interaction among NTCB par-
|
|
titions shall be via communications channels, operating at
|
|
either single or multiple levels as appropriate. The net-
|
|
work security architect must identify how the NTCB is parti-
|
|
tioned and how all the trusted system requirements are
|
|
satisfied.
|
|
|
|
A given component that does not enforce the full imple-
|
|
mentation of all polices (i.e., mandatory access control,
|
|
discretionary access control, identification/ authentication
|
|
and audit) must be evaluated as a component as specified in
|
|
Appendix A. For example, a network architecture that does
|
|
not operate above Level 3 of the ISO protocol model and typ-
|
|
ically does not enforce discretionary access control must be
|
|
evaluated as a component under Appendix A and not as a full
|
|
system.
|
|
|
|
I.3.2.2.1. Connection-Oriented Abstraction
|
|
_ _ _ _ _ __________ ________ ___________
|
|
|
|
In many networking environments, the overall network
|
|
security policy includes controlling the establishment of
|
|
authorized connections across the network. The access con-
|
|
trol mediation performed by the components of these networks
|
|
enforces the establishment of connections between host com-
|
|
puters on the network in accordance with some form of
|
|
authorized connection list. While a connection-oriented
|
|
policy may be suitable from an overall network perspective,
|
|
specifying such a policy in terms of component level
|
|
abstractions may be difficult but is required in order to
|
|
evaluate the network.
|
|
|
|
Individual trusted network components may employ a
|
|
local mechanism to enforce mediation only between local sub-
|
|
jects and objects, as described in the TCSEC. Some of these
|
|
components may have no direct involvement with the enforce-
|
|
ment of network connections. Others, however, will have an
|
|
additional higher level network connection enforcement role.
|
|
This higher level connection-oriented abstraction may be
|
|
enforced solely within an individual component or may be
|
|
distributed across many components (e.g., in the end-to-end
|
|
encryption case, cryptographic front end devices enforce the
|
|
network connection authorization decisions made by an access
|
|
control/key management center.)
|
|
|
|
With the connection-oriented abstraction, the role of
|
|
the network as a whole in controlling information flow may
|
|
be more easily understood, but there may be no simple way to
|
|
extend this abstraction to the reference monitor require-
|
|
ments of individual components in the network. The overall
|
|
network security policy must be decomposed into policy ele-
|
|
ments that are allocated to appropriate components and used
|
|
as the basis for security policy models for these com-
|
|
ponents.
|
|
|
|
The reference monitor subject/object definitions as
|
|
given in the TCSEC represent the fundamental security policy
|
|
enforcement at the individual component level but may not
|
|
directly describe the overall network security policy issues
|
|
such as the network's connection policy. The connection-
|
|
oriented abstraction may be essential to understanding the
|
|
overall network security policy. The network architecture
|
|
must demonstrate the linkage between the connection-oriented
|
|
abstraction and its realization in the individual components
|
|
of the network.
|
|
|
|
I.3.2.2.2. Subjects and Objects
|
|
_ _ _ _ _ ________ ___ _______
|
|
|
|
For purposes of this trusted network interpretation,
|
|
the terms ``subject'' and ``object'' are defined as in the
|
|
TCSEC.
|
|
|
|
The subjects of a trusted network commonly fall into
|
|
two classes: those that serve as direct surrogates for a
|
|
user (where ``user'' is synonymous with ``human being''),
|
|
and ``internal'' subjects that provide services for other
|
|
subjects--typically representing software process rather
|
|
than being made part of each user surrogate subject.
|
|
|
|
There is a set of TCSEC requirements that are directed
|
|
at users, rather than subjects. In the network context,
|
|
services used to facilitate communications between users and
|
|
AIS (e.g., protocol handlers) are usually provided by inter-
|
|
nal subjects. Some components that provide only communica-
|
|
tions facilitating services have only internal subjects.
|
|
|
|
Examples of ``single trusted system'' networks or com-
|
|
ponents could include- packet-switched communications sub-
|
|
networks (as found in the Defense Data Network (DDN), end-
|
|
to-end (or host-to-host) encryption systems (such as used in
|
|
Blacker or ANSI X9.17 implementations), application level
|
|
networks or closed user community systems (such as the Inter
|
|
Service/Agency Automated Message Processing Exchange [I S/A
|
|
AMPE] and SACDIN Programs), local area networks, digital
|
|
PABX systems, private switched networks (such as circuit-
|
|
switched telecommunications systems), future Integrated Ser-
|
|
vices Digital Network (ISDN) implementations, and a Virtual
|
|
Machine Monitor (VMM) on a single computer when analyzed as
|
|
a network.
|
|
|
|
I.4. Evaluation of Networks
|
|
_ _ __________ __ ________
|
|
|
|
The TCSEC provides a means for evaluating the
|
|
trustworthiness of a system and assigning an evaluation
|
|
class based on its technical properties - independent of the
|
|
particular use for or the sensitivity of information being
|
|
processed on the system. In this Interpretation, a network
|
|
as a whole with its various interconnected components is
|
|
recognized as a special instance of a trusted system. The
|
|
designer of a trusted system is unconstrained by the TCSEC
|
|
on design and implementation choices as long as for the
|
|
_________________________
|
|
- Examples are employed throughout this document to
|
|
clarify the concepts presented. The naming of an exam-
|
|
ple implies no judgement of the product or system named
|
|
nor on its suitability for any particular purpose.
|
|
|
|
|
|
|
|
system as a whole there is a clearly distinguished TCB with
|
|
a definitive protection domain boundary. The features and
|
|
assurance measures provided within the TCB perimeter will
|
|
determine the evaluation class. The network must be viewed
|
|
as PARTITIONED into a set of interconnected components,
|
|
where each component may have an independent ``NTCB parti-
|
|
tion.'' All interaction between such trusted components
|
|
must be via ``communication channels or I/O devices'' as
|
|
defined by the TCSEC. For Division A and B networks these
|
|
will generally be ``multilevel devices.''
|
|
|
|
I.4.1. Network Security Architecture and Design
|
|
_ _ _ _______ ________ ____________ ___ ______
|
|
|
|
Any network evaluated under this Interpretation must
|
|
possess a coherent Network Security Architecture and Design.
|
|
(Interconnection of components that do not adhere to such a
|
|
Network Security Architecture is addressed in the Intercon-
|
|
nection Rules, Appendix C.) The Network Security Architec-
|
|
ture must address the security-relevant policies, objec-
|
|
tives, and protocols. The Network Security Design specifies
|
|
the interfaces and services that must be incorporated into
|
|
the network so that it can be evaluated as a trusted entity.
|
|
There may be multiple designs that conform to the same
|
|
architecture but which are more or less incompatible and
|
|
non-interoperable (except through the Interconnection
|
|
Rules). Security related mechanisms that require coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms which have no visi-
|
|
ble interfaces are not specified in this document but are
|
|
left as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network Security Architecture and
|
|
Design are satisfied. That is, the components are assembl-
|
|
able into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization which is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and unambi-
|
|
guously define the security functionality of components as
|
|
well as the interfaces between or among components. The
|
|
Network Security Architecture and Design must be evaluated
|
|
to determine that a network constructed to its specifica-
|
|
tions will in fact be trusted, that is, it will be
|
|
evaluatable under these Interpretations.
|
|
|
|
I.4.2. The Partitioned NTCB
|
|
_ _ _ ___ ___________ ____
|
|
|
|
Like a stand-alone system, the network as a whole
|
|
possesses a single TCB, referred to as the NTCB, consisting
|
|
of the totality of security-relevant portions of the net-
|
|
work. But, unlike a stand-alone system, the design and
|
|
evaluation of the network rests on an understanding of how
|
|
the security mechanisms are distributed and allocated to
|
|
various components, in such a way that the security policy
|
|
is supported reliably in spite of (1) the vulnerability of
|
|
the communication paths and (2) the concurrent, asynchronous
|
|
operation of the network components.
|
|
|
|
Some distributed systems have reliable, protected com-
|
|
munication paths and thus satisfy only the first charac-
|
|
teristic of a network: the division into concurrently
|
|
operating, communicating processing components. Although
|
|
certain interpretations in this Interpretation will not
|
|
apply to them, it may be beneficial to employ this Interpre-
|
|
tation to evaluate them, and to take advantage of the
|
|
interpretations relating to component properties and inter-
|
|
faces.
|
|
|
|
An NTCB that is distributed over a number of network
|
|
components is referred to as partitioned, and that part of
|
|
the NTCB residing in a given component is referred to as an
|
|
NTCB partition. A network host may possess a TCB that has
|
|
previously been evaluated as a stand-alone system. Such a
|
|
TCB does not necessarily coincide with the NTCB partition in
|
|
the host, in the sense of having the same security perime-
|
|
ter. Whether it does or not depends on whether the security
|
|
policy for which the host TCB was evaluated coincides with
|
|
the network security policy, to the extent that it is allo-
|
|
cated to that host.
|
|
|
|
Even when a network host has a TCB that has been previ-
|
|
ously evaluated at a given class, and the host's TCB coin-
|
|
cides with the host's NTCB partition, there is still no a
|
|
priori relationship between the evaluation class of the host
|
|
and the evaluation class of the network. Some examples will
|
|
be given below to illustrate this point.
|
|
|
|
To evaluate a network at a given class, each require-
|
|
ment in Part I for that class must be satisfied by the net-
|
|
work as a whole. It is also necessary to understand how
|
|
each requirement is allocated among the network's com-
|
|
ponents. Some components, such as the hosts, may satisfy
|
|
the entire security policy in isolation; others, such as
|
|
packet switches and access control centers, may have more
|
|
specialized functions that satisfy only a subset of the net-
|
|
work security policy. In addition, distinct subsets of the
|
|
network security policy may be allocated to different net-
|
|
work components.
|
|
|
|
Forcing every component to satisfy a specific Part I
|
|
requirement is neither necessary nor sufficient to ensure
|
|
that the network as a whole meets that requirement.
|
|
|
|
To show that it is not sufficient, consider two trusted
|
|
multilevel AIS that export and import labeled information to
|
|
and from each other over a direct connection. Both satisfy
|
|
the Label Integrity requirement that a sensitivity label be
|
|
accurately and unambiguously associated with exported data.
|
|
If they were to have different, incompatible label encodings
|
|
for the same sensitive information, the network as a whole
|
|
would fail to satisfy the label integrity requirement. As a
|
|
result, these Interpretations require at the B1 level and
|
|
above that there be uniform labeling of sensitive informa-
|
|
tion throughout the network.
|
|
|
|
To show that it is not necessary, consider the Manda-
|
|
tory Access Control requirement that at least two sensi-
|
|
tivity levels be supported. Suppose that the network con-
|
|
sists of a number of untrusted hosts that are incapable of
|
|
maintaining labels and are operating at different levels in
|
|
a single-level mode. If they are interconnected through
|
|
suitable multilevel interface units, the network as a whole
|
|
can support the ``two or more levels'' requirement.
|
|
|
|
The allocation of a requirement to a component does not
|
|
simply mean that the component satisfies the requirement in
|
|
isolation, but includes the possibility that it depends on
|
|
other components to satisfy the requirement locally, or
|
|
cooperates with other components to ensure that the require-
|
|
ment is satisfied elsewhere in the network.
|
|
|
|
Taken together, these examples illustrate the essential
|
|
role of an overall network security architecture in design-
|
|
ing and evaluating a trusted network.
|
|
|
|
I.4.3. Component Evaluation
|
|
_ _ _ _________ __________
|
|
|
|
Because network components are often supplied by dif-
|
|
ferent vendors and are designed to support standardized or
|
|
common functions in a variety of networks, significant
|
|
advantages can accrue from a procedure for evaluating indi-
|
|
vidual components. The purpose of component evaluation is
|
|
to aid both the network designer and the evaluator by per-
|
|
forming the evaluation process once and reusing the results
|
|
whenever that component is incorporated into a network.
|
|
|
|
There are four types of security policies that may be
|
|
supported by a network component:
|
|
|
|
1. Mandatory Access Control
|
|
|
|
2. Discretionary Access Control
|
|
|
|
3. Supportive policies (e.g., Authentication, Audit)
|
|
|
|
4. Application policies (e.g., the policy supported
|
|
by a DBMS that is distinct from that supported by
|
|
the underlying system)
|
|
|
|
Application level policies are user dependent and will not
|
|
be considered further in these Interpretations.
|
|
|
|
For a component to support a policy such as Mandatory
|
|
Access Controls, it must support all the required features
|
|
for that policy with all of the required assurances of the
|
|
given class.
|
|
|
|
I.5. Structure of the Document
|
|
_ _ _________ __ ___ ________
|
|
|
|
The remainder of this document is divided into two
|
|
parts, three appendices, a list of acronyms, a glossary, and
|
|
a list of references. Part I presents TCSEC statements and
|
|
detailed interpretations, which together constitute the
|
|
requirements against which networks will be evaluated; and
|
|
rationale for the network interpretation of the TCSEC. The
|
|
TCSEC statement applies as modified by the Interpretation.
|
|
Part II is a description of other Security Services not
|
|
covered in the TCSEC interpretation which may be applicable
|
|
to networks. Appendix A describes the evaluation of network
|
|
components. Appendix B describes the rationale for network
|
|
partitioning into individual components. Appendix C
|
|
describes the interconnect rules for linking interconnected
|
|
accredited AIS.
|
|
|
|
|
|
Part I: Interpretations of the
|
|
____ _ _______________ __ ___
|
|
|
|
Trusted Computer System Evaluation Criteria
|
|
_______ ________ ______ __________ ________
|
|
|
|
|
|
Highlighting (ALL CAPS) is used in Part I to indicate criteria
|
|
not contained in a lower class or changes and additions to
|
|
already defined criteria. Where there is no highlighting,
|
|
requirements have been carried over from lower classes without
|
|
addition or modification.
|
|
|
|
|
|
1.0 DIVISION D: MINIMAL PROTECTION
|
|
_ _ ________ _ _______ __________
|
|
|
|
|
|
This division contains only one class. It is reserved for
|
|
those systems that have been evaluated but that fail to meet
|
|
the requirements for a higher evaluation class.
|
|
|
|
|
|
|
|
|
|
2.0 DIVISION C: DISCRETIONARY PROTECTION
|
|
_ _ ________ _ _____________ __________
|
|
|
|
|
|
Classes in this division provide for discretionary (need-
|
|
to-know) protection and, through the inclusion of audit
|
|
capabilities, for accountability of subjects and the actions
|
|
they initiate.
|
|
|
|
|
|
|
|
2.1 CLASS (C1): DISCRETIONARY SECURITY PROTECTION
|
|
_ _ _____ __ _____________ ________ __________
|
|
|
|
|
|
THE NETWORK TRUSTED COMPUTING BASE (NTCB) OF A
|
|
CLASS (C1) NETWORK SYSTEM NOMINALLY SATISFIES THE
|
|
DISCRETIONARY SECURITY REQUIREMENTS BY PROVIDING
|
|
SEPARATION OF USERS AND DATA. IT INCORPORATES
|
|
SOME FORM OF CREDIBLE CONTROLS CAPABLE OF ENFORC-
|
|
ING ACCESS LIMITATIONS ON AN INDIVIDUAL BASIS,
|
|
I.E., OSTENSIBLY SUITABLE FOR ALLOWING USERS TO BE
|
|
ABLE TO PROTECT PRIVATE OR PROJECT INFORMATION AND
|
|
TO KEEP OTHER USERS FROM ACCIDENTALLY READING OR
|
|
DESTROYING THEIR DATA. THE CLASS (C1) ENVIRONMENT
|
|
IS EXPECTED TO BE ONE OF COOPERATING USERS PRO-
|
|
CESSING DATA AT THE SAME LEVEL(S) OF SENSITIVITY.
|
|
THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEMS
|
|
ASSIGNED A CLASS (C1) RATING.
|
|
|
|
|
|
2.1.1 Security Policy
|
|
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THE NETWORK SPONSOR SHALL DESCRIBE THE OVERALL NETWORK
|
|
SECURITY POLICY ENFORCED BY THE NTCB. AT A MINIMUM, THIS
|
|
POLICY SHALL INCLUDE THE DISCRETIONARY REQUIREMENTS APPLICA-
|
|
BLE TO THIS CLASS. THE POLICY MAY REQUIRE DATA SECRECY, OR
|
|
DATA INTEGRITY, OR BOTH. THE POLICY SHALL INCLUDE A DISCRE-
|
|
TIONARY POLICY FOR PROTECTING THE INFORMATION BEING PRO-
|
|
CESSED BASED ON THE AUTHORIZATIONS OF USERS OR GROUPS OF
|
|
USERS. THIS ACCESS CONTROL POLICY STATEMENT SHALL DESCRIBE
|
|
THE REQUIREMENTS ON THE NETWORK TO PREVENT OR DETECT "READ-
|
|
ING OR DESTROYING" SENSITIVE INFORMATION BY UNAUTHORIZED
|
|
USERS OR ERRORS. UNAUTHORIZED USERS INCLUDE BOTH THOSE THAT
|
|
ARE NOT AUTHORIZED TO USE THE NETWORK AT ALL (E.G., A USER
|
|
ATTEMPTING TO USE A PASSIVE OR ACTIVE WIRE TAP) OR A LEGITI-
|
|
MATE USER OF THE NETWORK WHO IS NOT AUTHORIZED TO ACCESS A
|
|
SPECIFIC PIECE OF INFORMATION BEING PROTECTED.
|
|
|
|
NOTE THAT "USERS" DOES NOT INCLUDE "OPERATORS," "SYSTEM
|
|
PROGRAMMERS," "TECHNICAL CONTROL OFFICERS," "SYSTEM SECURITY
|
|
OFFICERS," AND OTHER SYSTEM SUPPORT PERSONNEL. THEY ARE
|
|
DISTINCT FROM USERS AND ARE SUBJECT TO THE TRUSTED FACILITY
|
|
MANUAL AND THE SYSTEM ARCHITECTURE REQUIREMENTS. SUCH INDI-
|
|
VIDUALS MAY CHANGE THE SYSTEM PARAMETERS OF THE NETWORK SYS-
|
|
TEM, FOR EXAMPLE, BY DEFINING MEMBERSHIP OF A GROUP. THESE
|
|
INDIVIDUALS MAY ALSO HAVE THE SEPARATE ROLE OF USERS.
|
|
|
|
|
|
SECRECY POLICY: THE NETWORK SPONSOR SHALL DEFINE THE
|
|
FORM OF THE DISCRETIONARY SECRECY POLICY THAT IS
|
|
ENFORCED IN THE NETWORK TO PREVENT UNAUTHORIZED
|
|
USERS FROM READING THE SENSITIVE INFORMATION
|
|
ENTRUSTED TO THE NETWORK.
|
|
|
|
|
|
DATA INTEGRITY POLICY: THE NETWORK SPONSOR SHALL
|
|
DEFINE THE DISCRETIONARY INTEGRITY POLICY TO PREVENT
|
|
UNAUTHORIZED USERS FROM MODIFYING, VIZ., WRITING,
|
|
SENSITIVE INFORMATION. THE DEFINITION OF DATA
|
|
INTEGRITY PRESENTED BY THE NETWORK SPONSOR REFERS TO
|
|
THE REQUIREMENT THAT THE INFORMATION HAS NOT BEEN
|
|
SUBJECTED TO UNAUTHORIZED MODIFICATION IN THE NET-
|
|
WORK.
|
|
|
|
|
|
+ Rationale
|
|
|
|
THE WORD "SPONSOR" IS USED IN PLACE OF ALTERNATIVES
|
|
(SUCH AS "VENDOR," "ARCHITECT," "MANUFACTURER," AND
|
|
"DEVELOPER") BECAUSE THE ALTERNATIVES INDICATE PEOPLE WHO
|
|
MAY NOT BE AVAILABLE, INVOLVED, OR RELEVANT AT THE TIME THAT
|
|
A NETWORK SYSTEM IS PROPOSED FOR EVALUATION.
|
|
|
|
A TRUSTED NETWORK IS ABLE TO CONTROL BOTH THE READING
|
|
AND WRITING OF SHARED SENSITIVE INFORMATION. CONTROL OF
|
|
WRITING IS USED TO PROTECT AGAINST DESTRUCTION OF INFORMA-
|
|
TION. A NETWORK NORMALLY IS EXPECTED TO HAVE POLICY REQUIRE-
|
|
MENTS TO PROTECT BOTH THE SECRECY AND INTEGRITY OF THE
|
|
INFORMATION ENTRUSTED TO IT. IN A NETWORK THE INTEGRITY IS
|
|
FREQUENTLY AS IMPORTANT OR MORE IMPORTANT THAN THE SECRECY
|
|
REQUIREMENTS. THEREFORE THE SECRECY AND/OR INTEGRITY POLICY
|
|
TO BE ENFORCED BY THE NETWORK MUST BE STATED FOR EACH NET-
|
|
WORK REGARDLESS OF ITS EVALUATION CLASS. THE ASSURANCE THAT
|
|
THE POLICY IS FAITHFULLY ENFORCED IS REFLECTED IN THE
|
|
EVALUATION CLASS OF THE NETWORK.
|
|
|
|
|
|
THIS CONTROL OVER MODIFICATION IS TYPICALLY USED TO
|
|
PROTECT INFORMATION SO THAT IT MAY BE RELIED UPON AND TO
|
|
CONTROL THE POTENTIAL HARM THAT WOULD RESULT IF THE INFORMA-
|
|
TION WERE CORRUPTED. THE OVERALL NETWORK POLICY REQUIRE-
|
|
MENTS FOR INTEGRITY INCLUDES THE PROTECTION FOR DATA BOTH
|
|
WHILE BEING PROCESSED IN A COMPONENT AND WHILE BEING
|
|
TRANSMITTED IN THE NETWORK. THE ACCESS CONTROL POLICY
|
|
ENFORCED BY THE NTCB RELATES TO THE ACCESS OF SUBJECTS TO
|
|
OBJECTS WITHIN EACH COMPONENT. COMMUNICATIONS INTEGRITY
|
|
ADDRESSED WITHIN PART II RELATES TO INFORMATION WHILE BEING
|
|
TRANSMITTED.
|
|
|
|
|
|
|
|
2.1.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL DEFINE AND CONTROL ACCESS BETWEEN NAMED USERS
|
|
AND NAMED OBJECTS (E.G., FILES AND PROGRAMS) IN THE ADP SYS-
|
|
TEM. THE ENFORCEMENT MECHANISM (E.G., SELF/GROUP/PUBLIC
|
|
CONTROLS, ACCESS CONTROL LISTS) SHALL ALLOW USERS TO SPECIFY
|
|
AND CONTROL SHARING OF THOSE OBJECTS BY NAMED INDIVIDUALS OR
|
|
DEFINED GROUPS OF INDIVIDUALS, OR BOTH.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THE DISCRETIONARY ACCESS CONTROL (DAC) MECHANISM(S) MAY
|
|
BE DISTRIBUTED OVER THE PARTITIONED NTCB IN VARIOUS WAYS.
|
|
SOME PART, ALL, OR NONE OF THE DAC MAY BE IMPLEMENTED IN A
|
|
GIVEN COMPONENT OF THE NETWORK SYSTEM. IN PARTICULAR, COM-
|
|
PONENTS THAT SUPPORT ONLY INTERNAL SUBJECTS (I.E., THAT HAVE
|
|
NO SUBJECTS ACTING AS DIRECT SURROGATES FOR USERS), SUCH AS
|
|
A PUBLIC NETWORK PACKET SWITCH, MIGHT NOT IMPLEMENT THE DAC
|
|
MECHANISM(S) DIRECTLY (E.G., THEY ARE UNLIKELY TO CONTAIN
|
|
ACCESS CONTROL LISTS).
|
|
|
|
IDENTIFICATION OF USERS BY GROUPS MAY BE ACHIEVED IN
|
|
VARIOUS WAYS IN THE NETWORKING ENVIRONMENT. FOR EXAMPLE,
|
|
THE NETWORK IDENTIFIERS (E.G., INTERNET ADDRESSES) FOR VARI-
|
|
OUS COMPONENTS (E.G., HOSTS, GATEWAYS) CAN BE USED AS IDEN-
|
|
TIFIERS OF GROUPS OF INDIVIDUAL USERS (E.G., "ALL USERS AT
|
|
HOST A," "ALL USERS OF NETWORK Q") WITHOUT EXPLICIT IDENTIF-
|
|
ICATION OF INDIVIDUAL USERS, NOR EVEN AN EXPLICIT NUMBER OF
|
|
USERS IMPLIED), IF THIS IS CONSISTENT WITH THE NETWORK SECU-
|
|
RITY POLICY.
|
|
|
|
FOR NETWORKS, INDIVIDUAL HOSTS WILL IMPOSE NEED-TO-KNOW
|
|
CONTROLS OVER THEIR USERS - MUCH LIKE (IN FACT, PROBABLY THE
|
|
SAME) CONTROLS USED WHEN THERE IS NO NETWORK CONNECTION.
|
|
|
|
WHEN GROUP IDENTIFIERS ARE ACCEPTABLE FOR ACCESS CON-
|
|
TROL, THE IDENTIFIER OF SOME OTHER HOST MAY BE EMPLOYED, TO
|
|
ELIMINATE THE MAINTENANCE THAT WOULD BE REQUIRED IF INDIVI-
|
|
DUAL IDENTIFICATION OF REMOTE USERS WAS EMPLOYED.
|
|
|
|
THE DAC MECHANISM OF A NTCB PARTITION MAY BE IMPLE-
|
|
MENTED AT THE INTERFACE OF THE REFERENCE MONITOR OR MAY BE
|
|
DISTRIBUTED IN SUBJECTS THAT ARE PART OF THE NTCB IN THE
|
|
SAME OR DIFFERENT COMPONENT. THE REFERENCE MONITOR MANAGES
|
|
ALL THE PHYSICAL RESOURCES OF THE SYSTEM AND FROM THEM
|
|
CREATES THE ABSTRACTION OF SUBJECTS AND OBJECTS THAT IT CON-
|
|
TROLS. SOME OF THESE SUBJECTS AND OBJECTS MAY BE USED TO
|
|
IMPLEMENT A PART OF THE NTCB.
|
|
|
|
WHEN INTEGRITY IS INCLUDED AS PART OF THE NETWORK DIS-
|
|
CRETIONARY SECURITY POLICY, THE ABOVE INTERPRETATIONS SHALL
|
|
BE SPECIFICALLY APPLIED TO THE CONTROLS OVER MODIFICATION,
|
|
VIZ, THE WRITE MODE OF ACCESS, WITHIN EACH COMPONENT BASED
|
|
ON IDENTIFIED USERS OR GROUPS OF USERS.
|
|
|
|
|
|
+ Rationale
|
|
|
|
IN THIS CLASS, THE SUPPORTING ELEMENTS OF THE OVERALL
|
|
DAC MECHANISM ARE TREATED EXACTLY AS UNTRUSTED SUBJECTS ARE
|
|
TREATED WITH RESPECT TO DAC IN AN ADP SYSTEM, WITH THE SAME
|
|
RESULT AS NOTED IN THE INTERPRETATION. STRENGTHENING OF THE
|
|
DAC MECHANISM IN THE NETWORK ENVIRONMENT IS PROVIDED IN
|
|
CLASS (C2) (SEE THE DISCRETIONARY ACCESS CONTROL SECTION).
|
|
|
|
A TYPICAL SITUATION FOR DAC IS THAT A SURROGATE PROCESS
|
|
FOR A REMOTE USER WILL BE CREATED IN SOME HOST FOR ACCESS TO
|
|
OBJECTS UNDER THE CONTROL OF THE NTCB PARTITION WITHIN THAT
|
|
HOST. THE INTERPRETATION REQUIRES THAT A USER IDENTIFIER BE
|
|
ASSIGNED AND MAINTAINED FOR EACH SUCH PROCESS BY THE NTCB,
|
|
SO THAT ACCESS BY A SURROGATE PROCESS IS SUBJECT TO ESSEN-
|
|
TIALLY THE SAME DISCRETIONARY CONTROLS AS ACCESS BY A PRO-
|
|
CESS ACTING ON BEHALF OF A LOCAL USER WOULD BE. HOWEVER,
|
|
WITHIN THIS INTERPRETATION A RANGE OF POSSIBLE INTERPRETA-
|
|
TIONS OF THE ASSIGNED USER IDENTIFICATION IS PERMITTED.
|
|
|
|
THE MOST OBVIOUS SITUATION WOULD EXIST IF A GLOBAL
|
|
DATABASE OF NETWORK USERS WERE TO BE MADE PERMANENTLY AVAIL-
|
|
ABLE ON DEMAND TO EVERY HOST, (I.E., A NAME SERVER EXISTED)
|
|
SO THAT ALL USER IDENTIFICATIONS WERE GLOBALLY MEANINGFUL.
|
|
|
|
IT IS ALSO ACCEPTABLE, HOWEVER, FOR SOME NTCB PARTI-
|
|
TIONS TO MAINTAIN A DATABASE OF LOCALLY-REGISTERED USERS FOR
|
|
ITS OWN USE. IN SUCH A CASE, ONE COULD CHOOSE TO INHIBIT
|
|
THE CREATION OF SURROGATE PROCESSES FOR LOCALLY UNREGISTERED
|
|
USERS, OR (IF PERMITTED BY THE LOCAL POLICY) ALTERNATIVELY,
|
|
TO PERMIT THE CREATION OF SURROGATE PROCESSES WITH
|
|
PRESELECTED USER AND GROUP IDENTIFIERS WHICH, IN EFFECT,
|
|
IDENTIFY THE PROCESS AS EXECUTING ON BEHALF OF A MEMBER OF A
|
|
GROUP OF USERS ON A PARTICULAR REMOTE HOST. THE INTENT OF
|
|
THE WORDS CONCERNING AUDIT IN THE INTERPRETATION IS TO PRO-
|
|
VIDE A MINIMALLY ACCEPTABLE DEGREE OF AUDITABILITY FOR CASES
|
|
SUCH AS THE LAST DESCRIBED. WHAT IS REQUIRED IS THAT THERE
|
|
BE A CAPABILITY, USING THE AUDIT FACILITIES PROVIDED BY THE
|
|
NETWORK NTCB PARTITIONS INVOLVED, TO DETERMINE WHO WAS
|
|
LOGGED IN AT THE ACTUAL HOST OF THE GROUP OF REMOTE USERS AT
|
|
THE TIME THE SURROGATE PROCESSING OCCURED.
|
|
|
|
ASSOCIATING THE PROPER USER ID WITH A SURROGATE PROCESS
|
|
IS THE JOB OF IDENTIFICATION AND AUTHENTICATION. THIS MEANS
|
|
THAT DAC IS APPLIED LOCALLY, WITH RESPECT TO THE USER ID OF
|
|
THE SURROGATE PROCESS. THE TRANSMISSION OF THE DATA BACK
|
|
ACROSS THE NETWORK TO THE USER'S HOST, AND THE CREATION OF A
|
|
COPY OF THE DATA THERE, IS NOT THE BUSINESS OF DAC.
|
|
|
|
COMPONENTS THAT SUPPORT ONLY INTERNAL SUBJECTS IMPACT
|
|
THE IMPLEMENTATION OF THE DAC BY PROVIDING SERVICES BY WHICH
|
|
INFORMATION (E.G., A USER-ID) IS MADE AVAILABLE TO A COM-
|
|
PONENT THAT MAKES A DAC DECISION. AN EXAMPLE OF THE LATTER
|
|
WOULD BE THE CASE THAT A USER AT HOST A ATTEMPTS TO ACCESS A
|
|
FILE AT HOST B. THE DAC DECISION MIGHT BE (AND USUALLY
|
|
WOULD BE) MADE AT HOST B ON THE BASIS OF A USER-ID TRANSMIT-
|
|
TED FROM HOST A TO HOST B.
|
|
|
|
UNIQUE USER IDENTIFICATION MAY BE ACHIEVED BY A VARIETY
|
|
OF MECHANISMS, INCLUDING (A) A REQUIREMENT FOR UNIQUE IDEN-
|
|
TIFICATION AND AUTHENTICATION ON THE HOST WHERE ACCESS TAKES
|
|
PLACE; (B) RECOGNITION OF FULLY QUALIFIED NETWORK
|
|
ADDRESSES AUTHENTICATED BY ANOTHER HOST AND FORWARDED TO THE
|
|
HOST WHERE ACCESS TAKES PLACE; OR (C) ADMINISTRATIVE SUPPORT
|
|
OF A NETWORK-WIDE UNIQUE PERSONNEL IDENTIFIER THAT COULD BE
|
|
AUTHENTICATED AND FORWARDED BY ANOTHER HOST AS IN (B) ABOVE,
|
|
OR COULD BE AUTHENTICATED AND FORWARDED BY A DEDICATED NET-
|
|
WORK IDENTIFICATION AND AUTHENTICATION SERVER. THE PROTO-
|
|
COLS WHICH IMPLEMENT (B) OR (C) ARE SUBJECT TO THE SYSTEM
|
|
ARCHITECTURE REQUIREMENTS.
|
|
|
|
NETWORK SUPPORT FOR DAC MIGHT BE HANDLED IN OTHER WAYS
|
|
THAN THAT DESCRIBED AS "TYPICAL" ABOVE. IN PARTICULAR, SOME
|
|
FORM OF CENTRALIZED ACCESS CONTROL IS OFTEN PROPOSED. AN
|
|
ACCESS CONTROL CENTER MAY MAKE ALL DECISIONS FOR DAC, OR IT
|
|
MAY SHARE THE BURDEN WITH THE HOSTS BY CONTROLLING HOST-TO-
|
|
HOST CONNECTIONS, AND LEAVING THE HOSTS TO DECIDE ON ACCESS
|
|
TO THEIR OBJECTS BY USERS AT A LIMITED SET OF REMOTE HOSTS.
|
|
IN THIS CASE THE ACCESS CONTROL CENTER PROVIDES THE LINKAGE
|
|
BETWEEN THE CONNECTION ORIENTED ABSTRACTION (AS DISCUSSED IN
|
|
THE INTRODUCTION) AND THE OVERALL NETWORK SECURITY POLICY
|
|
FOR DAC. IN ALL CASES THE ENFORCEMENT OF THE DECISION MUST
|
|
BE PROVIDED BY THE HOST WHERE THE OBJECT RESIDES.
|
|
|
|
|
|
2.1.2 Accountability
|
|
|
|
|
|
2.1.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL REQUIRE USERS TO IDENTIFY THEMSELVES TO IT
|
|
BEFORE BEGINNING TO PERFORM ANY OTHER ACTIONS THAT THE TCB
|
|
IS EXPECTED TO MEDIATE. FURTHERMORE, THE TCB SHALL USE A
|
|
PROTECTED MECHANISM (E.G., PASSWORDS) TO AUTHENTICATE THE
|
|
USER'S IDENTITY. THE TCB SHALL PROTECT AUTHENTICATION DATA
|
|
SO THAT IT CANNOT BE ACCESSED BY ANY UNAUTHORIZED USER.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THE REQUIREMENT FOR IDENTIFICATION AND AUTHENTICATION
|
|
OF USERS IS THE SAME FOR A NETWORK SYSTEM AS FOR AN ADP SYS-
|
|
TEM. THE IDENTIFICATION AND AUTHENTICATION MAY BE DONE BY
|
|
THE COMPONENT TO WHICH THE USER IS DIRECTLY CONNECTED OR
|
|
SOME OTHER COMPONENT, SUCH AS AN IDENTIFICATION AND AUTHEN-
|
|
TICATION SERVER. AVAILABLE TECHNIQUES, SUCH AS THOSE
|
|
DESCRIBED IN THE PASSWORD GUIDELINE=, ARE GENERALLY ALSO
|
|
APPLICABLE IN THE NETWORK CONTEXT. HOWEVER, IN CASES WHERE
|
|
THE NTCB IS EXPECTED TO MEDIATE ACTIONS OF A HOST (OR OTHER
|
|
NETWORK COMPONENT) THAT IS ACTING ON BEHALF OF A USER OR
|
|
GROUP OF USERS, THE NTCB MAY EMPLOY IDENTIFICATION AND
|
|
AUTHENTICATION OF THE HOST (OR OTHER COMPONENT) IN LIEU OF
|
|
IDENTIFICATION AND AUTHENTICATION OF AN INDIVIDUAL USER.
|
|
|
|
AUTHENTICATION INFORMATION, INCLUDING THE IDENTITY OF A
|
|
USER (ONCE AUTHENTICATED) MAY BE PASSED FROM ONE COMPONENT
|
|
TO ANOTHER WITHOUT REAUTHENTICATION, SO LONG AS THE NTCB
|
|
PROTECTS (E.G., BY ENCRYPTION) THE INFORMATION FROM UNAU-
|
|
THORIZED DISCLOSURE AND MODIFICATION. THIS PROTECTION SHALL
|
|
PROVIDE AT LEAST A SIMILAR LEVEL OF ASSURANCE (OR STRENGTH
|
|
OF MECHANISM) AS PERTAINS TO THE PROTECTION OF THE AUTHENTI-
|
|
CATION MECHANISM AND AUTHENTICATION DATA.
|
|
|
|
|
|
+ Rationale
|
|
|
|
THE NEED FOR ACCOUNTABILITY IS NOT CHANGED IN THE CON-
|
|
TEXT OF A NETWORK SYSTEM. THE FACT THAT THE NTCB IS PARTI-
|
|
TIONED OVER A SET OF COMPONENTS NEITHER REDUCES THE NEED NOR
|
|
IMPOSES NEW REQUIREMENTS. THAT IS, INDIVIDUAL ACCOUNTABIL-
|
|
ITY IS STILL THE OBJECTIVE. HOWEVER, IN THE CONTEXT OF A
|
|
NETWORK SYSTEM AT THE (C1) LEVEL (WHEREIN EXPLICIT INDIVI-
|
|
DUAL USER ACCOUNTABILITY IS NOT REQUIRED), "INDIVIDUAL
|
|
ACCOUNTABILITY" CAN BE SATISFIED BY IDENTIFICATION OF A HOST
|
|
(OR OTHER COMPONENT). IN ADDITION, THERE IS NO NEED IN A
|
|
DISTRIBUTED PROCESSING SYSTEM LIKE A NETWORK TO REAUTHENTI-
|
|
CATE A USER AT EACH POINT IN THE NETWORK WHERE A PROJECTION
|
|
OF A USER (VIA THE SUBJECT OPERATING ON BEHALF OF THE USER)
|
|
INTO ANOTHER REMOTE SUBJECT TAKES PLACE.
|
|
|
|
THE PASSING OF IDENTIFIERS AND/OR AUTHENTICATION INFOR-
|
|
MATION FROM ONE COMPONENT TO ANOTHER IS USUALLY DONE IN SUP-
|
|
PORT TO THE IMPLEMENTATION OF THE DISCRETIONARY ACCESS CON-
|
|
TROL (DAC). THIS SUPPORT RELATES DIRECTLY TO THE DAC
|
|
REGARDING ACCESS BY A USER TO A STORAGE OBJECT IN A DIF-
|
|
FERENT NTCB PARTITION THAN THE ONE WHERE THE USER WAS
|
|
AUTHENTICATED. EMPLOYING A FORWARDED IDENTIFICATION IMPLIES
|
|
ADDITIONAL RELIANCE ON THE SOURCE AND COMPONENTS ALONG THE
|
|
PATH.
|
|
|
|
|
|
2.1.3 Assurance
|
|
|
|
|
|
2.1.3.1 Operational Assurance
|
|
|
|
|
|
2.1.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION THAT
|
|
PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING (E.G.,
|
|
BY MODIFICATION OF ITS CODE OR DATA STRUCTURES). RESOURCES
|
|
CONTROLLED BY THE TCB MAY BE A DEFINED SUBSET OF THE SUB-
|
|
JECTS AND OBJECTS IN THE ADP SYSTEM.
|
|
|
|
+ Interpretation
|
|
|
|
THE SYSTEM ARCHITECTURE CRITERION MUST BE MET INDIVIDU-
|
|
ALLY BY ALL NTCB PARTITIONS. IMPLEMENTATION OF THE REQUIRE-
|
|
MENT THAT THE NTCB MAINTAIN A DOMAIN FOR ITS OWN EXECUTION
|
|
IS ACHIEVED BY HAVING EACH NTCB PARTITION MAINTAIN A DOMAIN
|
|
FOR ITS OWN EXECUTION.
|
|
|
|
THE SUBSET OF NETWORK RESOURCES OVER WHICH THE NTCB HAS
|
|
CONTROL ARE THE UNION OF THE SETS OF RESOURCES OVER WHICH
|
|
THE NTCB PARTITIONS HAVE CONTROL. CODE AND DATA STRUCTURES
|
|
BELONGING TO THE NTCB, TRANSFERRED AMONG NTCB SUBJECTS
|
|
(I.E., SUBJECTS OUTSIDE THE REFERENCE MONITOR BUT INSIDE THE
|
|
NTCB) BELONGING TO DIFFERENT NTCB PARTITIONS, MUST BE PRO-
|
|
TECTED AGAINST EXTERNAL INTERFERENCE OR TAMPERING. FOR
|
|
EXAMPLE, A CRYPTOGRAPHIC CHECKSUM OR PHYSICAL MEANS MAY BE
|
|
EMPLOYED TO PROTECT USER AUTHENTICATION DATA EXCHANGED
|
|
BETWEEN NTCB PARTITIONS.
|
|
|
|
+ Rationale
|
|
|
|
THE REQUIREMENT FOR THE PROTECTION OF COMMUNICATIONS
|
|
BETWEEN NTCB PARTITIONS IS SPECIFICALLY DIRECTED TO SUBJECTS
|
|
THAT ARE PART OF THE NTCB PARTITIONS. ANY REQUIREMENTS FOR
|
|
SUCH PROTECTION FOR THE SUBJECTS THAT ARE OUTSIDE THE NTCB
|
|
PARTITIONS ARE ADDRESSED IN RESPONSE TO THE INTEGRITY
|
|
REQUIREMENTS OF THE SECURITY POLICY.
|
|
|
|
|
|
2.1.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
HARDWARE AND/OR SOFTWARE FEATURES SHALL BE PROVIDED THAT CAN
|
|
BE USED TO PERIODICALLY VALIDATE THE CORRECT OPERATION OF
|
|
THE ON-SITE HARDWARE AND FIRMWARE ELEMENTS OF THE TCB.
|
|
|
|
+ Interpretation
|
|
|
|
IMPLEMENTATION OF THE REQUIREMENT IS PARTLY ACHIEVED BY
|
|
HAVING HARDWARE AND/OR SOFTWARE FEATURES THAT CAN BE USED TO
|
|
PERIODICALLY VALIDATE THE CORRECT OPERATION OF THE HARDWARE
|
|
AND FIRMWARE ELEMENTS OF EACH COMPONENT'S NTCB PARTITION.
|
|
FEATURES SHALL ALSO BE PROVIDED TO VALIDATE THE IDENTITY AND
|
|
CORRECT OPERATION OF A COMPONENT PRIOR TO ITS INCORPORATION
|
|
IN THE NETWORK SYSTEM AND THROUGHOUT SYSTEM OPERATION. FOR
|
|
EXAMPLE, A PROTOCOL COULD BE DESIGNED THAT ENABLES THE COM-
|
|
PONENTS OF THE PARTITIONED NTCB TO EXCHANGE MESSAGES PERIOD-
|
|
ICALLY AND VALIDATE EACH OTHER'S CORRECT RESPONSE. THE PRO-
|
|
TOCOL SHALL BE ABLE TO DETERMINE THE REMOTE ENTITY'S ABILITY
|
|
TO RESPOND. NTCB PARTITIONS SHALL PROVIDE THE CAPABILITY TO
|
|
REPORT TO NETWORK ADMINISTRATIVE PERSONNEL THE FAILURES
|
|
DETECTED IN OTHER NTCB PARTITIONS.
|
|
|
|
INTERCOMPONENT PROTOCOLS IMPLEMENTED WITHIN A NTCB
|
|
SHALL BE DESIGNED IN SUCH A WAY AS TO PROVIDE CORRECT OPERA-
|
|
TION IN THE CASE OF FAILURES OF NETWORK COMMUNICATIONS OR
|
|
INDIVIDUAL COMPONENTS. THE ALLOCATION OF DISCRETIONARY
|
|
ACCESS CONTROL POLICY IN A NETWORK MAY REQUIRE COMMUNICATION
|
|
BETWEEN TRUSTED SUBJECTS THAT ARE PART OF THE NTCB PARTI-
|
|
TIONS IN DIFFERENT COMPONENTS. THIS COMMUNICATION IS NOR-
|
|
MALLY IMPLEMENTED WITH A PROTOCOL BETWEEN THE SUBJECTS AS
|
|
PEER ENTITIES. INCORRECT ACCESS WITHIN A COMPONENT SHALL
|
|
NOT RESULT FROM FAILURE OF AN NTCB PARTITION TO COMMUNICATE
|
|
WITH OTHER COMPONENTS.
|
|
|
|
+ Rationale
|
|
|
|
THE FIRST PARAGRAPH OF THE INTERPRETATION IS A
|
|
STRAIGHTFORWARD EXTENSION OF THE REQUIREMENT INTO THE CON-
|
|
TEXT OF A NETWORK SYSTEM AND PARTITIONED NTCB AS DEFINED FOR
|
|
THESE NETWORK CRITERIA.
|
|
|
|
NTCB PROTOCOLS SHOULD BE ROBUST ENOUGH SO THAT THEY
|
|
PERMIT THE SYSTEM TO OPERATE CORRECTLY IN THE CASE OF LOCAL-
|
|
IZED FAILURE. THE PURPOSE OF THIS PROTECTION IS TO PRESERVE
|
|
THE INTEGRITY OF THE NTCB ITSELF. IT IS NOT UNUSUAL FOR ONE
|
|
OR MORE COMPONENTS IN A NETWORK TO BE INOPERATIVE AT ANY
|
|
TIME, SO IT IS IMPORTANT TO MINIMIZE THE EFFECTS OF SUCH
|
|
FAILURES ON THE REST OF THE NETWORK. ADDITIONAL INTEGRITY
|
|
AND DENIAL OF SERVICE ISSUES ARE ADDRESSED IN PART II.
|
|
|
|
|
|
2.1.3.2 Life-Cycle Assurance
|
|
|
|
|
|
2.1.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE SECURITY MECHANISMS OF THE ADP SYSTEM SHALL BE TESTED
|
|
AND FOUND TO WORK AS CLAIMED IN THE SYSTEM DOCUMENTATION.
|
|
TESTING SHALL BE DONE TO ASSURE THAT THERE ARE NO OBVIOUS
|
|
WAYS FOR AN UNAUTHORIZED USER TO BYPASS OR OTHERWISE DEFEAT
|
|
THE SECURITY PROTECTION MECHANISMS OF THE TCB. (SEE THE
|
|
SECURITY TESTING GUIDELINES.)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
TESTING OF A COMPONENT WILL REQUIRE A TESTBED THAT
|
|
EXERCISES THE INTERFACES AND PROTOCOLS OF THE COMPONENT.
|
|
THE TESTING OF A SECURITY MECHANISM OF THE NETWORK SYSTEM
|
|
FOR MEETING THIS CRITERION SHALL BE AN INTEGRATED TESTING
|
|
PROCEDURE INVOLVING ALL COMPONENTS CONTAINING AN NTCB PARTI-
|
|
TION THAT IMPLEMENT THE GIVEN MECHANISM. THIS INTEGRATED
|
|
TESTING IS ADDITIONAL TO ANY INDIVIDUAL COMPONENT TESTS
|
|
INVOLVED IN THE EVALUATION OF THE NETWORK SYSTEM. THE SPON-
|
|
SOR SHOULD IDENTIFY THE ALLOWABLE SET OF CONFIGURATIONS
|
|
INCLUDING THE SIZES OF THE NETWORKS. ANALYSIS OR TESTING
|
|
PROCEDURES AND TOOLS SHALL BE AVAILABLE TO TEST THE LIMITS
|
|
OF THESE CONFIGURATIONS. A CHANGE IN CONFIGURATION WITHIN
|
|
THE ALLOWABLE SET OF CONFIGURATIONS DOES NOT REQUIRE RETEST-
|
|
ING.
|
|
|
|
+ Rationale
|
|
|
|
TESTING IS THE PRIMARY METHOD AVAILABLE IN THIS EVALUA-
|
|
TION DIVISION TO GAIN ANY ASSURANCE THAT THE SECURITY
|
|
MECHANISMS PERFORM THEIR INTENDED FUNCTION.
|
|
|
|
2.1.4 Documentation
|
|
|
|
2.1.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A SINGLE SUMMARY, CHAPTER, OR MANUAL IN USER DOCUMENTATION
|
|
SHALL DESCRIBE THE PROTECTION MECHANISMS PROVIDED BY THE
|
|
TCB, INTERPRETATIONS ON THEIR USE, AND HOW THEY INTERACT
|
|
WITH ONE ANOTHER.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THIS USER DOCUMENTATION DESCRIBES USER VISIBLE PROTEC-
|
|
TION MECHANISMS AT THE GLOBAL (NETWORK SYSTEM) LEVEL AND AT
|
|
THE USER INTERFACE OF EACH COMPONENT, AND THE INTERACTION
|
|
AMONG THESE.
|
|
|
|
+ Rationale
|
|
|
|
THE INTERPRETATION IS AN EXTENSION OF THE REQUIREMENT
|
|
INTO THE CONTEXT OF A NETWORK SYSTEM AS DEFINED FOR THESE
|
|
NETWORK CRITERIA. DOCUMENTATION OF PROTECTION MECHANISMS
|
|
PROVIDED BY INDIVIDUAL COMPONENTS IS REQUIRED BY THE CRI-
|
|
TERIA FOR TRUSTED COMPUTER SYSTEMS THAT ARE APPLIED AS
|
|
APPROPRIATE FOR THE INDIVIDUAL COMPONENTS.
|
|
|
|
|
|
2.1.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A MANUAL ADDRESSED TO THE ADP SYSTEM ADMINISTRATOR SHALL
|
|
PRESENT CAUTIONS ABOUT FUNCTIONS AND PRIVILEGES THAT SHOULD
|
|
BE CONTROLLED WHEN RUNNING A SECURE FACILITY.
|
|
|
|
+ Interpretation
|
|
|
|
THIS MANUAL SHALL CONTAIN SPECIFICATIONS AND PROCEDURES
|
|
TO ASSIST THE SYSTEM ADMINISTRATOR(S) MAINTAIN COGNIZANCE OF
|
|
THE NETWORK CONFIGURATION. THESE SPECIFICATIONS AND PRO-
|
|
CEDURES SHALL ADDRESS THE FOLLOWING:
|
|
|
|
1.THE HARDWARE CONFIGURATION OF THE NETWORK ITSELF;
|
|
|
|
2.THE IMPLICATIONS OF ATTACHING NEW COMPONENTS TO THE
|
|
NETWORK;
|
|
|
|
3.THE CASE WHERE CERTAIN COMPONENTS MAY PERIODICALLY
|
|
LEAVE THE NETWORK (E.G., BY CRASHING, OR BY BEING
|
|
DISCONNECTED) AND THEN REJOIN;
|
|
|
|
4.NETWORK CONFIGURATION ASPECTS THAT CAN IMPACT THE
|
|
SECURITY OF THE NETWORK SYSTEM; (FOR EXAMPLE, THE
|
|
MANUAL SHOULD DESCRIBE FOR THE NETWORK SYSTEM
|
|
ADMINISTRATOR THE INTERCONNECTIONS AMONG COMPONENTS
|
|
THAT ARE CONSISTENT WITH THE OVERALL NETWORK SYSTEM
|
|
ARCHITECTURE.)
|
|
|
|
5.LOADING OR MODIFYING NTCB SOFTWARE OR FIRMWARE
|
|
(E.G., DOWN-LINE LOADING).
|
|
|
|
THE PHYSICAL AND ADMINISTRATIVE ENVIRONMENTAL CONTROLS
|
|
SHALL BE SPECIFIED. ANY ASSUMPTIONS ABOUT SECURITY OF A
|
|
GIVEN NETWORK SHOULD BE CLEARLY STATED (E.G., THE FACT THAT
|
|
ALL COMMUNICATIONS LINKS MUST BE PHYSICALLY PROTECTED TO A
|
|
CERTAIN LEVEL).
|
|
|
|
|
|
+ Rationale
|
|
|
|
THERE MAY BE MULTIPLE SYSTEM ADMINISTRATORS WITH
|
|
DIVERSE RESPONSIBILITIES. THE TECHNICAL SECURITY MEASURES
|
|
DESCRIBED BY THESE CRITERIA MUST BE USED IN CONJUNCTION WITH
|
|
OTHER FORMS OF SECURITY IN ORDER TO ACHIEVE SECURITY OF THE
|
|
NETWORK. ADDITIONAL FORMS INCLUDE ADMINISTRATIVE SECURITY,
|
|
PHYSICAL SECURITY, EMANATIONS SECURITY, ETC.
|
|
|
|
|
|
EXTENSION OF THIS CRITERION TO COVER CONFIGURATION
|
|
ASPECTS OF THE NETWORK IS NEEDED BECAUSE, FOR EXAMPLE,
|
|
PROPER INTERCONNECTION OF COMPONENTS IS TYPICALLY ESSENTIAL
|
|
TO ACHIEVE A CORRECT REALIZATION OF THE NETWORK ARCHITEC-
|
|
TURE.
|
|
|
|
|
|
CRYPTOGRAPHY IS ONE COMMON MECHANISM EMPLOYED TO PRO-
|
|
TECT COMMUNICATION CIRCUITS. ENCRYPTION TRANSFORMS THE
|
|
REPRESENTATION OF INFORMATION SO THAT IT IS UNINTELLIGIBLE
|
|
TO UNAUTHORIZED SUBJECTS. REFLECTING THIS TRANSFORMATION,
|
|
THE SENSITIVITY OF THE CIPHERTEXT IS GENERALLY LOWER THAN
|
|
THE CLEARTEXT. IF ENCRYPTION METHODOLOGIES ARE EMPLOYED,
|
|
THEY SHALL BE APPROVED BY THE NATIONAL SECURITY AGENCY
|
|
(NSA).
|
|
|
|
THE ENCRYPTION ALGORITHM AND ITS IMPLEMENTATION ARE
|
|
OUTSIDE THE SCOPE OF THESE INTERPRETATIONS. THIS ALGORITHM
|
|
AND IMPLEMENTATION MAY BE IMPLEMENTED IN A SEPARATE DEVICE
|
|
OR MAY BE A FUNCTION OF A SUBJECT IN A COMPONENT NOT DEDI-
|
|
CATED TO ENCRYPTION. WITHOUT PREJUDICE, EITHER IMPLEMENTA-
|
|
TION PACKAGING IS REFERRED TO AS AN ENCRYPTION MECHANISM
|
|
HEREIN.
|
|
|
|
|
|
2.1.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE SYSTEM DEVELOPER SHALL PROVIDE TO THE EVALUATORS A DOCU-
|
|
MENT THAT DESCRIBES THE TEST PLAN, TEST PROCEDURES THAT SHOW
|
|
HOW THE SECURITY MECHANISMS WERE TESTED, AND RESULTS OF THE
|
|
SECURITY MECHANISMS' FUNCTIONAL TESTING.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THE "SYSTEM DEVELOPER" IS INTERPRETED AS "THE NETWORK
|
|
SYSTEM SPONSOR". THE DESCRIPTION OF THE TEST PLAN SHOULD
|
|
ESTABLISH THE CONTEXT IN WHICH THE TESTING WAS OR SHOULD BE
|
|
CONDUCTED. THE DESCRIPTION SHOULD IDENTIFY ANY ADDITIONAL
|
|
TEST COMPONENTS THAT ARE NOT PART OF THE SYSTEM BEING
|
|
EVALUATED. THIS INCLUDES A DESCRIPTION OF THE TEST-RELEVANT
|
|
FUNCTIONS OF SUCH TEST COMPONENTS AND A DESCRIPTION OF THE
|
|
INTERFACING OF THOSE TEST COMPONENTS TO THE SYSTEM BEING
|
|
EVALUATED. THE DESCRIPTION OF THE TEST PLAN SHOULD ALSO
|
|
DEMONSTRATE THAT THE TESTS ADEQUATELY COVER THE NETWORK
|
|
SECURITY POLICY. THE TESTS SHOULD INCLUDE THE FEATURES
|
|
DESCRIBED IN THE SYSTEM ARCHITECTURE AND THE SYSTEM
|
|
INTEGRITY SECTIONS. THE TESTS SHOULD ALSO INCLUDE NETWORK
|
|
CONFIGURATION AND SIZING.
|
|
|
|
|
|
+ Rationale
|
|
|
|
THE ENTITY BEING EVALUATED MAY BE A NETWORKING SUBSYS-
|
|
TEM (SEE APPENDIX A) TO WHICH OTHER COMPONENTS MUST BE ADDED
|
|
TO MAKE A COMPLETE NETWORK SYSTEM. IN THAT CASE, THIS
|
|
INTERPRETATION IS EXTENDED TO INCLUDE CONTEXTUAL DEFINITION
|
|
BECAUSE, AT EVALUATION TIME, IT IS NOT POSSIBLE TO VALIDATE
|
|
THE TEST PLANS WITHOUT THE DESCRIPTION OF THE CONTEXT FOR
|
|
TESTING THE NETWORKING SUBSYSTEM.
|
|
|
|
|
|
|
|
2.1.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
DOCUMENTATION SHALL BE AVAILABLE THAT PROVIDES A DESCRIPTION
|
|
OF THE MANUFACTURER'S PHILOSOPHY OF PROTECTION AND AN EXPLA-
|
|
NATION OF HOW THIS PHILOSOPHY IS TRANSLATED INTO THE TCB. IF
|
|
THE TCB IS COMPOSED OF DISTINCT MODULES, THE INTERFACES
|
|
BETWEEN THESE MODULES SHALL BE DESCRIBED.
|
|
|
|
+ Interpretation
|
|
|
|
EXPLANATION OF HOW THE SPONSOR'S PHILOSOPHY OF PROTEC-
|
|
TION IS TRANSLATED INTO THE NTCB SHALL INCLUDE A DESCRIPTION
|
|
OF HOW THE NTCB IS PARTITIONED. THE SECURITY POLICY ALSO
|
|
SHALL BE STATED. THE DESCRIPTION OF THE INTERFACES BETWEEN
|
|
THE NTCB MODULES SHALL INCLUDE THE INTERFACE(S) BETWEEN NTCB
|
|
PARTITIONS AND MODULES WITHIN THE PARTITIONS IF THE MODULES
|
|
EXIST. THE SPONSOR SHALL DESCRIBE THE SECURITY ARCHITECTURE
|
|
AND DESIGN, INCLUDING THE ALLOCATION OF SECURITY REQUIRE-
|
|
MENTS AMONG COMPONENTS. APPENDIX A ADDRESSES COMPONENT
|
|
EVALUATION ISSUES.
|
|
|
|
+ Rationale
|
|
|
|
THE INTERPRETATION IS A STRAIGHTFORWARD EXTENSION OF
|
|
THE REQUIREMENT INTO THE CONTEXT OF A NETWORK SYSTEM AS
|
|
DEFINED FOR THIS NETWORK INTERPRETATION. OTHER DOCUMENTA-
|
|
TION, SUCH AS DESCRIPTION OF COMPONENTS AND DESCRIPTION OF
|
|
OPERATING ENVIRONMENT(S) IN WHICH THE NETWORKING SUBSYSTEM
|
|
OR NETWORK SYSTEM IS DESIGNED TO FUNCTION, IS REQUIRED ELSE-
|
|
WHERE, E.G., IN THE TRUSTED FACILITY MANUAL.
|
|
|
|
IN ORDER TO BE EVALUATED, A NETWORK MUST POSSESS A
|
|
COHERENT NETWORK SECURITY ARCHITECTURE AND DESIGN. (INTER-
|
|
CONNECTION OF COMPONENTS THAT DO NOT ADHERE TO SUCH A SINGLE
|
|
COHERENT NETWORK SECURITY ARCHITECTURE IS ADDRESSED IN THE
|
|
INTERCONNECTION OF ACCREDITED AIS, APPENDIX C.) THE NETWORK
|
|
SECURITY ARCHITECTURE MUST ADDRESS THE SECURITY-RELEVANT
|
|
POLICIES, OBJECTIVES, AND PROTOCOLS. THE NETWORK SECURITY
|
|
DESIGN SPECIFIES THE INTERFACES AND SERVICES THAT MUST BE
|
|
INCORPORATED INTO THE NETWORK SO THAT IT CAN BE EVALUATED AS
|
|
A TRUSTED ENTITY. THERE MAY BE MULTIPLE DESIGNS THAT CON-
|
|
FORM TO THE SAME ARCHITECTURE BUT ARE MORE OR LESS INCOMPA-
|
|
TIBLE AND NON-INTEROPERABLE (EXCEPT THROUGH THE INTERCONNEC-
|
|
TION RULES). SECURITY RELATED MECHANISMS REQUIRING COOPERA-
|
|
TION AMONG COMPONENTS ARE SPECIFIED IN THE DESIGN IN TERMS
|
|
OF THEIR VISIBLE INTERFACES; MECHANISMS HAVING NO VISIBLE
|
|
INTERFACES ARE NOT SPECIFIED IN THIS DOCUMENT BUT ARE LEFT
|
|
AS IMPLEMENTATION DECISIONS.
|
|
|
|
THE NETWORK SECURITY ARCHITECTURE AND DESIGN MUST BE
|
|
AVAILABLE FROM THE NETWORK SPONSOR BEFORE EVALUATION OF THE
|
|
NETWORK, OR ANY COMPONENT, CAN BE UNDERTAKEN. THE NETWORK
|
|
SECURITY ARCHITECTURE AND DESIGN MUST BE SUFFICIENTLY COM-
|
|
PLETE, UNAMBIGUOUS, AND FREE FROM OBVIOUS FLAWS TO PERMIT
|
|
THE CONSTRUCTION OR ASSEMBLY OF A TRUSTED NETWORK BASED ON
|
|
THE STRUCTURE IT SPECIFIES.
|
|
|
|
WHEN A COMPONENT IS BEING DESIGNED OR PRESENTED FOR
|
|
EVALUATION, OR WHEN A NETWORK ASSEMBLED FROM COMPONENTS IS
|
|
ASSEMBLED OR PRESENTED FOR EVALUATION, THERE MUST BE A
|
|
PRIORI EVIDENCE THAT THE NETWORK SECURITY ARCHITECTURE AND
|
|
DESIGN ARE SATISFIED. THAT IS, THE COMPONENTS CAN BE ASSEM-
|
|
BLED INTO A NETWORK THAT CONFORMS IN EVERY WAY WITH THE NET-
|
|
WORK SECURITY ARCHITECTURE AND DESIGN TO PRODUCE A PHYSICAL
|
|
REALIZATION THAT IS TRUSTED TO THE EXTENT THAT ITS EVALUA-
|
|
TION INDICATES.
|
|
|
|
IN ORDER FOR A TRUSTED NETWORK TO BE CONSTRUCTED FROM
|
|
COMPONENTS THAT CAN BE BUILT INDEPENDENTLY, THE NETWORK
|
|
SECURITY ARCHITECTURE AND DESIGN MUST COMPLETELY AND UNAMBI-
|
|
GUOUSLY DEFINE THE SECURITY FUNCTIONALITY OF COMPONENTS AS
|
|
WELL AS THE INTERFACES BETWEEN OR AMONG COMPONENTS. THE
|
|
NETWORK SECURITY ARCHITECTURE AND DESIGN MUST BE EVALUATED
|
|
TO DETERMINE THAT A NETWORK CONSTRUCTED TO ITS
|
|
SPECIFICATIONS WILL IN FACT BE TRUSTED, THAT IS, IT WILL BE
|
|
EVALUATABLE UNDER THESE INTERPRETATIONS.
|
|
|
|
|
|
|
|
|
|
2.2 CLASS (C2): CONTROLLED ACCESS PROTECTION
|
|
_ _ _____ __ __________ ______ __________
|
|
|
|
|
|
NETWORK SYSTEMS IN THIS CLASS ENFORCE A MORE
|
|
FINELY GRAINED DISCRETIONARY ACCESS CONTROL THAN
|
|
(C1) NETWORK SYSTEMS, MAKING USERS INDIVIDUALLY
|
|
ACCOUNTABLE FOR THEIR ACTIONS THROUGH LOGIN PRO-
|
|
CEDURES, AUDITING OF SECURITY-RELEVANT EVENTS, AND
|
|
RESOURCE ISOLATION. THE FOLLOWING ARE MINIMAL
|
|
REQUIREMENTS FOR SYSTEMS ASSIGNED A CLASS (C2)
|
|
RATING.
|
|
|
|
|
|
2.2.1 Security Policy
|
|
_ _ _ ________ ______
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The network sponsor shall describe the overall network
|
|
security policy enforced by the NTCB. At a minimum, this
|
|
policy shall include the discretionary requirements applica-
|
|
ble to this class. The policy may require data secrecy, or
|
|
data integrity, or both. The policy shall include a discre-
|
|
tionary policy for protecting the information being pro-
|
|
cessed based on the authorizations of INDIVIDUALS, users, or
|
|
groups of users. This access control policy statement shall
|
|
describe the requirements on the network to prevent or
|
|
detect "reading or destroying" sensitive information by
|
|
unauthorized users or errors. Unauthorized users include
|
|
both those that are not authorized to use the network at all
|
|
(e.g., a user attempting to use a passive or active wire
|
|
tap) or a legitimate user of the network who is not author-
|
|
ized to access a specific piece of information being pro-
|
|
tected.
|
|
|
|
Note that "users" does not include "operators," "system
|
|
programmers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network
|
|
system, for example, by defining membership of a group.
|
|
These individuals may also have the separate role of users.
|
|
|
|
|
|
SECRECY POLICY: The network sponsor shall define the
|
|
form of the discretionary secrecy policy that is
|
|
enforced in the network to prevent unauthorized
|
|
users from reading the sensitive information
|
|
entrusted to the network.
|
|
|
|
|
|
DATA INTEGRITY POLICY: The network sponsor shall
|
|
define the discretionary integrity policy to prevent
|
|
unauthorized users from modifying, viz., writing,
|
|
sensitive information. The definition of data
|
|
integrity presented by the network sponsor refers to
|
|
the requirement that the information has not been
|
|
subjected to unauthorized modification in the net-
|
|
work.
|
|
|
|
+ Rationale
|
|
|
|
The word "sponsor" is used in place of alternatives
|
|
(such as "vendor," "architect," "manufacturer," and
|
|
"developer") because the alternatives indicate people who
|
|
may not be available, involved, or relevant at the time that
|
|
a network system is proposed for evaluation.
|
|
|
|
A trusted network is able to control both the reading
|
|
and writing of shared sensitive information. Control of
|
|
writing is used to protect against destruction of informa-
|
|
tion. A network normally is expected to have policy require-
|
|
ments to protect both the secrecy and integrity of the
|
|
information entrusted to it. In a network the integrity is
|
|
frequently as important or more important than the secrecy
|
|
requirements. Therefore the secrecy and/or integrity policy
|
|
to be enforced by the network must be stated for each net-
|
|
work regardless of its evaluation class. The assurance that
|
|
the policy is faithfully enforced is reflected in the
|
|
evaluation class of the network.
|
|
|
|
This control over modification is typically used to
|
|
protect information so that it may be relied upon and to
|
|
control the potential harm that would result if the informa-
|
|
tion were corrupted. The overall network policy require-
|
|
ments for integrity includes the protection for data both
|
|
while being processed in a component and while being
|
|
transmitted in the network. The access control policy
|
|
enforced by the NTCB relates to the access of subjects to
|
|
objects within each component. Communications integrity
|
|
addressed within Part II relates to information while being
|
|
transmitted.
|
|
|
|
2.2.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall define and control access between named users
|
|
and named objects (e.g., files and programs) in the ADP sys-
|
|
tem. The enforcement mechanism (e.g., self/group/public
|
|
controls, access control lists) shall allow users to specify
|
|
and control sharing of those objects by named individuals or
|
|
defined groups OF INDIVIDUALS, or both, AND SHALL PROVIDE
|
|
CONTROLS TO LIMIT PROPAGATION OF ACCESS RIGHTS. THE DISCRE-
|
|
TIONARY ACCESS CONTROL MECHANISM SHALL, EITHER BY EXPLICIT
|
|
USER ACTION OR BY DEFAULT, PROVIDE THAT OBJECTS ARE PRO-
|
|
TECTED FROM UNAUTHORIZED ACCESS. THESE ACCESS CONTROLS
|
|
SHALL BE CAPABLE OF INCLUDING OR EXCLUDING ACCESS TO THE
|
|
GRANULARITY OF A SINGLE USER. ACCESS PERMISSION TO AN
|
|
OBJECT BY USERS NOT ALREADY POSSESSING ACCESS PERMISSION
|
|
SHALL ONLY BE ASSIGNED BY AUTHORIZED USERS.
|
|
|
|
+ Interpretation
|
|
|
|
The discretionary access control (DAC) mechanism(s) may
|
|
be distributed over the partitioned NTCB in various ways.
|
|
Some part, all, or none of the DAC may be implemented in a
|
|
given component of the network system. In particular, com-
|
|
ponents that support only internal subjects (i.e., that have
|
|
no subjects acting as direct surrogates for users), such as
|
|
a public network packet switch, might not implement the DAC
|
|
mechanism(s) directly (e.g., they are unlikely to contain
|
|
access control lists).
|
|
|
|
Identification of users by groups may be achieved in
|
|
various ways in the networking environment. For example,
|
|
the network identifiers (e.g., internet addresses) for vari-
|
|
ous components (e.g., hosts, gateways) can be used as iden-
|
|
tifiers of groups of individual users (e.g., "all users at
|
|
Host A," "all users of network Q") SO LONG AS THE INDIVIDU-
|
|
ALS INVOLVED IN THE GROUP ARE IMPLIED BY THE GROUP IDENTIF-
|
|
IER. FOR EXAMPLE, HOST A MIGHT EMPLOY A PARTICULAR GROUP-ID,
|
|
FOR WHICH IT MAINTAINS A LIST OF EXPLICIT USERS IN THAT
|
|
GROUP, IN ITS NETWORK EXCHANGE WITH HOST B, WHICH ACCEPTS
|
|
THE GROUP-ID UNDER THE CONDITIONS OF THIS INTERPRETATION.
|
|
|
|
For networks, individual hosts will impose need-to-know
|
|
controls over their users ON THE BASIS OF NAMED INDIVIDUALS
|
|
- much like (in fact, probably the same) controls used when
|
|
there is no network connection.
|
|
|
|
When group identifiers are acceptable for access con-
|
|
trol, the identifier of some other host may be employed, to
|
|
eliminate the maintenance that would be required if indivi-
|
|
dual identification of remote users was employed. IN CLASS
|
|
C2 AND HIGHER, HOWEVER, IT MUST BE POSSIBLE FROM THAT AUDIT
|
|
RECORD TO IDENTIFY (IMMEDIATELY OR AT SOME LATER TIME)
|
|
EXACTLY THE INDIVIDUALS REPRESENTED BY A GROUP IDENTIFIER AT
|
|
THE TIME OF THE USE OF THAT IDENTIFIER. THERE IS ALLOWED TO
|
|
BE AN UNCERTAINTY BECAUSE OF ELAPSED TIME BETWEEN CHANGES IN
|
|
THE GROUP MEMBERSHIP AND THE ENFORCEMENT IN THE ACCESS CON-
|
|
TROL MECHANISMS.
|
|
|
|
The DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. The reference monitor manages
|
|
all the physical resources of the system and from them
|
|
creates the abstraction of subjects and objects that it con-
|
|
trols. Some of these subjects and objects may be used to
|
|
implement a part of the NTCB. WHEN THE DAC MECHANISM IS
|
|
DISTRIBUTED IN SUCH NTCB SUBJECTS (I.E., WHEN OUTSIDE THE
|
|
REFERENCE MONITOR), THE ASSURANCE REQUIREMENTS (SEE THE
|
|
ASSURANCE SECTION) FOR THE DESIGN AND IMPLEMENTATION OF THE
|
|
DAC SHALL BE THOSE OF CLASS C2 FOR ALL NETWORKS OF CLASS C2
|
|
OR ABOVE.
|
|
|
|
When integrity is included as part of the network dis-
|
|
cretionary security policy, the above interpretations shall
|
|
be specifically applied to the controls over modification,
|
|
viz, the write mode of access, within each component based
|
|
on identified users or groups of users.
|
|
|
|
+ Rationale
|
|
|
|
In this class, THE SUPPORTING ELEMENTS OF THE OVERALL
|
|
DAC MECHANISM ARE REQUIRED TO ISOLATE INFORMATION (OBJECTS)
|
|
THAT SUPPORTS DAC SO THAT IT IS SUBJECT TO AUDITING REQUIRE-
|
|
MENTS (SEE THE SYSTEM ARCHITECTURE SECTION). THE USE OF
|
|
NETWORK IDENTIFIERS TO IDENTIFY GROUPS OF INDIVIDUAL USERS
|
|
COULD BE IMPLEMENTED, FOR EXAMPLE, AS AN X.25 COMMUNITY OF
|
|
INTEREST IN THE NETWORK PROTOCOL LAYER (LAYER 3). IN ALL
|
|
OTHER RESPECTS, the supporting elements of the overall DAC
|
|
mechanism are treated exactly as untrusted subjects are
|
|
treated with respect to DAC in an ADP system, with the same
|
|
result as noted in the interpretation.
|
|
|
|
A typical situation for DAC is that a surrogate process
|
|
for a remote user will be created in some host for access to
|
|
objects under the control of the NTCB partition within that
|
|
host. The interpretation requires that a user identifier be
|
|
assigned and maintained for each such process by the NTCB,
|
|
so that access by a surrogate process is subject to essen-
|
|
tially the same discretionary controls as access by a pro-
|
|
cess acting on behalf of a local user would be. However,
|
|
within this interpretation a range of possible interpreta-
|
|
tions of the assigned user identification is permitted.
|
|
|
|
The most obvious situation would exist if a global
|
|
database of network users were to be made permanently avail-
|
|
able on demand to every host, (i.e., a name server existed)
|
|
so that all user identifications were globally meaningful.
|
|
|
|
It is also acceptable, however, for some NTCB parti-
|
|
tions to maintain a database of locally-registered users for
|
|
its own use. In such a case, one could choose to inhibit
|
|
the creation of surrogate processes for locally unregistered
|
|
users, or (if permitted by the local policy) alternatively,
|
|
to permit the creation of surrogate processes with
|
|
preselected user and group identifiers which, in effect,
|
|
identify the process as executing on behalf of a member of a
|
|
group of users on a particular remote host. The intent of
|
|
the words concerning audit in the interpretation is to pro-
|
|
vide a minimally acceptable degree of auditability for cases
|
|
such as the last described. What is required is that there
|
|
be a capability, using the audit facilities provided by the
|
|
network NTCB partitions involved, to determine who was
|
|
logged in at the actual host of the group of remote users at
|
|
the time the surrogate processing occured.
|
|
|
|
Associating the proper user id with a surrogate process
|
|
is the job of identification and authentication. This means
|
|
that DAC is applied locally, with respect to the user id of
|
|
the surrogate process. The transmission of the data back
|
|
across the network to the user's host, and the creation of a
|
|
copy of the data there, is not the business of DAC.
|
|
|
|
Components that support only internal subjects impact
|
|
the implementation of the DAC by providing services by which
|
|
information (e.g., a user-id) is made available to a com-
|
|
ponent that makes a DAC decision. An example of the latter
|
|
would be the case that a user at Host A attempts to access a
|
|
file at Host B. The DAC decision might be (and usually
|
|
would be) made at Host B on the basis of a user-id transmit-
|
|
ted from Host A to Host B.
|
|
|
|
Unique user identification may be achieved by a variety
|
|
of mechanisms, including (a) a requirement for unique iden-
|
|
tification and authentication on the host where access takes
|
|
place; (b) recognition of fully qualified network
|
|
addresses authenticated by another host and forwarded to the
|
|
host where access takes place; or (c) administrative support
|
|
of a network-wide unique personnel identifier that could be
|
|
authenticated and forwarded by another host as in (b) above,
|
|
or could be authenticated and forwarded by a dedicated net-
|
|
work identification and authentication server. The proto-
|
|
cols which implement (b) or (c) are subject to the System
|
|
Architecture requirements.
|
|
|
|
Network support for DAC might be handled in other ways
|
|
than that described as "typical" above. In particular, some
|
|
form of centralized access control is often proposed. An
|
|
access control center may make all decisions for DAC, or it
|
|
may share the burden with the hosts by controlling host-to-
|
|
host connections, and leaving the hosts to decide on access
|
|
to their objects by users at a limited set of remote hosts.
|
|
In this case the access control center provides the linkage
|
|
between the connection oriented abstraction (as discussed in
|
|
the Introduction) and the overall network security policy
|
|
for DAC. In all cases the enforcement of the decision must
|
|
be provided by the host where the object resides.
|
|
|
|
2.2.1.2 Object Reuse
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
ALL AUTHORIZATIONS TO THE INFORMATION CONTAINED WITHIN A
|
|
STORAGE OBJECT SHALL BE REVOKED PRIOR TO INITIAL ASSIGNMENT,
|
|
ALLOCATION OR REALLOCATION TO A SUBJECT FROM THE TCB'S POOL
|
|
OF UNUSED STORAGE OBJECTS. NO INFORMATION, INCLUDING
|
|
ENCRYPTED REPRESENTATIONS OF INFORMATION, PRODUCED BY A
|
|
PRIOR SUBJECT'S ACTIONS IS TO BE AVAILABLE TO ANY SUBJECT
|
|
THAT OBTAINS ACCESS TO AN OBJECT THAT HAS BEEN RELEASED BACK
|
|
TO THE SYSTEM.
|
|
|
|
+ Interpretation
|
|
|
|
THE NTCB SHALL ENSURE THAT ANY STORAGE OBJECTS THAT IT
|
|
CONTROLS (E.G., MESSAGE BUFFERS UNDER THE CONTROL OF A NTCB
|
|
PARTITION IN A COMPONENT) CONTAIN NO INFORMATION FOR WHICH A
|
|
SUBJECT IN THAT COMPONENT IS NOT AUTHORIZED BEFORE GRANTING
|
|
ACCESS. THIS REQUIREMENT MUST BE ENFORCED BY EACH OF THE
|
|
NTCB PARTITIONS.
|
|
|
|
+ Rationale
|
|
|
|
IN A NETWORK SYSTEM, STORAGE OBJECTS OF INTEREST ARE
|
|
THINGS THAT THE NTCB DIRECTLY CONTROLS, SUCH AS MESSAGE
|
|
BUFFERS IN COMPONENTS. EACH COMPONENT OF THE NETWORK SYSTEM
|
|
MUST ENFORCE THE OBJECT REUSE REQUIREMENT WITH RESPECT TO
|
|
THE STORAGE OBJECTS OF INTEREST AS DETERMINED BY THE NETWORK
|
|
SECURITY POLICY. FOR EXAMPLE, THE DAC REQUIREMENT IN THIS
|
|
DIVISION LEADS TO THE REQUIREMENT HERE THAT MESSAGE BUFFERS
|
|
BE UNDER THE CONTROL OF THE NTCB PARTITION. A BUFFER
|
|
ASSIGNED TO AN INTERNAL SUBJECT MAY BE REUSED AT THE DISCRE-
|
|
TION OF THAT SUBJECT WHICH IS RESPONSIBLE FOR PRESERVING THE
|
|
INTEGRITY OF MESSAGE STREAMS. SUCH CONTROLLED OBJECTS MAY
|
|
BE IMPLEMENTED IN PHYSICAL RESOURCES, SUCH AS BUFFERS, DISK
|
|
SECTORS, TAPE SPACE, AND MAIN MEMORY, IN COMPONENTS SUCH AS
|
|
NETWORK SWITCHES.
|
|
|
|
|
|
2.2.2 Accountability
|
|
_ _ _ ______________
|
|
|
|
|
|
2.2.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall require users to identify themselves to it
|
|
before beginning to perform any other actions that the TCB
|
|
is expected to mediate. Furthermore, the TCB shall use a
|
|
protected mechanism (e.g., passwords) to authenticate the
|
|
user's identity. The TCB shall protect authentication data
|
|
so that it cannot be accessed by any unauthorized user. THE
|
|
TCB SHALL BE ABLE TO ENFORCE INDIVIDUAL ACCOUNTABILITY BY
|
|
PROVIDING THE CAPABILITY TO UNIQUELY IDENTIFY EACH INDIVI-
|
|
DUAL ADP SYSTEM USER. THE TCB SHALL ALSO PROVIDE THE CAPA-
|
|
BILITY OF ASSOCIATING THIS IDENTITY WITH ALL AUDITABLE
|
|
ACTIONS TAKEN BY THAT INDIVIDUAL.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement for identification and authentication
|
|
of users is the same for a network system as for an ADP sys-
|
|
tem. The identification and authentication may be done by
|
|
the component to which the user is directly connected or
|
|
some other component, such as an identification and authen-
|
|
tication server. Available techniques, such as those
|
|
described in the Password Guideline=, are generally also
|
|
applicable in the network context. However, in cases where
|
|
the NTCB is expected to mediate actions of a host (or other
|
|
network component) that is acting on behalf of a user or
|
|
group of users, the NTCB may employ identification and
|
|
authentication of the host (or other component) in lieu of
|
|
identification and authentication of an individual user, SO
|
|
LONG AS THE COMPONENT IDENTIFIER IMPLIES A LIST OF SPECIFIC
|
|
USERS UNIQUELY ASSOCIATED WITH THE IDENTIFIER AT THE TIME OF
|
|
ITS USE FOR AUTHENTICATION. THIS REQUIREMENT DOES NOT APPLY
|
|
TO INTERNAL SUBJECTS.
|
|
|
|
Authentication information, including the identity of a
|
|
user (once authenticated) may be passed from one component
|
|
to another without reauthentication, so long as the NTCB
|
|
protects (e.g., by encryption) the information from unau-
|
|
thorized disclosure and modification. This protection shall
|
|
provide at least a similar level of assurance (or strength
|
|
of mechanism) as pertains to the protection of the authenti-
|
|
cation mechanism and authentication data.
|
|
|
|
+ Rationale
|
|
|
|
The need for accountability is not changed in the con-
|
|
text of a network system. The fact that the NTCB is parti-
|
|
tioned over a set of components neither reduces the need nor
|
|
imposes new requirements. That is, individual accountabil-
|
|
ity is still the objective. ALSO, in the context of a net-
|
|
work system at the (C2) LEVEL OR HIGHER "INDIVIDUAL ACCOUN-
|
|
TABILITY" CAN BE SATISFIED BY IDENTIFICATION OF A HOST (OR
|
|
OTHER COMPONENT) SO LONG AS THE REQUIREMENT FOR TRACEABILITY
|
|
TO INDIVIDUAL USERS OR A SET OF SPECIFIC INDIVIDUAL USERS
|
|
WITH ACTIVE SUBJECTS IS SATISFIED. THERE IS ALLOWED TO BE AN
|
|
UNCERTAINTY IN TRACEABILITY BECAUSE OF ELAPSED TIME BETWEEN
|
|
CHANGES IN THE GROUP MEMBERSHIP AND THE ENFORCEMENT IN THE
|
|
ACCESS CONTROL MECHANISMS. In addition, there is no need in
|
|
a distributed processing system like a network to reauthen-
|
|
ticate a user at each point in the network where a projec-
|
|
tion of a user (via the subject operating on behalf of the
|
|
user) into another remote subject takes place.
|
|
_________________________
|
|
= Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, CSC-STD-002-85
|
|
____
|
|
|
|
The passing of identifiers and/or authentication infor-
|
|
mation from one component to another is usually done in sup-
|
|
port to the implementation of the discretionary access con-
|
|
trol (DAC). This support relates directly to the DAC
|
|
regarding access by a user to a storage object in a dif-
|
|
ferent NTCB partition than the one where the user was
|
|
authenticated. Employing a forwarded identification implies
|
|
additional reliance on the source and components along the
|
|
path.
|
|
|
|
|
|
2.2.2.2 Audit
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL BE ABLE TO CREATE, MAINTAIN, AND PROTECT FROM
|
|
MODIFICATION OR UNAUTHORIZED ACCESS OR DESTRUCTION AN AUDIT
|
|
TRAIL OF ACCESSES TO THE OBJECTS IT PROTECTS. THE AUDIT
|
|
DATA SHALL BE PROTECTED BY THE TCB SO THAT READ ACCESS TO IT
|
|
IS LIMITED TO THOSE WHO ARE AUTHORIZED FOR AUDIT DATA. THE
|
|
TCB SHALL BE ABLE TO RECORD THE FOLLOWING TYPES OF EVENTS:
|
|
USE OF IDENTIFICATION AND AUTHENTICATION MECHANISMS, INTRO-
|
|
DUCTION OF OBJECTS INTO A USER'S ADDRESS SPACE (E.G., FILE
|
|
OPEN, PROGRAM INITIATION), DELETION OF OBJECTS, ACTIONS
|
|
TAKEN BY COMPUTER OPERATORS AND SYSTEM ADMINISTRATORS AND/OR
|
|
SYSTEM SECURITY OFFICERS, AND OTHER SECURITY RELEVANT
|
|
EVENTS. FOR EACH RECORDED EVENT, THE AUDIT RECORD SHALL
|
|
IDENTIFY: DATE AND TIME OF THE EVENT, USER, TYPE OF EVENT,
|
|
AND SUCCESS OR FAILURE OF THE EVENT. FOR
|
|
IDENTIFICATION/AUTHENTICATION EVENTS THE ORIGIN OF REQUEST
|
|
(E.G., TERMINAL ID) SHALL BE INCLUDED IN THE AUDIT RECORD.
|
|
FOR EVENTS THAT INTRODUCE AN OBJECT INTO A USER'S ADDRESS
|
|
SPACE AND FOR OBJECT DELETION EVENTS THE AUDIT RECORD SHALL
|
|
INCLUDE THE NAME OF THE OBJECT. THE ADP SYSTEM ADMINISTRA-
|
|
TOR SHALL BE ABLE TO SELECTIVELY AUDIT THE ACTIONS OF ANY
|
|
ONE OR MORE USERS BASED ON INDIVIDUAL IDENTITY.
|
|
|
|
+ Interpretation
|
|
|
|
THIS CRITERION APPLIES AS STATED. THE SPONSOR MUST
|
|
SELECT WHICH EVENTS ARE AUDITABLE. IF ANY SUCH EVENTS ARE
|
|
NOT DISTINGUISHABLE BY THE NTCB ALONE (FOR EXAMPLE THOSE
|
|
IDENTIFIED IN PART II), THE AUDIT MECHANISM SHALL PROVIDE AN
|
|
INTERFACE, WHICH AN AUTHORIZED SUBJECT CAN INVOKE WITH
|
|
PARAMETERS SUFFICIENT TO PRODUCE AN AUDIT RECORD. THESE
|
|
AUDIT RECORDS SHALL BE DISTINGUISHABLE FROM THOSE PROVIDED
|
|
BY THE NTCB. IN THE CONTEXT OF A NETWORK SYSTEM, "OTHER
|
|
SECURITY RELEVANT EVENTS" (DEPENDING ON NETWORK SYSTEM
|
|
ARCHITECTURE AND NETWORK SECURITY POLICY) MIGHT BE AS FOL-
|
|
LOWS:
|
|
|
|
1. IDENTIFICATION OF EACH ACCESS EVENT (E.G., ESTAB-
|
|
LISHING A CONNECTION OR A CONNECTIONLESS ASSOCIATION
|
|
BETWEEN PROCESSES IN TWO HOSTS OF THE NETWORK) AND
|
|
ITS PRINCIPAL PARAMETERS (E.G., HOST IDENTIFIERS OF
|
|
THE TWO HOSTS INVOLVED IN THE ACCESS EVENT AND USER
|
|
IDENTIFIER OR HOST IDENTIFIER OF THE USER OR HOST
|
|
THAT IS REQUESTING THE ACCESS EVENT)
|
|
|
|
2. IDENTIFICATION OF THE STARTING AND ENDING TIMES OF
|
|
EACH ACCESS EVENT USING LOCAL TIME OR GLOBAL SYN-
|
|
CHRONIZED TIME
|
|
|
|
3. IDENTIFICATION OF SECURITY-RELEVANT EXCEPTIONAL CON-
|
|
DITIONS (E.G., POTENTIAL VIOLATION OF DATA
|
|
INTEGRITY, SUCH AS MISROUTED DATAGRAMS) DETECTED
|
|
DURING THE TRANSACTIONS BETWEEN TWO HOSTS
|
|
|
|
4. UTILIZATION OF CRYPTOGRAPHIC VARIABLES
|
|
|
|
5. CHANGING THE CONFIGURATION OF THE NETWORK (E.G., A
|
|
COMPONENT LEAVING THE NETWORK AND REJOINING)
|
|
|
|
IN ADDITION, IDENTIFICATION INFORMATION SHOULD BE
|
|
INCLUDED IN APPROPRIATE AUDIT TRAIL RECORDS, AS NECESSARY,
|
|
TO ALLOW ASSOCIATION OF ALL RELATED (E.G., INVOLVING THE
|
|
SAME NETWORK EVENT) AUDIT TRAIL RECORDS (E.G., AT DIFFERENT
|
|
HOSTS) WITH EACH OTHER. FURTHERMORE, A COMPONENT OF THE
|
|
NETWORK SYSTEM MAY PROVIDE THE REQUIRED AUDIT CAPABILITY
|
|
(E.G., STORAGE, RETRIEVAL, REDUCTION, ANALYSIS) FOR OTHER
|
|
COMPONENTS THAT DO NOT INTERNALLY STORE AUDIT DATA BUT
|
|
TRANSMIT THE AUDIT DATA TO SOME DESIGNATED COLLECTION COM-
|
|
PONENT. PROVISIONS SHALL BE MADE TO CONTROL THE LOSS OF
|
|
AUDIT DATA DUE TO UNAVAILABILITY OF RESOURCES.
|
|
|
|
IN THE CONTEXT OF A NETWORK SYSTEM, THE "USER'S ADDRESS
|
|
SPACE" IS EXTENDED, FOR OBJECT INTRODUCTION AND DELETION
|
|
EVENTS, TO INCLUDE ADDRESS SPACES BEING EMPLOYED ON BEHALF
|
|
OF A REMOTE USER (OR HOST). HOWEVER, THE FOCUS REMAINS ON
|
|
USERS IN CONTRAST TO INTERNAL SUBJECTS AS DISCUSSED IN THE
|
|
DAC CRITERION. IN ADDITION, AUDIT INFORMATION MUST BE
|
|
STORED IN MACHINE-READABLE FORM.
|
|
|
|
+ Rationale
|
|
|
|
FOR REMOTE USERS, THE NETWORK IDENTIFIERS (E.G., INTER-
|
|
NET ADDRESS) CAN BE USED AS IDENTIFIERS OF GROUPS OF INDIVI-
|
|
DUAL USERS (E.G., "ALL USERS AT HOST A") TO ELIMINATE THE
|
|
MAINTENANCE THAT WOULD BE REQUIRED IF INDIVIDUAL IDENTIFICA-
|
|
TION OF REMOTE USERS WAS EMPLOYED. IN THIS CLASS (C2), HOW-
|
|
EVER, IT MUST BE POSSIBLE TO IDENTIFY (IMMEDIATELY OR AT
|
|
SOME LATER TIME) THE INDIVIDUALS REPRESENTED BY A GROUP
|
|
IDENTIFIER. IN ALL OTHER RESPECTS, THE INTERPRETATION IS A
|
|
STRAIGHTFORWARD EXTENSION OF THE CRITERION INTO THE CONTEXT
|
|
OF A NETWORK SYSTEM.
|
|
|
|
|
|
2.2.3 Assurance
|
|
_ _ _ _________
|
|
|
|
|
|
2.2.3.1 Operational Assurance
|
|
|
|
|
|
2.2.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall maintain a domain for its own execution that
|
|
protects it from external interference or tampering (e.g.,
|
|
by modification of its code or data structures). Resources
|
|
controlled by the TCB may be a defined subset of the sub-
|
|
jects and objects in the ADP system. THE TCB SHALL ISOLATE
|
|
THE RESOURCES TO BE PROTECTED SO THAT THEY ARE SUBJECT TO
|
|
THE ACCESS CONTROL AND AUDITING REQUIREMENTS.
|
|
|
|
+ Interpretation
|
|
|
|
The system architecture criterion must be met individu-
|
|
ally by all NTCB partitions. Implementation of the require-
|
|
ment that the NTCB maintain a domain for its own execution
|
|
is achieved by having each NTCB partition maintain a domain
|
|
for its own execution.
|
|
|
|
The subset of network resources over which the NTCB has
|
|
control are the union of the sets of resources over which
|
|
the NTCB partitions have control. Code and data structures
|
|
belonging to the NTCB, transferred among NTCB subjects
|
|
(i.e., subjects outside the reference monitor but inside the
|
|
NTCB) belonging to different NTCB partitions, must be pro-
|
|
tected against external interference or tampering. For
|
|
example, a cryptographic checksum or physical means may be
|
|
employed to protect user authentication data exchanged
|
|
between NTCB partitions.
|
|
|
|
EACH NTCB PARTITION PROVIDES ISOLATION OF RESOURCES
|
|
(WITHIN ITS COMPONENT) TO BE PROTECTED IN ACCORD WITH THE
|
|
NETWORK SYSTEM ARCHITECTURE AND SECURITY POLICY.
|
|
|
|
+ Rationale
|
|
|
|
|
|
The requirement for the protection of communications
|
|
between NTCB partitions is specifically directed to subjects
|
|
that are part of the NTCB partitions. Any requirements for
|
|
such protection for the subjects that are outside the NTCB
|
|
partitions are addressed in response to the integrity
|
|
requirements of the security policy.
|
|
|
|
ISOLATION OF THE RESOURCES TO BE PROTECTED PROVIDES
|
|
ADDITIONAL PROTECTION, COMPARED TO CLASS (C1), THAT MECHAN-
|
|
ISMS THAT DEPEND ON THE RESOURCE (E.G., DAC AND USER IDEN-
|
|
TIFICATION) WILL OPERATE CORRECTLY.
|
|
|
|
2.2.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Hardware and/or software features shall be provided that can
|
|
be used to periodically validate the correct operation of
|
|
the on-site hardware and firmware elements of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Implementation of the requirement is partly achieved by
|
|
having hardware and/or software features that can be used to
|
|
periodically validate the correct operation of the hardware
|
|
and firmware elements of each component's NTCB partition.
|
|
Features shall also be provided to validate the identity and
|
|
correct operation of a component prior to its incorporation
|
|
in the network system and throughout system operation. For
|
|
example, a protocol could be designed that enables the com-
|
|
ponents of the partitioned NTCB to exchange messages period-
|
|
ically and validate each other's correct response. The pro-
|
|
tocol shall be able to determine the remote entity's ability
|
|
to respond. NTCB partitions shall provide the capability to
|
|
report to network administrative personnel the failures
|
|
detected in other NTCB partitions.
|
|
|
|
Intercomponent protocols implemented within a NTCB
|
|
shall be designed in such a way as to provide correct opera-
|
|
tion in the case of failures of network communications or
|
|
individual components. The allocation of discretionary
|
|
access control policy in a network may require communication
|
|
between trusted subjects that are part of the NTCB parti-
|
|
tions in different components. This communication is nor-
|
|
mally implemented with a protocol between the subjects as
|
|
peer entities. Incorrect access within a component shall
|
|
not result from failure of an NTCB partition to communicate
|
|
with other components.
|
|
|
|
+ Rationale
|
|
|
|
The first paragraph of the interpretation is a
|
|
straightforward extension of the requirement into the con-
|
|
text of a network system and partitioned NTCB as defined for
|
|
these network criteria.
|
|
|
|
NTCB protocols should be robust enough so that they
|
|
permit the system to operate correctly in the case of local-
|
|
ized failure. The purpose of this protection is to preserve
|
|
the integrity of the NTCB itself. It is not unusual for one
|
|
or more components in a network to be inoperative at any
|
|
time, so it is important to minimize the effects of such
|
|
failures on the rest of the network. Additional integrity
|
|
and denial of service issues are addressed in Part II.
|
|
|
|
2.2.3.2 Life-Cycle Assurance
|
|
|
|
|
|
2.2.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The security mechanisms of the ADP system shall be tested
|
|
and found to work as claimed in the system documentation.
|
|
Testing shall be done to assure that there are no obvious
|
|
ways for an unauthorized user to bypass or otherwise defeat
|
|
the security protection mechanisms of the TCB. TESTING SHALL
|
|
ALSO INCLUDE A SEARCH FOR OBVIOUS FLAWS THAT WOULD ALLOW
|
|
VIOLATION OF RESOURCE ISOLATION, OR THAT WOULD PERMIT UNAU-
|
|
THORIZED ACCESS TO THE AUDIT OR AUTHENTICATION DATA. (See
|
|
the Security Testing Guidelines.)
|
|
|
|
+ Interpretation
|
|
|
|
Testing of a component will require a testbed that
|
|
exercises the interfaces and protocols of the COMPONENT
|
|
INCLUDING TESTS UNDER EXCEPTIONAL CONDITIONS. The testing
|
|
of a security mechanism of the network system for meeting
|
|
this criterion shall be an integrated testing procedure
|
|
involving all components containing an NTCB partition that
|
|
implement the given mechanism. This integrated testing is
|
|
additional to any individual component tests involved in the
|
|
evaluation of the network system. The sponsor should iden-
|
|
tify the allowable set of configurations including the sizes
|
|
of the networks. Analysis or testing procedures and tools
|
|
shall be available to test the limits of these configura-
|
|
tions. A change in configuration within the allowable set
|
|
of configurations does not require retesting.
|
|
|
|
+ Rationale
|
|
|
|
Testing is the primary method available in this evalua-
|
|
tion division to gain any assurance that the security
|
|
mechanisms perform their intended function.
|
|
|
|
|
|
2.2.4 Documentation
|
|
_ _ _ _____________
|
|
|
|
|
|
2.2.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A single summary, chapter, or manual in user documentation
|
|
shall describe the protection mechanisms provided by the
|
|
TCB, interpretations on their use, and how they interact
|
|
with one another.
|
|
|
|
+ Interpretation
|
|
|
|
This user documentation describes user visible protec-
|
|
tion mechanisms at the global (network system) level and at
|
|
the user interface of each component, and the interaction
|
|
among these.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system as defined for these
|
|
network criteria. Documentation of protection mechanisms
|
|
provided by individual components is required by the cri-
|
|
teria for trusted computer systems that are applied as
|
|
appropriate for the individual components.
|
|
|
|
|
|
2.2.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A manual addressed to the ADP system administrator shall
|
|
present cautions about functions and privileges that should
|
|
be controlled when running a secure facility. THE PROCEDURES
|
|
FOR EXAMINING AND MAINTAINING THE AUDIT FILES AS WELL AS THE
|
|
DETAILED AUDIT RECORD STRUCTURE FOR EACH TYPE OF AUDIT EVENT
|
|
SHALL BE GIVEN.
|
|
|
|
+ Interpretation
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator(s) maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address the following:
|
|
|
|
1. The hardware configuration of the network itself;
|
|
|
|
2. The implications of attaching new components to the
|
|
network;
|
|
|
|
3. The case where certain components may periodically
|
|
leave the network (e.g., by crashing, or by being
|
|
disconnected) and then rejoin;
|
|
|
|
4. Network configuration aspects that can impact the
|
|
security of the network system; (For example, the
|
|
manual should describe for the network system
|
|
administrator the interconnections among components
|
|
that are consistent with the overall network system
|
|
architecture.)
|
|
|
|
5. Loading or modifying NTCB software or firmware
|
|
(e.g., down-line loading).
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
+ Rationale
|
|
|
|
There may be multiple system administrators with
|
|
diverse responsibilities. The technical security measures
|
|
described by these criteria must be used in conjunction with
|
|
other forms of security in order to achieve security of the
|
|
network. Additional forms include administrative security,
|
|
physical security, emanations security, etc.
|
|
|
|
Extension of this criterion to cover configuration
|
|
aspects of the network is needed because, for example,
|
|
proper interconnection of components is typically essential
|
|
to achieve a correct realization of the network architec-
|
|
ture.
|
|
|
|
Cryptography is one common mechanism employed to pro-
|
|
tect communication circuits. Encryption transforms the
|
|
representation of information so that it is unintelligible
|
|
to unauthorized subjects. Reflecting this transformation,
|
|
the sensitivity of the ciphertext is generally lower than
|
|
the cleartext. If encryption methodologies are employed,
|
|
they shall be approved by the National Security Agency
|
|
(NSA).
|
|
|
|
The encryption algorithm and its implementation are
|
|
outside the scope of these interpretations. This algorithm
|
|
and implementation may be implemented in a separate device
|
|
or may be a function of a subject in a component not dedi-
|
|
cated to encryption. Without prejudice, either implementa-
|
|
tion packaging is referred to as an encryption mechanism
|
|
herein.
|
|
|
|
|
|
2.2.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall provide to the evaluators a docu-
|
|
ment that describes the test plan, test procedures that show
|
|
how the security mechanisms were tested, and results of the
|
|
security mechanisms' functional testing.
|
|
|
|
+ Interpretation
|
|
|
|
The "system developer" is interpreted as "the network
|
|
system sponsor". The description of the test plan should
|
|
establish the context in which the testing was or should be
|
|
conducted. The description should identify any additional
|
|
test components that are not part of the system being
|
|
evaluated. This includes a description of the test-relevant
|
|
functions of such test components and a description of the
|
|
interfacing of those test components to the system being
|
|
evaluated. The description of the test plan should also
|
|
demonstrate that the tests adequately cover the network
|
|
security policy. The tests should include the features
|
|
described in the System Architecture and the System
|
|
Integrity sections. The tests should also include network
|
|
configuration and sizing.
|
|
|
|
+ Rationale
|
|
|
|
The entity being evaluated may be a networking subsys-
|
|
tem (see Appendix A) to which other components must be added
|
|
to make a complete network system. In that case, this
|
|
interpretation is extended to include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
|
|
2.2.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Documentation shall be available that provides a description
|
|
of the manufacturer's philosophy of protection and an expla-
|
|
nation of how this philosophy is translated into the TCB. If
|
|
the TCB is composed of distinct modules, the interfaces
|
|
between these modules shall be described.
|
|
|
|
+ Interpretation
|
|
|
|
Explanation of how the sponsor's philosophy of protec-
|
|
tion is translated into the NTCB shall include a description
|
|
of how the NTCB is partitioned. The security policy also
|
|
shall be stated. The description of the interfaces between
|
|
the NTCB modules shall include the interface(s) between NTCB
|
|
partitions and modules within the partitions if the modules
|
|
exist. The sponsor shall describe the security architecture
|
|
and design, including the allocation of security require-
|
|
ments among components. Appendix A addresses component
|
|
evaluation issues.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system as
|
|
defined for this network interpretation. Other documenta-
|
|
tion, such as description of components and description of
|
|
operating environment(s) in which the networking subsystem
|
|
or network system is designed to function, is required else-
|
|
where, e.g., in the Trusted Facility Manual.
|
|
|
|
In order to be evaluated, a network must possess a
|
|
coherent Network Security Architecture and Design. (Inter-
|
|
connection of components that do not adhere to such a single
|
|
coherent Network Security Architecture is addressed in the
|
|
Interconnection of Accredited AIS, Appendix C.) The Network
|
|
Security Architecture must address the security-relevant
|
|
policies, objectives, and protocols. The Network Security
|
|
Design specifies the interfaces and services that must be
|
|
incorporated into the network so that it can be evaluated as
|
|
a trusted entity. There may be multiple designs that con-
|
|
form to the same architecture but are more or less incompa-
|
|
tible and non-interoperable (except through the Interconnec-
|
|
tion Rules). Security related mechanisms requiring coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms having no visible
|
|
interfaces are not specified in this document but are left
|
|
as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network security Architecture and
|
|
Design are satisfied. That is, the components can be assem-
|
|
bled into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization that is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and unambi-
|
|
guously define the security functionality of components as
|
|
well as the interfaces between or among components. The
|
|
Network Security Architecture and Design must be evaluated
|
|
to determine that a network constructed to its specifica-
|
|
tions will in fact be trusted, that is, it will be evaluat-
|
|
able under these interpretations.
|
|
|
|
3.0 DIVISION B: MANDATORY PROTECTION
|
|
|
|
|
|
The notion of an NTCB that preserves the integrity of sensi-
|
|
tivity labels and uses them to enforce a set of mandatory
|
|
access control rules is a major requirement in this divi-
|
|
sion. Network systems in this division must carry the sen-
|
|
sitivity labels with major data structures in the system.
|
|
The network system sponsor also provides the security policy
|
|
model on which the NTCB is based and furnishes a specifica-
|
|
tion of the NTCB. Evidence must be provided to demonstrate
|
|
that the reference monitor concept has been implemented.
|
|
|
|
|
|
3.1 CLASS (B1): LABELED SECURITY PROTECTION
|
|
_ _ _____ __ _______ ________ __________
|
|
|
|
|
|
CLASS (B1) NETWORK SYSTEMS REQUIRE ALL THE
|
|
FEATURES REQUIRED FOR CLASS (C2). IN ADDITION, AN
|
|
INFORMAL STATEMENT OF THE SECURITY POLICY MODEL,
|
|
DATA LABELING, AND MANDATORY ACCESS CONTROL OVER
|
|
SUBJECTS AND STORAGE OBJECTS MUST BE PRESENT. THE
|
|
CAPABILITY MUST EXIST FOR ACCURATELY LABELING
|
|
EXPORTED INFORMATION. ANY FLAWS IDENTIFIED BY
|
|
TESTING MUST BE REMOVED. THE FOLLOWING ARE
|
|
MINIMAL REQUIREMENTS FOR NETWORK SYSTEMS ASSIGNED
|
|
A CLASS (B1) RATING:
|
|
|
|
|
|
3.1.1 Security Policy
|
|
_ _ _ ________ ______
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The network sponsor shall describe the overall network
|
|
security policy enforced by the NTCB. At a minimum, this
|
|
policy shall include the discretionary AND MANDATORY
|
|
requirements applicable to this class. The policy may
|
|
require data secrecy, or data integrity, or both. THE POL-
|
|
ICY IS AN ACCESS CONTROL POLICY HAVING TWO PRIMARY COM-
|
|
PONENTS: MANDATORY AND DISCRETIONARY. The policy shall
|
|
include a discretionary policy for protecting the informa-
|
|
tion being processed based on the authorizations of indivi-
|
|
duals, users, or groups of users. This access control pol-
|
|
icy statement shall describe the requirements on the network
|
|
to prevent or detect "reading or destroying" sensitive
|
|
information by unauthorized users or errors. THE MANDATORY
|
|
POLICY MUST DEFINE THE SET OF DISTINCT SENSITIVITY LEVELS
|
|
THAT IT SUPPORTS. FOR THE CLASS B1 OR ABOVE THE MANDATORY
|
|
POLICY SHALL BE BASED ON THE LABELS ASSOCIATED WITH THE
|
|
INFORMATION THAT REFLECTS ITS SENSITIVITY WITH RESPECT TO
|
|
SECRECY AND/OR INTEGRITY, WHERE APPLICABLE, AND LABELS ASSO-
|
|
CIATED WITH USERS TO REFLECT THEIR AUTHORIZATION TO ACCESS
|
|
SUCH INFORMATION. UNAUTHORIZED USERS INCLUDE BOTH THOSE
|
|
that are not authorized to use the network at all (e.g., a
|
|
user attempting to use a passive or active wire tap) or a
|
|
legitimate user of the network who is not authorized to
|
|
access a specific piece of information being protected.
|
|
|
|
Note that "users" does not include "operators," "system
|
|
programmers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network sys-
|
|
tem, for example, by defining membership of a group. These
|
|
individuals may also have the separate role of users.
|
|
|
|
|
|
SECRECY POLICY: The network sponsor shall define the
|
|
form of the discretionary AND MANDATORY secrecy
|
|
policy that is enforced in the network to prevent
|
|
unauthorized users from reading the sensitive infor-
|
|
mation entrusted to the network.
|
|
|
|
|
|
DATA INTEGRITY POLICY: The network sponsor shall
|
|
define the discretionary AND MANDATORY integrity
|
|
policy to prevent unauthorized users from modifying,
|
|
viz., writing, sensitive information. The defini-
|
|
tion of data integrity presented by the network
|
|
sponsor refers to the requirement that the informa-
|
|
tion has not been subjected to unauthorized modifi-
|
|
cation in the network. THE MANDATORY INTEGRITY POL-
|
|
ICY ENFORCED BY THE NTCB CANNOT, IN GENERAL, PREVENT
|
|
MODIFICATION WHILE INFORMATION IS BEING TRANSMITTED
|
|
BETWEEN COMPONENTS. HOWEVER, AN INTEGRITY SENSI-
|
|
TIVITY LABEL MAY REFLECT THE CONFIDENCE THAT THE
|
|
INFORMATION HAS NOT BEEN SUBJECTED TO TRANSMISSION
|
|
ERRORS BECAUSE OF THE PROTECTION AFFORDED DURING
|
|
TRANSMISSION. THIS REQUIREMENT IS DISTINCT FROM THE
|
|
REQUIREMENT FOR LABEL INTEGRITY.
|
|
|
|
+ Rationale
|
|
|
|
The word "sponsor" is used in place of alternatives
|
|
(such as "vendor," "architect," "manufacturer," and
|
|
"developer") because the alternatives indicate people who
|
|
may not be available, involved, or relevant at the time that
|
|
a network system is proposed for evaluation.
|
|
|
|
A trusted network is able to control both the reading
|
|
and writing of shared sensitive information. Control of
|
|
writing is used to protect against destruction of informa-
|
|
tion. A network normally is expected to have policy require-
|
|
ments to protect both the secrecy and integrity of the
|
|
information entrusted to it. In a network the integrity is
|
|
frequently as important or more important than the secrecy
|
|
requirements. Therefore the secrecy and/or integrity policy
|
|
to be enforced by the network must be stated for each net-
|
|
work regardless of its evaluation class. The assurance that
|
|
the policy is faithfully enforced is reflected in the
|
|
evaluation class of the network.
|
|
|
|
This control over modification is typically used to
|
|
protect information so that it may be relied upon and to
|
|
control the potential harm that would result if the informa-
|
|
tion were corrupted. The overall network policy require-
|
|
ments for integrity includes the protection for data both
|
|
while being processed in a component and while being
|
|
transmitted in the network. The access control policy
|
|
enforced by the NTCB relates to the access of subjects to
|
|
objects within each component. Communications integrity
|
|
addressed within Part II relates to information while being
|
|
transmitted.
|
|
|
|
THE MANDATORY INTEGRITY POLICY (AT CLASS B1 AND ABOVE)
|
|
IN SOME ARCHITECTURES MAY BE USEFUL IN SUPPORTING THE LINK-
|
|
AGE BETWEEN THE CONNECTION ORIENTED ABSTRACTION INTRODUCED
|
|
IN THE INTRODUCTION AND THE INDIVIDUAL COMPONENTS OF THE
|
|
NETWORK. FOR EXAMPLE, IN A KEY DISTRIBUTION CENTER FOR
|
|
END-TO-END ENCRYPTION, A DISTINCT INTEGRITY CATEGORY MAY BE
|
|
ASSIGNED TO ISOLATE THE KEY GENERATION CODE AND DATA FROM
|
|
POSSIBLE MODIFICATION BY OTHER SUPPORTING PROCESSES IN THE
|
|
SAME COMPONENT, SUCH AS OPERATOR INTERFACES AND AUDIT.
|
|
|
|
THE MANDATORY INTEGRITY POLICY FOR SOME ARCHITECTURE
|
|
MAY DEFINE AN INTEGRITY SENSITIVITY LABEL THAT REFLECTS THE
|
|
SPECIFIC REQUIREMENTS FOR ENSURING THAT INFORMATION HAS NOT
|
|
BEEN SUBJECT TO RANDOM ERRORS IN EXCESS OF A STATED LIMIT
|
|
NOR TO UNAUTHORIZED MESSAGE STREAM MODIFICATION (MSM) -.
|
|
THE SPECIFIC METRIC ASSOCIATED WITH AN INTEGRITY SENSITIVITY
|
|
LABEL WILL GENERALLY REFLECT THE INTENDED APPLICATIONS OF
|
|
THE NETWORK.
|
|
|
|
|
|
3.1.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall define and control access between named users
|
|
and named objects (e.g., files and programs) in the ADP sys-
|
|
tem. The enforcement mechanism (e.g., self/group/public
|
|
controls, access control lists) shall allow users to specify
|
|
and control sharing of those objects by named individuals or
|
|
defined groups of individuals, or both, and shall provide
|
|
controls to limit propagation of access rights. The discre-
|
|
tionary access control mechanism shall, either by explicit
|
|
user action or by default, provide that objects are pro-
|
|
tected from unauthorized access. These access controls
|
|
shall be capable of including or excluding access to the
|
|
granularity of a single user. Access permission to an
|
|
object by users not already possessing access permission
|
|
shall only be assigned by authorized users.
|
|
_________________________
|
|
- See Voydock, Victor L. and Stephen T. Kent, "Secu-
|
|
rity Mechanisms in High-Level Network Protocols," Com-
|
|
___
|
|
puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
|
|
______ _______
|
|
|
|
+ Interpretation
|
|
|
|
The discretionary access control (DAC) mechanism(s) may
|
|
be distributed over the partitioned NTCB in various ways.
|
|
Some part, all, or none of the DAC may be implemented in a
|
|
given component of the network system. In particular, com-
|
|
ponents that support only internal subjects (i.e., that have
|
|
no subjects acting as direct surrogates for users), such as
|
|
a public network packet switch, might not implement the DAC
|
|
mechanism(s) directly (e.g., they are unlikely to contain
|
|
access control lists).
|
|
|
|
Identification of users by groups may be achieved in
|
|
various ways in the networking environment. For example,
|
|
the network identifiers (e.g., internet addresses) for vari-
|
|
ous components (e.g., hosts, gateways) can be used as iden-
|
|
tifiers of groups of individual users (e.g., "all users at
|
|
Host A," "all users of network Q") so long as the individu-
|
|
als involved in the group are implied by the group identif-
|
|
ier. For example, Host A might employ a particular group-id,
|
|
for which it maintains a list of explicit users in that
|
|
group, in its network exchange with Host B, which accepts
|
|
the group-id under the conditions of this interpretation.
|
|
|
|
For networks, individual hosts will impose need-to-know
|
|
controls over their users on the basis of named individuals
|
|
- much like (in fact, probably the same) controls used when
|
|
there is no network connection.
|
|
|
|
When group identifiers are acceptable for access con-
|
|
trol, the identifier of some other host may be employed, to
|
|
eliminate the maintenance that would be required if indivi-
|
|
dual identification of remote users was employed. In class
|
|
C2 and higher, however, it must be possible from that audit
|
|
record to identify (immediately or at some later time)
|
|
exactly the individuals represented by a group identifier at
|
|
the time of the use of that identifier. There is allowed to
|
|
be an uncertainty because of elapsed time between changes in
|
|
the group membership and the enforcement in the access con-
|
|
trol mechanisms.
|
|
|
|
The DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. The reference monitor manages
|
|
all the physical resources of the system and from them
|
|
creates the abstraction of subjects and objects that it con-
|
|
trols. Some of these subjects and objects may be used to
|
|
implement a part of the NTCB. When the DAC mechanism is
|
|
distributed in such NTCB subjects (i.e., when outside the
|
|
reference monitor), the assurance requirements (see the
|
|
Assurance section) for the design and implementation of the
|
|
DAC shall be those of class C2 for all networks of class C2
|
|
or above.
|
|
|
|
When integrity is included as part of the network dis-
|
|
cretionary security policy, the above interpretations shall
|
|
be specifically applied to the controls over modification,
|
|
viz, the write mode of access, within each component based
|
|
on identified users or groups of users.
|
|
|
|
+ Rationale
|
|
|
|
In this class, the supporting elements of the overall
|
|
DAC mechanism are required to isolate information (objects)
|
|
that supports DAC so that it is subject to auditing require-
|
|
ments (see the System Architecture section). The use of
|
|
network identifiers to identify groups of individual users
|
|
could be implemented, for example, as an X.25 community of
|
|
interest in the network protocol layer (layer 3). In all
|
|
other respects, the supporting elements of the overall DAC
|
|
mechanism are treated exactly as untrusted subjects are
|
|
treated with respect to DAC in an ADP system, with the same
|
|
result as noted in the interpretation.
|
|
|
|
A typical situation for DAC is that a surrogate process
|
|
for a remote user will be created in some host for access to
|
|
objects under the control of the NTCB partition within that
|
|
host. The interpretation requires that a user identifier be
|
|
assigned and maintained for each such process by the NTCB,
|
|
so that access by a surrogate process is subject to essen-
|
|
tially the same discretionary controls as access by a pro-
|
|
cess acting on behalf of a local user would be. However,
|
|
within this interpretation a range of possible interpreta-
|
|
tions of the assigned user identification is permitted.
|
|
|
|
The most obvious situation would exist if a global
|
|
database of network users were to be made permanently avail-
|
|
able on demand to every host, (i.e., a name server existed)
|
|
so that all user identifications were globally meaningful.
|
|
|
|
It is also acceptable, however, for some NTCB parti-
|
|
tions to maintain a database of locally-registered users for
|
|
its own use. In such a case, one could choose to inhibit
|
|
the creation of surrogate processes for locally unregistered
|
|
users, or (if permitted by the local policy) alternatively,
|
|
to permit the creation of surrogate processes with
|
|
preselected user and group identifiers which, in effect,
|
|
identify the process as executing on behalf of a member of a
|
|
group of users on a particular remote host. The intent of
|
|
the words concerning audit in the interpretation is to pro-
|
|
vide a minimally acceptable degree of auditability for cases
|
|
such as the last described. What is required is that there
|
|
be a capability, using the audit facilities provided by the
|
|
network NTCB partitions involved, to determine who was
|
|
logged in at the actual host of the group of remote users at
|
|
the time the surrogate processing occured.
|
|
|
|
Associating the proper user id with a surrogate process
|
|
is the job of identification and authentication. This means
|
|
that DAC is applied locally, with respect to the user id of
|
|
the surrogate process. The transmission of the data back
|
|
across the network to the user's host, and the creation of a
|
|
copy of the data there, is not the business of DAC.
|
|
|
|
Components that support only internal subjects impact
|
|
the implementation of the DAC by providing services by which
|
|
information (e.g., a user-id) is made available to a com-
|
|
ponent that makes a DAC decision. An example of the latter
|
|
would be the case that a user at Host A attempts to access a
|
|
file at Host B. The DAC decision might be (and usually
|
|
would be) made at Host B on the basis of a user-id transmit-
|
|
ted from Host A to Host B.
|
|
|
|
Unique user identification may be achieved by a variety
|
|
of mechanisms, including (a) a requirement for unique iden-
|
|
tification and authentication on the host where access takes
|
|
place; (b) recognition of fully qualified network
|
|
addresses authenticated by another host and forwarded to the
|
|
host where access takes place; or (c) administrative support
|
|
of a network-wide unique personnel identifier that could be
|
|
authenticated and forwarded by another host as in (b) above,
|
|
or could be authenticated and forwarded by a dedicated net-
|
|
work identification and authentication server. The proto-
|
|
cols which implement (b) or (c) are subject to the System
|
|
Architecture requirements.
|
|
|
|
Network support for DAC might be handled in other ways
|
|
than that described as "typical" above. In particular, some
|
|
form of centralized access control is often proposed. An
|
|
access control center may make all decisions for DAC, or it
|
|
may share the burden with the hosts by controlling host-to-
|
|
host connections, and leaving the hosts to decide on access
|
|
to their objects by users at a limited set of remote hosts.
|
|
In this case the access control center provides the linkage
|
|
between the connection oriented abstraction (as discussed in
|
|
the Introduction) and the overall network security policy
|
|
for DAC. In all cases the enforcement of the decision must
|
|
be provided by the host where the object resides.
|
|
|
|
THERE ARE TWO FORMS OF DISTRIBUTION FOR THE DAC MECHAN-
|
|
ISM: IMPLEMENTING PORTIONS OF THE DAC IN SEPARATE COM-
|
|
PONENTS, AND SUPPORTING THE DAC IN SUBJECTS CONTAINED WITHIN
|
|
THE NTCB PARTITION IN A COMPONENT. SINCE "THE ADP SYSTEM"
|
|
IS UNDERSTOOD TO BE "THE COMPUTER NETWORK" AS A WHOLE, EACH
|
|
NETWORK COMPONENT IS RESPONSIBLE FOR ENFORCING SECURITY IN
|
|
THE MECHANISMS ALLOCATED TO IT TO ENSURE SECURE IMPLEMENTA-
|
|
TION OF THE NETWORK SECURITY POLICY. FOR TRADITIONAL HOST
|
|
SYSTEMS IT IS FREQUENTLY EASY TO ALSO ENFORCE THE DAC ALONG
|
|
WITH THE MAC WITHIN THE REFERENCE MONITOR, PER SE, ALTHOUGH
|
|
A FEW APPROACHES, SUCH AS VIRTUAL MACHINE MONITORS, SUPPORT
|
|
DAC OUTSIDE THIS INTERFACE.
|
|
|
|
IN CONTRAST TO THE UNIVERSALLY RIGID STRUCTURE OF MAN-
|
|
DATORY POLICIES (SEE THE MANDATORY ACCESS CONTROL SECTION),
|
|
DAC POLICIES TEND TO BE VERY NETWORK AND SYSTEM SPECIFIC,
|
|
WITH FEATURES THAT REFLECT THE NATURAL USE OF THE SYSTEM.
|
|
FOR NETWORKS IT IS COMMON THAT INDIVIDUAL HOSTS WILL IMPOSE
|
|
CONTROLS OVER THEIR LOCAL USERS ON THE BASIS OF NAMED
|
|
INDIVIDUALS-MUCH LIKE THE CONTROLS USED WHEN THERE IS NO
|
|
NETWORK CONNECTION. HOWEVER, IT IS DIFFICULT TO MANAGE IN A
|
|
CENTRALIZED MANNER ALL THE INDIVIDUALS USING A LARGE NET-
|
|
WORK. THEREFORE, USERS ON OTHER HOSTS ARE COMMONLY GROUPED
|
|
TOGETHER SO THAT THE CONTROLS REQUIRED BY THE NETWORK DAC
|
|
POLICY ARE ACTUALLY BASED ON THE IDENTITY OF THE HOSTS OR
|
|
OTHER COMPONENTS. A GATEWAY IS AN EXAMPLE OF SUCH A COM-
|
|
PONENT.
|
|
|
|
THE ASSURANCE REQUIREMENTS ARE AT THE VERY HEART OF THE
|
|
CONCEPT OF A TRUSTED SYSTEM. IT IS THE ASSURANCE THAT
|
|
DETERMINES IF A SYSTEM OR NETWORK IS APPROPRIATE FOR A GIVEN
|
|
ENVIRONMENT, AS REFLECTED, FOR EXAMPLE, IN THE ENVIRONMENTS
|
|
GUIDELINE-. IN THE CASE OF MONOLITHIC SYSTEMS THAT HAVE DAC
|
|
INTEGRAL TO THE REFERENCE MONITOR, THE ASSURANCE REQUIRE-
|
|
MENTS FOR DAC ARE INSEPARABLE FROM THOSE OF THE REST OF THE
|
|
REFERENCE MONITOR. FOR NETWORKS THERE IS TYPICALLY A MUCH
|
|
CLEARER DISTINCTION DUE TO DISTRIBUTED DAC. THE RATIONALE
|
|
FOR MAKING THE DISTINCTION IN THIS NETWORK INTERPRETATION IS
|
|
THAT IF MAJOR TRUSTED NETWORK COMPONENTS CAN BE MADE SIGNI-
|
|
FICANTLY EASIER TO DESIGN AND IMPLEMENT WITHOUT REDUCING THE
|
|
ABILITY TO MEET SECURITY POLICY, THEN TRUSTED NETWORKS WILL
|
|
BE MORE EASILY AVAILABLE.
|
|
|
|
|
|
3.1.1.2 Object Reuse
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
All authorizations to the information contained within a
|
|
storage object shall be revoked prior to initial assignment,
|
|
allocation or reallocation to a subject from the TCB's pool
|
|
of unused storage objects. No information, including
|
|
encrypted representations of information, produced by a
|
|
prior subject's actions is to be available to any subject
|
|
that obtains access to an object that has been released back
|
|
to the system.
|
|
|
|
+ Interpretation
|
|
|
|
The NTCB shall ensure that any storage objects that it
|
|
controls (e.g., message buffers under the control of a NTCB
|
|
partition in a component) contain no information for which a
|
|
subject in that component is not authorized before granting
|
|
access. This requirement must be enforced by each of the
|
|
NTCB partitions.
|
|
|
|
|
|
|
|
_________________________
|
|
- Guidance for Applying the Department of Defense
|
|
________ ___ ________ ___ __________ __ _______
|
|
Trusted Computer System Evaluation Criteria in Specific
|
|
_______ ________ ______ __________ ________ __ ________
|
|
Environments, CSC-STD-003-85.
|
|
____________
|
|
|
|
|
|
+ Rationale
|
|
|
|
In a network system, storage objects of interest are
|
|
things that the NTCB directly controls, such as message
|
|
buffers in components. Each component of the network system
|
|
must enforce the object reuse requirement with respect to
|
|
the storage objects of interest as determined by the network
|
|
security policy. For example, the DAC requirement in this
|
|
division leads to the requirement here that message buffers
|
|
be under the control of the NTCB partition. A buffer
|
|
assigned to an internal subject may be reused at the discre-
|
|
tion of that subject which is responsible for preserving the
|
|
integrity of message streams. Such controlled objects may
|
|
be implemented in physical resources, such as buffers, disk
|
|
sectors, tape space, and main memory, in components such as
|
|
network switches.
|
|
|
|
|
|
|
|
3.1.1.3 Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
SENSITIVITY LABELS ASSOCIATED WITH EACH SUBJECT AND STORAGE
|
|
OBJECT UNDER ITS CONTROL (E.G., PROCESS, FILE, SEGMENT, DEV-
|
|
ICE) SHALL BE MAINTAINED BY THE TCB. THESE LABELS SHALL BE
|
|
USED AS THE BASIS FOR MANDATORY ACCESS CONTROL DECISIONS.
|
|
IN ORDER TO IMPORT NON-LABELED DATA, THE TCB SHALL REQUEST
|
|
AND RECEIVE FROM AN AUTHORIZED USER THE SENSITIVITY LEVEL OF
|
|
THE DATA, AND ALL SUCH ACTIONS SHALL BE AUDITABLE BY THE
|
|
TCB.
|
|
|
|
+ Interpretation
|
|
|
|
NON-LABELED DATA IMPORTED UNDER THE CONTROL OF THE NTCB
|
|
PARTITION WILL BE ASSIGNED A LABEL CONSTRAINED BY THE
|
|
SINGLE-LEVEL DEVICE USED TO IMPORT IT. LABELS MAY INCLUDE
|
|
SECRECY AND INTEGRITY- COMPONENTS IN ACCORDANCE WITH THE
|
|
OVERALL NETWORK SECURITY POLICY DESCRIBED BY THE NETWORK
|
|
SPONSOR. WHENEVER THE TERM "LABEL" IS USED THROUGHOUT THIS
|
|
INTERPRETATION, IT IS UNDERSTOOD TO INCLUDE BOTH COMPONENTS
|
|
AS APPLICABLE. SIMILARLY, THE TERMS "SINGLE-LEVEL" AND
|
|
"MULTILEVEL" ARE UNDERSTOOD TO BE BASED ON BOTH THE SECRECY
|
|
AND INTEGRITY COMPONENTS OF THE POLICY. THE MANDATORY
|
|
INTEGRITY POLICY WILL TYPICALLY HAVE REQUIREMENTS, SUCH AS
|
|
THE PROBABILITY OF UNDETECTED MESSAGE STREAM MODIFICATION,
|
|
THAT WILL BE REFLECTED IN THE LABEL FOR THE DATA SO PRO-
|
|
TECTED. FOR EXAMPLE, WHEN DATA IS IMPORTED ITS INTEGRITY
|
|
LABEL MAY BE ASSIGNED BASED ON MECHANISMS, SUCH AS CRYPTOG-
|
|
RAPHY, USED TO PROVIDE THE ASSURANCE REQUIRED BY THE POLICY.
|
|
THE NTCB SHALL ASSURE THAT SUCH MECHANISM ARE PROTECTED FROM
|
|
TAMPERING AND ARE ALWAYS INVOKED WHEN THEY ARE THE BASIS FOR
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Computer Systems," ESD-TR-76-372, MTR-
|
|
3153, The MITRE Corporation, Bedford, MA, April 1977.
|
|
|
|
|
|
A LABEL.
|
|
|
|
+ Rationale
|
|
|
|
THE INTERPRETATION IS AN EXTENSION OF THE REQUIREMENT
|
|
INTO THE CONTEXT OF A NETWORK SYSTEM AND PARTITIONED NTCB AS
|
|
DEFINED FOR THESE NETWORK INTERPRETATIONS. A SINGLE-LEVEL
|
|
DEVICE MAY BE REGARDED EITHER AS A SUBJECT OR AN OBJECT. A
|
|
MULTILEVEL DEVICE IS REGARDED AS A TRUSTED SUBJECT IN WHICH
|
|
THE SECURITY RANGE OF THE SUBJECT IS THE MINIMUM-MAXIMUM
|
|
RANGE OF THE DATA EXPECTED TO BE TRANSMITTED OVER THE DEV-
|
|
ICE.
|
|
|
|
THE SENSITIVITY LABELS FOR EITHER SECRECY OR INTEGRITY
|
|
OR BOTH MAY REFLECT NON-HIERARCHICAL CATEGORIES OR HIERARCH-
|
|
ICAL CLASSIFICATION OR BOTH.
|
|
|
|
|
|
|
|
3.1.1.3.1 Label Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
SENSITIVITY LABELS SHALL ACCURATELY REPRESENT SENSITIVITY
|
|
LEVELS OF THE SPECIFIC SUBJECTS OR OBJECTS WITH WHICH THEY
|
|
ARE ASSOCIATED. WHEN EXPORTED BY THE TCB, SENSITIVITY
|
|
LABELS SHALL ACCURATELY AND UNAMBIGUOUSLY REPRESENT THE
|
|
INTERNAL LABELS AND SHALL BE ASSOCIATED WITH THE INFORMATION
|
|
BEING EXPORTED.
|
|
|
|
+ Interpretation
|
|
|
|
THE PHRASE "EXPORTED BY THE TCB" IS UNDERSTOOD TO
|
|
INCLUDE TRANSMISSION OF INFORMATION FROM AN OBJECT IN ONE
|
|
COMPONENT TO AN OBJECT IN ANOTHER COMPONENT. INFORMATION
|
|
TRANSFERRED BETWEEN NTCB PARTITIONS IS ADDRESSED IN THE SYS-
|
|
TEM INTEGRITY SECTION. THE FORM OF INTERNAL AND EXTERNAL
|
|
(EXPORTED) SENSITIVITY LABELS MAY DIFFER, BUT THE MEANING
|
|
SHALL BE THE SAME. THE NTCB SHALL, IN ADDITION, ENSURE THAT
|
|
CORRECT ASSOCIATION OF SENSITIVITY LABELS WITH THE INFORMA-
|
|
TION BEING TRANSPORTED ACROSS THE NETWORK IS PRESERVED.
|
|
|
|
AS MENTIONED IN THE TRUSTED FACILITY MANUAL SECTION,
|
|
ENCRYPTION TRANSFORMS THE REPRESENTATION OF INFORMATION SO
|
|
THAT IT IS UNINTELLIGIBLE TO UNAUTHORIZED SUBJECTS.
|
|
REFLECTING THIS TRANSFORMATION, THE SENSITIVITY LEVEL OF THE
|
|
CIPHERTEXT IS GENERALLY LOWER THAN THE CLEARTEXT. IT FOL-
|
|
LOWS THAT CLEARTEXT AND CIPHERTEXT ARE CONTAINED IN DIF-
|
|
FERENT OBJECTS, EACH POSSESSING ITS OWN LABEL. THE LABEL OF
|
|
THE CLEARTEXT MUST BE PRESERVED AND ASSOCIATED WITH THE
|
|
CIPHERTEXT SO THAT IT CAN BE RESTORED WHEN THE CLEARTEXT IS
|
|
SUBSEQUENTLY OBTAINED BY DECRYPTING THE CIPHERTEXT. IF THE
|
|
CLEARTEXT IS ASSOCIATED WITH A SINGLE-LEVEL DEVICE, THE
|
|
LABEL OF THAT CLEARTEXT MAY BE IMPLICIT. THE LABEL MAY ALSO
|
|
BE IMPLICIT IN THE KEY.
|
|
|
|
WHEN INFORMATION IS EXPORTED TO AN ENVIRONMENT WHERE IT
|
|
IS SUBJECT TO DELIBERATE OR ACCIDENTAL MODIFICATION, THE TCB
|
|
SHALL SUPPORT THE MEANS, SUCH AS CRYPTOGRAPHIC CHECKSUMS, TO
|
|
ASSURE THE ACCURACY OF THE LABELS. WHEN THERE IS A MANDA-
|
|
TORY INTEGRITY POLICY, THE POLICY WILL DEFINE THE MEANING OF
|
|
INTEGRITY LABELS.
|
|
|
|
+ Rationale
|
|
|
|
ENCRYPTION ALGORITHMS AND THEIR IMPLEMENTATION ARE OUT-
|
|
SIDE THE SCOPE OF THESE INTERPRETATIONS. SUCH ALGORITHMS
|
|
MAY BE IMPLEMENTED IN A SEPARATE DEVICE OR MAY BE INCOR-
|
|
PORATED IN A SUBJECT OF A LARGER COMPONENT. WITHOUT PREJU-
|
|
DICE, EITHER IMPLEMENTATION PACKAGING IS REFERRED TO AS AN
|
|
ENCRYPTION MECHANISM HEREIN. IF ENCRYPTION METHODOLOGIES ARE
|
|
EMPLOYED IN THIS REGARD, THEY SHALL BE APPROVED BY THE
|
|
NATIONAL SECURITY AGENCY (NSA). THE ENCRYPTION PROCESS IS
|
|
PART OF THE NETWORK TRUSTED COMPUTER BASE PARTITION IN THE
|
|
COMPONENTS IN WHICH IT IS IMPLEMENTED.
|
|
|
|
THE ENCRYPTION MECHANISM IS NOT NECESSARILY A MUL-
|
|
TILEVEL DEVICE OR MULTILEVEL SUBJECT, AS THESE TERMS ARE
|
|
USED IN THESE CRITERIA. THE PROCESS OF ENCRYPTION IS MUL-
|
|
TILEVEL BY DEFINITION. THE CLEARTEXT AND CIPHERTEXT INTER-
|
|
FACES CARRY INFORMATION OF DIFFERENT SENSITIVITY. AN
|
|
ENCRYPTION MECHANISM DOES NOT PROCESS DATA IN THE SENSE OF
|
|
PERFORMING LOGICAL OR ARITHMETIC OPERATIONS ON THAT DATA
|
|
WITH THE INTENT OF PRODUCING NEW DATA. THE CLEARTEXT AND
|
|
CIPHERTEXT INTERFACES ON THE ENCRYPTION MECHANISM MUST BE
|
|
SEPARATELY IDENTIFIED AS BEING SINGLE-LEVEL OR MULTILEVEL.
|
|
IF THE INTERFACE IS SINGLE-LEVEL, THEN THE SENSITIVITY OF
|
|
THE DATA IS ESTABLISHED BY A TRUSTED INDIVIDUAL AND IMPLI-
|
|
CITLY ASSOCIATED WITH THE INTERFACE; THE EXPORTATION TO
|
|
SINGLE-LEVEL DEVICES CRITERION APPLIES.
|
|
|
|
IF THE INTERFACE IS MULTILEVEL, THEN THE DATA MUST BE
|
|
LABELED; THE EXPORTATION TO MULTILEVEL DEVICES CRITERION
|
|
APPLIES. THE NETWORK ARCHITECT IS FREE TO SELECT AN ACCEPT-
|
|
TABLE MECHANISM FOR ASSOCIATING A LABEL WITH AN OBJECT. WITH
|
|
REFERENCE TO ENCRYPTED OBJECTS, THE FOLLOWING EXAMPLES ARE
|
|
POSSIBLE:
|
|
|
|
1. INCLUDE A LABEL FIELD IN THE PROTOCOL DEFINITION OF
|
|
THE OBJECT.
|
|
|
|
2. IMPLICITLY ASSOCIATE THE LABEL WITH THE OBJECT
|
|
THROUGH THE ENCRYPTION KEY. THAT IS, THE ENCRYPTION
|
|
KEY UNIQUELY IDENTIFIES A SENSITIVITY LEVEL. A SIN-
|
|
GLE OR PRIVATE KEY MUST BE PROTECTED AT THE LEVEL OF
|
|
THE DATA THAT IT ENCRYPTS.
|
|
|
|
|
|
3.1.1.3.2 Exportation of Labeled Information
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL DESIGNATE EACH COMMUNICATION CHANNEL AND I/O
|
|
DEVICE AS EITHER SINGLE-LEVEL OR MULTILEVEL. ANY CHANGE IN
|
|
THIS DESIGNATION SHALL BE DONE MANUALLY AND SHALL BE AUDIT-
|
|
ABLE BY THE TCB. THE TCB SHALL MAINTAIN AND BE ABLE TO
|
|
AUDIT ANY CHANGE IN THE SENSITIVITY LEVEL OR LEVELS ASSOCI-
|
|
ATED WITH A COMMUNICATIONS CHANNEL OR I/O DEVICE.
|
|
|
|
+ Interpretation
|
|
|
|
EACH COMMUNICATION CHANNEL AND NETWORK COMPONENT SHALL
|
|
BE DESIGNATED AS EITHER SINGLE-LEVEL OR MULTILEVEL. ANY
|
|
CHANGE IN THIS DESIGNATION SHALL BE DONE WITH THE COGNIZANCE
|
|
AND APPROVAL OF THE ADMINISTRATOR OR SECURITY OFFICER IN
|
|
CHARGE OF THE AFFECTED COMPONENTS AND THE ADMINISTRATOR OR
|
|
SECURITY OFFICER IN CHARGE OF THE NTCB. THIS CHANGE SHALL
|
|
BE AUDITABLE BY THE NETWORK. THE NTCB SHALL MAINTAIN AND BE
|
|
ABLE TO AUDIT ANY CHANGE IN THE CURRENT SENSITIVITY LEVEL
|
|
ASSOCIATED WITH THE DEVICE CONNECTED TO A SINGLE-LEVEL COM-
|
|
MUNICATION CHANNEL OR THE RANGE ASSOCIATED WITH A MULTILEVEL
|
|
COMMUNICATION CHANNEL OR COMPONENT. THE NTCB SHALL ALSO BE
|
|
ABLE TO AUDIT ANY CHANGE IN THE SET OF SENSITIVITY LEVELS
|
|
ASSOCIATED WITH THE INFORMATION WHICH CAN BE TRANSMITTED
|
|
OVER A MULTILEVEL COMMUNICATION CHANNEL OR COMPONENT.
|
|
|
|
+ Rationale
|
|
|
|
COMMUNICATION CHANNELS AND COMPONENTS IN A NETWORK ARE
|
|
ANALOGOUS TO COMMUNICATION CHANNELS AND I/O DEVICES IN
|
|
STAND-ALONE SYSTEMS. THEY MUST BE DESIGNATED AS EITHER MUL-
|
|
TILEVEL (I.E., ABLE TO DISTINGUISH AND MAINTAIN SEPARATION
|
|
AMONG INFORMATION OF VARIOUS SENSITIVITY LEVELS) OR SINGLE-
|
|
LEVEL. AS IN THE TCSEC, SINGLE-LEVEL DEVICES MAY ONLY BE
|
|
ATTACHED TO SINGLE-LEVEL CHANNELS.
|
|
|
|
THE LEVEL OR SET OF LEVELS OF INFORMATION THAT CAN BE
|
|
SENT TO A COMPONENT OR OVER A COMMUNICATION CHANNEL SHALL
|
|
ONLY CHANGE WITH THE KNOWLEDGE AND APPROVAL OF THE SECURITY
|
|
OFFICERS (OR SYSTEM ADMINISTRATOR, IF THERE IS NO SECURITY
|
|
OFFICER) OF THE NETWORK, AND OF THE AFFECTED COMPONENTS.
|
|
THIS REQUIREMENT ENSURES THAT NO SIGNIFICANT SECURITY-
|
|
RELEVANT CHANGES ARE MADE WITHOUT THE APPROVAL OF ALL
|
|
AFFECTED PARTIES.
|
|
|
|
|
|
3.1.1.3.2.1 Exportation to Multilevel Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
WHEN THE TCB EXPORTS AN OBJECT TO A MULTILEVEL I/O DEVICE,
|
|
THE SENSITIVITY LABEL ASSOCIATED WITH THAT OBJECT SHALL ALSO
|
|
BE EXPORTED AND SHALL RESIDE ON THE SAME PHYSICAL MEDIUM AS
|
|
THE EXPORTED INFORMATION AND SHALL BE IN THE SAME FORM
|
|
(I.E., MACHINE-READABLE OR HUMAN-READABLE FORM). WHEN THE
|
|
TCB EXPORTS OR IMPORTS AN OBJECT OVER A MULTILEVEL COMMUNI-
|
|
CATIONS CHANNEL, THE PROTOCOL USED ON THAT CHANNEL SHALL
|
|
PROVIDE FOR THE UNAMBIGUOUS PAIRING BETWEEN THE SENSITIVITY
|
|
LABELS AND THE ASSOCIATED INFORMATION THAT IS SENT OR
|
|
RECEIVED.
|
|
|
|
+ Interpretation
|
|
|
|
THE COMPONENTS, INCLUDING HOSTS, OF A NETWORK SHALL BE
|
|
INTERCONNECTED OVER "MULTILEVEL COMMUNICATION CHANNELS,"
|
|
MULTIPLE SINGLE-LEVEL COMMUNICATION CHANNELS, OR BOTH, WHEN-
|
|
EVER THE INFORMATION IS TO BE PROTECTED AT MORE THAN A SIN-
|
|
GLE SENSITIVITY LEVEL. THE PROTOCOL FOR ASSOCIATING THE
|
|
SENSITIVITY LABEL AND THE EXPORTED INFORMATION SHALL PROVIDE
|
|
THE ONLY INFORMATION NEEDED TO CORRECTLY ASSOCIATE A SENSI-
|
|
TIVITY LEVEL WITH THE EXPORTED INFORMATION TRANSFERRED OVER
|
|
THE MULTILEVEL CHANNEL BETWEEN THE NTCB PARTITIONS IN INDI-
|
|
VIDUAL COMPONENTS. THIS PROTOCOL DEFINITION MUST SPECIFY THE
|
|
REPRESENTATION AND SEMANTICS OF THE SENSITIVITY LABELS
|
|
(I.E., THE MACHINE-READABLE LABEL MUST UNIQUELY REPRESENT
|
|
THE SENSITIVITY LEVEL).
|
|
|
|
THE "UNAMBIGUOUS" ASSOCIATION OF THE SENSITIVITY LEVEL
|
|
WITH THE COMMUNICATED INFORMATION SHALL MEET THE SAME LEVEL
|
|
OF ACCURACY AS THAT REQUIRED FOR ANY OTHER LABEL WITHIN THE
|
|
NTCB, AS SPECIFIED IN THE CRITERION FOR LABEL INTEGRITY.
|
|
THIS MAY BE PROVIDED BY PROTECTED AND HIGHLY RELIABLE DIRECT
|
|
PHYSICAL LAYER CONNECTIONS, OR BY TRADITIONAL CRYPTOGRAPHIC
|
|
LINK PROTECTION IN WHICH ANY ERRORS DURING TRANSMISSION CAN
|
|
BE READILY DETECTED, OR BY USE OF A SEPARATE CHANNEL.
|
|
|
|
+ Rationale
|
|
|
|
THIS PROTOCOL MUST SPECIFY THE REPRESENTATION AND
|
|
SEMANTICS OF THE SENSITIVITY LABELS. SEE THE MANDATORY
|
|
ACCESS CONTROL POLICIES SECTION IN APPENDIX B. THE MUL-
|
|
TILEVEL DEVICE INTERFACE TO (UNTRUSTED) SUBJECTS MAY BE
|
|
IMPLEMENTED EITHER BY THE INTERFACE OF THE REFERENCE MONI-
|
|
TOR, PER SE, OR BY A MULTILEVEL SUBJECT (E.G., A "TRUSTED
|
|
SUBJECT" AS DEFINED IN THE BELL-LAPADULA MODEL) THAT PRO-
|
|
VIDES THE LABELS BASED ON THE INTERNAL LABELS OF THE NTCB
|
|
PARTITION.
|
|
|
|
THE CURRENT STATE OF THE ART LIMITS THE SUPPORT FOR
|
|
MANDATORY POLICY THAT IS PRACTICAL FOR SECURE NETWORKS.
|
|
REFERENCE MONITOR SUPPORT TO ENSURE THE CONTROL OVER ALL THE
|
|
OPERATIONS OF EACH SUBJECT IN THE NETWORK MUST BE COMPLETELY
|
|
PROVIDED WITHIN THE SINGLE NTCB PARTITION ON WHICH THAT SUB-
|
|
JECT INTERFACES TO THE NTCB. THIS MEANS THAT THE ENTIRE
|
|
PORTION OF THE "SECURE STATE" REPRESENTED IN THE SECURITY
|
|
POLICY MODEL THAT MAY BE CHANGED BY TRANSITIONS INVOKED BY
|
|
THIS SUBJECT MUST BE CONTAINED IN THE SAME COMPONENT.
|
|
|
|
THE SECURE STATE OF AN NTCB PARTITION MAY BE AFFECTED
|
|
BY EVENTS EXTERNAL TO THE COMPONENT IN WHICH THE NTCB PARTI-
|
|
TION RESIDES (E.G., ARRIVAL OF A MESSAGE). THE EFFECT
|
|
OCCURS ASYNCHRONUSLY AFTER BEING INITIATED BY AN EVENT IN
|
|
ANOTHER COMPONENT OR PARTITION. FOR EXAMPLE, INDETERMINATE
|
|
DELAYS MAY OCCUR BETWEEN THE INITIATION OF A MESSAGE IN ONE
|
|
COMPONENT, THE ARRIVAL OF THE MESSAGE IN THE NTCB PARTITION
|
|
IN ANOTHER COMPONENT, AND THE CORRESPONDING CHANGE TO THE
|
|
SECURE STATE OF THE SECOND COMPONENT. SINCE EACH COMPONENT
|
|
IS EXECUTING CONCURRENTLY, TO DO OTHERWISE WOULD REQUIRE
|
|
SOME SORT OF NETWORK-WIDE CONTROL TO SYNCHRONIZE STATE TRAN-
|
|
SITIONS, SUCH AS A GLOBAL NETWORK-WIDE CLOCK FOR ALL PROCES-
|
|
SORS; IN GENERAL, SUCH DESIGNS ARE NOT PRACTICAL AND PROB-
|
|
ABLY NOT EVEN DESIRABLE. THEREFORE, THE INTERACTION BETWEEN
|
|
NTCB PARTITIONS IS RESTRICTED TO JUST COMMUNICATIONS BETWEEN
|
|
PAIRS (AT LEAST LOGICALLY) OF DEVICES-MULTILEVEL DEVICES IF
|
|
THE DEVICE(S) CAN SEND/RECEIVE DATA OF MORE THAN A SINGLE
|
|
LEVEL. FOR BROADCAST CHANNELS THE PAIRS ARE THE SENDER AND
|
|
INTENDED RECEIVER(S). HOWEVER, IF THE BROADCAST CHANNEL
|
|
CARRIES MULTIPLE LEVELS OF INFORMATION, ADDITIONAL MECHANISM
|
|
(E.G., CRYPTOCHECKSUM MAINTAINED BY THE TCB) MAY BE REQUIRED
|
|
TO ENFORCE SEPARATION AND PROPER DELIVERY.
|
|
|
|
A COMMON REPRESENTATION FOR SENSITIVITY LABELS IS
|
|
NEEDED IN THE PROTOCOL USED ON THAT CHANNEL AND UNDERSTOOD
|
|
BY BOTH THE SENDER AND RECEIVER WHEN TWO MULTILEVEL DEVICES
|
|
(IN THIS CASE, IN TWO DIFFERENT COMPONENTS) ARE INTERCON-
|
|
NECTED. EACH DISTINCT SENSITIVITY LEVEL OF THE OVERALL NET-
|
|
WORK POLICY MUST BE REPRESENTED UNIQUELY IN THESE LABELS.
|
|
|
|
WITHIN A MONOLITHIC TCB, THE ACCURACY OF THE SENSI-
|
|
TIVITY LABELS IS GENERALLY ASSURED BY SIMPLE TECHNIQUES,
|
|
E.G., VERY RELIABLE CONNECTIONS OVER VERY SHORT PHYSICAL
|
|
CONNECTIONS, SUCH AS ON A SINGLE PRINTED CIRCUIT BOARD OR
|
|
OVER AN INTERNAL BUS. IN MANY NETWORK ENVIRONMENTS THERE IS
|
|
A MUCH HIGHER PROBABILITY OF ACCIDENTALLY OR MALICIOUSLY
|
|
INTRODUCED ERRORS, AND THESE MUST BE PROTECTED AGAINST.
|
|
|
|
|
|
3.1.1.3.2.2 Exportation to Single-Level Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
SINGLE-LEVEL I/O DEVICES AND SINGLE-LEVEL COMMUNICATION
|
|
CHANNELS ARE NOT REQUIRED TO MAINTAIN THE SENSITIVITY LABELS
|
|
OF THE INFORMATION THEY PROCESS. HOWEVER, THE TCB SHALL
|
|
INCLUDE A MECHANISM BY WHICH THE TCB AND AN AUTHORIZED USER
|
|
RELIABLY COMMUNICATE TO DESIGNATE THE SINGLE SENSITIVITY
|
|
LEVEL OF INFORMATION IMPORTED OR EXPORTED VIA SINGLE-LEVEL
|
|
COMMUNICATION CHANNELS OR I/O DEVICES.
|
|
|
|
+ Interpretation
|
|
|
|
WHENEVER ONE OR BOTH OF TWO DIRECTLY CONNECTED COM-
|
|
PONENTS IS NOT TRUSTED TO MAINTAIN THE SEPARATION OF INFOR-
|
|
MATION OF DIFFERENT SENSITIVITY LEVELS, OR WHENEVER THE TWO
|
|
DIRECTLY CONNECTED COMPONENTS HAVE ONLY A SINGLE SENSITIVITY
|
|
LEVEL IN COMMON, THE TWO COMPONENTS OF THE NETWORK SHALL
|
|
COMMUNICATE OVER A SINGLE-LEVEL CHANNEL. SINGLE-LEVEL COM-
|
|
PONENTS AND SINGLE-LEVEL COMMUNICATION CHANNELS ARE NOT
|
|
REQUIRED TO MAINTAIN THE SENSITIVITY LABELS OF THE
|
|
INFORMATION THEY PROCESS. HOWEVER, THE NTCB SHALL INCLUDE A
|
|
RELIABLE COMMUNICATION MECHANISM BY WHICH THE NTCB AND AN
|
|
AUTHORIZED USER OR A SUBJECT WITHIN AN NTCB PARTITION CAN
|
|
DESIGNATE THE SINGLE SENSITIVITY LEVEL OF INFORMATION
|
|
IMPORTED OR EXPORTED VIA SINGLE-LEVEL COMMUNICATION CHANNELS
|
|
OR NETWORK COMPONENTS.
|
|
|
|
+ Rationale
|
|
|
|
SINGLE-LEVEL COMMUNICATIONS CHANNELS AND SINGLE-LEVEL
|
|
COMPONENTS IN NETWORKS ARE ANALOGOUS TO SINGLE LEVEL CHAN-
|
|
NELS AND I/O DEVICES IN STAND-ALONE SYSTEMS IN THAT THEY ARE
|
|
NOT TRUSTED TO MAINTAIN THE SEPARATION OF INFORMATION OF
|
|
DIFFERENT SENSITIVITY LEVELS. THE LABELS ASSOCIATED WITH
|
|
DATA TRANSMITTED OVER THOSE CHANNELS AND BY THOSE COMPONENTS
|
|
ARE THEREFORE IMPLICIT; THE NTCB ASSOCIATES LABELS WITH THE
|
|
DATA BECAUSE OF THE CHANNEL OR COMPONENT, NOT BECAUSE OF AN
|
|
EXPLICIT PART OF THE BIT STREAM. NOTE THAT THE SENSITIVITY
|
|
LEVEL OF ENCRYPTED INFORMATION IS THE LEVEL OF THE CIPHER-
|
|
TEXT RATHER THAN THE ORIGINAL LEVEL(S) OF THE PLAINTEXT.
|
|
|
|
|
|
3.1.1.3.2.3 Labeling Human-Readable Output
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE ADP SYSTEM ADMINISTRATOR SHALL BE ABLE TO SPECIFY THE
|
|
PRINTABLE LABEL NAMES ASSOCIATED WITH EXPORTED SENSITIVITY
|
|
LABELS. THE TCB SHALL MARK THE BEGINNING AND END OF ALL
|
|
HUMAN-READABLE, PAGED, HARDCOPY OUTPUT (E.G., LINE PRINTER
|
|
OUTPUT) WITH HUMAN-READABLE SENSITIVITY LABELS THAT PROP-
|
|
ERLY1 REPRESENT THE SENSITIVITY OF THE OUTPUT. THE TCB
|
|
SHALL, BY DEFAULT, MARK THE TOP AND BOTTOM OF EACH PAGE OF
|
|
HUMAN-READABLE, PAGED, HARDCOPY OUTPUT (E.G., LINE PRINTER
|
|
OUTPUT) WITH HUMAN-READABLE SENSITIVITY LABELS THAT PROP-
|
|
ERLY1 REPRESENT THE SENSITIVITY OF THE PAGE. THE TCB SHALL,
|
|
BY DEFAULT AND IN AN APPROPRIATE MANNER, MARK OTHER FORMS OF
|
|
HUMAN READABLE OUTPUT (E.G., MAPS, GRAPHICS) WITH HUMAN-
|
|
READABLE SENSITIVITY LABELS THAT PROPERLY1 REPRESENT THE
|
|
SENSITIVITY OF THE OUTPUT. ANY OVERRIDE OF THESE MARKINGS
|
|
DEFAULTS SHALL BE AUDITABLE BY THE TCB.
|
|
|
|
+ Interpretation
|
|
|
|
THIS CRITERION IMPOSES NO REQUIREMENT TO A COMPONENT
|
|
THAT PRODUCES NO HUMAN-READABLE OUTPUT. FOR THOSE THAT DO
|
|
PRODUCE HUMAN-READABLE OUTPUT, EACH SENSITIVITY LEVEL THAT
|
|
_________________________
|
|
1 THE HIERARCHICAL CLASSIFICATION COMPONENT IN HUMAN-
|
|
READABLE SENSITIVITY LABELS SHALL BE EQUAL TO THE
|
|
GREATEST HIERARCHICAL CLASSIFICATION OF ANY OF THE IN-
|
|
FORMATION IN THE OUTPUT THAT THE LABELS REFER TO; THE
|
|
NON-HIERARCHICAL CATEGORY COMPONENT SHALL INCLUDE ALL
|
|
OF THE NON-HIERARCHICAL CATEGORIES OF THE INFORMATION
|
|
IN THE OUTPUT THE LABELS REFER TO, BUT NO OTHER NON-
|
|
HIERARCHICAL CATEGORIES.
|
|
|
|
|
|
|
|
|
|
IS DEFINED TO THE NETWORK SHALL HAVE A UNIFORM MEANING
|
|
ACROSS ALL COMPONENTS. THE NETWORK ADMINISTRATOR, IN CON-
|
|
JUNCTION WITH ANY AFFECTED COMPONENT ADMINISTRATOR, SHALL BE
|
|
ABLE TO SPECIFY THE HUMAN-READABLE LABEL THAT IS ASSOCIATED
|
|
WITH EACH DEFINED SENSITIVITY LEVEL.
|
|
|
|
+ Rationale
|
|
|
|
THE INTERPRETATION IS A STRAIGHTFORWARD EXTENSION OF
|
|
THE REQUIREMENT INTO THE CONTEXT OF A NETWORK SYSTEM AND
|
|
PARTITIONED NTCB AS DEFINED FOR THESE NETWORK INTERPRETA-
|
|
TIONS.
|
|
|
|
|
|
|
|
3.1.1.4 Mandatory Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL ENFORCE A MANDATORY ACCESS CONTROL POLICY OVER
|
|
ALL SUBJECTS AND STORAGE OBJECTS UNDER ITS CONTROL (E.G.,
|
|
PROCESSES, FILES, SEGMENTS, DEVICES). THESE SUBJECTS AND
|
|
OBJECTS SHALL BE ASSIGNED SENSITIVITY LABELS THAT ARE A COM-
|
|
BINATION OF HIERARCHICAL CLASSIFICATION LEVELS AND NON-
|
|
HIERARCHICAL CATEGORIES, AND THE LABELS SHALL BE USED AS THE
|
|
BASIS FOR MANDATORY ACCESS CONTROL DECISIONS. THE TCB SHALL
|
|
BE ABLE TO SUPPORT TWO OR MORE SUCH SENSITIVITY LEVELS.
|
|
(SEE THE MANDATORY ACCESS CONTROL INTERPRETATIONS.) THE
|
|
FOLLOWING REQUIREMENTS SHALL HOLD FOR ALL ACCESSES BETWEEN
|
|
SUBJECTS AND OBJECTS CONTROLLED BY THE TCB: A SUBJECT CAN
|
|
READ AN OBJECT ONLY IF THE HIERARCHICAL CLASSIFICATION IN
|
|
THE SUBJECT'S SENSITIVITY LEVEL IS GREATER THAN OR EQUAL TO
|
|
THE HIERARCHICAL CLASSIFICATION OF THE OBJECT'S SENSITIVITY
|
|
LEVEL AND THE NON-HIERARCHICAL CATEGORIES IN THE SUBJECT'S
|
|
SENSITIVITY LEVEL INCLUDE ALL THE NON-HIERARCHICAL
|
|
CATEGORIES IN THE OBJECT'S SENSITIVITY LEVEL. A SUBJECT CAN
|
|
WRITE AN OBJECT ONLY IF THE HIERARCHICAL CLASSIFICATION IN
|
|
THE SUBJECT'S SENSITIVITY LEVEL IS LESS THAN OR EQUAL TO THE
|
|
HIERARCHICAL CLASSIFICATION OF THE OBJECT'S SENSITIVITY
|
|
LEVEL AND THE NON-HIERARCHICAL CATEGORIES IN THE SUBJECT'S
|
|
SENSITIVITY LEVEL ARE INCLUDED IN THE NON-HIERARCHICAL
|
|
CATEGORIES IN THE OBJECT'S SENSITIVITY LEVEL. IDENTIFICATION
|
|
AND AUTHENTICATION DATA SHALL BE USED BY THE TCB TO AUTHEN-
|
|
TICATE THE USER'S IDENTITY AND TO ENSURE THAT THE SENSI-
|
|
TIVITY LEVEL AND AUTHORIZATION OF SUBJECTS EXTERNAL TO THE
|
|
TCB THAT MAY BE CREATED TO ACT ON BEHALF OF THE INDIVIDUAL
|
|
USER ARE DOMINATED BY THE CLEARANCE AND AUTHORIZATION OF
|
|
THAT USER.
|
|
|
|
+ Interpretation
|
|
|
|
EACH PARTITION OF THE NTCB EXERCISES MANDATORY ACCESS
|
|
CONTROL POLICY OVER ALL SUBJECTS AND OBJECTS IN ITS COM-
|
|
PONENT THAT ARE UNDER ITS CONTROL. IN A NETWORK, THE
|
|
RESPONSIBILITY OF AN NTCB PARTITION ENCOMPASSES ALL MANDA-
|
|
TORY ACCESS CONTROL FUNCTIONS IN ITS COMPONENT THAT WOULD BE
|
|
REQUIRED OF A TCB IN A STAND-ALONE SYSTEM. IN PARTICULAR,
|
|
SUBJECTS AND OBJECTS USED FOR COMMUNICATION WITH OTHER COM-
|
|
PONENTS ARE UNDER THE CONTROL OF THE NTCB PARTITION. MANDA-
|
|
TORY ACCESS CONTROL INCLUDES SECRECY AND INTEGRITY CONTROL
|
|
TO THE EXTENT THAT THE NETWORK SPONSOR HAS DESCRIBED IN THE
|
|
OVERALL NETWORK SECURITY POLICY.
|
|
|
|
CONCEPTUAL ENTITIES ASSOCIATED WITH COMMUNICATION
|
|
BETWEEN TWO COMPONENTS, SUCH AS SESSIONS, CONNECTIONS AND
|
|
VIRTUAL CIRCUITS, MAY BE THOUGHT OF AS HAVING TWO ENDS, ONE
|
|
IN EACH COMPONENT, WHERE EACH END IS REPRESENTED BY A LOCAL
|
|
OBJECT. COMMUNICATION IS VIEWED AS AN OPERATION THAT COPIES
|
|
INFORMATION FROM AN OBJECT AT ONE END OF A COMMUNICATION
|
|
PATH TO AN OBJECT AT THE OTHER END. TRANSIENT DATA-CARRYING
|
|
ENTITIES, SUCH AS DATAGRAMS AND PACKETS, EXIST EITHER AS
|
|
INFORMATION WITHIN OTHER OBJECTS, OR AS A PAIR OF OBJECTS,
|
|
ONE AT EACH END OF THE COMMUNICATION PATH.
|
|
|
|
THE REQUIREMENT FOR "TWO OR MORE" SENSITIVITY LEVELS
|
|
CAN BE MET BY EITHER SECRECY OR INTEGRITY LEVELS. WHEN
|
|
THERE IS A MANDATORY INTEGRITY POLICY, THE STATED REQUIRE-
|
|
MENTS FOR READING AND WRITING ARE GENERALIZED TO: A SUBJECT
|
|
CAN READ AN OBJECT ONLY IF THE SUBJECT'S SENSITIVITY LEVEL
|
|
DOMINATES THE OBJECT'S SENSITIVITY LEVEL, AND A SUBJECT CAN
|
|
WRITE AN OBJECT ONLY IF THE OBJECT'S SENSITIVITY LEVEL DOM-
|
|
INATES THE SUBJECT'S SENSITIVITY LEVEL. BASED ON THE
|
|
INTEGRITY POLICY, THE NETWORK SPONSOR SHALL DEFINE THE DOMI-
|
|
NANCE RELATION FOR THE TOTAL LABEL, FOR EXAMPLE, BY COMBIN-
|
|
ING SECRECY AND INTEGRITY LATTICES. -
|
|
|
|
+ Rationale
|
|
|
|
AN NTCB PARTITION CAN MAINTAIN ACCESS CONTROL ONLY OVER
|
|
SUBJECTS AND OBJECTS IN ITS COMPONENT. ACCESS BY A SUBJECT
|
|
IN ONE COMPONENT TO INFORMATION CONTAINED IN AN OBJECT IN
|
|
ANOTHER COMPONENT REQUIRES THE CREATION OF A SUBJECT IN THE
|
|
REMOTE COMPONENT WHICH ACTS AS A SURROGATE FOR THE FIRST
|
|
SUBJECT.
|
|
|
|
THE MANDATORY ACCESS CONTROLS MUST BE ENFORCED AT THE
|
|
INTERFACE OF THE REFERENCE MONITOR (VIZ. THE MECHANISM THAT
|
|
CONTROLS PHYSICAL PROCESSING RESOURCES) FOR EACH NTCB PARTI-
|
|
TION. THIS MECHANISM CREATES THE ABSTRACTION OF SUBJECTS
|
|
AND OBJECTS WHICH IT CONTROLS. SOME OF THESE SUBJECTS OUT-
|
|
SIDE THE REFERENCE MONITOR, PER SE, MAY BE DESIGNATED TO
|
|
IMPLEMENT PART OF AN NTCB PARTITION'S MANDATORY POLICY,
|
|
E.G., BY USING THE ``TRUSTED SUBJECTS" DEFINED IN THE BELL-
|
|
_________________________
|
|
- See, for example, Grohn, M. J., A Model of a Pro-
|
|
_ _____ __ _ ___
|
|
tected Data Management System, ESD-TR-76-289, I. P.
|
|
______ ____ __________ ______
|
|
Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
|
|
Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
|
|
and Shockley, W., Secure Distributed Data Views, Secu-
|
|
______ ___________ ____ _____ ____
|
|
rity Policy and Interpretation for a Class A1 Multilev-
|
|
____ ______ ___ ______________ ___ _ _____ __ ________
|
|
el Secure Relational Database System,SRI International,
|
|
__ ______ __________ ________ ______
|
|
November 1986.
|
|
|
|
|
|
LAPADULA MODEL.
|
|
|
|
THE PRIOR REQUIREMENTS ON EXPORTATION OF LABELED INFOR-
|
|
MATION TO AND FROM I/O DEVICES ENSURE THE CONSISTENCY
|
|
BETWEEN THE SENSITIVITY LABELS OF OBJECTS CONNECTED BY A
|
|
COMMUNICATION PATH. AS NOTED IN THE INTRODUCTION, THE NET-
|
|
WORK ARCHITECTURE MUST RECOGNIZE THE LINKAGE BETWEEN THE
|
|
OVERALL MANDATORY NETWORK SECURITY POLICY AND THE CONNECTION
|
|
ORIENTED ABSTRACTION. FOR EXAMPLE, INDIVIDUAL DATA-CARRYING
|
|
ENTITIES SUCH AS DATAGRAMS CAN HAVE INDIVIDUAL SENSITIVITY
|
|
LABELS THAT SUBJECT THEM TO MANDATORY ACCESS CONTROL IN EACH
|
|
COMPONENT. THE ABSTRACTION OF A SINGLE-LEVEL CONNECTION IS
|
|
REALIZED AND ENFORCED IMPLICITLY BY AN ARCHITECTURE WHILE A
|
|
CONNECTION IS REALIZED BY SINGLE-LEVEL SUBJECTS THAT NECES-
|
|
SARILY EMPLOY ONLY DATAGRAMS OF THE SAME LEVEL.
|
|
|
|
THE FUNDAMENTAL TRUSTED SYSTEMS TECHNOLOGY PERMITS THE
|
|
DAC MECHANISM TO BE DISTRIBUTED, IN CONTRAST TO THE REQUIRE-
|
|
MENTS FOR MANDATORY ACCESS CONTROL. FOR NETWORKS THIS
|
|
SEPARATION OF MAC AND DAC MECHANISMS IS THE RULE RATHER THAN
|
|
THE EXCEPTION.
|
|
|
|
THE SET OF TOTAL SENSITIVITY LABELS USED TO REPRESENT
|
|
ALL THE SENSITIVITY LEVELS FOR THE MANDATORY ACCESS CONTROL
|
|
(COMBINED DATA SECRECY AND DATA INTEGRITY) POLICY ALWAYS
|
|
FORMS A PARTIALLY ORDERED SET. WITHOUT LOSS OF GENERALITY,
|
|
THIS SET OF LABELS CAN ALWAYS BE EXTENDED TO FORM A LATTICE,
|
|
BY INCLUDING ALL THE COMBINATIONS OF NON-HIERARCHICAL
|
|
CATEGORIES. AS FOR ANY LATTICE, A DOMINANCE RELATION IS
|
|
ALWAYS DEFINED FOR THE TOTAL SENSITIVITY LABELS. FOR ADMIN-
|
|
ISTRATIVE REASONS IT MAY BE HELPFUL TO HAVE A MAXIMUM LEVEL
|
|
WHICH DOMINATES ALL OTHERS.
|
|
|
|
|
|
3.1.2 Accountability
|
|
_ _ _ ______________
|
|
|
|
|
|
3.1.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall require users to identify themselves to it
|
|
before beginning to perform any other actions that the TCB
|
|
is expected to mediate. Furthermore, the TCB shall MAINTAIN
|
|
AUTHENTICATION DATA THAT INCLUDES INFORMATION FOR VERIFYING
|
|
THE IDENTIFY OF INDIVIDUAL USERS (E.G., PASSWORDS) AS WELL
|
|
AS INFORMATION FOR DETERMINING THE CLEARANCE AND AUTHORIZA-
|
|
TIONS OF INDIVIDUAL USERS. THIS DATA SHALL BE USED BY THE
|
|
TCB TO AUTHENTICATE THE USER'S IDENTITY AND TO ENSURE THAT
|
|
THE SENSITIVITY LEVEL AND AUTHORIZATION OF SUBJECTS EXTERNAL
|
|
TO THE TCB THAT MAY BE CREATED TO ACT ON BEHALF OF THE INDI-
|
|
VIDUAL USER ARE DOMINATED BY THE CLEARANCE AND AUTHORIZATION
|
|
OF THAT USER. The TCB shall protect authentication data so
|
|
that it cannot be accessed by any unauthorized user. The
|
|
TCB shall be able to enforce individual accountability by
|
|
providing the capability to uniquely identify each indivi-
|
|
dual ADP system user. The TCB shall also provide the
|
|
capability of associating this identity with all auditable
|
|
actions taken by that individual.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement for identification and authentication
|
|
of users is the same for a network system as for an ADP sys-
|
|
tem. The identification and authentication may be done by
|
|
the component to which the user is directly connected or
|
|
some other component, such as an identification and authen-
|
|
tication server. Available techniques, such as those
|
|
described in the Password Guideline=, are generally also
|
|
applicable in the network context. However, in cases where
|
|
the NTCB is expected to mediate actions of a host (or other
|
|
network component) that is acting on behalf of a user or
|
|
group of users, the NTCB may employ identification and
|
|
authentication of the host (or other component) in lieu of
|
|
identification and authentication of an individual user, so
|
|
long as the component identifier implies a list of specific
|
|
users uniquely associated with the identifier at the time of
|
|
its use for authentication. This requirement does not apply
|
|
to internal subjects.
|
|
|
|
Authentication information, including the identity of a
|
|
user (once authenticated) may be passed from one component
|
|
to another without reauthentication, so long as the NTCB
|
|
protects (e.g., by encryption) the information from unau-
|
|
thorized disclosure and modification. This protection shall
|
|
provide at least a similar level of assurance (or strength
|
|
of mechanism) as pertains to the protection of the authenti-
|
|
cation mechanism and authentication data.
|
|
|
|
+ Rationale
|
|
|
|
The need for accountability is not changed in the con-
|
|
text of a network system. The fact that the NTCB is parti-
|
|
tioned over a set of components neither reduces the need nor
|
|
imposes new requirements. That is, individual accountabil-
|
|
ity is still the objective. Also, in the context of a net-
|
|
work system at the (C2) level or higher "individual accoun-
|
|
tability" can be satisfied by identification of a host (or
|
|
other component) so long as the requirement for traceability
|
|
to individual users or a set of specific individual users
|
|
with active subjects is satisfied. There is allowed to be an
|
|
uncertainty in traceability because of elapsed time between
|
|
changes in the group membership and the enforcement in the
|
|
access control mechanisms. In addition, there is no need in
|
|
a distributed processing system like a network to reauthen-
|
|
ticate a user at each point in the network where a projec-
|
|
tion of a user (via the subject operating on behalf of the
|
|
user) into another remote subject takes place.
|
|
|
|
|
|
_________________________
|
|
= Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, CSC-STD-002-85
|
|
____
|
|
|
|
|
|
The passing of identifiers and/or authentication infor-
|
|
mation from one component to another is usually done in sup-
|
|
port to the implementation of the discretionary access con-
|
|
trol (DAC). This support relates directly to the DAC
|
|
regarding access by a user to a storage object in a dif-
|
|
ferent NTCB partition than the one where the user was
|
|
authenticated. Employing a forwarded identification implies
|
|
additional reliance on the source and components along the
|
|
path. IF THE AUTHENTICATED IDENTIFICATION IS USED AS THE
|
|
BASIS OF DETERMINING A SENSITIVITY LABEL FOR A SUBJECT, IT
|
|
MUST SATISFY THE LABEL INTEGRITY CRITERION.
|
|
|
|
AN AUTHENTICATED IDENTIFICATION MAY BE FORWARDED
|
|
BETWEEN COMPONENTS AND EMPLOYED IN SOME COMPONENT TO IDEN-
|
|
TIFY THE SENSITIVITY LEVEL ASSOCIATED WITH A SUBJECT CREATED
|
|
TO ACT ON BEHALF OF THE USER SO IDENTIFIED.
|
|
|
|
|
|
3.1.2.2 Audit
|
|
_ _ _ _ _____
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall be able to create, maintain, and protect from
|
|
modification or unauthorized access or destruction an audit
|
|
trail of accesses to the objects it protects. The audit
|
|
data shall be protected by the TCB so that read access to it
|
|
is limited to those who are authorized for audit data. The
|
|
TCB shall be able to record the following types of events:
|
|
use of identification and authentication mechanisms, intro-
|
|
duction of objects into a user's address space (e.g., file
|
|
open, program initiation), deletion of objects, actions
|
|
taken by computer operators and system administrators and/or
|
|
system security officers, and other security relevant
|
|
events. THE TCB SHALL ALSO BE ABLE TO AUDIT ANY OVERRIDE OF
|
|
HUMAN-READABLE OUTPUT MARKINGS. For each recorded event,
|
|
the audit record shall identify: date and time of the event,
|
|
user, type of event, and success or failure of the event.
|
|
For identification/authentication events the origin of
|
|
request (e.g., terminal ID) shall be included in the audit
|
|
record. For events that introduce an object into a user's
|
|
address space and for object deletion events the audit
|
|
record shall include the name of the object AND THE OBJECT'S
|
|
SENSITIVITY LEVEL. The ADP system administrator shall be
|
|
able to selectively audit the actions of any one or more
|
|
users based on individual identify AND/OR OBJECT SENSITIVITY
|
|
LEVEL.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion applies as stated. The sponsor must
|
|
select which events are auditable. If any such events are
|
|
not distinguishable by the NTCB alone (for example those
|
|
identified in Part II), the audit mechanism shall provide an
|
|
interface, which an authorized subject can invoke with
|
|
parameters sufficient to produce an audit record. These
|
|
audit records shall be distinguishable from those provided
|
|
by the NTCB. In the context of a network system, "other
|
|
security relevant events" (depending on network system
|
|
architecture and network security policy) might be as fol-
|
|
lows:
|
|
|
|
|
|
1. Identification of each access event (e.g., estab-
|
|
lishing a connection or a connectionless association
|
|
between processes in two hosts of the network) and
|
|
its principal parameters (e.g., host identifiers of
|
|
the two hosts involved in the access event and user
|
|
identifier or host identifier of the user or host
|
|
that is requesting the access event)
|
|
|
|
2. Identification of the starting and ending times of
|
|
each access event using local time or global syn-
|
|
chronized time
|
|
|
|
3. Identification of security-relevant exceptional con-
|
|
ditions (e.g., potential violation of data
|
|
integrity, such as misrouted datagrams) detected
|
|
during the transactions between two hosts
|
|
|
|
4. Utilization of cryptographic variables
|
|
|
|
5. Changing the configuration of the network (e.g., a
|
|
component leaving the network and rejoining)
|
|
|
|
In addition, identification information should be
|
|
included in appropriate audit trail records, as necessary,
|
|
to allow association of all related (e.g., involving the
|
|
same network event) audit trail records (e.g., at different
|
|
hosts) with each other. Furthermore, a component of the
|
|
network system may provide the required audit capability
|
|
(e.g., storage, retrieval, reduction, analysis) for other
|
|
components that do not internally store audit data but
|
|
transmit the audit data to some designated collection com-
|
|
ponent. Provisions shall be made to control the loss of
|
|
audit data due to unavailability of resources.
|
|
|
|
In the context of a network system, the "user's address
|
|
space" is extended, for object introduction and deletion
|
|
events, to include address spaces being employed on behalf
|
|
of a remote user (or host). However, the focus remains on
|
|
users in contrast to internal subjects as discussed in the
|
|
DAC criterion. In addition, audit information must be
|
|
stored in machine-readable form.
|
|
|
|
+ Rationale
|
|
|
|
For remote users, the network identifiers (e.g., inter-
|
|
net address) can be used as identifiers of groups of indivi-
|
|
dual users (e.g., "all users at Host A") to eliminate the
|
|
maintenance that would be required if individual identifica-
|
|
tion of remote users was employed. In this class (C2), how-
|
|
ever, it must be possible to identify (immediately or at
|
|
some later time) the individuals represented by a group
|
|
identifier. In all other respects, the interpretation is a
|
|
straightforward extension of the criterion into the context
|
|
of a network system.
|
|
|
|
|
|
3.1.3 Assurance
|
|
_ _ _ _________
|
|
|
|
|
|
3.1.3.1 Operational Assurance
|
|
|
|
|
|
3.1.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall maintain a domain for its own execution that
|
|
protects it from external interference or tampering (e.g.,
|
|
by modification of its code or data structures). Resources
|
|
controlled by the TCB may be a defined subset of the sub-
|
|
jects and objects in the ADP system. THE TCB SHALL MAINTAIN
|
|
PROCESS ISOLATION THROUGH THE PROVISION OF DISTINCT ADDRESS
|
|
SPACES UNDER ITS CONTROL. The TCB shall isolate the
|
|
resources to be protected so that they are subject to the
|
|
access control and auditing requirements.
|
|
|
|
+ Interpretation
|
|
|
|
The system architecture criterion must be met individu-
|
|
ally by all NTCB partitions. Implementation of the require-
|
|
ment that the NTCB maintain a domain for its own execution
|
|
is achieved by having each NTCB partition maintain a domain
|
|
for its own execution. SINCE EACH COMPONENT IS ITSELF A DIS-
|
|
TINCT DOMAIN IN THE OVERALL NETWORK SYSTEM, THIS ALSO SATIS-
|
|
FIES THE REQUIREMENT FOR PROCESS ISOLATION THROUGH DISTINCT
|
|
ADDRESS SPACES IN THE SPECIAL CASE WHERE A COMPONENT HAS
|
|
ONLY A SINGLE SUBJECT.
|
|
|
|
The subset of network resources over which the NTCB has
|
|
control are the union of the sets of resources over which
|
|
the NTCB partitions have control. Code and data structures
|
|
belonging to the NTCB, transferred among NTCB subjects
|
|
(i.e., subjects outside the reference monitor but inside the
|
|
NTCB) belonging to different NTCB partitions, must be pro-
|
|
tected against external interference or tampering. For
|
|
example, a cryptographic checksum or physical means may be
|
|
employed to protect user authentication data exchanged
|
|
between NTCB partitions.
|
|
|
|
Each NTCB partition provides isolation of RESOURCES
|
|
(WITHIN ITS COMPONENT) TO BE PROTECTED IN accord with the
|
|
network system architecture and security policy SO THAT
|
|
"SUPPORTING ELEMENTS" (E.G., DAC AND USER IDENTIFICATION)
|
|
FOR THE SECURITY MECHANISMS OF THE NETWORK SYSTEM ARE
|
|
STRENGTHENED COMPARED TO C2, FROM AN ASSURANCE POINT OF
|
|
VIEW, THROUGH THE PROVISION OF DISTINCT ADDRESS SPACES UNDER
|
|
CONTROL OF THE NTCB.
|
|
|
|
AS DISCUSSED IN THE DISCRETIONARY ACCESS CONTROL SEC-
|
|
TION, THE DAC MECHANISM OF A NTCB PARTITION MAY BE IMPLE-
|
|
MENTED AT THE INTERFACE OF THE REFERENCE MONITOR OR MAY BE
|
|
DISTRIBUTED IN SUBJECTS THAT ARE PART OF THE NTCB IN THE
|
|
SAME OR DIFFERENT COMPONENT. WHEN DISTRIBUTED IN NTCB SUB-
|
|
JECTS (I.E., WHEN OUTSIDE THE REFERENCE MONITOR), THE
|
|
ASSURANCE REQUIREMENTS FOR THE DESIGN AND IMPLEMENTATION OF
|
|
THE DAC SHALL BE THOSE OF CLASS C2 FOR ALL NETWORKS OF CLASS
|
|
C2 OR ABOVE.
|
|
|
|
+ Rationale
|
|
|
|
|
|
The requirement for the protection of communications
|
|
between NTCB partitions is specifically directed to subjects
|
|
that are part of the NTCB partitions. Any requirements for
|
|
such protection for the subjects that are outside the NTCB
|
|
partitions are addressed in response to the integrity
|
|
requirements of the security policy.
|
|
|
|
THE PROVISION OF DISTINCT ADDRESS SPACES UNDER THE CON-
|
|
TROL OF THE NTCB PROVIDES THE ABILITY TO SEPARATE SUBJECTS
|
|
ACCORDING TO SENSITIVITY LEVEL. THIS REQUIREMENT IS INTRO-
|
|
DUCED AT B1 SINCE IT IS AN ABSOLUTE NECESSITY IN ORDER TO
|
|
IMPLEMENT MANDATORY ACCESS CONTROLS.
|
|
|
|
|
|
3.1.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Hardware and/or software features shall be provided that can
|
|
be used to periodically validate the correct operation of
|
|
the on-site hardware and firmware elements of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Implementation of the requirement is partly achieved by
|
|
having hardware and/or software features that can be used to
|
|
periodically validate the correct operation of the hardware
|
|
and firmware elements of each component's NTCB partition.
|
|
Features shall also be provided to validate the identity and
|
|
correct operation of a component prior to its incorporation
|
|
in the network system and throughout system operation. For
|
|
example, a protocol could be designed that enables the com-
|
|
ponents of the partitioned NTCB to exchange messages period-
|
|
ically and validate each other's correct response. The pro-
|
|
tocol shall be able to determine the remote entity's ability
|
|
to respond. NTCB partitions shall provide the capability to
|
|
report to network administrative personnel the failures
|
|
detected in other NTCB partitions.
|
|
|
|
Intercomponent protocols implemented within a NTCB
|
|
shall be designed in such a way as to provide correct opera-
|
|
tion in the case of failures of network communications or
|
|
individual components. The allocation of MANDATORY AND dis-
|
|
cretionary access control policy in a network may require
|
|
communication between trusted subjects that are part of the
|
|
NTCB partitions in different components. This communication
|
|
is normally implemented with a protocol between the subjects
|
|
as peer entities. Incorrect access within a component shall
|
|
not result from failure of an NTCB partition to communicate
|
|
with other components.
|
|
|
|
+ Rationale
|
|
|
|
The first paragraph of the interpretation is a
|
|
straightforward extension of the requirement into the con-
|
|
text of a network system and partitioned NTCB as defined for
|
|
these network criteria.
|
|
|
|
NTCB protocols should be robust enough so that they
|
|
permit the system to operate correctly in the case of local-
|
|
ized failure. The purpose of this protection is to preserve
|
|
the integrity of the NTCB itself. It is not unusual for one
|
|
or more components in a network to be inoperative at any
|
|
time, so it is important to minimize the effects of such
|
|
failures on the rest of the network. Additional integrity
|
|
and denial of service issues are addressed in Part II.
|
|
|
|
|
|
3.1.3.2 Life-Cycle Assurance
|
|
|
|
|
|
3.1.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The security mechanisms of the ADP system shall be tested
|
|
and found to work as claimed in the system documentation. A
|
|
TEAM OF INDIVIDUALS WHO THOROUGHLY UNDERSTAND THE SPECIFIC
|
|
IMPLEMENTATION OF THE TCB SHALL SUBJECT ITS DESIGN DOCUMEN-
|
|
TATION, SOURCE CODE, AND OBJECT CODE TO THROUGH ANALYSIS AND
|
|
TESTING. THEIR OBJECTIVES SHALL BE: TO UNCOVER ALL DESIGN
|
|
AND IMPLEMENTATION FLAWS THAT WOULD PERMIT A SUBJECT EXTER-
|
|
NAL TO THE TCB TO READ, CHANGE, OR DELETE DATA NORMALLY
|
|
DENIED UNDER THE MANDATORY OR DISCRETIONARY SECURITY POLICY
|
|
ENFORCED BY THE TCB; AS WELL AS TO ASSURE THAT NO SUBJECT
|
|
(WITHOUT AUTHORIZATION TO DO SO) IS ABLE TO CAUSE THE TCB TO
|
|
ENTER A STATE SUCH THAT IT IS UNABLE TO RESPOND TO COMMUNI-
|
|
CATIONS INITIATED BY OTHER USERS. ALL DISCOVERED FLAWS SHALL
|
|
BE REMOVED OR NEUTRALIZED AND THE TCB RETESTED TO DEMON-
|
|
STRATE THAT THEY HAVE BEEN ELIMINATED AND THAT NEW FLAWS
|
|
HAVE NOT BEEN INTRODUCED. (See the Security Testing Guide-
|
|
lines.)
|
|
|
|
+ Interpretation
|
|
|
|
Testing of a component will require a testbed that
|
|
exercises the interfaces and protocols of the component
|
|
including tests under exceptional conditions. The testing
|
|
of a security mechanism of the network system for meeting
|
|
this criterion shall be an integrated testing procedure
|
|
involving all components containing an NTCB partition that
|
|
implement the given mechanism. This integrated testing is
|
|
additional to any individual component tests involved in the
|
|
evaluation of the network system. The sponsor should iden-
|
|
tify the allowable set of configurations including the sizes
|
|
of the networks. Analysis or testing procedures and tools
|
|
shall be available to test the limits of these configura-
|
|
tions. A change in configuration within the allowable set
|
|
of configurations does not require retesting.
|
|
|
|
THE TESTING OF EACH COMPONENT WILL INCLUDE THE INTRO-
|
|
DUCTION OF SUBJECTS EXTERNAL TO THE NTCB PARTITION FOR THE
|
|
COMPONENT THAT WILL ATTEMPT TO READ, CHANGE, OR DELETE DATA
|
|
NORMALLY DENIED. IF THE NORMAL INTERFACE TO THE COMPONENT
|
|
DOES NOT PROVIDE A MEANS TO CREATE THE SUBJECTS NEEDED TO
|
|
CONDUCT SUCH A TEST, THEN THIS PORTION OF THE TESTING SHALL
|
|
USE A SPECIAL VERSION OF THE UNTRUSTED SOFTWARE FOR THE COM-
|
|
PONENT THAT RESULTS IN SUBJECTS THAT MAKE SUCH ATTEMPTS.
|
|
THE RESULTS SHALL BE SAVED FOR TEST ANALYSIS. SUCH SPECIAL
|
|
VERSIONS SHALL HAVE AN NTCB PARTITION THAT IS IDENTICAL TO
|
|
THAT FOR THE NORMAL CONFIGURATION OF THE COMPONENT UNDER
|
|
EVALUATION.
|
|
|
|
THE TESTING OF THE MANDATORY CONTROLS SHALL INCLUDE
|
|
TESTS TO DEMONSTRATE THAT THE LABELS FOR INFORMATION
|
|
IMPORTED AND/OR EXPORTED TO/FROM THE COMPONENT ACCURATELY
|
|
REPRESENT THE LABELS MAINTAINED BY THE NTCB PARTITION FOR
|
|
THE COMPONENT FOR USE AS THE BASIS FOR ITS MANDATORY ACCESS
|
|
CONTROL DECISIONS. THE TESTS SHALL INCLUDE EACH TYPE OF
|
|
DEVICE, WHETHER SINGLE-LEVEL OR MULTILEVEL, SUPPORTED BY THE
|
|
COMPONENT.
|
|
|
|
+ Rationale
|
|
|
|
THE PHRASE "NO SUBJECT (WITHOUT AUTHORIZATION TO DO SO)
|
|
IS ABLE TO CAUSE THE TCB TO ENTER A STATE SUCH THAT IT IS
|
|
UNABLE TO RESPOND TO COMMUNICATIONS INITIATED BY OTHER
|
|
USERS" RELATES TO THE SECURITY SERVICES (PART II OF THIS
|
|
TNI) FOR THE DENIAL OF SERVICE PROBLEM, AND TO CORRECTNESS
|
|
OF THE PROTOCOL IMPLEMENTATIONS.
|
|
|
|
Testing is AN IMPORTANT method available in this
|
|
evaluation division to gain any assurance that the security
|
|
mechanisms perform their intended function. A MAJOR PURPOSE
|
|
OF TESTING IS TO DEMONSTRATE THE SYSTEM'S RESPONSE TO INPUTS
|
|
TO THE NTCB PARTITION FROM UNTRUSTED (AND POSSIBLY MALI-
|
|
CIOUS) SUBJECTS.
|
|
|
|
IN CONTRAST TO GENERAL PURPOSE SYSTEMS THAT ALLOW FOR
|
|
THE DYNAMIC CREATION OF NEW PROGRAMS AND THE INTRODUCTIONS
|
|
OF NEW PROCESSES (AND HENCE NEW SUBJECTS) WITH USER SPECI-
|
|
FIED SECURITY PROPERITIES, MANY NETWORK COMPONENTS HAVE NO
|
|
METHOD FOR INTRODUCING NEW PROGRAMS AND/OR PROCESSES DURING
|
|
THEIR NORMAL OPERATION. THEREFORE, THE PROGRAMS NECESSARY
|
|
FOR THE TESTING MUST BE INTRODUCED AS SPECIAL VERSIONS OF
|
|
THE SOFTWARE RATHER THAN AS THE RESULT OF NORMAL INPUTS BY
|
|
THE TEST TEAM. HOWEVER, IT MUST BE INSURED THAT THE NTCB
|
|
PARTITION USED FOR SUCH TESTS IS IDENTICAL TO THE ONE UNDER
|
|
EVALUATION.
|
|
|
|
SENSITIVITY LABELS SERVE A CRITICAL ROLE IN MAINTAINING
|
|
THE SECURITY OF THE MANDATORY ACCESS CONTROLS IN THE NET-
|
|
WORK. ESPECIALLY IMPORTANT TO NETWORK SECURITY IS THE ROLE
|
|
OF THE LABELS FOR INFORMATION COMMUNICATED BETWEEN COM-
|
|
PONENTS - EXPLICIT LABELS FOR MULTILEVEL DEVICES AND IMPLI-
|
|
CIT LABELS FOR SINGLE-LEVEL DEVICES. THEREFORE THE TESTING
|
|
FOR CORRECT LABELS IS HIGHLIGHTED.
|
|
|
|
|
|
|
|
3.1.3.2.2 Design Specification and Verification
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
AN INFORMAL OR FORMAL MODEL OF THE SECURITY POLICY SUPPORTED
|
|
BY THE TCB SHALL BE MAINTAINED OVER THE LIFE CYCLE OF THE
|
|
ADP SYSTEM AND DEMONSTRATED TO BE CONSISTENT WITH ITS
|
|
AXIOMS.
|
|
|
|
+ Interpretation
|
|
|
|
THE OVERALL NETWORK SECURITY POLICY EXPRESSED IN THIS
|
|
MODEL WILL PROVIDE THE BASIS FOR THE MANDATORY ACCESS CON-
|
|
TROL POLICY EXERCISED BY THE NTCB OVER SUBJECTS AND STORAGE
|
|
OBJECTS IN THE ENTIRE NETWORK. THE POLICY WILL ALSO BE THE
|
|
BASIS FOR THE DISCRETIONARY ACCESS CONTROL POLICY EXERCISED
|
|
BY THE NTCB TO CONTROL ACCESS OF NAMED USERS TO NAMED
|
|
OBJECTS. DATA INTEGRITY REQUIREMENTS ADDRESSING THE EFFECTS
|
|
OF UNAUTHORIZED MSM NEED NOT BE INCLUDED IN THIS MODEL. THE
|
|
OVERALL NETWORK POLICY MUST BE DECOMPOSED INTO POLICY ELE-
|
|
MENTS THAT ARE ALLOCATED TO APPROPRIATE COMPONENTS AND USED
|
|
AS THE BASIS FOR THE SECURITY POLICY MODEL FOR THOSE COM-
|
|
PONENTS.
|
|
|
|
THE LEVEL OF ABSTRACTION OF THE MODEL, AND THE SET OF
|
|
SUBJECTS AND OBJECTS THAT ARE EXPLICITLY REPRESENTED IN THE
|
|
MODEL, WILL BE AFFECTED BY THE NTCB PARTITIONING. SUBJECTS
|
|
AND OBJECTS MUST BE REPRESENTED EXPLICITLY IN THE MODEL FOR
|
|
THE PARTITION IF THERE IS SOME NETWORK COMPONENT WHOSE NTCB
|
|
PARTITION EXERCISES ACCESS CONTROL OVER THEM. THE MODEL
|
|
SHALL BE STRUCTURED SO THAT THE AXIOMS AND ENTITIES APPLICA-
|
|
BLE TO INDIVIDUAL NETWORK COMPONENTS ARE MANIFEST. GLOBAL
|
|
NETWORK POLICY ELEMENTS THAT ARE ALLOCATED TO COMPONENTS
|
|
SHALL BE REPRESENTED BY THE MODEL FOR THAT COMPONENT.
|
|
|
|
+ Rationale
|
|
|
|
THE TREATMENT OF THE MODEL DEPENDS TO A GREAT EXTENT ON
|
|
THE DEGREE OF INTEGRATION OF THE COMMUNICATIONS SERVICE INTO
|
|
A DISTRIBUTED SYSTEM. IN A CLOSELY COUPLED DISTRIBUTED SYS-
|
|
TEM, ONE MIGHT USE A MODEL THAT CLOSELY RESEMBLES ONE
|
|
APPROPRIATE FOR A STAND-ALONE COMPUTER SYSTEM.
|
|
|
|
IN OTHER CASES, THE MODEL OF EACH PARTITION WILL BE
|
|
EXPECTED TO SHOW THE ROLE OF THE NTCB PARTITION IN EACH KIND
|
|
OF COMPONENT. IT WILL MOST LIKELY CLARIFY THE MODEL,
|
|
ALTHOUGH NOT PART OF THE MODEL, TO SHOW ACCESS RESTRICTIONS
|
|
IMPLIED BY THE SYSTEM DESIGN; FOR EXAMPLE, SUBJECTS
|
|
REPRESENTING PROTOCOL ENTITIES MIGHT HAVE ACCESS ONLY TO
|
|
OBJECTS CONTAINING DATA UNITS AT THE SAME LAYER OF PROTOCOL.
|
|
THE ALLOCATION OF SUBJECTS AND OBJECTS TO DIFFERENT PROTO-
|
|
COL LAYERS IS A PROTOCOL DESIGN CHOICE WHICH NEED NOT BE
|
|
REFLECTED IN THE SECURITY POLICY MODEL.
|
|
|
|
|
|
3.1.4 Documentation.
|
|
_ _ _ _____________
|
|
|
|
|
|
3.1.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A single summary, chapter, or manual in user documentation
|
|
shall describe the protection mechanisms provided by the
|
|
TCB, interpretations on their use, and how they interact
|
|
with one another.
|
|
|
|
+ Interpretation
|
|
|
|
This user documentation describes user visible protec-
|
|
tion mechanisms at the global (network system) level and at
|
|
the user interface of each component, and the interaction
|
|
among these.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system as defined for these
|
|
network criteria. Documentation of protection mechanisms
|
|
provided by individual components is required by the cri-
|
|
teria for trusted computer systems that are applied as
|
|
appropriate for the individual components.
|
|
|
|
|
|
3.1.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A manual addressed to the ADP system administrator shall
|
|
present cautions about functions and privileges that should
|
|
be controlled when running a secure facility. The procedures
|
|
for examining and maintaining the audit files as well as the
|
|
detailed audit record structure for each type of audit event
|
|
shall be given. THE MANUAL SHALL DESCRIBE THE OPERATOR AND
|
|
ADMINISTRATOR FUNCTIONS RELATED TO SECURITY, TO INCLUDE
|
|
CHANGING THE SECURITY CHARACTERISTICS OF A USER. IT SHALL
|
|
PROVIDE INTERPRETATIONS ON THE CONSISTENT AND EFFECTIVE USE
|
|
OF THE PROTECTION FEATURES OF THE SYSTEM, HOW THEY INTERACT,
|
|
HOW TO SECURELY GENERATE A NEW TCB, AND FACILITY PROCEDURES,
|
|
WARNINGS, AND PRIVILEGES THAT NEED TO BE CONTROLLED IN ORDER
|
|
TO OPERATE THE FACILITY IN A SECURE MANNER.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator(s) maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address the following:
|
|
|
|
1. The hardware configuration of the network itself;
|
|
|
|
2. The implications of attaching new components to the
|
|
network;
|
|
|
|
3. The case where certain components may periodically
|
|
leave the network (e.g., by crashing, or by being
|
|
disconnected) and then rejoin;
|
|
|
|
4. Network configuration aspects that can impact the
|
|
security of the network system; (For example, the
|
|
manual should describe for the network system
|
|
administrator the interconnections among components
|
|
that are consistent with the overall network system
|
|
architecture.)
|
|
|
|
5. Loading or modifying NTCB software or firmware
|
|
(e.g., down-line loading).
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
+ Rationale
|
|
|
|
There may be multiple system administrators with
|
|
diverse responsibilities. The technical security measures
|
|
described by these criteria must be used in conjunction with
|
|
other forms of security in order to achieve security of the
|
|
network. Additional forms include administrative security,
|
|
physical security, emanations security, etc.
|
|
|
|
Extension of this criterion to cover configuration
|
|
aspects of the network is needed because, for example,
|
|
proper interconnection of components is typically essential
|
|
to achieve a correct realization of the network architec-
|
|
ture.
|
|
|
|
AS MENTIONED IN THE SECTION ON LABEL INTEGRITY, cryp-
|
|
tography is one common mechanism employed to protect commun-
|
|
ication circuits. Encryption transforms the representation
|
|
of information so that it is unintelligible to unauthorized
|
|
subjects. Reflecting this transformation, the sensitivity
|
|
of the ciphertext is generally lower than the cleartext. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency (NSA).
|
|
|
|
The encryption algorithm and its implementation are
|
|
outside the scope of these interpretations. This algorithm
|
|
and implementation may be implemented in a separate device
|
|
or may be a function of a subject in a component not dedi-
|
|
cated to encryption. Without prejudice, either implementa-
|
|
tion packaging is referred to as an encryption mechanism
|
|
herein.
|
|
|
|
|
|
3.1.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall provide to the evaluators a docu-
|
|
ment that describes the test plan, test procedures that show
|
|
how the security mechanisms were tested, and results of the
|
|
security mechanisms' functional testing.
|
|
|
|
+ Interpretation
|
|
|
|
The "system developer" is interpreted as "the network
|
|
system sponsor". The description of the test plan should
|
|
establish the context in which the testing was or should be
|
|
conducted. The description should identify any additional
|
|
test components that are not part of the system being
|
|
evaluated. This includes a description of the test-relevant
|
|
functions of such test components and a description of the
|
|
interfacing of those test components to the system being
|
|
evaluated. The description of the test plan should also
|
|
demonstrate that the tests adequately cover the network
|
|
security policy. The tests should include the features
|
|
described in the System Architecture and the System
|
|
Integrity sections. The tests should also include network
|
|
configuration and sizing.
|
|
|
|
+ Rationale
|
|
|
|
The entity being evaluated may be a networking subsys-
|
|
tem (see Appendix A) to which other components must be added
|
|
to make a complete network system. In that case, this
|
|
interpretation is extended to include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
|
|
3.1.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Documentation shall be available that provides a description
|
|
of the manufacturer's philosophy of protection and an expla-
|
|
nation of how this philosophy is translated into the TCB. If
|
|
the TCB is composed of distinct modules, the interfaces
|
|
between these modules shall be described. AN INFORMAL OR
|
|
FORMAL DESCRIPTION OF THE SECURITY POLICY MODEL ENFORCED BY
|
|
THE TCB SHALL BE AVAILABLE AND AN EXPLANATION PROVIDED TO
|
|
SHOW THAT IT IS SUFFICIENT TO ENFORCE THE SECURITY POLICY.
|
|
THE SPECIFIC TCB PROTECTION MECHANISMS SHALL BE IDENTIFIED
|
|
AND AN EXPLANATION GIVEN TO SHOW THAT THEY SATISFY THE
|
|
MODEL.
|
|
|
|
+ Interpretation
|
|
|
|
Explanation of how the sponsor's philosophy of protec-
|
|
tion is translated into the NTCB shall include a description
|
|
of how the NTCB is partitioned. The security policy also
|
|
shall be stated. The description of the interfaces between
|
|
the NTCB modules shall include the interface(s) between NTCB
|
|
partitions and modules within the partitions if the modules
|
|
exist. The sponsor shall describe the security architecture
|
|
and design, including the allocation of security require-
|
|
ments among components. Appendix A addresses component
|
|
evaluation issues.
|
|
|
|
AS STATED IN THE INTRODUCTION TO DIVISION B, THE SPON-
|
|
SOR MUST DEMONSTRATE THAT THE NTCB EMPLOYS THE REFERENCE
|
|
MONITOR CONCEPT. THE SECURITY POLICY MODEL MUST BE A MODEL
|
|
FOR A REFERENCE MONITOR.
|
|
|
|
THE SECURITY POLICY MODEL FOR EACH PARTITION IMPLEMENT-
|
|
ING A REFERENCE MONITOR SHALL FULLY REPRESENT THE ACCESS
|
|
CONTROL POLICY SUPPORTED BY THE PARTITION, INCLUDING THE
|
|
DISCRETIONARY AND MANDATORY SECURITY POLICY FOR SECRECY
|
|
AND/OR INTEGRITY. FOR THE MANDATORY POLICY THE SINGLE DOMI-
|
|
NANCE RELATION FOR SENSITIVITY LABELS, INCLUDING SECRECY
|
|
AND/OR INTEGRITY COMPONENTS, SHALL BE PRECISELY DEFINED.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system as
|
|
defined for this network interpretation. Other documenta-
|
|
tion, such as description of components and description of
|
|
operating environment(s) in which the networking subsystem
|
|
or network system is designed to function, is required else-
|
|
where, e.g., in the Trusted Facility Manual.
|
|
|
|
In order to be evaluated, a network must possess a
|
|
coherent Network Security Architecture and Design. (Inter-
|
|
connection of components that do not adhere to such a single
|
|
coherent Network Security Architecture is addressed in the
|
|
Interconnection of Accredited AIS, Appendix C.) The Network
|
|
Security Architecture must address the security-relevant
|
|
policies, objectives, and protocols. The Network Security
|
|
Design specifies the interfaces and services that must be
|
|
incorporated into the network so that it can be evaluated as
|
|
a trusted entity. There may be multiple designs that con-
|
|
form to the same architecture but are more or less incompa-
|
|
tible and non-interoperable (except through the Interconnec-
|
|
tion Rules). Security related mechanisms requiring coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms having no visible
|
|
interfaces are not specified in this document but are left
|
|
as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network security Architecture and
|
|
Design are satisfied. That is, the components can be assem-
|
|
bled into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization that is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and unambi-
|
|
guously define the security functionality of components as
|
|
well as the interfaces between or among components. The
|
|
Network Security Architecture and Design must be evaluated
|
|
to determine that a network constructed to its specifica-
|
|
tions will in fact be trusted, that is, it will be evaluat-
|
|
able under these interpretations.
|
|
|
|
|
|
THE TERM "MODEL" IS USED IN SEVERAL DIFFERENT WAYS IN A
|
|
NETWORK CONTEXT, E.G., A "PROTOCOL REFERENCE MODEL," A "FOR-
|
|
MAL NETWORK MODEL," ETC. ONLY THE "SECURITY POLICY MODEL" IS
|
|
ADDRESSED BY THIS REQUIREMENT AND IS SPECIFICALLY INTENDED
|
|
TO MODEL THE INTERFACE, VIZ., "SECURITY PERIMETER," OF THE
|
|
REFERENCE MONITOR AND MUST MEET ALL THE REQUIREMENTS DEFINED
|
|
IN THE TCSEC. IT MUST BE SHOWN THAT ALL PARTS OF THE TCB
|
|
ARE A VALID INTERPRETATION OF THE SECURITY POLICY MODEL,
|
|
I.E., THAT THERE IS NO CHANGE TO THE SECURE STATE EXCEPT AS
|
|
REPRESENTED BY THE MODEL.
|
|
|
|
3.2 CLASS (B2): STRUCTURED PROTECTION
|
|
_ _ _____ __ __________ __________
|
|
|
|
|
|
IN CLASS (B2) NETWORK SYSTEMS, THE NTCB IS BASED
|
|
ON A CLEARLY DEFINED AND DOCUMENTED FORMAL SECU-
|
|
RITY POLICY MODEL THAT REQUIRES THE DISCRETIONARY
|
|
AND MANDATORY ACCESS CONTROL ENFORCEMENT FOUND IN
|
|
CLASS (B1) NETWORK SYSTEMS TO BE EXTENDED TO ALL
|
|
SUBJECTS AND OBJECTS IN THE NETWORK SYSTEM. IN
|
|
ADDITION, COVERT CHANNELS ARE ADDRESSED. THE NTCB
|
|
MUST BE CAREFULLY STRUCTURED INTO PROTECTION-
|
|
CRITICAL AND NON-PROTECTION-CRITICAL ELEMENTS.
|
|
THE NTCB INTERFACE IS WELL-DEFINED, AND THE NTCB
|
|
DESIGN AND IMPLEMENTATION ENABLE IT TO BE SUB-
|
|
JECTED TO MORE THOROUGH TESTING AND MORE COMPLETE
|
|
REVIEW. AUTHENTICATION MECHANISMS ARE
|
|
STRENGTHENED, TRUSTED FACILITY MANAGEMENT IS PRO-
|
|
VIDED IN THE FORM OF SUPPORT FOR SYSTEM ADMINIS-
|
|
TRATOR AND OPERATOR FUNCTIONS, AND STRINGENT CON-
|
|
FIGURATION MANAGEMENT CONTROLS ARE IMPOSED. THE
|
|
SYSTEM IS RELATIVELY RESISTANT TO PENETRATION.
|
|
THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEM
|
|
ASSIGNED A CLASS (B2) RATING.
|
|
|
|
|
|
3.2.1 Security Policy
|
|
_ _ _ ________ ______
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The network sponsor shall describe the overall network
|
|
security policy enforced by the NTCB. At a minimum, this
|
|
policy shall include the discretionary and mandatory
|
|
requirements applicable to this class. The policy may
|
|
require data secrecy, or data integrity, or both. The pol-
|
|
icy is an access control policy having two primary com-
|
|
ponents: mandatory and discretionary. The policy shall
|
|
include a discretionary policy for protecting the informa-
|
|
tion being processed based on the authorizations of indivi-
|
|
duals, users, or groups of users. This access control pol-
|
|
icy statement shall describe the requirements on the network
|
|
to prevent or detect "reading or destroying" sensitive
|
|
information by unauthorized users or errors. The mandatory
|
|
policy must define the set of distinct sensitivity levels
|
|
that it supports. For the Class B1 or above the mandatory
|
|
policy shall be based on the labels associated with the
|
|
information that reflects its sensitivity with respect to
|
|
secrecy and/or integrity, where applicable, and labels asso-
|
|
ciated with users to reflect their authorization to access
|
|
such information. Unauthorized users include both those
|
|
that are not authorized to use the network at all (e.g., a
|
|
user attempting to use a passive or active wire tap) or a
|
|
legitimate user of the network who is not authorized to
|
|
access a specific piece of information being protected.
|
|
|
|
Note that "users" does not include "operators," "system
|
|
programmers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network sys-
|
|
tem, for example, by defining membership of a group. These
|
|
individuals may also have the separate role of users.
|
|
|
|
|
|
SECRECY POLICY: The network sponsor shall define the
|
|
form of the discretionary and mandatory secrecy
|
|
policy that is enforced in the network to prevent
|
|
unauthorized users from reading the sensitive infor-
|
|
mation entrusted to the network.
|
|
|
|
|
|
DATA INTEGRITY POLICY: The network sponsor shall
|
|
define the discretionary and mandatory integrity
|
|
policy to prevent unauthorized users from modifying,
|
|
viz., writing, sensitive information. The defini-
|
|
tion of data integrity presented by the network
|
|
sponsor refers to the requirement that the informa-
|
|
tion has not been subjected to unauthorized modifi-
|
|
cation in the network. The mandatory integrity pol-
|
|
icy enforced by the NTCB cannot, in general, prevent
|
|
modification while information is being transmitted
|
|
between components. However, an integrity sensi-
|
|
tivity label may reflect the confidence that the
|
|
information has not been subjected to transmission
|
|
errors because of the protection afforded during
|
|
transmission. This requirement is distinct from the
|
|
requirement for label integrity.
|
|
|
|
+ Rationale
|
|
|
|
The word "sponsor" is used in place of alternatives
|
|
(such as "vendor," "architect," "manufacturer," and
|
|
"developer") because the alternatives indicate people who
|
|
may not be available, involved, or relevant at the time that
|
|
a network system is proposed for evaluation.
|
|
|
|
A trusted network is able to control both the reading
|
|
and writing of shared sensitive information. Control of
|
|
writing is used to protect against destruction of informa-
|
|
tion. A network normally is expected to have policy require-
|
|
ments to protect both the secrecy and integrity of the
|
|
information entrusted to it. In a network the integrity is
|
|
frequently as important or more important than the secrecy
|
|
requirements. Therefore the secrecy and/or integrity policy
|
|
to be enforced by the network must be stated for each net-
|
|
work regardless of its evaluation class. The assurance that
|
|
the policy is faithfully enforced is reflected in the
|
|
evaluation class of the network.
|
|
|
|
This control over modification is typically used to
|
|
protect information so that it may be relied upon and to
|
|
control the potential harm that would result if the informa-
|
|
tion were corrupted. The overall network policy require-
|
|
ments for integrity includes the protection for data both
|
|
while being processed in a component and while being
|
|
transmitted in the network. The access control policy
|
|
enforced by the NTCB relates to the access of subjects to
|
|
objects within each component. Communications integrity
|
|
addressed within Part II relates to information while being
|
|
transmitted.
|
|
|
|
The mandatory integrity policy (at class B1 and above)
|
|
in some architectures may be useful in supporting the link-
|
|
age between the connection oriented abstraction introduced
|
|
in the Introduction and the individual components of the
|
|
network. For example, in a key distribution center for
|
|
end-to-end encryption, a distinct integrity category may be
|
|
assigned to isolate the key generation code and data from
|
|
possible modification by other supporting processes in the
|
|
same component, such as operator interfaces and audit.
|
|
|
|
The mandatory integrity policy for some architecture
|
|
may define an integrity sensitivity label that reflects the
|
|
specific requirements for ensuring that information has not
|
|
been subject to random errors in excess of a stated limit
|
|
nor to unauthorized message stream modification (MSM) -.
|
|
The specific metric associated with an integrity sensitivity
|
|
label will generally reflect the intended applications of
|
|
the network.
|
|
|
|
|
|
3.2.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall define and control access between named users
|
|
and named objects (e.g., files and programs) in the ADP sys-
|
|
tem. The enforcement mechanism (e.g., self/group/public
|
|
_________________________
|
|
- See Voydock, Victor L. and Stephen T. Kent, "Secu-
|
|
rity Mechanisms in High-Level Network Protocols," Com-
|
|
___
|
|
puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
|
|
______ _______
|
|
|
|
|
|
controls, access control lists) shall allow users to specify
|
|
and control sharing of those objects by named individuals or
|
|
defined groups of individuals, or both, and shall provide
|
|
controls to limit propagation of access rights. The discre-
|
|
tionary access control mechanism shall, either by explicit
|
|
user action or by default, provide that objects are pro-
|
|
tected from unauthorized access. These access controls
|
|
shall be capable of including or excluding access to the
|
|
granularity of a single user. Access permission to an
|
|
object by users not already possessing access permission
|
|
shall only be assigned by authorized users.
|
|
|
|
+ Interpretation
|
|
|
|
The discretionary access control (DAC) mechanism(s) may
|
|
be distributed over the partitioned NTCB in various ways.
|
|
Some part, all, or none of the DAC may be implemented in a
|
|
given component of the network system. In particular, com-
|
|
ponents that support only internal subjects (i.e., that have
|
|
no subjects acting as direct surrogates for users), such as
|
|
a public network packet switch, might not implement the DAC
|
|
mechanism(s) directly (e.g., they are unlikely to contain
|
|
access control lists).
|
|
|
|
Identification of users by groups may be achieved in
|
|
various ways in the networking environment. For example,
|
|
the network identifiers (e.g., internet addresses) for vari-
|
|
ous components (e.g., hosts, gateways) can be used as iden-
|
|
tifiers of groups of individual users (e.g., "all users at
|
|
Host A," "all users of network Q") so long as the individu-
|
|
als involved in the group are implied by the group identif-
|
|
ier. For example, Host A might employ a particular group-id,
|
|
for which it maintains a list of explicit users in that
|
|
group, in its network exchange with Host B, which accepts
|
|
the group-id under the conditions of this interpretation.
|
|
|
|
For networks, individual hosts will impose need-to-know
|
|
controls over their users on the basis of named individuals
|
|
- much like (in fact, probably the same) controls used when
|
|
there is no network connection.
|
|
|
|
When group identifiers are acceptable for access con-
|
|
trol, the identifier of some other host may be employed, to
|
|
eliminate the maintenance that would be required if indivi-
|
|
dual identification of remote users was employed. In class
|
|
C2 and higher, however, it must be possible from that audit
|
|
record to identify (immediately or at some later time)
|
|
exactly the individuals represented by a group identifier at
|
|
the time of the use of that identifier. There is allowed to
|
|
be an uncertainty because of elapsed time between changes in
|
|
the group membership and the enforcement in the access con-
|
|
trol mechanisms.
|
|
|
|
The DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. The reference monitor manages
|
|
all the physical resources of the system and from them
|
|
creates the abstraction of subjects and objects that it con-
|
|
trols. Some of these subjects and objects may be used to
|
|
implement a part of the NTCB. When the DAC mechanism is
|
|
distributed in such NTCB subjects (i.e., when outside the
|
|
reference monitor), the assurance requirements (see the
|
|
Assurance section) for the design and implementation of the
|
|
DAC shall be those of class C2 for all networks of class C2
|
|
or above.
|
|
|
|
When integrity is included as part of the network dis-
|
|
cretionary security policy, the above interpretations shall
|
|
be specifically applied to the controls over modification,
|
|
viz, the write mode of access, within each component based
|
|
on identified users or groups of users.
|
|
|
|
+ Rationale
|
|
|
|
In this class, the supporting elements of the overall
|
|
DAC mechanism are required to isolate information (objects)
|
|
that supports DAC so that it is subject to auditing require-
|
|
ments (see the System Architecture section). The use of
|
|
network identifiers to identify groups of individual users
|
|
could be implemented, for example, as an X.25 community of
|
|
interest in the network protocol layer (layer 3). In all
|
|
other respects, the supporting elements of the overall DAC
|
|
mechanism are treated exactly as untrusted subjects are
|
|
treated with respect to DAC in an ADP system, with the same
|
|
result as noted in the interpretation.
|
|
|
|
A typical situation for DAC is that a surrogate process
|
|
for a remote user will be created in some host for access to
|
|
objects under the control of the NTCB partition within that
|
|
host. The interpretation requires that a user identifier be
|
|
assigned and maintained for each such process by the NTCB,
|
|
so that access by a surrogate process is subject to essen-
|
|
tially the same discretionary controls as access by a pro-
|
|
cess acting on behalf of a local user would be. However,
|
|
within this interpretation a range of possible interpreta-
|
|
tions of the assigned user identification is permitted.
|
|
|
|
The most obvious situation would exist if a global
|
|
database of network users were to be made permanently avail-
|
|
able on demand to every host, (i.e., a name server existed)
|
|
so that all user identifications were globally meaningful.
|
|
|
|
It is also acceptable, however, for some NTCB parti-
|
|
tions to maintain a database of locally-registered users for
|
|
its own use. In such a case, one could choose to inhibit
|
|
the creation of surrogate processes for locally unregistered
|
|
users, or (if permitted by the local policy) alternatively,
|
|
to permit the creation of surrogate processes with
|
|
preselected user and group identifiers which, in effect,
|
|
identify the process as executing on behalf of a member of a
|
|
group of users on a particular remote host. The intent of
|
|
the words concerning audit in the interpretation is to pro-
|
|
vide a minimally acceptable degree of auditability for cases
|
|
such as the last described. What is required is that there
|
|
be a capability, using the audit facilities provided by the
|
|
network NTCB partitions involved, to determine who was
|
|
logged in at the actual host of the group of remote users at
|
|
the time the surrogate processing occured.
|
|
|
|
Associating the proper user id with a surrogate process
|
|
is the job of identification and authentication. This means
|
|
that DAC is applied locally, with respect to the user id of
|
|
the surrogate process. The transmission of the data back
|
|
across the network to the user's host, and the creation of a
|
|
copy of the data there, is not the business of DAC.
|
|
|
|
Components that support only internal subjects impact
|
|
the implementation of the DAC by providing services by which
|
|
information (e.g., a user-id) is made available to a com-
|
|
ponent that makes a DAC decision. An example of the latter
|
|
would be the case that a user at Host A attempts to access a
|
|
file at Host B. The DAC decision might be (and usually
|
|
would be) made at Host B on the basis of a user-id transmit-
|
|
ted from Host A to Host B.
|
|
|
|
Unique user identification may be achieved by a variety
|
|
of mechanisms, including (a) a requirement for unique iden-
|
|
tification and authentication on the host where access takes
|
|
place; (b) recognition of fully qualified network
|
|
addresses authenticated by another host and forwarded to the
|
|
host where access takes place; or (c) administrative support
|
|
of a network-wide unique personnel identifier that could be
|
|
authenticated and forwarded by another host as in (b) above,
|
|
or could be authenticated and forwarded by a dedicated net-
|
|
work identification and authentication server. The proto-
|
|
cols which implement (b) or (c) are subject to the System
|
|
Architecture requirements.
|
|
|
|
Network support for DAC might be handled in other ways
|
|
than that described as "typical" above. In particular, some
|
|
form of centralized access control is often proposed. An
|
|
access control center may make all decisions for DAC, or it
|
|
may share the burden with the hosts by controlling host-to-
|
|
host connections, and leaving the hosts to decide on access
|
|
to their objects by users at a limited set of remote hosts.
|
|
In this case the access control center provides the linkage
|
|
between the connection oriented abstraction (as discussed in
|
|
the Introduction) and the overall network security policy
|
|
for DAC. In all cases the enforcement of the decision must
|
|
be provided by the host where the object resides.
|
|
|
|
There are two forms of distribution for the DAC mechan-
|
|
ism: implementing portions of the DAC in separate com-
|
|
ponents, and supporting the DAC in subjects contained within
|
|
the NTCB partition in a component. Since "the ADP system"
|
|
is understood to be "the computer network" as a whole, each
|
|
network component is responsible for enforcing security in
|
|
the mechanisms allocated to it to ensure secure implementa-
|
|
tion of the network security policy. For traditional host
|
|
systems it is frequently easy to also enforce the DAC along
|
|
with the MAC within the reference monitor, per se, although
|
|
a few approaches, such as virtual machine monitors, support
|
|
DAC outside this interface.
|
|
|
|
In contrast to the universally rigid structure of man-
|
|
datory policies (see the Mandatory Access Control section),
|
|
DAC policies tend to be very network and system specific,
|
|
with features that reflect the natural use of the system.
|
|
For networks it is common that individual hosts will impose
|
|
controls over their local users on the basis of named
|
|
individuals-much like the controls used when there is no
|
|
network connection. However, it is difficult to manage in a
|
|
centralized manner all the individuals using a large net-
|
|
work. Therefore, users on other hosts are commonly grouped
|
|
together so that the controls required by the network DAC
|
|
policy are actually based on the identity of the hosts or
|
|
other components. A gateway is an example of such a com-
|
|
ponent.
|
|
|
|
The assurance requirements are at the very heart of the
|
|
concept of a trusted system. It is the assurance that
|
|
determines if a system or network is appropriate for a given
|
|
environment, as reflected, for example, in the Environments
|
|
Guideline-. In the case of monolithic systems that have DAC
|
|
integral to the reference monitor, the assurance require-
|
|
ments for DAC are inseparable from those of the rest of the
|
|
reference monitor. For networks there is typically a much
|
|
clearer distinction due to distributed DAC. The rationale
|
|
for making the distinction in this network interpretation is
|
|
that if major trusted network components can be made signi-
|
|
ficantly easier to design and implement without reducing the
|
|
ability to meet security policy, then trusted networks will
|
|
be more easily available.
|
|
|
|
3.2.1.2 Object Reuse
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
All authorizations to the information contained within a
|
|
storage object shall be revoked prior to initial assignment,
|
|
allocation or reallocation to a subject from the TCB's pool
|
|
of unused storage objects. No information, including
|
|
encrypted representations of information, produced by a
|
|
prior subject's actions is to be available to any subject
|
|
that obtains access to an object that has been released back
|
|
to the system.
|
|
|
|
|
|
_________________________
|
|
- Guidance for Applying the Department of Defense
|
|
________ ___ ________ ___ __________ __ _______
|
|
Trusted Computer System Evaluation Criteria in Specific
|
|
_______ ________ ______ __________ ________ __ ________
|
|
Environments, CSC-STD-003-85.
|
|
____________
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The NTCB shall ensure that any storage objects that it
|
|
controls (e.g., message buffers under the control of a NTCB
|
|
partition in a component) contain no information for which a
|
|
subject in that component is not authorized before granting
|
|
access. This requirement must be enforced by each of the
|
|
NTCB partitions.
|
|
|
|
+ Rationale
|
|
|
|
In a network system, storage objects of interest are
|
|
things that the NTCB directly controls, such as message
|
|
buffers in components. Each component of the network system
|
|
must enforce the object reuse requirement with respect to
|
|
the storage objects of interest as determined by the network
|
|
security policy. For example, the DAC requirement in this
|
|
division leads to the requirement here that message buffers
|
|
be under the control of the NTCB partition. A buffer
|
|
assigned to an internal subject may be reused at the discre-
|
|
tion of that subject which is responsible for preserving the
|
|
integrity of message streams. Such controlled objects may
|
|
be implemented in physical resources, such as buffers, disk
|
|
sectors, tape space, and main memory, in components such as
|
|
network switches.
|
|
|
|
|
|
3.2.1.3 Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels associated with each ADP SYSTEM RESOURCE
|
|
(E.G., SUBJECT, STORAGE OBJECT, ROM) THAT IS DIRECTLY OR
|
|
INDIRECTLY ACCESSIBLE BY SUBJECTS EXTERNAL TO THE TCB shall
|
|
be maintained by the TCB. These labels shall be used as the
|
|
basis for mandatory access control decisions. In order to
|
|
import non-labeled data, the TCB shall request and receive
|
|
from an authorized user the sensitivity level of the data,
|
|
and all such actions shall be auditable by the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Non-labeled data imported under the control of the NTCB
|
|
partition will be assigned a label constrained by THE DEVICE
|
|
LABELS OF the single-level device used to import it. Labels
|
|
may include secrecy and integrity- components in accordance
|
|
with the overall network security policy described by the
|
|
network sponsor. Whenever the term "label" is used
|
|
throughout this interpretation, it is understood to include
|
|
both components as applicable. Similarly, the terms
|
|
"single-level" and "multilevel" are understood to be based
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Computer Systems," ESD-TR-76-372, MTR-
|
|
3153, The MITRE Corporation, Bedford, MA, April 1977.
|
|
|
|
|
|
on both the secrecy and integrity components of the policy.
|
|
The mandatory integrity policy will typically have require-
|
|
ments, such as the probability of undetected message stream
|
|
modification, that will be reflected in the label for the
|
|
data so protected. For example, when data is imported its
|
|
integrity label may be assigned based on mechanisms, such as
|
|
cryptography, used to provide the assurance required by the
|
|
policy. The NTCB shall assure that such mechanism are pro-
|
|
tected from tampering and are always invoked when they are
|
|
the basis for a label.
|
|
|
|
|
|
IF THE SECURITY POLICY INCLUDES AN INTEGRITY POLICY,
|
|
ALL ACTIVITIES THAT RESULT IN MESSAGE-STREAM MODIFICATION
|
|
DURING TRANSMISSION ARE REGARDED AS UNAUTHORIZED ACCESSES IN
|
|
VIOLATION OF THE INTEGRITY POLICY. THE NTCB SHALL HAVE AN
|
|
AUTOMATED CAPABILITY FOR TESTING, DETECTING, AND REPORTING
|
|
THOSE ERRORS/CORRUPTIONS THAT EXCEED SPECIFIED NETWORK
|
|
INTEGRITY POLICY REQUIREMENTS. MESSAGE-STREAM MODIFICATION
|
|
(MSM) COUNTERMEASURES SHALL BE IDENTIFIED. A TECHNOLOGY OF
|
|
ADEQUATE STRENGTH SHALL BE SELECTED TO RESIST MSM. IF
|
|
ENCRYPTION METHODOLOGIES ARE EMPLOYED, THEY SHALL BE
|
|
APPROVED BY THE NATIONAL SECURITY AGENCY.
|
|
|
|
ALL OBJECTS MUST BE LABELED WITHIN EACH COMPONENT OF
|
|
THE NETWORK THAT IS TRUSTED TO MAINTAIN SEPARATION OF MULTI-
|
|
PLE LEVELS OF INFORMATION. THE LABEL ASSOCIATED WITH ANY
|
|
OBJECTS ASSOCIATED WITH SINGLE-LEVEL COMPONENTS WILL BE
|
|
IDENTICAL TO THE LEVEL OF THAT COMPONENT. OBJECTS USED TO
|
|
STORE NETWORK CONTROL INFORMATION, AND OTHER NETWORK STRUC-
|
|
TURES, SUCH AS ROUTING TABLES, MUST BE LABELED TO PREVENT
|
|
UNAUTHORIZED ACCESS AND/OR MODIFICATION.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system and partitioned NTCB as
|
|
defined for these network interpretations. A single-level
|
|
device may be regarded either as a subject or an object. A
|
|
multilevel device is regarded as a trusted subject in which
|
|
the security range of the subject is the minimum-maximum
|
|
range of the data expected to be transmitted over the dev-
|
|
ice.
|
|
|
|
The sensitivity labels for either secrecy or integrity
|
|
or both may reflect non-hierarchical categories or hierarch-
|
|
ical classification or both.
|
|
|
|
FOR A NETWORK IT IS NECESSARY THAT THIS REQUIREMENT BE
|
|
APPLIED TO ALL NETWORK SYSTEM RESOURCES AT THE (B2) LEVEL
|
|
AND ABOVE.
|
|
|
|
THE NTCB IS RESPONSIBLE FOR IMPLEMENTING THE NETWORK
|
|
INTEGRITY POLICY, WHEN ONE EXISTS. THE NTCB MUST ENFORCE
|
|
THAT POLICY BY ENSURING THAT INFORMATION IS ACCURATELY
|
|
TRANSMITTED FROM SOURCE TO DESTINATION (REGARDLESS OF THE
|
|
NUMBER OF INTERVENING CONNECTING POINTS). THE NTCB MUST BE
|
|
ABLE TO COUNTER EQUIPMENT FAILURE, ENVIRONMENTAL DISRUP-
|
|
TIONS, AND ACTIONS BY PERSONS AND PROCESSES NOT AUTHORIZED
|
|
TO ALTER THE DATA. PROTOCOLS THAT PERFORM CODE OR FORMAT
|
|
CONVERSION SHALL PRESERVE THE INTEGRITY OF DATA AND CONTROL
|
|
INFORMATION.
|
|
|
|
THE PROBABILITY OF AN UNDETECTED TRANSMISSION ERROR MAY
|
|
BE SPECIFIED AS PART OF THE NETWORK SECURITY POLICY SO THAT
|
|
THE ACCEPTABILITY OF THE NETWORK FOR ITS INTENDED APPLICA-
|
|
TION MAY BE DETERMINED. THE SPECIFIC METRICS (E.G., PROBA-
|
|
BILITY OF UNDETECTED MODIFICATION) SATISFIED BY THE DATA CAN
|
|
BE REFLECTED IN THE INTEGRITY SENSITIVITY LABEL ASSOCIATED
|
|
WITH THE DATA WHILE IT IS PROCESSED WITHIN A COMPONENT. IT
|
|
IS RECOGNIZED THAT DIFFERENT APPLICATIONS AND OPERATIONAL
|
|
ENVIRONMENTS (E.G., CRISIS AS COMPARED TO LOGISTIC) WILL
|
|
HAVE DIFFERENT INTEGRITY REQUIREMENTS.
|
|
|
|
THE NETWORK SHALL ALSO HAVE AN AUTOMATED CAPABILITY OF
|
|
TESTING FOR, DETECTING, AND REPORTING ERRORS THAT EXCEED A
|
|
THRESHOLD CONSISTENT WITH THE OPERATIONAL MODE REQUIREMENTS.
|
|
THE EFFECTIVENESS OF INTEGRITY COUNTERMEASURES MUST BE ESTA-
|
|
BLISHED WITH THE SAME RIGOR AS THE OTHER SECURITY-RELEVANT
|
|
PROPERTIES SUCH AS SECRECY.
|
|
|
|
CRYPTOGRAPHY IS OFTEN UTILIZED AS A BASIS TO PROVIDE
|
|
DATA INTEGRITY ASSURANCE. MECHANISMS, SUCH AS MANIPULATION
|
|
DETECTION CODES (MDC)-, MAY BE USED. THE ADEQUACY OF THE
|
|
ENCRYPTION OR MDC ALGORITHM, THE CORRECTNESS OF THE PROTOCOL
|
|
LOGIC, AND THE ADEQUACY OF IMPLEMENTATION MUST BE ESTA-
|
|
BLISHED IN MSM COUNTERMEASURES DESIGN.
|
|
|
|
|
|
|
|
3.2.1.3.1 Label Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels shall accurately represent sensitivity
|
|
levels of the specific subjects or objects with which they
|
|
are associated. When exported by the TCB, sensitivity
|
|
labels shall accurately and unambiguously represent the
|
|
internal labels and shall be associated with the information
|
|
being exported.
|
|
|
|
+ Interpretation
|
|
|
|
The phrase "exported by the TCB" is understood to
|
|
include transmission of information from an object in one
|
|
component to an object in another component. Information
|
|
transferred between NTCB partitions is addressed in the Sys-
|
|
tem Integrity Section. The form of internal and external
|
|
(exported) sensitivity labels may differ, but the meaning
|
|
shall be the same. The NTCB shall, in addition, ensure that
|
|
_________________________
|
|
- See Jueneman, R. R., "Electronic Document Authenti-
|
|
cation," IEEE Network Magazine, April 1987, pp 17-23.
|
|
____ _______ ________
|
|
|
|
correct association of sensitivity labels with the informa-
|
|
tion being transported across the network is preserved.
|
|
|
|
As mentioned in the Trusted Facility Manual Section,
|
|
encryption transforms the representation of information so
|
|
that it is unintelligible to unauthorized subjects.
|
|
Reflecting this transformation, the sensitivity level of the
|
|
ciphertext is generally lower than the cleartext. It fol-
|
|
lows that cleartext and ciphertext are contained in dif-
|
|
ferent objects, each possessing its own label. The label of
|
|
the cleartext must be preserved and associated with the
|
|
ciphertext so that it can be restored when the cleartext is
|
|
subsequently obtained by decrypting the ciphertext. If the
|
|
cleartext is associated with a single-level device, the
|
|
label of that cleartext may be implicit. The label may also
|
|
be implicit in the key.
|
|
|
|
When information is exported to an environment where it
|
|
is subject to deliberate or accidental modification, the TCB
|
|
shall support the means, such as cryptographic checksums, to
|
|
assure the accuracy of the labels. When there is a manda-
|
|
tory integrity policy, the policy will define the meaning of
|
|
integrity labels.
|
|
|
|
+ Rationale
|
|
|
|
Encryption algorithms and their implementation are out-
|
|
side the scope of these interpretations. Such algorithms
|
|
may be implemented in a separate device or may be incor-
|
|
porated in a subject of a larger component. Without preju-
|
|
dice, either implementation packaging is referred to as an
|
|
encryption mechanism herein. If encryption methodologies are
|
|
employed in this regard, they shall be approved by the
|
|
National Security Agency (NSA). The encryption process is
|
|
part of the Network Trusted Computer Base partition in the
|
|
components in which it is implemented.
|
|
|
|
The encryption mechanism is not necessarily a mul-
|
|
tilevel device or multilevel subject, as these terms are
|
|
used in these criteria. The process of encryption is mul-
|
|
tilevel by definition. The cleartext and ciphertext inter-
|
|
faces carry information of different sensitivity. An
|
|
encryption mechanism does not process data in the sense of
|
|
performing logical or arithmetic operations on that data
|
|
with the intent of producing new data. The cleartext and
|
|
ciphertext interfaces on the encryption mechanism must be
|
|
separately identified as being single-level or multilevel.
|
|
If the interface is single-level, then the sensitivity of
|
|
the data is established by a trusted individual and impli-
|
|
citly associated with the interface; the Exportation to
|
|
Single-Level Devices criterion applies.
|
|
|
|
If the interface is multilevel, then the data must be
|
|
labeled; the Exportation to Multilevel Devices criterion
|
|
applies. The network architect is free to select an accept-
|
|
able mechanism for associating a label with an object. With
|
|
reference to encrypted objects, the following examples are
|
|
possible:
|
|
|
|
1. Include a label field in the protocol definition of
|
|
the object.
|
|
|
|
2. Implicitly associate the label with the object
|
|
through the encryption key. That is, the encryption
|
|
key uniquely identifies a sensitivity level. A sin-
|
|
gle or private key must be protected at the level of
|
|
the data that it encrypts.
|
|
|
|
|
|
3.2.1.3.2 Exportation of Labeled Information
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall designate each communication channel and I/O
|
|
device as either single-level or multilevel. Any change in
|
|
this designation shall be done manually and shall be audit-
|
|
able by the TCB. The TCB shall maintain and be able to
|
|
audit any change in the sensitivity level or levels associ-
|
|
ated with a communications channel or I/O device.
|
|
|
|
+ Interpretation
|
|
|
|
Each communication channel and network component shall
|
|
be designated as either single-level or multilevel. Any
|
|
change in this designation shall be done with the cognizance
|
|
and approval of the administrator or security officer in
|
|
charge of the affected components and the administrator or
|
|
security officer in charge of the NTCB. This change shall
|
|
be auditable by the network. The NTCB shall maintain and be
|
|
able to audit any change in the DEVICE LABELS associated
|
|
with a single-level communication channel or the range asso-
|
|
ciated with a multilevel communication channel or component.
|
|
The NTCB shall also be able to audit any change in the set
|
|
of sensitivity levels associated with the information which
|
|
can be transmitted over a multilevel communication channel
|
|
or component.
|
|
|
|
+ Rationale
|
|
|
|
Communication channels and components in a network are
|
|
analogous to communication channels and I/O devices in
|
|
stand-alone systems. They must be designated as either mul-
|
|
tilevel (i.e., able to distinguish and maintain separation
|
|
among information of various sensitivity levels) or single-
|
|
level. As in the TCSEC, single-level devices may only be
|
|
attached to single-level channels.
|
|
|
|
The level or set of levels of information that can be
|
|
sent to a component or over a communication channel shall
|
|
only change with the knowledge and approval of the security
|
|
officers (or system administrator, if there is no security
|
|
officer) of the network, and of the affected components.
|
|
This requirement ensures that no significant security-
|
|
relevant changes are made without the approval of all
|
|
affected parties.
|
|
|
|
|
|
3.2.1.3.2.1 Exportation to Multilevel Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
When the TCB exports an object to a multilevel I/O device,
|
|
the sensitivity label associated with that object shall also
|
|
be exported and shall reside on the same physical medium as
|
|
the exported information and shall be in the same form
|
|
(i.e., machine-readable or human-readable form). When the
|
|
TCB exports or imports an object over a multilevel communi-
|
|
cations channel, the protocol used on that channel shall
|
|
provide for the unambiguous pairing between the sensitivity
|
|
labels and the associated information that is sent or
|
|
received.
|
|
|
|
+ Interpretation
|
|
|
|
The components, including hosts, of a network shall be
|
|
interconnected over "multilevel communication channels,"
|
|
multiple single-level communication channels, or both, when-
|
|
ever the information is to be protected at more than a sin-
|
|
gle sensitivity level. The protocol for associating the
|
|
sensitivity label and the exported information shall provide
|
|
the only information needed to correctly associate a sensi-
|
|
tivity level with the exported information transferred over
|
|
the multilevel channel between the NTCB partitions in indi-
|
|
vidual components. This protocol definition must specify the
|
|
representation and semantics of the sensitivity labels
|
|
(i.e., the machine-readable label must uniquely represent
|
|
the sensitivity level).
|
|
|
|
The "unambiguous" association of the sensitivity level
|
|
with the communicated information shall meet the same level
|
|
of accuracy as that required for any other label within the
|
|
NTCB, as specified in the criterion for Label Integrity.
|
|
This may be provided by protected and highly reliable direct
|
|
physical layer connections, or by traditional cryptographic
|
|
link protection in which any errors during transmission can
|
|
be readily detected, or by use of a separate channel. THE
|
|
RANGE OF INFORMATION IMPORTED OR EXPORTED MUST BE CON-
|
|
STRAINED BY THE ASSOCIATED DEVICE LABELS.
|
|
|
|
+ Rationale
|
|
|
|
This protocol must specify the representation and
|
|
semantics of the sensitivity labels. See the Mandatory
|
|
Access Control Policies section in Appendix B. The mul-
|
|
tilevel device interface to (untrusted) subjects may be
|
|
implemented either by the interface of the reference moni-
|
|
tor, per se, or by a multilevel subject (e.g., a "trusted
|
|
subject" as defined in the Bell-LaPadula Model) that pro-
|
|
vides the labels based on the internal labels of the NTCB
|
|
partition.
|
|
|
|
The current state of the art limits the support for
|
|
mandatory policy that is practical for secure networks.
|
|
Reference monitor support to ensure the control over all the
|
|
operations of each subject in the network must be completely
|
|
provided within the single NTCB partition on which that sub-
|
|
ject interfaces to the NTCB. This means that the entire
|
|
portion of the "secure state" represented in the FORMAL
|
|
security policy model that may be changed by transitions
|
|
invoked by this subject must be contained in the same com-
|
|
ponent.
|
|
|
|
The secure state of an NTCB partition may be affected
|
|
by events external to the component in which the NTCB parti-
|
|
tion resides (e.g., arrival of a message). The effect
|
|
occurs asynchronusly after being initiated by an event in
|
|
another component or partition. For example, indeterminate
|
|
delays may occur between the initiation of a message in one
|
|
component, the arrival of the message in the NTCB partition
|
|
in another component, and the corresponding change to the
|
|
secure state of the second component. Since each component
|
|
is executing concurrently, to do otherwise would require
|
|
some sort of network-wide control to synchronize state tran-
|
|
sitions, such as a global network-wide clock for all proces-
|
|
sors; in general, such designs are not practical and prob-
|
|
ably not even desirable. Therefore, the interaction between
|
|
NTCB partitions is restricted to just communications between
|
|
pairs (at least logically) of devices-multilevel devices if
|
|
the device(s) can send/receive data of more than a single
|
|
level. For broadcast channels the pairs are the sender and
|
|
intended receiver(s). However, if the broadcast channel
|
|
carries multiple levels of information, additional mechanism
|
|
(e.g., cryptochecksum maintained by the TCB) may be required
|
|
to enforce separation and proper delivery.
|
|
|
|
A common representation for sensitivity labels is
|
|
needed in the protocol used on that channel and understood
|
|
by both the sender and receiver when two multilevel devices
|
|
(in this case, in two different components) are intercon-
|
|
nected. Each distinct sensitivity level of the overall net-
|
|
work policy must be represented uniquely in these labels.
|
|
|
|
Within a monolithic TCB, the accuracy of the sensi-
|
|
tivity labels is generally assured by simple techniques,
|
|
e.g., very reliable connections over very short physical
|
|
connections, such as on a single printed circuit board or
|
|
over an internal bus. In many network environments there is
|
|
a much higher probability of accidentally or maliciously
|
|
introduced errors, and these must be protected against.
|
|
|
|
|
|
3.2.1.3.2.2 Exportation to Single-Level Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Single-level I/O devices and single-level communication
|
|
channels are not required to maintain the sensitivity labels
|
|
of the information they process. However, the TCB shall
|
|
include a mechanism by which the TCB and an authorized user
|
|
reliably communicate to designate the single sensitivity
|
|
level of information imported or exported via single-level
|
|
communication channels or I/O devices.
|
|
|
|
+ Interpretation
|
|
|
|
Whenever one or both of two directly connected com-
|
|
ponents is not trusted to maintain the separation of infor-
|
|
mation of different sensitivity levels, or whenever the two
|
|
directly connected components have only a single sensitivity
|
|
level in common, the two components of the network shall
|
|
communicate over a single-level channel. Single-level com-
|
|
ponents and single-level communication channels are not
|
|
required to maintain the sensitivity labels of the informa-
|
|
tion they process. However, the NTCB shall include a reli-
|
|
able communication mechanism by which the NTCB and an
|
|
authorized user (VIA A TRUSTED PATH) or a subject within an
|
|
NTCB partition can designate the single sensitivity level of
|
|
information imported or exported via single-level communica-
|
|
tion channels or network components. THE LEVEL OF INFORMA-
|
|
TION COMMUNICATED MUST EQUAL THE DEVICE LEVEL.
|
|
|
|
+ Rationale
|
|
|
|
Single-level communications channels and single-level
|
|
components in networks are analogous to single level chan-
|
|
nels and I/O devices in stand-alone systems in that they are
|
|
not trusted to maintain the separation of information of
|
|
different sensitivity levels. The labels associated with
|
|
data transmitted over those channels and by those components
|
|
are therefore implicit; the NTCB associates labels with the
|
|
data because of the channel or component, not because of an
|
|
explicit part of the bit stream. Note that the sensitivity
|
|
level of encrypted information is the level of the cipher-
|
|
text rather than the original level(s) of the plaintext.
|
|
|
|
|
|
3.2.1.3.2.3 Labeling Human-Readable Output
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The ADP system administrator shall be able to specify the
|
|
printable label names associated with exported sensitivity
|
|
labels. The TCB shall mark the beginning and end of all
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the output. The TCB
|
|
shall, by default, mark the top and bottom of each page of
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the page. The TCB shall,
|
|
by default and in an appropriate manner, mark other forms of
|
|
human readable output (e.g., maps, graphics) with human-
|
|
readable sensitivity labels that properly1 represent the
|
|
sensitivity of the output. Any override of these markings
|
|
defaults shall be auditable by the TCB.
|
|
_________________________
|
|
1 The hierarchical classification component in human-readable
|
|
sensitivity labels shall be equal to the greatest hierarchical
|
|
classification of any of the information in the output that the
|
|
labels refer to; the non-hierarchical category component shall
|
|
include all of the non-hierarchical categories of the information
|
|
in the output the labels refer to, but to no other non-
|
|
hierarchical categories.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
This criterion imposes no requirement to a component
|
|
that produces no human-readable output. For those that do
|
|
produce human-readable output, each sensitivity level that
|
|
is defined to the network shall have a uniform meaning
|
|
across all components. The network administrator, in con-
|
|
junction with any affected component administrator, shall be
|
|
able to specify the human-readable label that is associated
|
|
with each defined sensitivity level.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system and
|
|
partitioned NTCB as defined for these network interpreta-
|
|
tions.
|
|
|
|
|
|
3.2.1.3.3 Subject Sensitivity Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL IMMEDIATELY NOTIFY A TERMINAL USER OF EACH
|
|
CHANGE IN THE SENSITIVITY LEVEL ASSOCIATED WITH THAT USER
|
|
DURING AN INTERACTIVE SESSION. A TERMINAL USER SHALL BE
|
|
ABLE TO QUERY THE TCB AS DESIRED FOR A DISPLAY OF THE
|
|
SUBJECT'S COMPLETE SENSITIVITY LABEL.
|
|
|
|
+ Interpretation
|
|
|
|
AN NTCB PARTITION SHALL IMMEDIATELY NOTIFY A TERMINAL
|
|
USER ATTACHED TO ITS COMPONENT OF EACH CHANGE IN THE SENSI-
|
|
TIVITY LEVEL ASSOCIATED WITH THAT USER.
|
|
|
|
+ Rationale
|
|
|
|
THE LOCAL NTCB PARTITION MUST ENSURE THAT THE USER
|
|
UNDERSTANDS THE SENSITIVITY LEVEL OF INFORMATION SENT TO AND
|
|
FROM A TERMINAL. WHEN A USER HAS A SURROGATE PROCESS IN
|
|
ANOTHER COMPONENT, ADJUSTMENTS TO ITS LEVEL MAY OCCUR TO
|
|
MAINTAIN COMMUNICATION WITH THE USER. THESE CHANGES MAY
|
|
OCCUR ASYNCHRONOUSLY. SUCH ADJUSTMENTS ARE NECESSITATED BY
|
|
MANDATORY ACCESS CONTROL AS APPLIED TO THE OBJECTS INVOLVED
|
|
IN THE COMMUNICATION PATH.
|
|
|
|
|
|
3.2.1.3.4 Device Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL SUPPORT THE ASSIGNMENT OF MINIMUM AND MAXIMUM
|
|
SENSITIVITY LEVELS TO ALL ATTACHED PHYSICAL DEVICES. THESE
|
|
SENSITIVITY LEVELS SHALL BE USED BY THE TCB TO ENFORCE CON-
|
|
STRAINTS IMPOSED BY THE PHYSICAL ENVIRONMENTS IN WHICH THE
|
|
DEVICES ARE LOCATED.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
THIS REQUIREMENT APPLIES AS WRITTEN TO EACH NTCB PARTI-
|
|
TION THAT IS TRUSTED TO SEPARATE INFORMATION BASED ON SENSI-
|
|
TIVITY LEVEL. EACH I/O DEVICE IN A COMPONENT, USED FOR COM-
|
|
MUNICATION WITH OTHER NETWORK COMPONENTS, IS ASSIGNED A DEV-
|
|
ICE RANGE, CONSISTING OF A SET OF LABELS WITH A MAXIMUM AND
|
|
MINIMUM. (A DEVICE RANGE USUALLY CONTAINS, BUT DOES NOT
|
|
NECESSARILY CONTAIN, ALL POSSIBLE LABELS "BETWEEN" THE MAX-
|
|
IMUM AND MINIMUM, IN THE SENSE OF DOMINATING THE MINIMUM AND
|
|
BEING DOMINATED BY THE MAXIMUM.)
|
|
|
|
THE NTCB ALWAYS PROVIDES AN ACCURATE LABEL FOR INFORMA-
|
|
TION EXPORTED THROUGH DEVICES. INFORMATION EXPORTED OR
|
|
IMPORTED USING A SINGLE-LEVEL DEVICE IS LABELLED IMPLICITLY
|
|
BY THE SENSITIVITY LEVEL OF THE DEVICE. INFORMATION
|
|
EXPORTED FROM ONE MULTILEVEL DEVICE AND IMPORTED AT ANOTHER
|
|
MUST BE LABELLED THROUGH AN AGREED-UPON PROTOCOL, UNLESS IT
|
|
IS LABELLED IMPLICITLY BY USING A COMMUNICATION LINK THAT
|
|
ALWAYS CARRIES A SINGLE LEVEL.
|
|
|
|
INFORMATION EXPORTED AT A GIVEN SENSITIVITY LEVEL CAN
|
|
BE SENT ONLY TO AN IMPORTING DEVICE WHOSE DEVICE RANGE CON-
|
|
TAINS THAT LEVEL OR A HIGHER LEVEL. IF THE IMPORTING DEVICE
|
|
RANGE DOES NOT CONTAIN THE GIVEN LEVEL, THE INFORMATION IS
|
|
RELABELLED UPON RECEPTION AT A HIGHER LEVEL WITHIN THE
|
|
IMPORTING DEVICE RANGE. RELABELLING SHOULD NOT OCCUR OTHER-
|
|
WISE.
|
|
|
|
+ Rationale
|
|
|
|
THE PURPOSE OF DEVICE LABELS IS TO REFLECT AND CON-
|
|
STRAIN THE SENSITIVITY LEVELS OF INFORMATION AUTHORIZED FOR
|
|
THE PHYSICAL ENVIRONMENT IN WHICH THE DEVICES ARE LOCATED.
|
|
|
|
THE INFORMATION TRANSFER RESTRICTIONS PERMIT ONE-WAY
|
|
COMMUNICATION (I.E., NO ACKNOWLEDGEMENTS) FROM ONE DEVICE TO
|
|
ANOTHER WHOSE RANGES HAVE NO LEVEL IN COMMON, AS LONG AS
|
|
EACH LEVEL IN THE SENDING DEVICE RANGE IS DOMINATED BY SOME
|
|
LEVEL IN THE RECEIVING DEVICE RANGE. IT IS NEVER PERMITTED
|
|
TO SEND INFORMATION AT A GIVEN LEVEL TO A DEVICE WHOSE RANGE
|
|
DOES NOT CONTAIN A DOMINATING LEVEL. (SEE APPENDIX C FOR
|
|
SIMILAR INTERCONNECTION RULES FOR THE INTERCONNECTED AIS
|
|
VIEW.)
|
|
|
|
3.2.1.4 Mandatory Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall enforce a mandatory access control policy over
|
|
all RESOURCES (I.E., SUBJECTS, STORAGE OBJECTS, AND I/O DEV-
|
|
ICES) THAT ARE DIRECTLY OR INDIRECTLY ACCESSIBLE BY SUBJECTS
|
|
EXTERNAL TO THE TCB. These subjects and objects shall be
|
|
assigned sensitivity labels that are a combination of
|
|
hierarchical classification levels and non-hierarchical
|
|
categories, and the labels shall be used as the basis for
|
|
mandatory access control decisions. The TCB shall be able
|
|
to support two or more such sensitivity levels. (See the
|
|
Mandatory Access Control interpretations.) The following
|
|
requirements shall hold for all accesses between ALL SUB-
|
|
JECTS EXTERNAL TO THE TCB AND ALL OBJECTS DIRECTLY OR
|
|
INDIRECTLY ACCESSIBLE BY THESE SUBJECTS. A subject can
|
|
read an object only if the hierarchical classification in
|
|
the subject's sensitivity level is greater than or equal to
|
|
the hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level include all the non-hierarchical
|
|
categories in the object's sensitivity level. A subject can
|
|
write an object only if the hierarchical classification in
|
|
the subject's sensitivity level is less than or equal to the
|
|
hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level are included in the non-hierarchical
|
|
categories in the object's sensitivity level. Identification
|
|
and authentication data shall be used by the TCB to authen-
|
|
ticate the user's identity and to ensure that the sensi-
|
|
tivity level and authorization of subjects external to the
|
|
TCB that may be created to act on behalf of the individual
|
|
user are dominated by the clearance and authorization of
|
|
that user.
|
|
|
|
+ Interpretation
|
|
|
|
Each partition of the NTCB exercises mandatory access
|
|
control policy over all subjects and objects in its COM-
|
|
PONENT. In a network, the responsibility of an NTCB parti-
|
|
tion encompasses all mandatory access control functions in
|
|
its component that would be required of a TCB in a stand-
|
|
alone system. In particular, subjects and objects used for
|
|
communication with other components are under the control of
|
|
the NTCB partition. Mandatory access control includes
|
|
secrecy and integrity control to the extent that the network
|
|
sponsor has described in the overall network security pol-
|
|
icy.
|
|
|
|
Conceptual entities associated with communication
|
|
between two components, such as sessions, connections and
|
|
virtual circuits, may be thought of as having two ends, one
|
|
in each component, where each end is represented by a local
|
|
object. Communication is viewed as an operation that copies
|
|
information from an object at one end of a communication
|
|
path to an object at the other end. Transient data-carrying
|
|
entities, such as datagrams and packets, exist either as
|
|
information within other objects, or as a pair of objects,
|
|
one at each end of the communication path.
|
|
|
|
The requirement for "two or more" sensitivity levels
|
|
can be met by either secrecy or integrity levels. When
|
|
there is a mandatory integrity policy, the stated require-
|
|
ments for reading and writing are generalized to: A subject
|
|
can read an object only if the subject's sensitivity level
|
|
dominates the object's sensitivity level, and a subject can
|
|
write an object only if the object's sensitivity level dom-
|
|
inates the subject's sensitivity level. Based on the
|
|
integrity policy, the network sponsor shall define the domi-
|
|
nance relation for the total label, for example, by combin-
|
|
ing secrecy and integrity lattices. -
|
|
|
|
+ Rationale
|
|
|
|
An NTCB partition can maintain access control only over
|
|
subjects and objects in its component. AT LEVELS B2 AND
|
|
ABOVE, THE NTCB PARTITION MUST MAINTAIN ACCESS CONTROL OVER
|
|
ALL SUBJECTS AND OBJECTS IN ITS COMPONENT. Access by a sub-
|
|
ject in one component to information contained in an object
|
|
in another component requires the creation of a subject in
|
|
the remote component which acts as a surrogate for the first
|
|
subject.
|
|
|
|
The mandatory access controls must be enforced at the
|
|
interface of the reference monitor (viz. the mechanism that
|
|
controls physical processing resources) for each NTCB parti-
|
|
tion. This mechanism creates the abstraction of subjects
|
|
and objects which it controls. Some of these subjects out-
|
|
side the reference monitor, per se, may be designated to
|
|
implement part of an NTCB partition's mandatory policy,
|
|
e.g., by using the ``trusted subjects" defined in the Bell-
|
|
LaPadula model.
|
|
|
|
The prior requirements on exportation of labeled infor-
|
|
mation to and from I/O devices ensure the consistency
|
|
between the sensitivity labels of objects connected by a
|
|
communication path. As noted in the introduction, the net-
|
|
work architecture must recognize the linkage between the
|
|
overall mandatory network security policy and the connection
|
|
oriented abstraction. For example, individual data-carrying
|
|
entities such as datagrams can have individual sensitivity
|
|
labels that subject them to mandatory access control in each
|
|
component. The abstraction of a single-level connection is
|
|
realized and enforced implicitly by an architecture while a
|
|
connection is realized by single-level subjects that neces-
|
|
sarily employ only datagrams of the same level.
|
|
|
|
The fundamental trusted systems technology permits the
|
|
DAC mechanism to be distributed, in contrast to the require-
|
|
ments for mandatory access control. For networks this
|
|
separation of MAC and DAC mechanisms is the rule rather than
|
|
_________________________
|
|
- See, for example, Grohn, M. J., A Model of a Pro-
|
|
_ _____ __ _ ___
|
|
tected Data Management System, ESD-TR-76-289, I. P.
|
|
______ ____ __________ ______
|
|
Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
|
|
Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
|
|
and Shockley, W., Secure Distributed Data Views, Secu-
|
|
______ ___________ ____ _____ ____
|
|
rity Policy and Interpretation for a Class A1 Multilev-
|
|
____ ______ ___ ______________ ___ _ _____ __ ________
|
|
el Secure Relational Database System,SRI International,
|
|
__ ______ __________ ________ ______
|
|
November 1986.
|
|
|
|
the exception.
|
|
|
|
The set of total sensitivity labels used to represent
|
|
all the sensitivity levels for the mandatory access control
|
|
(combined data secrecy and data integrity) policy always
|
|
forms a partially ordered set. Without loss of generality,
|
|
this set of labels can always be extended to form a lattice,
|
|
by including all the combinations of non-hierarchical
|
|
categories. As for any lattice, a dominance relation is
|
|
always defined for the total sensitivity labels. For admin-
|
|
istrative reasons it may be helpful to have a maximum level
|
|
which dominates all others.
|
|
|
|
|
|
3.2.2 Accountability
|
|
_ _ _ ______________
|
|
|
|
|
|
3.2.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall require users to identify themselves to it
|
|
before beginning to perform any other actions that the TCB
|
|
is expected to mediate. Furthermore, the TCB shall maintain
|
|
authentication data that includes information for verifying
|
|
the identify of individual users (e.g., passwords) as well
|
|
as information for determining the clearance and authoriza-
|
|
tions of individual users. This data shall be used by the
|
|
TCB to authenticate the user's identity and to ensure that
|
|
the sensitivity level and authorization of subjects external
|
|
to the TCB that may be created to act on behalf of the indi-
|
|
vidual user are dominated by the clearance and authorization
|
|
of that user. The TCB shall protect authentication data so
|
|
that it cannot be accessed by any unauthorized user. The
|
|
TCB shall be able to enforce individual accountability by
|
|
providing the capability to uniquely identify each indivi-
|
|
dual ADP system user. The TCB shall also provide the capa-
|
|
bility of associating this identity with all auditable
|
|
actions taken by that individual.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement for identification and authentication
|
|
of users is the same for a network system as for an ADP sys-
|
|
tem. The identification and authentication may be done by
|
|
the component to which the user is directly connected or
|
|
some other component, such as an identification and authen-
|
|
tication server. Available techniques, such as those
|
|
described in the Password Guideline=, are generally also
|
|
applicable in the network context. However, in cases where
|
|
the NTCB is expected to mediate actions of a host (or other
|
|
network component) that is acting on behalf of a user or
|
|
group of users, the NTCB may employ identification and
|
|
_________________________
|
|
= Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, CSC-STD-002-85
|
|
____
|
|
|
|
|
|
authentication of the host (or other component) in lieu of
|
|
identification and authentication of an individual user, so
|
|
long as the component identifier implies a list of specific
|
|
users uniquely associated with the identifier at the time of
|
|
its use for authentication. This requirement does not apply
|
|
to internal subjects.
|
|
|
|
Authentication information, including the identity of a
|
|
user (once authenticated) may be passed from one component
|
|
to another without reauthentication, so long as the NTCB
|
|
protects (e.g., by encryption) the information from unau-
|
|
thorized disclosure and modification. This protection shall
|
|
provide at least a similar level of assurance (or strength
|
|
of mechanism) as pertains to the protection of the authenti-
|
|
cation mechanism and authentication data.
|
|
|
|
+ Rationale
|
|
|
|
The need for accountability is not changed in the con-
|
|
text of a network system. The fact that the NTCB is parti-
|
|
tioned over a set of components neither reduces the need nor
|
|
imposes new requirements. That is, individual accountabil-
|
|
ity is still the objective. Also, in the context of a net-
|
|
work system at the (C2) level or higher "individual accoun-
|
|
tability" can be satisfied by identification of a host (or
|
|
other component) so long as the requirement for traceability
|
|
to individual users or a set of specific individual users
|
|
with active subjects is satisfied. There is allowed to be an
|
|
uncertainty in traceability because of elapsed time between
|
|
changes in the group membership and the enforcement in the
|
|
access control mechanisms. In addition, there is no need in
|
|
a distributed processing system like a network to reauthen-
|
|
ticate a user at each point in the network where a projec-
|
|
tion of a user (via the subject operating on behalf of the
|
|
user) into another remote subject takes place.
|
|
|
|
The passing of identifiers and/or authentication infor-
|
|
mation from one component to another is usually done in sup-
|
|
port to the implementation of the discretionary access con-
|
|
trol (DAC). This support relates directly to the DAC
|
|
regarding access by a user to a storage object in a dif-
|
|
ferent NTCB partition than the one where the user was
|
|
authenticated. Employing a forwarded identification implies
|
|
additional reliance on the source and components along the
|
|
path. If the authenticated identification is used as the
|
|
basis of determining a sensitivity label for a subject, it
|
|
must satisfy the Label Integrity criterion.
|
|
|
|
An authenticated identification may be forwarded
|
|
between components and employed in some component to iden-
|
|
tify the sensitivity level associated with a subject created
|
|
to act on behalf of the user so identified.
|
|
|
|
|
|
3.2.2.1.1 Trusted Path
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL SUPPORT A TRUSTED COMMUNICATION PATH BETWEEN
|
|
ITSELF AND USER FOR INITIAL LOGIN AND AUTHENTICATION. COM-
|
|
MUNICATIONS VIA THIS PATH SHALL BE INITIATED EXCLUSIVELY BY
|
|
A USER.
|
|
|
|
+ Interpretation
|
|
|
|
A TRUSTED PATH IS SUPPORTED BETWEEN A USER (I.E.,
|
|
HUMAN) AND THE NTCB PARTITION IN THE COMPONENT TO WHICH THE
|
|
USER IS DIRECTLY CONNECTED.
|
|
|
|
+ Rationale
|
|
|
|
WHEN A USER LOGS INTO A REMOTE COMPONENT, THE USER ID
|
|
IS TRANSMITTED SECURELY BETWEEN THE LOCAL AND REMOTE NTCB
|
|
PARTITIONS IN ACCORDANCE WITH THE REQUIREMENTS IN IDENTIFI-
|
|
CATION AND AUTHENTICATION.
|
|
|
|
TRUSTED PATH IS NECESSARY IN ORDER TO ASSURE THAT THE
|
|
USER IS COMMUNICATING WITH THE NTCB AND ONLY THE NTCB WHEN
|
|
SECURITY RELEVANT ACTIVITIES ARE TAKING PLACE (E.G., AUTHEN-
|
|
TICATE USER, SET CURRENT SESSION SENSITIVITY LEVEL). HOW-
|
|
EVER, TRUSTED PATH DOES NOT ADDRESS COMMUNICATIONS WITHIN
|
|
THE NTCB, ONLY COMMUNICATIONS BETWEEN THE USER AND THE NTCB.
|
|
IF, THEREFORE, A COMPONENT DOES NOT SUPPORT ANY DIRECT USER
|
|
COMMUNICATION THEN THE COMPONENT NEED NOT CONTAIN MECHANISMS
|
|
FOR ASSURING DIRECT NTCB TO USER COMMUNICATIONS.
|
|
|
|
THE REQUIREMENT FOR TRUSTED COMMUNICATION BETWEEN ONE
|
|
NTCB PARTITION AND ANOTHER NCTB PARTITION IS ADDRESSED IN
|
|
THE SYSTEM ARCHITECTURE SECTION. THESE REQUIREMENTS ARE
|
|
SEPARATE AND DISTINCT FROM THE USER TO NTCB COMMUNICATION
|
|
REQUIREMENT OF A TRUSTED PATH. HOWEVER, IT IS EXPECTED THAT
|
|
THIS TRUSTED COMMUNICATION BETWEEN ONE NTCB PARTITION AND
|
|
ANOTHER NTCB PARTITION WILL BE USED IN CONJUNCTION WITH THE
|
|
TRUSTED PATH TO IMPLEMENT TRUSTED COMMUNICATION BETWEEN THE
|
|
USER AND THE REMOTE NTCB PARTITION.
|
|
|
|
|
|
3.2.2.2 Audit
|
|
_ _ _ _ _____
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall be able to create, maintain, and protect from
|
|
modification or unauthorized access or destruction an audit
|
|
trail of accesses to the objects it protects. The audit
|
|
data shall be protected by the TCB so that read access to it
|
|
is limited to those who are authorized for audit data. The
|
|
TCB shall be able to record the following types of events:
|
|
use of identification and authentication mechanisms, intro-
|
|
duction of objects into a user's address space (e.g., file
|
|
open, program initiation), deletion of objects, actions
|
|
taken by computer operators and system administrators and/or
|
|
system security officers, and other security relevant
|
|
events. The TCB shall also be able to audit any override of
|
|
human-readable output markings. For each recorded event,
|
|
the audit record shall identify: date and time of the event,
|
|
user, type of event, and success or failure of the event.
|
|
For identification/authentication events the origin of
|
|
request (e.g., terminal ID) shall be included in the audit
|
|
record. For events that introduce an object into a user's
|
|
address space and for object deletion events the audit
|
|
record shall include the name of the object and the object's
|
|
sensitivity level. The ADP system administrator shall be
|
|
able to selectively audit the actions of any one or more
|
|
users based on individual identify and/or object sensitivity
|
|
level. THE TCB SHALL BE ABLE TO AUDIT THE IDENTIFIED
|
|
EVENTS THAT MAY BE USED IN THE EXPLOITATION OF COVERT
|
|
STORAGE CHANNELS.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion applies as stated. The sponsor must
|
|
select which events are auditable. If any such events are
|
|
not distinguishable by the NTCB alone (for example those
|
|
identified in Part II), the audit mechanism shall provide an
|
|
interface, which an authorized subject can invoke with
|
|
parameters sufficient to produce an audit record. These
|
|
audit records shall be distinguishable from those provided
|
|
by the NTCB. In the context of a network system, "other
|
|
security relevant events" (depending on network system
|
|
architecture and network security policy) might be as fol-
|
|
lows:
|
|
|
|
|
|
1. Identification of each access event (e.g., estab-
|
|
lishing a connection or a connectionless association
|
|
between processes in two hosts of the network) and
|
|
its principal parameters (e.g., host identifiers of
|
|
the two hosts involved in the access event and user
|
|
identifier or host identifier of the user or host
|
|
that is requesting the access event)
|
|
|
|
2. Identification of the starting and ending times of
|
|
each access event using local time or global syn-
|
|
chronized time
|
|
|
|
3. Identification of security-relevant exceptional con-
|
|
ditions (e.g., potential violation of data
|
|
integrity, such as misrouted datagrams) detected
|
|
during the transactions between two hosts
|
|
|
|
4. Utilization of cryptographic variables
|
|
|
|
5. Changing the configuration of the network (e.g., a
|
|
component leaving the network and rejoining)
|
|
|
|
In addition, identification information should be
|
|
included in appropriate audit trail records, as necessary,
|
|
to allow association of all related (e.g., involving the
|
|
same network event) audit trail records (e.g., at different
|
|
hosts) with each other. Furthermore, a component of the
|
|
network system may provide the required audit capability
|
|
(e.g., storage, retrieval, reduction, analysis) for other
|
|
components that do not internally store audit data but
|
|
transmit the audit data to some designated collection com-
|
|
ponent. Provisions shall be made to control the loss of
|
|
audit data due to unavailability of resources.
|
|
|
|
In the context of a network system, the "user's address
|
|
space" is extended, for object introduction and deletion
|
|
events, to include address spaces being employed on behalf
|
|
of a remote user (or host). However, the focus remains on
|
|
users in contrast to internal subjects as discussed in the
|
|
DAC criterion. In addition, audit information must be
|
|
stored in machine-readable form.
|
|
|
|
THE CAPABILITY MUST EXIST TO AUDIT THE IDENTIFIED
|
|
EVENTS THAT MAY BE USED IN THE EXPLOITATION OF COVERT
|
|
STORAGE CHANNELS. TO ACCOMPLISH THIS, EACH NTCB PARTITION
|
|
MUST BE ABLE TO AUDIT THOSE EVENTS LOCALLY THAT MAY LEAD TO
|
|
THE EXPLOITATION OF A COVERT STORAGE CHANNEL WHICH EXIST
|
|
BECAUSE OF THE NETWORK.
|
|
|
|
+ Rationale
|
|
|
|
For remote users, the network identifiers (e.g., inter-
|
|
net address) can be used as identifiers of groups of indivi-
|
|
dual users (e.g., "all users at Host A") to eliminate the
|
|
maintenance that would be required if individual identifica-
|
|
tion of remote users was employed. In this class (C2), how-
|
|
ever, it must be possible to identify (immediately or at
|
|
some later time) the individuals represented by a group
|
|
identifier. In all other respects, the interpretation is a
|
|
straightforward extension of the criterion into the context
|
|
of a network system. IDENTIFICATION OF COVERT CHANNEL
|
|
EVENTS IS ADDRESSED IN THE COVERT CHANNEL ANALYSIS SECTION.
|
|
|
|
|
|
|
|
3.2.3 Assurance
|
|
_ _ _ _________
|
|
|
|
|
|
3.2.3.1 Operational Assurance
|
|
|
|
|
|
3.2.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION THAT
|
|
PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING (E.G.,
|
|
BY MODIFICATION OF ITS CODE OR DATA STRUCTURES). THE TCB
|
|
SHALL MAINTAIN PROCESS ISOLATION THROUGH THE PROVISION OF
|
|
DISTINCT ADDRESS SPACES UNDER ITS CONTROL. THE TCB SHALL BE
|
|
INTERNALLY STRUCTURED INTO WELL-DEFINED LARGELY INDEPENDENT
|
|
MODULES. IT SHALL MAKE EFFECTIVE USE OF AVAILABLE HARDWARE
|
|
TO SEPARATE THOSE ELEMENTS THAT ARE PROTECTION-CRITICAL FROM
|
|
THOSE THAT ARE NOT. THE TCB MODULES SHALL BE DESIGNED SUCH
|
|
THAT THE PRINCIPLE OF LEAST PRIVILEGE IS ENFORCED. FEATURES
|
|
IN HARDWARE, SUCH AS SEGMENTATION, SHALL BE USED TO SUPPORT
|
|
LOGICALLY DISTINCT STORAGE OBJECTS WITH SEPARATE ATTRIBUTES
|
|
(NAMELY: READABLE, WRITABLE). THE USER INTERFACE TO THE TCB
|
|
SHALL BE COMPLETELY DEFINED AND ALL ELEMENTS OF THE TCB
|
|
IDENTIFIED.
|
|
|
|
+ Interpretation
|
|
|
|
The system architecture criterion must be met individu-
|
|
ally by all NTCB partitions. Implementation of the require-
|
|
ment that the NTCB maintain a domain for its own execution
|
|
is achieved by having each NTCB partition maintain a domain
|
|
for its own execution. Since each component is itself a dis-
|
|
tinct domain in the overall network system, this also satis-
|
|
fies the requirement for process isolation through distinct
|
|
address spaces in the special case where a component has
|
|
only a single subject.
|
|
|
|
THE NTCB MUST BE INTERNALLY STRUCTURED INTO WELL-
|
|
DEFINED LARGELY INDEPENDENT MODULES AND MEET THE HARDWARE
|
|
REQUIREMENTS. THIS IS SATISFIED BY HAVING EACH NTCB PARTI-
|
|
TION SO STRUCTURED. THE NTCB CONTROLS ALL NETWORK RESOURCES.
|
|
THESE RESOURCES are the union of the sets of resources over
|
|
which the NTCB partitions have control. Code and data
|
|
structures belonging to the NTCB, transferred among NTCB
|
|
subjects (i.e., subjects outside the reference monitor but
|
|
inside the NTCB) belonging to different NTCB partitions,
|
|
must be protected against external interference or tamper-
|
|
ing. For example, a cryptographic checksum or physical
|
|
means may be employed to protect user authentication data
|
|
exchanged between NTCB partitions.
|
|
|
|
EACH NTCB PARTITION MUST ENFORCE THE PRINCIPLE OF LEAST
|
|
PRIVILEGE WITHIN ITS COMPONENT. ADDITIONALLY, THE NTCB MUST
|
|
BE STRUCTURED SO THAT THE PRINCIPLE OF LEAST PRIVILEGE IS
|
|
ENFORCED IN THE SYSTEM AS A WHOLE.
|
|
|
|
Each NTCB partition provides isolation of resources
|
|
(within its component) in accord with the network system
|
|
architecture and security policy so that "supporting ele-
|
|
ments" (e.g., DAC and user identification) for the security
|
|
mechanisms of the network system are strengthened compared
|
|
to C2, from an assurance point of view, through the provi-
|
|
sion of distinct address spaces under control of the NTCB.
|
|
|
|
As discussed in the Discretionary Access Control sec-
|
|
tion, the DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. When distributed in NTCB sub-
|
|
jects (i.e., when outside the reference monitor), the
|
|
assurance requirements for the design and implementation of
|
|
the DAC shall be those of class C2 for all networks of class
|
|
C2 or above.
|
|
|
|
+ Rationale
|
|
|
|
|
|
THE REQUIREMENT THAT THE NTCB BE STRUCTURED INTO
|
|
MODULES AND MEET THE HARDWARE REQUIREMENTS APPLIES WITHIN
|
|
THE NTCB PARTITIONS IN THE VARIOUS COMPONENTS.
|
|
|
|
THE PRINCIPLE OF LEAST PRIVILEGE REQUIRES THAT EACH
|
|
USER OR OTHER INDIVIDUAL WITH ACCESS TO THE SYSTEM BE GIVEN
|
|
ONLY THOSE RESOURCES AND AUTHORIZATIONS REQUIRED FOR THE
|
|
PERFORMANCE OF THIS JOB. IN ORDER TO ENFORE THIS PRINCIPLE
|
|
IN THE SYSTEM IT MUST BE ENFORCED IN EVERY NTCB PARTITION
|
|
THAT SUPPORTS USERS OR OTHER INDIVIDUALS. FOR EXAMPLE,
|
|
PROHIBITING ACCESS BY ADMINISTRATORS TO OBJECTS OUTSIDE THE
|
|
NTCB PARTITION (E.G., GAMES) LESSENS THE OPPORTUNITY OF DAM-
|
|
AGE BY A TROJAN HORSE.
|
|
|
|
The requirement for the protection of communications
|
|
between NTCB partitions is specifically directed to subjects
|
|
that are part of the NTCB partitions. Any requirements for
|
|
such protection for the subjects that are outside the NTCB
|
|
partitions are addressed in response to the integrity
|
|
requirements of the security policy.
|
|
|
|
The provision of distinct address spaces under the con-
|
|
trol of the NTCB provides the ability to separate subjects
|
|
according to sensitivity level. This requirement is intro-
|
|
duced at B1 since it is an absolute necessity in order to
|
|
implement mandatory access controls.
|
|
|
|
|
|
3.2.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Hardware and/or software features shall be provided that can
|
|
be used to periodically validate the correct operation of
|
|
the on-site hardware and firmware elements of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Implementation of the requirement is partly achieved by
|
|
having hardware and/or software features that can be used to
|
|
periodically validate the correct operation of the hardware
|
|
and firmware elements of each component's NTCB partition.
|
|
Features shall also be provided to validate the identity and
|
|
correct operation of a component prior to its incorporation
|
|
in the network system and throughout system operation. For
|
|
example, a protocol could be designed that enables the com-
|
|
ponents of the partitioned NTCB to exchange messages period-
|
|
ically and validate each other's correct response. The pro-
|
|
tocol shall be able to determine the remote entity's ability
|
|
to respond. NTCB partitions shall provide the capability to
|
|
report to network administrative personnel the failures
|
|
detected in other NTCB partitions.
|
|
|
|
Intercomponent protocols implemented within a NTCB
|
|
shall be designed in such a way as to provide correct opera-
|
|
tion in the case of failures of network communications or
|
|
individual components. The allocation of mandatory and dis-
|
|
cretionary access control policy in a network may require
|
|
communication between trusted subjects that are part of the
|
|
NTCB partitions in different components. This communication
|
|
is normally implemented with a protocol between the subjects
|
|
as peer entities. Incorrect access within a component shall
|
|
not result from failure of an NTCB partition to communicate
|
|
with other components.
|
|
|
|
+ Rationale
|
|
|
|
The first paragraph of the interpretation is a
|
|
straightforward extension of the requirement into the con-
|
|
text of a network system and partitioned NTCB as defined for
|
|
these network criteria.
|
|
|
|
NTCB protocols should be robust enough so that they
|
|
permit the system to operate correctly in the case of local-
|
|
ized failure. The purpose of this protection is to preserve
|
|
the integrity of the NTCB itself. It is not unusual for one
|
|
or more components in a network to be inoperative at any
|
|
time, so it is important to minimize the effects of such
|
|
failures on the rest of the network. Additional integrity
|
|
and denial of service issues are addressed in Part II.
|
|
|
|
|
|
|
|
3.2.3.1.3 Covert Channel Analysis
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE SYSTEM DEVELOPER SHALL CONDUCT A THOROUGH SEARCH FOR
|
|
COVERT STORAGE CHANNELS AND MAKE A DETERMINATION (EITHER BY
|
|
ACTUAL MEASUREMENT OR BY ENGINEERING ESTIMATION) OF THE MAX-
|
|
IMUM BANDWIDTH OF EACH IDENTIFIED CHANNEL. (SEE THE COVERT
|
|
CHANNELS GUIDELINE SECTION.)
|
|
|
|
+ Interpretation
|
|
|
|
THE REQUIREMENT, INCLUDING THE TCSEC COVERT CHANNEL
|
|
GUIDELINE, APPLIES AS WRITTEN. IN A NETWORK, THERE ARE
|
|
ADDITIONAL INSTANCES OF COVERT CHANNELS ASSOCIATED WITH COM-
|
|
MUNICATION BETWEEN COMPONENTS.
|
|
|
|
+ Rationale
|
|
|
|
THE EXPLOITATION OF NETWORK PROTOCOL INFORMATION (E.G.,
|
|
HEADERS) CAN RESULT IN COVERT STORAGE CHANNELS. THE TOPIC
|
|
HAS BEEN ADDRESSED IN THE LITERATURE.-
|
|
_________________________
|
|
- See, for example, Girling, C. G., "Covert Channels
|
|
in LAN's," IEEE Transactions on Software Engineering,
|
|
____ ____________ __ ________ ___________
|
|
Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
|
|
Snow, D. P., and Karger, P. A., Limitations of End-to-
|
|
___________ __ ___ __
|
|
End Encryption in Secure Computer Networks, MITRE
|
|
___ __________ __ ______ ________ ________
|
|
Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
|
|
|
|
|
|
|
|
3.2.3.1.4 Trusted Facility Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
THE TCB SHALL SUPPORT SEPARATE OPERATOR AND ADMINISTRATOR
|
|
FUNCTIONS.
|
|
|
|
+ Interpretation
|
|
|
|
THIS REQUIREMENT APPLIES AS WRITTEN TO BOTH THE NETWORK
|
|
AS A WHOLE AND TO INDIVIDUAL COMPONENTS WHICH SUPPORT SUCH
|
|
PERSONNEL.
|
|
|
|
+ Rationale
|
|
|
|
IT IS RECOGNIZED THAT BASED ON THE ALLOCATED POLICY
|
|
ELEMENTS SOME COMPONENTS MAY OPERATE WITH NO HUMAN INTER-
|
|
FACE.
|
|
|
|
|
|
3.2.3.2 Life-Cycle Assurance
|
|
|
|
|
|
3.2.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The security mechanisms of the ADP system shall be tested
|
|
and found to work as claimed in the system documentation. A
|
|
team of individuals who thoroughly understand the specific
|
|
implementation of the TCB shall subject its design documen-
|
|
tation, source code, and object code to through analysis and
|
|
testing. Their objectives shall be: to uncover all design
|
|
and implementation flaws that would permit a subject exter-
|
|
nal to the TCB to read, change, or delete data normally
|
|
denied under the mandatory or discretionary security policy
|
|
enforced by the TCB; as well as to assure that no subject
|
|
(without authorization to do so) is able to cause the TCB to
|
|
enter a state such that it is unable to respond to communi-
|
|
cations initiated by other users. THE TCB SHALL BE FOUND
|
|
RELATIVELY RESISTANT TO PENETRATION. All discovered flaws
|
|
shall be removed or neutralized and the TCB retested to
|
|
demonstrate that they have been eliminated and that new
|
|
flaws have not been introduced. TESTING SHALL DEMONSTRATE
|
|
THAT THE TCB IMPLEMENTATION IS CONSISTENT WITH THE DESCRIP-
|
|
TIVE TOP-LEVEL SPECIFICATION. (See the Security Testing
|
|
Guidelines.)
|
|
|
|
+ Interpretation
|
|
|
|
Testing of a component will require a testbed that
|
|
exercises the interfaces and protocols of the component
|
|
including tests under exceptional conditions. The testing
|
|
of a security mechanism of the network system for meeting
|
|
this criterion shall be an integrated testing procedure
|
|
involving all components containing an NTCB partition that
|
|
implement the given mechanism. This integrated testing is
|
|
additional to any individual component tests involved in the
|
|
evaluation of the network system. The sponsor should iden-
|
|
tify the allowable set of configurations including the sizes
|
|
of the networks. Analysis or testing procedures and tools
|
|
shall be available to test the limits of these configura-
|
|
tions. A change in configuration within the allowable set
|
|
of configurations does not require retesting.
|
|
|
|
The testing of each component will include the intro-
|
|
duction of subjects external to the NTCB partition for the
|
|
component that will attempt to read, change, or delete data
|
|
normally denied. If the normal interface to the component
|
|
does not provide a means to create the subjects needed to
|
|
conduct such a test, then this portion of the testing shall
|
|
use a special version of the untrusted software for the com-
|
|
ponent that results in subjects that make such attempts.
|
|
The results shall be saved for test analysis. Such special
|
|
versions shall have an NTCB partition that is identical to
|
|
that for the normal configuration of the component under
|
|
evaluation.
|
|
|
|
The testing of the mandatory controls shall include
|
|
tests to demonstrate that the labels for information
|
|
imported and/or exported to/from the component accurately
|
|
represent the labels maintained by the NTCB partition for
|
|
the component for use as the basis for its mandatory access
|
|
control decisions. The tests shall include each type of
|
|
device, whether single-level or multilevel, supported by the
|
|
component.
|
|
|
|
THE NTCB MUST BE FOUND RELATIVELY RESISTANT TO PENETRA-
|
|
TION. THIS APPLIES TO THE NTCB AS A WHOLE, AND TO EACH NTCB
|
|
PARTITION IN A COMPONENT OF THIS CLASS.
|
|
|
|
+ Rationale
|
|
|
|
The phrase "no subject (without authorization to do so)
|
|
is able to cause the TCB to enter a state such that it is
|
|
unable to respond to communications initiated by other
|
|
users" relates to the security services (Part II of this
|
|
TNI) for the Denial of Service problem, and to correctness
|
|
of the protocol implementations.
|
|
|
|
Testing is an important method available in this
|
|
evaluation division to gain any assurance that the security
|
|
mechanisms perform their intended function. A major purpose
|
|
of testing is to demonstrate the system's response to inputs
|
|
to the NTCB partition from untrusted (and possibly mali-
|
|
cious) subjects.
|
|
|
|
In contrast to general purpose systems that allow for
|
|
the dynamic creation of new programs and the introductions
|
|
of new processes (and hence new subjects) with user speci-
|
|
fied security properities, many network components have no
|
|
method for introducing new programs and/or processes during
|
|
their normal operation. Therefore, the programs necessary
|
|
for the testing must be introduced as special versions of
|
|
the software rather than as the result of normal inputs by
|
|
the test team. However, it must be insured that the NTCB
|
|
partition used for such tests is identical to the one under
|
|
evaluation.
|
|
|
|
Sensitivity labels serve a critical role in maintaining
|
|
the security of the mandatory access controls in the net-
|
|
work. Especially important to network security is the role
|
|
of the labels for information communicated between com-
|
|
ponents - explicit labels for multilevel devices and impli-
|
|
cit labels for single-level devices. Therefore the testing
|
|
for correct labels is highlighted.
|
|
|
|
THE REQUIREMENT FOR TESTING TO DEMONSTRATE CONSISTENCY
|
|
BETWEEN THE NTCB IMPLEMENTATION AND THE DTLS IS A STRAIGHT-
|
|
FORWARD EXTENSION OF THE TCSEC REQUIREMENT INTO THE CONTEXT
|
|
OF A NETWORK SYSTEM.
|
|
|
|
|
|
|
|
3.2.3.2.2 Design Specification and Verification
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A FORMAL model of the security policy supported by the TCB
|
|
shall be maintained over the life cycle of the ADP system
|
|
THAT IS PROVEN and demonstrated to be consistent with its
|
|
axioms. A DESCRIPTIVE TOP-LEVEL SPECIFICATION (DTLS) OF THE
|
|
TCB SHALL BE MAINTAINED THAT COMPLETELY AND ACCURATELY
|
|
DESCRIBES THE TCB IN TERMS OF EXCEPTIONS, ERROR MESSAGES,
|
|
AND EFFECTS. IT SHALL BE SHOWN TO BE AN ACCURATE DESCRIP-
|
|
TION OF THE TCB INTERFACE.
|
|
|
|
+ Interpretation
|
|
|
|
The overall network security policy expressed in this
|
|
model will provide the basis for the mandatory access con-
|
|
trol policy exercised by the NTCB over subjects and storage
|
|
objects in the entire network. The policy will also be the
|
|
basis for the discretionary access control policy exercised
|
|
by the NTCB to control access of named users to named
|
|
objects. Data integrity requirements addressing the effects
|
|
of unauthorized MSM need not be included in this model. The
|
|
overall network policy must be decomposed into policy ele-
|
|
ments that are allocated to appropriate components and used
|
|
as the basis for the security policy model for those com-
|
|
ponents.
|
|
|
|
The level of abstraction of the model, and the set of
|
|
subjects and objects that are explicitly represented in the
|
|
model, will be affected by the NTCB partitioning. Subjects
|
|
and objects must be represented explicitly in the model for
|
|
the partition if there is some network component whose NTCB
|
|
partition exercises access control over them. The model
|
|
shall be structured so that the axioms and entities
|
|
applicable to individual network components are manifest.
|
|
Global network policy elements that are allocated to com-
|
|
ponents shall be represented by the model for that com-
|
|
ponent.
|
|
|
|
THE REQUIREMENTS FOR A NETWORK DTLS ARE GIVEN IN THE
|
|
DESIGN DOCUMENTATION SECTION.
|
|
|
|
+ Rationale
|
|
|
|
The treatment of the model depends to a great extent on
|
|
the degree of integration of the communications service into
|
|
a distributed system. In a closely coupled distributed sys-
|
|
tem, one might use a model that closely resembles one
|
|
appropriate for a stand-alone computer system.
|
|
|
|
In other cases, the model of each partition will be
|
|
expected to show the role of the NTCB partition in each kind
|
|
of component. It will most likely clarify the model,
|
|
although not part of the model, to show access restrictions
|
|
implied by the system design; for example, subjects
|
|
representing protocol entities might have access only to
|
|
objects containing data units at the same layer of protocol.
|
|
The allocation of subjects and objects to different proto-
|
|
col layers is a protocol design choice which need not be
|
|
reflected in the security policy model.
|
|
|
|
|
|
|
|
3.2.3.2.3 Configuration Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
DURING DEVELOPMENT AND MAINTENANCE OF THE TCB, A CONFIGURA-
|
|
TION MANAGEMENT SYSTEM SHALL BE IN PLACE THAT MAINTAINS CON-
|
|
TROL OF CHANGES TO THE DESCRIPTIVE TOP-LEVEL SPECIFICATION,
|
|
OTHER DESIGN DATA, IMPLEMENTATION DOCUMENTATION, SOURCE
|
|
CODE, THE RUNNING VERSION OF THE OBJECT CODE, AND TEST FIX-
|
|
TURES AND DOCUMENTATION. THE CONFIGURATION MANAGEMENT SYS-
|
|
TEM SHALL ASSURE A CONSISTENT MAPPING AMONG ALL DOCUMENTA-
|
|
TION AND CODE ASSOCIATED WITH THE CURRENT VERSION OF THE
|
|
TCB. TOOLS SHALL BE PROVIDED FOR GENERATION OF A NEW VER-
|
|
SION OF THE TCB FROM SOURCE CODE. ALSO AVAILABLE SHALL BE
|
|
TOOLS FOR COMPARING A NEWLY GENERATED VERSION WITH THE PRE-
|
|
VIOUS TCB VERSION IN ORDER TO ASCERTAIN THAT ONLY THE
|
|
INTENDED CHANGES HAVE BEEN MADE IN THE CODE THAT WILL ACTU-
|
|
ALLY BE USED AS THE NEW VERSION OF THE TCB.
|
|
|
|
+ Interpretation
|
|
|
|
THE REQUIREMENT APPLIES AS WRITTEN, WITH THE FOLLOWING
|
|
EXTENSIONS:
|
|
|
|
1. A CONFIGURATION MANAGEMENT SYSTEM MUST BE IN PLACE
|
|
FOR EACH NTCB PARTITION.
|
|
|
|
|
|
2. A CONFIGURATION MANAGEMENT PLAN MUST EXIST FOR THE
|
|
ENTIRE SYSTEM. IF THE CONFIGURATION MANAGEMENT SYS-
|
|
TEM IS MADE UP OF THE CONGLOMERATION OF THE CONFI-
|
|
GURATION MANAGEMENT SYSTEMS OF THE VARIOUS NTCB PAR-
|
|
TITIONS, THEN THE CONFIGURATION MANAGEMENT PLAN MUST
|
|
ADDRESS THE ISSUE OF HOW CONFIGURATION CONTROL IS
|
|
APPLIED TO THE SYSTEM AS A WHOLE.
|
|
|
|
+ Rationale
|
|
|
|
EACH NTCB PARTITION MUST HAVE A CONFIGURATION MANAGE-
|
|
MENT SYSTEM IN PLACE, OR ELSE THERE WILL BE NO WAY FOR THE
|
|
NTCB AS A WHOLE TO HAVE AN EFFECTIVE CONFIGURATION MANAGE-
|
|
MENT SYSTEM. THE OTHER EXTENSIONS ARE MERELY REFLECTIONS OF
|
|
THE WAY THAT NETWORKS OPERATE IN PRACTICE.
|
|
|
|
|
|
|
|
3.2.4 Documentation.
|
|
_ _ _ _____________
|
|
|
|
|
|
3.2.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A single summary, chapter, or manual in user documentation
|
|
shall describe the protection mechanisms provided by the
|
|
TCB, interpretations on their use, and how they interact
|
|
with one another.
|
|
|
|
+ Interpretation
|
|
|
|
This user documentation describes user visible protec-
|
|
tion mechanisms at the global (network system) level and at
|
|
the user interface of each component, and the interaction
|
|
among these.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system as defined for these
|
|
network criteria. Documentation of protection mechanisms
|
|
provided by individual components is required by the cri-
|
|
teria for trusted computer systems that are applied as
|
|
appropriate for the individual components.
|
|
|
|
|
|
3.2.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A manual addressed to the ADP system administrator shall
|
|
present cautions about functions and privileges that should
|
|
be controlled when running a secure facility. The procedures
|
|
for examining and maintaining the audit files as well as the
|
|
detailed audit record structure for each type of audit event
|
|
shall be given. The manual shall describe the operator and
|
|
administrator functions related to security, to include
|
|
changing the security characteristics of a user. It shall
|
|
provide interpretations on the consistent and effective use
|
|
of the protection features of the system, how they interact,
|
|
how to securely generate a new TCB, and facility procedures,
|
|
warnings, and privileges that need to be controlled in order
|
|
to operate the facility in a secure manner. THE TCB MODULES
|
|
THAT CONTAIN THE REFERENCE VALIDATION MECHANISM SHALL BE
|
|
IDENTIFIED. THE PROCEDURES FOR SECURE GENERATION OF A NEW
|
|
TCB FROM SOURCE AFTER MODIFICATION OF ANY MODULES IN THE TCB
|
|
SHALL BE DESCRIBED.
|
|
|
|
+ Interpretation
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator(s) maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address the following:
|
|
|
|
1. The hardware configuration of the network itself;
|
|
|
|
2. The implications of attaching new components to the
|
|
network;
|
|
|
|
3. The case where certain components may periodically
|
|
leave the network (e.g., by crashing, or by being
|
|
disconnected) and then rejoin;
|
|
|
|
4. Network configuration aspects that can impact the
|
|
security of the network system; (For example, the
|
|
manual should describe for the network system
|
|
administrator the interconnections among components
|
|
that are consistent with the overall network system
|
|
architecture.)
|
|
|
|
5. Loading or modifying NTCB software or firmware
|
|
(e.g., down-line loading).
|
|
|
|
6. INCREMENTAL UPDATES; THAT IS, IT MUST EXPLICITLY
|
|
INDICATE WHICH COMPONENTS OF THE NETWORK MAY CHANGE
|
|
WITHOUT OTHERS ALSO CHANGING.
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
THE COMPONENTS OF THE NETWORK THAT FORM THE NTCB MUST
|
|
BE IDENTIFIED. FURTHERMORE, THE MODULES WITHIN AN NTCB PAR-
|
|
TITION THAT CONTAIN THE REFERENCE VALIDATION MECHANISM (IF
|
|
ANY) WITHIN THAT PARTITION MUST BE IDENTIFIED.
|
|
|
|
THE PROCEDURES FOR THE SECURE GENERATION OF A NEW VER-
|
|
SION (OR COPY) OF EACH NTCB PARTITION FROM SOURCE MUST BE
|
|
DESCRIBED. THE PROCEDURES AND REQUIREMENTS FOR THE SECURE
|
|
GENERATION OF THE NTCB NECESSITATED BY CHANGES IN THE NET-
|
|
WORK CONFIGURATION SHALL BE DESCRIBED.
|
|
|
|
+ Rationale
|
|
|
|
There may be multiple system administrators with
|
|
diverse responsibilities. The technical security measures
|
|
described by these criteria must be used in conjunction with
|
|
other forms of security in order to achieve security of the
|
|
network. Additional forms include administrative security,
|
|
physical security, emanations security, etc.
|
|
|
|
Extension of this criterion to cover configuration
|
|
aspects of the network is needed because, for example,
|
|
proper interconnection of components is typically essential
|
|
to achieve a correct realization of the network architec-
|
|
ture.
|
|
|
|
As mentioned in the section on Label Integrity, cryp-
|
|
tography is one common mechanism employed to protect commun-
|
|
ication circuits. Encryption transforms the representation
|
|
of information so that it is unintelligible to unauthorized
|
|
subjects. Reflecting this transformation, the sensitivity
|
|
of the ciphertext is generally lower than the cleartext. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency (NSA).
|
|
|
|
The encryption algorithm and its implementation are
|
|
outside the scope of these interpretations. This algorithm
|
|
and implementation may be implemented in a separate device
|
|
or may be a function of a subject in a component not dedi-
|
|
cated to encryption. Without prejudice, either implementa-
|
|
tion packaging is referred to as an encryption mechanism
|
|
herein.
|
|
|
|
THE REQUIREMENTS FOR DESCRIPTIONS OF NTCB GENERATION
|
|
AND IDENTIFICATION OF MODULES AND COMPONENTS THAT FORM THE
|
|
NTCB ARE STRAIGHTFORWARD EXTENSIONS OF THE TCSEC REQUIRE-
|
|
MENTS INTO THE NETWORK CONTEXT. IN THOSE CASES WHERE THE
|
|
VENDOR DOES NOT PROVIDE SOURCE CODE, AN ACCEPTABLE PROCEDURE
|
|
SHALL BE TO REQUEST THE VENDOR TO PERFORM THE SECURE GENERA-
|
|
TION.
|
|
|
|
|
|
3.2.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall provide to the evaluators a docu-
|
|
ment that describes the test plan, test procedures that show
|
|
how the security mechanisms were tested, and results of the
|
|
security mechanisms' functional testing. IT SHALL INCLUDE
|
|
RESULTS OF TESTING THE EFFECTIVENESS OF THE METHODS USED TO
|
|
REDUCE COVERT CHANNEL BANDWIDTHS.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The "system developer" is interpreted as "the network
|
|
system sponsor". The description of the test plan should
|
|
establish the context in which the testing was or should be
|
|
conducted. The description should identify any additional
|
|
test components that are not part of the system being
|
|
evaluated. This includes a description of the test-relevant
|
|
functions of such test components and a description of the
|
|
interfacing of those test components to the system being
|
|
evaluated. The description of the test plan should also
|
|
demonstrate that the tests adequately cover the network
|
|
security policy. The tests should include the features
|
|
described in the System Architecture and the System
|
|
Integrity sections. The tests should also include network
|
|
configuration and sizing.
|
|
|
|
+ Rationale
|
|
|
|
The entity being evaluated may be a networking subsys-
|
|
tem (see Appendix A) to which other components must be added
|
|
to make a complete network system. In that case, this
|
|
interpretation is extended to include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
THE BANDWIDTHS OF COVERT CHANNELS ARE USED TO DETERMINE
|
|
THE SUITABILITY OF A NETWORK SYSTEM FOR A GIVEN ENVIRONMENT.
|
|
THE EFFECTIVENESS OF THE METHODS USED TO REDUCE THESE
|
|
BANDWIDTHS MUST THEREFORE BE ACCURATELY DETERMINED.
|
|
|
|
|
|
3.2.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Documentation shall be available that provides a description
|
|
of the manufacturer's philosophy of protection and an expla-
|
|
nation of how this philosophy is translated into the TCB.
|
|
THE interfaces between THE TCB modules shall be described.
|
|
A FORMAL description of the security policy model enforced
|
|
by the TCB shall be available and an explanation provided to
|
|
show that it is sufficient to enforce the security policy.
|
|
The specific TCB protection mechanisms shall be identified
|
|
and an explanation given to show that they satisfy the
|
|
model. THE DESCRIPTIVE TOP-LEVEL SPECIFICATION (DTLS) SHALL
|
|
BE SHOWN TO BE AN ACCURATE DESCRIPTION OF THE TCB INTERFACE.
|
|
DOCUMENTATION SHALL DESCRIBE HOW THE TCB IMPLEMENTS THE
|
|
REFERENCE MONITOR CONCEPT AND GIVE AN EXPLANATION WHY IT IS
|
|
TAMPER RESISTANT, CANNOT BE BYPASSED, AND IS CORRECTLY
|
|
IMPLEMENTED. DOCUMENTATION SHALL DESCRIBE HOW THE TCB IS
|
|
STRUCTURED TO FACILITATE TESTING AND TO ENFORCE LEAST
|
|
PRIVILEGE. THIS DOCUMENTATION SHALL ALSO PRESENT THE
|
|
RESULTS OF THE COVERT CHANNEL ANALYSIS AND THE TRADEOFFS
|
|
INVOLVED IN RESTRICTING THE CHANNELS. ALL AUDITABLE EVENTS
|
|
THAT MAY BE USED IN THE EXPLOITATION OF KNOWN COVERT STORAGE
|
|
CHANNELS SHALL BE IDENTIFIED. THE BANDWIDTHS OF KNOWN
|
|
COVERT STORAGE CHANNELS, THE USE OF WHICH IS NOT DETECTABLE
|
|
BY THE AUDITING MECHANISMS, SHALL BE PROVIDED. (SEE THE
|
|
COVERT CHANNEL GUIDELINE SECTION.)
|
|
|
|
+ Interpretation
|
|
|
|
Explanation of how the sponsor's philosophy of protec-
|
|
tion is translated into the NTCB shall include a description
|
|
of how the NTCB is partitioned. The security policy also
|
|
shall be stated. The description of the interfaces between
|
|
the NTCB modules shall include the interface(s) between NTCB
|
|
partitions and modules within the partitions if the modules
|
|
exist. The sponsor shall describe the security architecture
|
|
and design, including the allocation of security require-
|
|
ments among components.
|
|
|
|
THE DOCUMENTATION INCLUDES BOTH A SYSTEM DESCRIPTION
|
|
AND A SET OF COMPONENT DTLS'S. THE SYSTEM DESCRIPTION
|
|
ADDRESSES THE NETWORK SECURITY ARCHITECTURE AND DESIGN BY
|
|
SPECIFYING THE TYPES OF COMPONENTS IN THE NETWORK, WHICH
|
|
ONES ARE TRUSTED, AND IN WHAT WAY THEY MUST COOPERATE TO
|
|
SUPPORT NETWORK SECURITY OBJECTIVES. A COMPONENT DTLS SHALL
|
|
BE PROVIDED FOR EACH TRUSTED NETWORK COMPONENT, I.E., EACH
|
|
COMPONENT CONTAINING AN NTCB PARTITION. EACH COMPONENT DTLS
|
|
SHALL DESCRIBE THE INTERFACE TO THE NTCB PARTITION OF ITS
|
|
COMPONENT. APPENDIX A ADDRESSES COMPONENT EVALUATION ISSUES.
|
|
|
|
As stated in the introduction to Division B, the spon-
|
|
sor must demonstrate that the NTCB employs the reference
|
|
monitor concept. The security policy model must be a model
|
|
for a reference monitor.
|
|
|
|
The security policy model for each partition implement-
|
|
ing a reference monitor shall fully represent the access
|
|
control policy supported by the partition, including the
|
|
discretionary and mandatory security policy for secrecy
|
|
and/or integrity. For the mandatory policy the single domi-
|
|
nance relation for sensitivity labels, including secrecy
|
|
and/or integrity components, shall be precisely defined.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system as
|
|
defined for this network interpretation. Other documenta-
|
|
tion, such as description of components and description of
|
|
operating environment(s) in which the networking subsystem
|
|
or network system is designed to function, is required else-
|
|
where, e.g., in the Trusted Facility Manual.
|
|
|
|
In order to be evaluated, a network must possess a
|
|
coherent Network Security Architecture and Design. (Inter-
|
|
connection of components that do not adhere to such a single
|
|
coherent Network Security Architecture is addressed in the
|
|
Interconnection of Accredited AIS, Appendix C.) The Network
|
|
Security Architecture must address the security-relevant
|
|
policies, objectives, and protocols. The Network Security
|
|
Design specifies the interfaces and services that must be
|
|
incorporated into the network so that it can be evaluated as
|
|
a trusted entity. There may be multiple designs that con-
|
|
form to the same architecture but are more or less incompa-
|
|
tible and non-interoperable (except through the Interconnec-
|
|
tion Rules). Security related mechanisms requiring coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms having no visible
|
|
interfaces are not specified in this document but are left
|
|
as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network security Architecture and
|
|
Design are satisfied. That is, the components can be assem-
|
|
bled into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization that is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and unambi-
|
|
guously define the security functionality of components as
|
|
well as the interfaces between or among components. The
|
|
Network Security Architecture and Design must be evaluated
|
|
to determine that a network constructed to its specifica-
|
|
tions will in fact be trusted, that is, it will be evaluat-
|
|
able under these interpretations.
|
|
|
|
|
|
The term "model" is used in several different ways in a
|
|
network context, e.g., a "protocol reference model," a "for-
|
|
mal network model," etc. Only the "security policy model" is
|
|
addressed by this requirement and is specifically intended
|
|
to model the interface, viz., "security perimeter," of the
|
|
reference monitor and must meet all the requirements defined
|
|
in the TCSEC. It must be shown that all parts of the TCB
|
|
are a valid interpretation of the security policy model,
|
|
i.e., that there is no change to the secure state except as
|
|
represented by the model.
|
|
|
|
3.3 CLASS (B3): SECURITY DOMAINS
|
|
_ _ _____ __ ________ _______
|
|
|
|
|
|
THE CLASS (B3) NTCB MUST SATISFY THE REFERENCE
|
|
MONITOR REQUIREMENTS THAT IT MEDIATE ALL ACCESSES
|
|
OF SUBJECTS TO OBJECTS, BE TAMPERPROOF, AND BE
|
|
SMALL ENOUGH TO BE SUBJECTED TO ANALYSIS AND
|
|
TESTS. TO THIS END, THE NTCB IS STRUCTURED TO
|
|
EXCLUDE CODE NOT ESSENTIAL TO SECURITY POLICY
|
|
ENFORCEMENT, WITH SIGNIFICANT SYSTEM ENGINEERING
|
|
DURING NTCB DESIGN AND IMPLEMENTATION DIRECTED
|
|
TOWARD MINIMIZING ITS COMPLEXITY. A SECURITY
|
|
ADMINISTRATOR IS SUPPORTED, AUDIT MECHANISMS ARE
|
|
EXPANDED TO SIGNAL SECURITY-RELEVANT EVENTS, AND
|
|
SYSTEM RECOVERY PROCEDURES ARE REQUIRED. THE SYS-
|
|
TEM IS HIGHLY RESISTANT TO PENETRATION. THE FOL-
|
|
LOWING ARE MINIMAL REQUIREMENTS FOR SYSTEMS
|
|
ASSIGNED A CLASS (B3) RATING:
|
|
|
|
|
|
3.3.1 Security Policy
|
|
_ _ _ ________ ______
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The network sponsor shall describe the overall network
|
|
security policy enforced by the NTCB. At a minimum, this
|
|
policy shall include the discretionary and mandatory
|
|
requirements applicable to this class. The policy may
|
|
require data secrecy, or data integrity, or both. The pol-
|
|
icy is an access control policy having two primary com-
|
|
ponents: mandatory and discretionary. The policy shall
|
|
include a discretionary policy for protecting the informa-
|
|
tion being processed based on the authorizations of indivi-
|
|
duals, users, or groups of users. This access control pol-
|
|
icy statement shall describe the requirements on the network
|
|
to prevent or detect "reading or destroying" sensitive
|
|
information by unauthorized users or errors. The mandatory
|
|
policy must define the set of distinct sensitivity levels
|
|
that it supports. For the Class B1 or above the mandatory
|
|
policy shall be based on the labels associated with the
|
|
information that reflects its sensitivity with respect to
|
|
secrecy and/or integrity, where applicable, and labels asso-
|
|
ciated with users to reflect their authorization to access
|
|
such information. Unauthorized users include both those
|
|
that are not authorized to use the network at all (e.g., a
|
|
user attempting to use a passive or active wire tap) or a
|
|
legitimate user of the network who is not authorized to
|
|
access a specific piece of information being protected.
|
|
|
|
Note that "users" does not include "operators," "system
|
|
programmers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network sys-
|
|
tem, for example, by defining membership of a group. These
|
|
individuals may also have the separate role of users.
|
|
|
|
|
|
SECRECY POLICY: The network sponsor shall define the
|
|
form of the discretionary and mandatory secrecy
|
|
policy that is enforced in the network to prevent
|
|
unauthorized users from reading the sensitive infor-
|
|
mation entrusted to the network.
|
|
|
|
|
|
DATA INTEGRITY POLICY: The network sponsor shall
|
|
define the discretionary and mandatory integrity
|
|
policy to prevent unauthorized users from modifying,
|
|
viz., writing, sensitive information. The defini-
|
|
tion of data integrity presented by the network
|
|
sponsor refers to the requirement that the informa-
|
|
tion has not been subjected to unauthorized modifi-
|
|
cation in the network. The mandatory integrity pol-
|
|
icy enforced by the NTCB cannot, in general, prevent
|
|
modification while information is being transmitted
|
|
between components. However, an integrity sensi-
|
|
tivity label may reflect the confidence that the
|
|
information has not been subjected to transmission
|
|
errors because of the protection afforded during
|
|
transmission. This requirement is distinct from the
|
|
requirement for label integrity.
|
|
|
|
+ Rationale
|
|
|
|
The word "sponsor" is used in place of alternatives
|
|
(such as "vendor," "architect," "manufacturer," and
|
|
"developer") because the alternatives indicate people who
|
|
may not be available, involved, or relevant at the time that
|
|
a network system is proposed for evaluation.
|
|
|
|
A trusted network is able to control both the reading
|
|
and writing of shared sensitive information. Control of
|
|
writing is used to protect against destruction of informa-
|
|
tion. A network normally is expected to have policy require-
|
|
ments to protect both the secrecy and integrity of the
|
|
information entrusted to it. In a network the integrity is
|
|
frequently as important or more important than the secrecy
|
|
requirements. Therefore the secrecy and/or integrity policy
|
|
to be enforced by the network must be stated for each net-
|
|
work regardless of its evaluation class. The assurance that
|
|
the policy is faithfully enforced is reflected in the
|
|
evaluation class of the network.
|
|
|
|
This control over modification is typically used to
|
|
protect information so that it may be relied upon and to
|
|
control the potential harm that would result if the informa-
|
|
tion were corrupted. The overall network policy require-
|
|
ments for integrity includes the protection for data both
|
|
while being processed in a component and while being
|
|
transmitted in the network. The access control policy
|
|
enforced by the NTCB relates to the access of subjects to
|
|
objects within each component. Communications integrity
|
|
addressed within Part II relates to information while being
|
|
transmitted.
|
|
|
|
The mandatory integrity policy (at class B1 and above)
|
|
in some architectures may be useful in supporting the link-
|
|
age between the connection oriented abstraction introduced
|
|
in the Introduction and the individual components of the
|
|
network. For example, in a key distribution center for
|
|
end-to-end encryption, a distinct integrity category may be
|
|
assigned to isolate the key generation code and data from
|
|
possible modification by other supporting processes in the
|
|
same component, such as operator interfaces and audit.
|
|
|
|
The mandatory integrity policy for some architecture
|
|
may define an integrity sensitivity label that reflects the
|
|
specific requirements for ensuring that information has not
|
|
been subject to random errors in excess of a stated limit
|
|
nor to unauthorized message stream modification (MSM) -.
|
|
The specific metric associated with an integrity sensitivity
|
|
label will generally reflect the intended applications of
|
|
the network.
|
|
|
|
|
|
3.3.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall define and control access between named users
|
|
and named objects (e.g., files and programs) in the ADP sys-
|
|
tem. The enforcement mechanism (e.g., ACCESS CONTROL LISTS)
|
|
shall allow users to specify and control sharing of those
|
|
OBJECTS and shall provide controls to limit propagation of
|
|
access rights. The discretionary access control mechanism
|
|
shall, either by explicit user action or by default, provide
|
|
that objects are protected from unauthorized access. These
|
|
access controls shall be capable of SPECIFYING, FOR EACH
|
|
_________________________
|
|
- See Voydock, Victor L. and Stephen T. Kent, "Secu-
|
|
rity Mechanisms in High-Level Network Protocols," Com-
|
|
___
|
|
puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
|
|
______ _______
|
|
|
|
|
|
|
|
NAMED OBJECT, A LIST OF NAMED INDIVIDUALS AND A LIST OF
|
|
GROUPS OF NAMED INDIVIDUALS WITH THEIR RESPECTIVE MODES OF
|
|
ACCESS TO THAT OBJECT. FURTHERMORE, FOR EACH SUCH NAMED
|
|
OBJECT, IT SHALL BE POSSIBLE TO SPECIFY A LIST OF NAMED
|
|
INDIVIDUALS AND A LIST OF GROUPS OF NAMED INDIVIDUALS FOR
|
|
WHICH NO ACCESS TO THE OBJECT IS GIVEN. Access permission
|
|
to an object by users not already possessing access permis-
|
|
sion shall only be assigned by authorized users.
|
|
|
|
+ Interpretation
|
|
|
|
The discretionary access control (DAC) mechanism(s) may
|
|
be distributed over the partitioned NTCB in various ways.
|
|
Some part, all, or none of the DAC may be implemented in a
|
|
given component of the network system. In particular, com-
|
|
ponents that support only internal subjects (i.e., that have
|
|
no subjects acting as direct surrogates for users), such as
|
|
a public network packet switch, might not implement the DAC
|
|
mechanism(s) directly (e.g., they are unlikely to contain
|
|
access control lists).
|
|
|
|
Identification of users by groups may be achieved in
|
|
various ways in the networking environment. For example,
|
|
the network identifiers (e.g., internet addresses) for vari-
|
|
ous components (e.g., hosts, gateways) can be used as iden-
|
|
tifiers of groups of individual users (e.g., "all users at
|
|
Host A," "all users of network Q") so long as the individu-
|
|
als involved in the group are implied by the group identif-
|
|
ier. For example, Host A might employ a particular group-id,
|
|
for which it maintains a list of explicit users in that
|
|
group, in its network exchange with Host B, which accepts
|
|
the group-id under the conditions of this interpretation.
|
|
|
|
For networks, individual hosts will impose need-to-know
|
|
controls over their users on the basis of named individuals
|
|
- much like (in fact, probably the same) controls used when
|
|
there is no network connection.
|
|
|
|
When group identifiers are acceptable for access con-
|
|
trol, the identifier of some other host may be employed, to
|
|
eliminate the maintenance that would be required if indivi-
|
|
dual identification of remote users was employed. In class
|
|
C2 and higher, however, it must be possible from that audit
|
|
record to identify (immediately or at some later time)
|
|
exactly the individuals represented by a group identifier at
|
|
the time of the use of that identifier. There is allowed to
|
|
be an uncertainty because of elapsed time between changes in
|
|
the group membership and the enforcement in the access con-
|
|
trol mechanisms.
|
|
|
|
The DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. The reference monitor manages
|
|
all the physical resources of the system and from them
|
|
creates the abstraction of subjects and objects that it con-
|
|
trols. Some of these subjects and objects may be used to
|
|
implement a part of the NTCB. When the DAC mechanism is
|
|
distributed in such NTCB subjects (i.e., when outside the
|
|
reference monitor), the assurance requirements (see the
|
|
Assurance section) for the design and implementation of the
|
|
DAC shall be those of class C2 for all networks of class C2
|
|
or above.
|
|
|
|
When integrity is included as part of the network dis-
|
|
cretionary security policy, the above interpretations shall
|
|
be specifically applied to the controls over modification,
|
|
viz, the write mode of access, within each component based
|
|
on identified users or groups of users.
|
|
|
|
+ Rationale
|
|
|
|
In this class, the supporting elements of the overall
|
|
DAC mechanism are required to isolate information (objects)
|
|
that supports DAC so that it is subject to auditing require-
|
|
ments (see the System Architecture section). The use of
|
|
network identifiers to identify groups of individual users
|
|
could be implemented, for example, as an X.25 community of
|
|
interest in the network protocol layer (layer 3). In all
|
|
other respects, the supporting elements of the overall DAC
|
|
mechanism are treated exactly as untrusted subjects are
|
|
treated with respect to DAC in an ADP system, with the same
|
|
result as noted in the interpretation.
|
|
|
|
A typical situation for DAC is that a surrogate process
|
|
for a remote user will be created in some host for access to
|
|
objects under the control of the NTCB partition within that
|
|
host. The interpretation requires that a user identifier be
|
|
assigned and maintained for each such process by the NTCB,
|
|
so that access by a surrogate process is subject to essen-
|
|
tially the same discretionary controls as access by a pro-
|
|
cess acting on behalf of a local user would be. However,
|
|
within this interpretation a range of possible interpreta-
|
|
tions of the assigned user identification is permitted.
|
|
|
|
The most obvious situation would exist if a global
|
|
database of network users were to be made permanently avail-
|
|
able on demand to every host, (i.e., a name server existed)
|
|
so that all user identifications were globally meaningful.
|
|
|
|
It is also acceptable, however, for some NTCB parti-
|
|
tions to maintain a database of locally-registered users for
|
|
its own use. In such a case, one could choose to inhibit
|
|
the creation of surrogate processes for locally unregistered
|
|
users, or (if permitted by the local policy) alternatively,
|
|
to permit the creation of surrogate processes with
|
|
preselected user and group identifiers which, in effect,
|
|
identify the process as executing on behalf of a member of a
|
|
group of users on a particular remote host. The intent of
|
|
the words concerning audit in the interpretation is to pro-
|
|
vide a minimally acceptable degree of auditability for cases
|
|
such as the last described. What is required is that there
|
|
be a capability, using the audit facilities provided by the
|
|
network NTCB partitions involved, to determine who was
|
|
logged in at the actual host of the group of remote users at
|
|
the time the surrogate processing occured.
|
|
|
|
Associating the proper user id with a surrogate process
|
|
is the job of identification and authentication. This means
|
|
that DAC is applied locally, with respect to the user id of
|
|
the surrogate process. The transmission of the data back
|
|
across the network to the user's host, and the creation of a
|
|
copy of the data there, is not the business of DAC.
|
|
|
|
Components that support only internal subjects impact
|
|
the implementation of the DAC by providing services by which
|
|
information (e.g., a user-id) is made available to a com-
|
|
ponent that makes a DAC decision. An example of the latter
|
|
would be the case that a user at Host A attempts to access a
|
|
file at Host B. The DAC decision might be (and usually
|
|
would be) made at Host B on the basis of a user-id transmit-
|
|
ted from Host A to Host B.
|
|
|
|
Unique user identification may be achieved by a variety
|
|
of mechanisms, including (a) a requirement for unique iden-
|
|
tification and authentication on the host where access takes
|
|
place; (b) recognition of fully qualified network
|
|
addresses authenticated by another host and forwarded to the
|
|
host where access takes place; or (c) administrative support
|
|
of a network-wide unique personnel identifier that could be
|
|
authenticated and forwarded by another host as in (b) above,
|
|
or could be authenticated and forwarded by a dedicated net-
|
|
work identification and authentication server. The proto-
|
|
cols which implement (b) or (c) are subject to the System
|
|
Architecture requirements.
|
|
|
|
Network support for DAC might be handled in other ways
|
|
than that described as "typical" above. In particular, some
|
|
form of centralized access control is often proposed. An
|
|
access control center may make all decisions for DAC, or it
|
|
may share the burden with the hosts by controlling host-to-
|
|
host connections, and leaving the hosts to decide on access
|
|
to their objects by users at a limited set of remote hosts.
|
|
In this case the access control center provides the linkage
|
|
between the connection oriented abstraction (as discussed in
|
|
the Introduction) and the overall network security policy
|
|
for DAC. In all cases the enforcement of the decision must
|
|
be provided by the host where the object resides.
|
|
|
|
There are two forms of distribution for the DAC mechan-
|
|
ism: implementing portions of the DAC in separate com-
|
|
ponents, and supporting the DAC in subjects contained within
|
|
the NTCB partition in a component. Since "the ADP system"
|
|
is understood to be "the computer network" as a whole, each
|
|
network component is responsible for enforcing security in
|
|
the mechanisms allocated to it to ensure secure implementa-
|
|
tion of the network security policy. For traditional host
|
|
systems it is frequently easy to also enforce the DAC along
|
|
with the MAC within the reference monitor, per se, although
|
|
a few approaches, such as virtual machine monitors, support
|
|
DAC outside this interface.
|
|
|
|
In contrast to the universally rigid structure of man-
|
|
datory policies (see the Mandatory Access Control section),
|
|
DAC policies tend to be very network and system specific,
|
|
with features that reflect the natural use of the system.
|
|
For networks it is common that individual hosts will impose
|
|
controls over their local users on the basis of named
|
|
individuals-much like the controls used when there is no
|
|
network connection. However, it is difficult to manage in a
|
|
centralized manner all the individuals using a large net-
|
|
work. Therefore, users on other hosts are commonly grouped
|
|
together so that the controls required by the network DAC
|
|
policy are actually based on the identity of the hosts or
|
|
other components. A gateway is an example of such a com-
|
|
ponent.
|
|
|
|
The assurance requirements are at the very heart of the
|
|
concept of a trusted system. It is the assurance that
|
|
determines if a system or network is appropriate for a given
|
|
environment, as reflected, for example, in the Environments
|
|
Guideline-. In the case of monolithic systems that have DAC
|
|
integral to the reference monitor, the assurance require-
|
|
ments for DAC are inseparable from those of the rest of the
|
|
reference monitor. For networks there is typically a much
|
|
clearer distinction due to distributed DAC. The rationale
|
|
for making the distinction in this network interpretation is
|
|
that if major trusted network components can be made signi-
|
|
ficantly easier to design and implement without reducing the
|
|
ability to meet security policy, then trusted networks will
|
|
be more easily available.
|
|
|
|
|
|
3.3.1.2 Object Reuse
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
All authorizations to the information contained within a
|
|
storage object shall be revoked prior to initial assignment,
|
|
allocation or reallocation to a subject from the TCB's pool
|
|
of unused storage objects. No information, including
|
|
encrypted representations of information, produced by a
|
|
prior subject's actions is to be available to any subject
|
|
that obtains access to an object that has been released back
|
|
to the system.
|
|
|
|
+ Interpretation
|
|
|
|
The NTCB shall ensure that any storage objects that it
|
|
controls (e.g., message buffers under the control of a NTCB
|
|
_________________________
|
|
- Guidance for Applying the Department of Defense
|
|
________ ___ ________ ___ __________ __ _______
|
|
Trusted Computer System Evaluation Criteria in Specific
|
|
_______ ________ ______ __________ ________ __ ________
|
|
Environments, CSC-STD-003-85.
|
|
____________
|
|
|
|
|
|
partition in a component) contain no information for which a
|
|
subject in that component is not authorized before granting
|
|
access. This requirement must be enforced by each of the
|
|
NTCB partitions.
|
|
|
|
+ Rationale
|
|
|
|
In a network system, storage objects of interest are
|
|
things that the NTCB directly controls, such as message
|
|
buffers in components. Each component of the network system
|
|
must enforce the object reuse requirement with respect to
|
|
the storage objects of interest as determined by the network
|
|
security policy. For example, the DAC requirement in this
|
|
division leads to the requirement here that message buffers
|
|
be under the control of the NTCB partition. A buffer
|
|
assigned to an internal subject may be reused at the discre-
|
|
tion of that subject which is responsible for preserving the
|
|
integrity of message streams. Such controlled objects may
|
|
be implemented in physical resources, such as buffers, disk
|
|
sectors, tape space, and main memory, in components such as
|
|
network switches.
|
|
|
|
|
|
|
|
3.3.1.3 Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels associated with each ADP system resource
|
|
(e.g., subject, storage object, ROM) that is directly or
|
|
indirectly accessible by subjects external to the TCB shall
|
|
be maintained by the TCB. These labels shall be used as the
|
|
basis for mandatory access control decisions. In order to
|
|
import non-labeled data, the TCB shall request and receive
|
|
from an authorized user the sensitivity level of the data,
|
|
and all such actions shall be auditable by the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Non-labeled data imported under the control of the NTCB
|
|
partition will be assigned a label constrained by the device
|
|
labels of the single-level device used to import it. Labels
|
|
may include secrecy and integrity- components in accordance
|
|
with the overall network security policy described by the
|
|
network sponsor. Whenever the term "label" is used
|
|
throughout this interpretation, it is understood to include
|
|
both components as applicable. Similarly, the terms
|
|
"single-level" and "multilevel" are understood to be based
|
|
on both the secrecy and integrity components of the policy.
|
|
The mandatory integrity policy will typically have require-
|
|
ments, such as the probability of undetected message stream
|
|
modification, that will be reflected in the label for the
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Computer Systems," ESD-TR-76-372, MTR-
|
|
3153, The MITRE Corporation, Bedford, MA, April 1977.
|
|
|
|
data so protected. For example, when data is imported its
|
|
integrity label may be assigned based on mechanisms, such as
|
|
cryptography, used to provide the assurance required by the
|
|
policy. The NTCB shall assure that such mechanism are pro-
|
|
tected from tampering and are always invoked when they are
|
|
the basis for a label.
|
|
|
|
|
|
If the security policy includes an integrity policy,
|
|
all activities that result in message-stream modification
|
|
during transmission are regarded as unauthorized accesses in
|
|
violation of the integrity policy. The NTCB shall have an
|
|
automated capability for testing, detecting, and reporting
|
|
those errors/corruptions that exceed specified network
|
|
integrity policy requirements. Message-stream modification
|
|
(MSM) countermeasures shall be identified. A technology of
|
|
adequate strength shall be selected to resist MSM. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency.
|
|
|
|
All objects must be labeled within each component of
|
|
the network that is trusted to maintain separation of multi-
|
|
ple levels of information. The label associated with any
|
|
objects associated with single-level components will be
|
|
identical to the level of that component. Objects used to
|
|
store network control information, and other network struc-
|
|
tures, such as routing tables, must be labeled to prevent
|
|
unauthorized access and/or modification.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system and partitioned NTCB as
|
|
defined for these network interpretations. A single-level
|
|
device may be regarded either as a subject or an object. A
|
|
multilevel device is regarded as a trusted subject in which
|
|
the security range of the subject is the minimum-maximum
|
|
range of the data expected to be transmitted over the dev-
|
|
ice.
|
|
|
|
The sensitivity labels for either secrecy or integrity
|
|
or both may reflect non-hierarchical categories or hierarch-
|
|
ical classification or both.
|
|
|
|
For a network it is necessary that this requirement be
|
|
applied to all network system resources at the (B2) level
|
|
and above.
|
|
|
|
The NTCB is responsible for implementing the network
|
|
integrity policy, when one exists. The NTCB must enforce
|
|
that policy by ensuring that information is accurately
|
|
transmitted from source to destination (regardless of the
|
|
number of intervening connecting points). The NTCB must be
|
|
able to counter equipment failure, environmental disrup-
|
|
tions, and actions by persons and processes not authorized
|
|
to alter the data. Protocols that perform code or format
|
|
conversion shall preserve the integrity of data and control
|
|
information.
|
|
|
|
The probability of an undetected transmission error may
|
|
be specified as part of the network security policy so that
|
|
the acceptability of the network for its intended applica-
|
|
tion may be determined. The specific metrics (e.g., proba-
|
|
bility of undetected modification) satisfied by the data can
|
|
be reflected in the integrity sensitivity label associated
|
|
with the data while it is processed within a component. It
|
|
is recognized that different applications and operational
|
|
environments (e.g., crisis as compared to logistic) will
|
|
have different integrity requirements.
|
|
|
|
The network shall also have an automated capability of
|
|
testing for, detecting, and reporting errors that exceed a
|
|
threshold consistent with the operational mode requirements.
|
|
The effectiveness of integrity countermeasures must be esta-
|
|
blished with the same rigor as the other security-relevant
|
|
properties such as secrecy.
|
|
|
|
Cryptography is often utilized as a basis to provide
|
|
data integrity assurance. Mechanisms, such as Manipulation
|
|
Detection Codes (MDC)-, may be used. The adequacy of the
|
|
encryption or MDC algorithm, the correctness of the protocol
|
|
logic, and the adequacy of implementation must be esta-
|
|
blished in MSM countermeasures design.
|
|
|
|
|
|
|
|
3.3.1.3.1 Label Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels shall accurately represent sensitivity
|
|
levels of the specific subjects or objects with which they
|
|
are associated. When exported by the TCB, sensitivity
|
|
labels shall accurately and unambiguously represent the
|
|
internal labels and shall be associated with the information
|
|
being exported.
|
|
|
|
+ Interpretation
|
|
|
|
The phrase "exported by the TCB" is understood to
|
|
include transmission of information from an object in one
|
|
component to an object in another component. Information
|
|
transferred between NTCB partitions is addressed in the Sys-
|
|
tem Integrity Section. The form of internal and external
|
|
(exported) sensitivity labels may differ, but the meaning
|
|
shall be the same. The NTCB shall, in addition, ensure that
|
|
correct association of sensitivity labels with the informa-
|
|
tion being transported across the network is preserved.
|
|
|
|
|
|
_________________________
|
|
- See Jueneman, R. R., "Electronic Document Authenti-
|
|
cation," IEEE Network Magazine, April 1987, pp 17-23.
|
|
____ _______ ________
|
|
|
|
|
|
As mentioned in the Trusted Facility Manual Section,
|
|
encryption transforms the representation of information so
|
|
that it is unintelligible to unauthorized subjects.
|
|
Reflecting this transformation, the sensitivity level of the
|
|
ciphertext is generally lower than the cleartext. It fol-
|
|
lows that cleartext and ciphertext are contained in dif-
|
|
ferent objects, each possessing its own label. The label of
|
|
the cleartext must be preserved and associated with the
|
|
ciphertext so that it can be restored when the cleartext is
|
|
subsequently obtained by decrypting the ciphertext. If the
|
|
cleartext is associated with a single-level device, the
|
|
label of that cleartext may be implicit. The label may also
|
|
be implicit in the key.
|
|
|
|
When information is exported to an environment where it
|
|
is subject to deliberate or accidental modification, the TCB
|
|
shall support the means, such as cryptographic checksums, to
|
|
assure the accuracy of the labels. When there is a manda-
|
|
tory integrity policy, the policy will define the meaning of
|
|
integrity labels.
|
|
|
|
+ Rationale
|
|
|
|
Encryption algorithms and their implementation are out-
|
|
side the scope of these interpretations. Such algorithms
|
|
may be implemented in a separate device or may be incor-
|
|
porated in a subject of a larger component. Without preju-
|
|
dice, either implementation packaging is referred to as an
|
|
encryption mechanism herein. If encryption methodologies are
|
|
employed in this regard, they shall be approved by the
|
|
National Security Agency (NSA). The encryption process is
|
|
part of the Network Trusted Computer Base partition in the
|
|
components in which it is implemented.
|
|
|
|
The encryption mechanism is not necessarily a mul-
|
|
tilevel device or multilevel subject, as these terms are
|
|
used in these criteria. The process of encryption is mul-
|
|
tilevel by definition. The cleartext and ciphertext inter-
|
|
faces carry information of different sensitivity. An
|
|
encryption mechanism does not process data in the sense of
|
|
performing logical or arithmetic operations on that data
|
|
with the intent of producing new data. The cleartext and
|
|
ciphertext interfaces on the encryption mechanism must be
|
|
separately identified as being single-level or multilevel.
|
|
If the interface is single-level, then the sensitivity of
|
|
the data is established by a trusted individual and impli-
|
|
citly associated with the interface; the Exportation to
|
|
Single-Level Devices criterion applies.
|
|
|
|
If the interface is multilevel, then the data must be
|
|
labeled; the Exportation to Multilevel Devices criterion
|
|
applies. The network architect is free to select an accept-
|
|
able mechanism for associating a label with an object. With
|
|
reference to encrypted objects, the following examples are
|
|
possible:
|
|
|
|
|
|
1. Include a label field in the protocol definition of
|
|
the object.
|
|
|
|
2. Implicitly associate the label with the object
|
|
through the encryption key. That is, the encryption
|
|
key uniquely identifies a sensitivity level. A sin-
|
|
gle or private key must be protected at the level of
|
|
the data that it encrypts.
|
|
|
|
|
|
3.3.1.3.2 Exportation of Labeled Information
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall designate each communication channel and I/O
|
|
device as either single-level or multilevel. Any change in
|
|
this designation shall be done manually and shall be audit-
|
|
able by the TCB. The TCB shall maintain and be able to
|
|
audit any change in the sensitivity level or levels associ-
|
|
ated with a communications channel or I/O device.
|
|
|
|
+ Interpretation
|
|
|
|
Each communication channel and network component shall
|
|
be designated as either single-level or multilevel. Any
|
|
change in this designation shall be done with the cognizance
|
|
and approval of the administrator or security officer in
|
|
charge of the affected components and the administrator or
|
|
security officer in charge of the NTCB. This change shall
|
|
be auditable by the network. The NTCB shall maintain and be
|
|
able to audit any change in the device labels associated
|
|
with a single-level communication channel or the range asso-
|
|
ciated with a multilevel communication channel or component.
|
|
The NTCB shall also be able to audit any change in the set
|
|
of sensitivity levels associated with the information which
|
|
can be transmitted over a multilevel communication channel
|
|
or component.
|
|
|
|
+ Rationale
|
|
|
|
Communication channels and components in a network are
|
|
analogous to communication channels and I/O devices in
|
|
stand-alone systems. They must be designated as either mul-
|
|
tilevel (i.e., able to distinguish and maintain separation
|
|
among information of various sensitivity levels) or single-
|
|
level. As in the TCSEC, single-level devices may only be
|
|
attached to single-level channels.
|
|
|
|
The level or set of levels of information that can be
|
|
sent to a component or over a communication channel shall
|
|
only change with the knowledge and approval of the security
|
|
officers (or system administrator, if there is no security
|
|
officer) of the network, and of the affected components.
|
|
This requirement ensures that no significant security-
|
|
relevant changes are made without the approval of all
|
|
affected parties.
|
|
|
|
3.3.1.3.2.1 Exportation to Multilevel Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
When the TCB exports an object to a multilevel I/O device,
|
|
the sensitivity label associated with that object shall also
|
|
be exported and shall reside on the same physical medium as
|
|
the exported information and shall be in the same form
|
|
(i.e., machine-readable or human-readable form). When the
|
|
TCB exports or imports an object over a multilevel communi-
|
|
cations channel, the protocol used on that channel shall
|
|
provide for the unambiguous pairing between the sensitivity
|
|
labels and the associated information that is sent or
|
|
received.
|
|
|
|
+ Interpretation
|
|
|
|
The components, including hosts, of a network shall be
|
|
interconnected over "multilevel communication channels,"
|
|
multiple single-level communication channels, or both, when-
|
|
ever the information is to be protected at more than a sin-
|
|
gle sensitivity level. The protocol for associating the
|
|
sensitivity label and the exported information shall provide
|
|
the only information needed to correctly associate a sensi-
|
|
tivity level with the exported information transferred over
|
|
the multilevel channel between the NTCB partitions in indi-
|
|
vidual components. This protocol definition must specify the
|
|
representation and semantics of the sensitivity labels
|
|
(i.e., the machine-readable label must uniquely represent
|
|
the sensitivity level).
|
|
|
|
The "unambiguous" association of the sensitivity level
|
|
with the communicated information shall meet the same level
|
|
of accuracy as that required for any other label within the
|
|
NTCB, as specified in the criterion for Label Integrity.
|
|
This may be provided by protected and highly reliable direct
|
|
physical layer connections, or by traditional cryptographic
|
|
link protection in which any errors during transmission can
|
|
be readily detected, or by use of a separate channel. The
|
|
range of information imported or exported must be con-
|
|
strained by the associated device labels.
|
|
|
|
+ Rationale
|
|
|
|
This protocol must specify the representation and
|
|
semantics of the sensitivity labels. See the Mandatory
|
|
Access Control Policies section in Appendix B. The mul-
|
|
tilevel device interface to (untrusted) subjects may be
|
|
implemented either by the interface of the reference moni-
|
|
tor, per se, or by a multilevel subject (e.g., a "trusted
|
|
subject" as defined in the Bell-LaPadula Model) that pro-
|
|
vides the labels based on the internal labels of the NTCB
|
|
partition.
|
|
|
|
The current state of the art limits the support for
|
|
mandatory policy that is practical for secure networks.
|
|
Reference monitor support to ensure the control over all the
|
|
operations of each subject in the network must be completely
|
|
provided within the single NTCB partition on which that sub-
|
|
ject interfaces to the NTCB. This means that the entire
|
|
portion of the "secure state" represented in the formal
|
|
security policy model that may be changed by transitions
|
|
invoked by this subject must be contained in the same com-
|
|
ponent.
|
|
|
|
The secure state of an NTCB partition may be affected
|
|
by events external to the component in which the NTCB parti-
|
|
tion resides (e.g., arrival of a message). The effect
|
|
occurs asynchronusly after being initiated by an event in
|
|
another component or partition. For example, indeterminate
|
|
delays may occur between the initiation of a message in one
|
|
component, the arrival of the message in the NTCB partition
|
|
in another component, and the corresponding change to the
|
|
secure state of the second component. Since each component
|
|
is executing concurrently, to do otherwise would require
|
|
some sort of network-wide control to synchronize state tran-
|
|
sitions, such as a global network-wide clock for all proces-
|
|
sors; in general, such designs are not practical and prob-
|
|
ably not even desirable. Therefore, the interaction between
|
|
NTCB partitions is restricted to just communications between
|
|
pairs (at least logically) of devices-multilevel devices if
|
|
the device(s) can send/receive data of more than a single
|
|
level. For broadcast channels the pairs are the sender and
|
|
intended receiver(s). However, if the broadcast channel
|
|
carries multiple levels of information, additional mechanism
|
|
(e.g., cryptochecksum maintained by the TCB) may be required
|
|
to enforce separation and proper delivery.
|
|
|
|
A common representation for sensitivity labels is
|
|
needed in the protocol used on that channel and understood
|
|
by both the sender and receiver when two multilevel devices
|
|
(in this case, in two different components) are intercon-
|
|
nected. Each distinct sensitivity level of the overall net-
|
|
work policy must be represented uniquely in these labels.
|
|
|
|
Within a monolithic TCB, the accuracy of the sensi-
|
|
tivity labels is generally assured by simple techniques,
|
|
e.g., very reliable connections over very short physical
|
|
connections, such as on a single printed circuit board or
|
|
over an internal bus. In many network environments there is
|
|
a much higher probability of accidentally or maliciously
|
|
introduced errors, and these must be protected against.
|
|
|
|
|
|
3.3.1.3.2.2 Exportation to Single-Level Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Single-level I/O devices and single-level communication
|
|
channels are not required to maintain the sensitivity labels
|
|
of the information they process. However, the TCB shall
|
|
include a mechanism by which the TCB and an authorized user
|
|
reliably communicate to designate the single sensitivity
|
|
level of information imported or exported via single-level
|
|
communication channels or I/O devices.
|
|
|
|
+ Interpretation
|
|
|
|
Whenever one or both of two directly connected com-
|
|
ponents is not trusted to maintain the separation of infor-
|
|
mation of different sensitivity levels, or whenever the two
|
|
directly connected components have only a single sensitivity
|
|
level in common, the two components of the network shall
|
|
communicate over a single-level channel. Single-level com-
|
|
ponents and single-level communication channels are not
|
|
required to maintain the sensitivity labels of the informa-
|
|
tion they process. However, the NTCB shall include a reli-
|
|
able communication mechanism by which the NTCB and an
|
|
authorized user (via a trusted path) or a subject within an
|
|
NTCB partition can designate the single sensitivity level of
|
|
information imported or exported via single-level communica-
|
|
tion channels or network components. The level of informa-
|
|
tion communicated must equal the device level.
|
|
|
|
+ Rationale
|
|
|
|
Single-level communications channels and single-level
|
|
components in networks are analogous to single level chan-
|
|
nels and I/O devices in stand-alone systems in that they are
|
|
not trusted to maintain the separation of information of
|
|
different sensitivity levels. The labels associated with
|
|
data transmitted over those channels and by those components
|
|
are therefore implicit; the NTCB associates labels with the
|
|
data because of the channel or component, not because of an
|
|
explicit part of the bit stream. Note that the sensitivity
|
|
level of encrypted information is the level of the cipher-
|
|
text rather than the original level(s) of the plaintext.
|
|
|
|
|
|
3.3.1.3.2.3 Labeling Human-Readable Output
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The ADP system administrator shall be able to specify the
|
|
printable label names associated with exported sensitivity
|
|
labels. The TCB shall mark the beginning and end of all
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the output. The TCB
|
|
shall, by default, mark the top and bottom of each page of
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the page. The TCB shall,
|
|
by default and in an appropriate manner, mark other forms of
|
|
human readable output (e.g., maps, graphics) with human-
|
|
readable sensitivity labels that properly1 represent the
|
|
sensitivity of the output. Any override of these markings
|
|
defaults shall be auditable by the TCB.
|
|
_________________________
|
|
1 The hierarchical classification component in human-
|
|
readable sensitivity labels shall be equal to the greatest
|
|
hierarchical classification of any of the information in the
|
|
output that the labels refer to; the non-hierarchical category
|
|
component shall include all of the non-hierarchical categories of
|
|
the information in the output the labels refer to, but no other
|
|
non-hierarchical categories.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion imposes no requirement to a component
|
|
that produces no human-readable output. For those that do
|
|
produce human-readable output, each sensitivity level that
|
|
is defined to the network shall have a uniform meaning
|
|
across all components. The network administrator, in con-
|
|
junction with any affected component administrator, shall be
|
|
able to specify the human-readable label that is associated
|
|
with each defined sensitivity level.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system and
|
|
partitioned NTCB as defined for these network interpreta-
|
|
tions.
|
|
|
|
|
|
3.3.1.3.3 Subject Sensitivity Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall immediately notify a terminal user of each
|
|
change in the sensitivity level associated with that user
|
|
during an interactive session. A terminal user shall be
|
|
able to query the TCB as desired for a display of the
|
|
subject's complete sensitivity label.
|
|
|
|
+ Interpretation
|
|
|
|
An NTCB partition shall immediately notify a terminal
|
|
user attached to its component of each change in the sensi-
|
|
tivity level associated with that user.
|
|
|
|
+ Rationale
|
|
|
|
The local NTCB partition must ensure that the user
|
|
understands the sensitivity level of information sent to and
|
|
from a terminal. When a user has a surrogate process in
|
|
another component, adjustments to its level may occur to
|
|
maintain communication with the user. These changes may
|
|
occur asynchronously. Such adjustments are necessitated by
|
|
mandatory access control as applied to the objects involved
|
|
in the communication path.
|
|
|
|
|
|
3.3.1.3.4 Device Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support the assignment of minimum and maximum
|
|
sensitivity levels to all attached physical devices. These
|
|
sensitivity levels shall be used by the TCB to enforce con-
|
|
straints imposed by the physical environments in which the
|
|
devices are located.
|
|
|
|
+ Interpretation
|
|
|
|
This requirement applies as written to each NTCB parti-
|
|
tion that is trusted to separate information based on sensi-
|
|
tivity level. Each I/O device in a component, used for com-
|
|
munication with other network components, is assigned a dev-
|
|
ice range, consisting of a set of labels with a maximum and
|
|
minimum. (A device range usually contains, but does not
|
|
necessarily contain, all possible labels "between" the max-
|
|
imum and minimum, in the sense of dominating the minimum and
|
|
being dominated by the maximum.)
|
|
|
|
The NTCB always provides an accurate label for informa-
|
|
tion exported through devices. Information exported or
|
|
imported using a single-level device is labelled implicitly
|
|
by the sensitivity level of the device. Information
|
|
exported from one multilevel device and imported at another
|
|
must be labelled through an agreed-upon protocol, unless it
|
|
is labelled implicitly by using a communication link that
|
|
always carries a single level.
|
|
|
|
Information exported at a given sensitivity level can
|
|
be sent only to an importing device whose device range con-
|
|
tains that level or a higher level. If the importing device
|
|
range does not contain the given level, the information is
|
|
relabelled upon reception at a higher level within the
|
|
importing device range. Relabelling should not occur other-
|
|
wise.
|
|
|
|
+ Rationale
|
|
|
|
The purpose of device labels is to reflect and con-
|
|
strain the sensitivity levels of information authorized for
|
|
the physical environment in which the devices are located.
|
|
|
|
The information transfer restrictions permit one-way
|
|
communication (i.e., no acknowledgements) from one device to
|
|
another whose ranges have no level in common, as long as
|
|
each level in the sending device range is dominated by some
|
|
level in the receiving device range. It is never permitted
|
|
to send information at a given level to a device whose range
|
|
does not contain a dominating level. (See Appendix C for
|
|
similar interconnection rules for the interconnected AIS
|
|
view.)
|
|
|
|
|
|
3.3.1.4 Mandatory Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall enforce a mandatory access control policy over
|
|
all resources (i.e., subjects, storage objects, and I/O dev-
|
|
ices) that are directly or indirectly accessible by subjects
|
|
external to the TCB. These subjects and objects shall be
|
|
assigned sensitivity labels that are a combination of
|
|
hierarchical classification levels and non-hierarchical
|
|
categories, and the labels shall be used as the basis for
|
|
mandatory access control decisions. The TCB shall be able
|
|
to support two or more such sensitivity levels. (See the
|
|
Mandatory Access Control interpretations.) The following
|
|
requirements shall hold for all accesses between all sub-
|
|
jects external to the TCB and all objects directly or
|
|
indirectly accessible by these subjects. A subject can
|
|
read an object only if the hierarchical classification in
|
|
the subject's sensitivity level is greater than or equal to
|
|
the hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level include all the non-hierarchical
|
|
categories in the object's sensitivity level. A subject can
|
|
write an object only if the hierarchical classification in
|
|
the subject's sensitivity level is less than or equal to the
|
|
hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level are included in the non-hierarchical
|
|
categories in the object's sensitivity level. Identification
|
|
and authentication data shall be used by the TCB to authen-
|
|
ticate the user's identity and to ensure that the sensi-
|
|
tivity level and authorization of subjects external to the
|
|
TCB that may be created to act on behalf of the individual
|
|
user are dominated by the clearance and authorization of
|
|
that user.
|
|
|
|
+ Interpretation
|
|
|
|
Each partition of the NTCB exercises mandatory access
|
|
control policy over all subjects and objects in its com-
|
|
ponent. In a network, the responsibility of an NTCB parti-
|
|
tion encompasses all mandatory access control functions in
|
|
its component that would be required of a TCB in a stand-
|
|
alone system. In particular, subjects and objects used for
|
|
communication with other components are under the control of
|
|
the NTCB partition. Mandatory access control includes
|
|
secrecy and integrity control to the extent that the network
|
|
sponsor has described in the overall network security pol-
|
|
icy.
|
|
|
|
Conceptual entities associated with communication
|
|
between two components, such as sessions, connections and
|
|
virtual circuits, may be thought of as having two ends, one
|
|
in each component, where each end is represented by a local
|
|
object. Communication is viewed as an operation that copies
|
|
information from an object at one end of a communication
|
|
path to an object at the other end. Transient data-carrying
|
|
entities, such as datagrams and packets, exist either as
|
|
information within other objects, or as a pair of objects,
|
|
one at each end of the communication path.
|
|
|
|
The requirement for "two or more" sensitivity levels
|
|
can be met by either secrecy or integrity levels. When
|
|
there is a mandatory integrity policy, the stated require-
|
|
ments for reading and writing are generalized to: A subject
|
|
can read an object only if the subject's sensitivity level
|
|
dominates the object's sensitivity level, and a subject can
|
|
write an object only if the object's sensitivity level dom-
|
|
inates the subject's sensitivity level. Based on the
|
|
integrity policy, the network sponsor shall define the domi-
|
|
nance relation for the total label, for example, by combin-
|
|
ing secrecy and integrity lattices. -
|
|
|
|
+ Rationale
|
|
|
|
An NTCB partition can maintain access control only over
|
|
subjects and objects in its component. At levels B2 and
|
|
above, the NTCB partition must maintain access control over
|
|
all subjects and objects in its component. Access by a sub-
|
|
ject in one component to information contained in an object
|
|
in another component requires the creation of a subject in
|
|
the remote component which acts as a surrogate for the first
|
|
subject.
|
|
|
|
The mandatory access controls must be enforced at the
|
|
interface of the reference monitor (viz. the mechanism that
|
|
controls physical processing resources) for each NTCB parti-
|
|
tion. This mechanism creates the abstraction of subjects
|
|
and objects which it controls. Some of these subjects out-
|
|
side the reference monitor, per se, may be designated to
|
|
implement part of an NTCB partition's mandatory policy,
|
|
e.g., by using the ``trusted subjects" defined in the Bell-
|
|
LaPadula model.
|
|
|
|
The prior requirements on exportation of labeled infor-
|
|
mation to and from I/O devices ensure the consistency
|
|
between the sensitivity labels of objects connected by a
|
|
communication path. As noted in the introduction, the net-
|
|
work architecture must recognize the linkage between the
|
|
overall mandatory network security policy and the connection
|
|
oriented abstraction. For example, individual data-carrying
|
|
entities such as datagrams can have individual sensitivity
|
|
labels that subject them to mandatory access control in each
|
|
component. The abstraction of a single-level connection is
|
|
realized and enforced implicitly by an architecture while a
|
|
connection is realized by single-level subjects that neces-
|
|
sarily employ only datagrams of the same level.
|
|
|
|
The fundamental trusted systems technology permits the
|
|
DAC mechanism to be distributed, in contrast to the require-
|
|
ments for mandatory access control. For networks this
|
|
separation of MAC and DAC mechanisms is the rule rather than
|
|
_________________________
|
|
- See, for example, Grohn, M. J., A Model of a Pro-
|
|
_ _____ __ _ ___
|
|
tected Data Management System, ESD-TR-76-289, I. P.
|
|
______ ____ __________ ______
|
|
Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
|
|
Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
|
|
and Shockley, W., Secure Distributed Data Views, Secu-
|
|
______ ___________ ____ _____ ____
|
|
rity Policy and Interpretation for a Class A1 Multilev-
|
|
____ ______ ___ ______________ ___ _ _____ __ ________
|
|
el Secure Relational Database System,SRI International,
|
|
__ ______ __________ ________ ______
|
|
November 1986.
|
|
|
|
the exception.
|
|
|
|
The set of total sensitivity labels used to represent
|
|
all the sensitivity levels for the mandatory access control
|
|
(combined data secrecy and data integrity) policy always
|
|
forms a partially ordered set. Without loss of generality,
|
|
this set of labels can always be extended to form a lattice,
|
|
by including all the combinations of non-hierarchical
|
|
categories. As for any lattice, a dominance relation is
|
|
always defined for the total sensitivity labels. For admin-
|
|
istrative reasons it may be helpful to have a maximum level
|
|
which dominates all others.
|
|
|
|
|
|
3.3.2 Accountability
|
|
_ _ _ ______________
|
|
|
|
|
|
3.3.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall require users to identify themselves to it
|
|
before beginning to perform any other actions that the TCB
|
|
is expected to mediate. Furthermore, the TCB shall maintain
|
|
authentication data that includes information for verifying
|
|
the identify of individual users (e.g., passwords) as well
|
|
as information for determining the clearance and authoriza-
|
|
tions of individual users. This data shall be used by the
|
|
TCB to authenticate the user's identity and to ensure that
|
|
the sensitivity level and authorization of subjects external
|
|
to the TCB that may be created to act on behalf of the indi-
|
|
vidual user are dominated by the clearance and authorization
|
|
of that user. The TCB shall protect authentication data so
|
|
that it cannot be accessed by any unauthorized user. The
|
|
TCB shall be able to enforce individual accountability by
|
|
providing the capability to uniquely identify each indivi-
|
|
dual ADP system user. The TCB shall also provide the capa-
|
|
bility of associating this identity with all auditable
|
|
actions taken by that individual.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement for identification and authentication
|
|
of users is the same for a network system as for an ADP sys-
|
|
tem. The identification and authentication may be done by
|
|
the component to which the user is directly connected or
|
|
some other component, such as an identification and authen-
|
|
tication server. Available techniques, such as those
|
|
described in the Password Guideline=, are generally also
|
|
applicable in the network context. However, in cases where
|
|
the NTCB is expected to mediate actions of a host (or other
|
|
network component) that is acting on behalf of a user or
|
|
group of users, the NTCB may employ identification and
|
|
_________________________
|
|
= Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, CSC-STD-002-85
|
|
____
|
|
|
|
authentication of the host (or other component) in lieu of
|
|
identification and authentication of an individual user, so
|
|
long as the component identifier implies a list of specific
|
|
users uniquely associated with the identifier at the time of
|
|
its use for authentication. This requirement does not apply
|
|
to internal subjects.
|
|
|
|
Authentication information, including the identity of a
|
|
user (once authenticated) may be passed from one component
|
|
to another without reauthentication, so long as the NTCB
|
|
protects (e.g., by encryption) the information from unau-
|
|
thorized disclosure and modification. This protection shall
|
|
provide at least a similar level of assurance (or strength
|
|
of mechanism) as pertains to the protection of the authenti-
|
|
cation mechanism and authentication data.
|
|
|
|
+ Rationale
|
|
|
|
The need for accountability is not changed in the con-
|
|
text of a network system. The fact that the NTCB is parti-
|
|
tioned over a set of components neither reduces the need nor
|
|
imposes new requirements. That is, individual accountabil-
|
|
ity is still the objective. Also, in the context of a net-
|
|
work system at the (C2) level or higher "individual accoun-
|
|
tability" can be satisfied by identification of a host (or
|
|
other component) so long as the requirement for traceability
|
|
to individual users or a set of specific individual users
|
|
with active subjects is satisfied. There is allowed to be an
|
|
uncertainty in traceability because of elapsed time between
|
|
changes in the group membership and the enforcement in the
|
|
access control mechanisms. In addition, there is no need in
|
|
a distributed processing system like a network to reauthen-
|
|
ticate a user at each point in the network where a projec-
|
|
tion of a user (via the subject operating on behalf of the
|
|
user) into another remote subject takes place.
|
|
|
|
The passing of identifiers and/or authentication infor-
|
|
mation from one component to another is usually done in sup-
|
|
port to the implementation of the discretionary access con-
|
|
trol (DAC). This support relates directly to the DAC
|
|
regarding access by a user to a storage object in a dif-
|
|
ferent NTCB partition than the one where the user was
|
|
authenticated. Employing a forwarded identification implies
|
|
additional reliance on the source and components along the
|
|
path. If the authenticated identification is used as the
|
|
basis of determining a sensitivity label for a subject, it
|
|
must satisfy the Label Integrity criterion.
|
|
|
|
An authenticated identification may be forwarded
|
|
between components and employed in some component to iden-
|
|
tify the sensitivity level associated with a subject created
|
|
to act on behalf of the user so identified.
|
|
|
|
|
|
3.3.2.1.1 Trusted Path
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support a trusted communication path between
|
|
itself and USERS FOR USE WHEN A POSITIVE TCB-TO-USER CONNEC-
|
|
TION IS REQUIRED (E.G., LOGIN, CHANGE SUBJECT SENSITIVITY
|
|
LEVEL). Communications via this TRUSTED path shall be
|
|
ACTIVATED exclusively by a USER OR THE TCB AND SHALL BE
|
|
LOGICALLY AND UNMISTAKABLY DISTINGUISHABLE FROM OTHER PATHS.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
A trusted path is supported between a user (i.e.,
|
|
human) and the NTCB partition in the component to which the
|
|
user is directly connected.
|
|
|
|
+ Rationale
|
|
|
|
When a user logs into a remote component, the user id
|
|
is transmitted securely between the local and remote NTCB
|
|
partitions in accordance with the requirements in Identifi-
|
|
cation and Authentication.
|
|
|
|
Trusted Path is necessary in order to assure that the
|
|
user is communicating with the NTCB and only the NTCB when
|
|
security relevant activities are taking place (e.g., authen-
|
|
ticate user, set current session sensitivity level). How-
|
|
ever, Trusted Path does not address communications within
|
|
the NTCB, only communications between the user and the NTCB.
|
|
If, therefore, a component does not support any direct user
|
|
communication then the component need not contain mechanisms
|
|
for assuring direct NTCB to user communications.
|
|
|
|
The requirement for trusted communication between one
|
|
NTCB partition and another NCTB partition is addressed in
|
|
the System Architecture section. These requirements are
|
|
separate and distinct from the user to NTCB communication
|
|
requirement of a trusted path. However, it is expected that
|
|
this trusted communication between one NTCB partition and
|
|
another NTCB partition will be used in conjunction with the
|
|
trusted path to implement trusted communication between the
|
|
user and the remote NTCB partition.
|
|
|
|
|
|
3.3.2.2 Audit
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall be able to create, maintain, and protect from
|
|
modification or unauthorized access or destruction an audit
|
|
trail of accesses to the objects it protects. The audit
|
|
data shall be protected by the TCB so that read access to it
|
|
is limited to those who are authorized for audit data. The
|
|
TCB shall be able to record the following types of events:
|
|
use of identification and authentication mechanisms,
|
|
introduction of objects into a user's address space (e.g.,
|
|
file open, program initiation), deletion of objects, actions
|
|
taken by computer operators and system administrators and/or
|
|
system security officers, and other security relevant
|
|
events. The TCB shall also be able to audit any override of
|
|
human-readable output markings. For each recorded event,
|
|
the audit record shall identify: date and time of the event,
|
|
user, type of event, and success or failure of the event.
|
|
For identification/authentication events the origin of
|
|
request (e.g., terminal ID) shall be included in the audit
|
|
record. For events that introduce an object into a user's
|
|
address space and for object deletion events the audit
|
|
record shall include the name of the object and the object's
|
|
sensitivity level. The ADP system administrator shall be
|
|
able to selectively audit the actions of any one or more
|
|
users based on individual identify and/or object sensitivity
|
|
level. The TCB shall be able to audit the identified
|
|
events that may be used in the exploitation of covert
|
|
storage channels. THE TCB SHALL CONTAIN A MECHANISM THAT
|
|
IS ABLE TO MONITOR THE OCCURRENCE OR ACCUMULATION OF SECU-
|
|
RITY AUDITABLE EVENTS THAT MAY INDICATE AN IMMINENT VIOLA-
|
|
TION OF SECURITY POLICY. THIS MECHANISM SHALL BE ABLE TO
|
|
IMMEDIATELY NOTIFY THE SECURITY ADMINISTRATOR WHEN THRES-
|
|
HOLDS ARE EXCEEDED AND, IF THE OCCURRENCE OR ACCUMULATION OF
|
|
THESE SECURITY RELEVANT EVENTS CONTINUES, THE SYSTEM SHALL
|
|
TAKE THE LEAST DISRUPTIVE ACTION TO TERMINATE THE EVENT.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion applies as stated. The sponsor must
|
|
select which events are auditable. If any such events are
|
|
not distinguishable by the NTCB alone (for example those
|
|
identified in Part II), the audit mechanism shall provide an
|
|
interface, which an authorized subject can invoke with
|
|
parameters sufficient to produce an audit record. These
|
|
audit records shall be distinguishable from those provided
|
|
by the NTCB. In the context of a network system, "other
|
|
security relevant events" (depending on network system
|
|
architecture and network security policy) might be as fol-
|
|
lows:
|
|
|
|
|
|
1. Identification of each access event (e.g., estab-
|
|
lishing a connection or a connectionless association
|
|
between processes in two hosts of the network) and
|
|
its principal parameters (e.g., host identifiers of
|
|
the two hosts involved in the access event and user
|
|
identifier or host identifier of the user or host
|
|
that is requesting the access event)
|
|
|
|
2. Identification of the starting and ending times of
|
|
each access event using local time or global syn-
|
|
chronized time
|
|
|
|
3. Identification of security-relevant exceptional con-
|
|
ditions (e.g., potential violation of data
|
|
integrity, such as misrouted datagrams) detected
|
|
during the transactions between two hosts
|
|
|
|
4. Utilization of cryptographic variables
|
|
|
|
5. Changing the configuration of the network (e.g., a
|
|
component leaving the network and rejoining)
|
|
|
|
In addition, identification information should be
|
|
included in appropriate audit trail records, as necessary,
|
|
to allow association of all related (e.g., involving the
|
|
same network event) audit trail records (e.g., at different
|
|
hosts) with each other. Furthermore, a component of the
|
|
network system may provide the required audit capability
|
|
(e.g., storage, retrieval, reduction, analysis) for other
|
|
components that do not internally store audit data but
|
|
transmit the audit data to some designated collection com-
|
|
ponent. Provisions shall be made to control the loss of
|
|
audit data due to unavailability of resources.
|
|
|
|
In the context of a network system, the "user's address
|
|
space" is extended, for object introduction and deletion
|
|
events, to include address spaces being employed on behalf
|
|
of a remote user (or host). However, the focus remains on
|
|
users in contrast to internal subjects as discussed in the
|
|
DAC criterion. In addition, audit information must be
|
|
stored in machine-readable form.
|
|
|
|
The capability must exist to audit the identified
|
|
events that may be used in the exploitation of covert
|
|
storage channels. To accomplish this, each NTCB partition
|
|
must be able to audit those events locally that may lead to
|
|
the exploitation of a covert storage channel which exist
|
|
because of the network.
|
|
|
|
THE SPONSOR SHALL IDENTIFY THE SPECIFIC AUDITABLE
|
|
EVENTS THAT MAY INDICATE AN IMMINENT VIOLATION OF SECURITY
|
|
POLICY. THE COMPONENT WHICH DETECTS THE OCCURRENCE OR ACCU-
|
|
MULATION OF SUCH EVENTS MUST BE ABLE TO NOTIFY AN APPROPRI-
|
|
ATE ADMINISTRATOR WHEN THRESHOLDS ARE EXCEEDED, AND TO INI-
|
|
TIATE ACTIONS WHICH WILL RESULT IN TERMINATION OF THE EVENT
|
|
IF THE ACCUMULATION CONTINUES. FOR EXAMPLE, WHEN THE THRES-
|
|
HOLD OF UNSUCCESSFUL LOGIN ATTEMPTS WITHIN A PERIOD OF TIME
|
|
IS EXCEEDED, LOGIN SHALL BE INHIBITED FOR A SPECIFIC TIME
|
|
PERIOD.
|
|
|
|
+ Rationale
|
|
|
|
For remote users, the network identifiers (e.g., inter-
|
|
net address) can be used as identifiers of groups of indivi-
|
|
dual users (e.g., "all users at Host A") to eliminate the
|
|
maintenance that would be required if individual identifica-
|
|
tion of remote users was employed. In this class (C2), how-
|
|
ever, it must be possible to identify (immediately or at
|
|
some later time) the individuals represented by a group
|
|
identifier. In all other respects, the interpretation is a
|
|
straightforward extension of the criterion into the context
|
|
of a network system. Identification of covert channel
|
|
events is addressed in the Covert Channel Analysis section.
|
|
|
|
BECAUSE OF CONCURRENCY AND SYNCHRONIZATION PROBLEMS, IT
|
|
MAY NOT BE POSSIBLE TO DETECT IN REAL TIME THE ACCUMULATION
|
|
OF SECURITY AUDITABLE EVENTS THAT ARE OCCURRING IN DIFFERENT
|
|
NTCB PARTITIONS. HOWEVER, EACH NTCB PARTITION THAT HAS BEEN
|
|
ALLOCATED AUDIT RESPONSIBILITY MUST HAVE THE CAPABILITY TO
|
|
DETECT THE LOCAL ACCUMULATION OF EVENTS, TO NOTIFY THE PAR-
|
|
TITION SECURITY ADMINISTRATOR AND/OR THE NETWORK SECURITY
|
|
ADMINISTRATOR, AND TO INITIATE ACTIONS WHICH WILL RESULT IN
|
|
TERMINATION OF THE EVENT LOCALLY.
|
|
|
|
|
|
3.3.3 Assurance
|
|
_ _ _ _________
|
|
|
|
|
|
3.3.3.1 Operational Assurance
|
|
|
|
|
|
3.3.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall maintain a domain for its own execution that
|
|
protects it from external interference or tampering (e.g.,
|
|
by modification of its code or data structures). The TCB
|
|
shall maintain process isolation through the provision of
|
|
distinct address spaces under its control. The TCB shall be
|
|
internally structured into well-defined largely independent
|
|
modules. It shall make effective use of available hardware
|
|
to separate those elements that are protection-critical from
|
|
those that are not. The TCB modules shall be designed such
|
|
that the principle of least privilege is enforced. Features
|
|
in hardware, such as segmentation, shall be used to support
|
|
logically distinct storage objects with separate attributes
|
|
(namely: readable, writable). The user interface to the TCB
|
|
shall be completely defined and all elements of the TCB
|
|
identified. THE TCB SHALL BE DESIGNED AND STRUCTURED TO
|
|
USE A COMPLETE, CONCEPTUALLY SIMPLE PROTECTION MECHANISM
|
|
WITH PRECISELY DEFINED SEMANTICS. THIS MECHANISM SHALL PLAY
|
|
A CENTRAL ROLE IN ENFORCING THE INTERNAL STRUCTURING OF THE
|
|
TCB AND THE SYSTEM. THE TCB SHALL INCORPORATE SIGNIFICANT
|
|
USE OF LAYERING, ABSTRACTION AND DATA HIDING. SIGNIFICANT
|
|
SYSTEM ENGINEERING SHALL BE DIRECTED TOWARD MINIMIZING THE
|
|
COMPLEXITY OF THE TCB AND EXCLUDING FROM THE TCB MODULES
|
|
THAT ARE NOT PROTECTION-CRITICAL.
|
|
|
|
+ Interpretation
|
|
|
|
The system architecture criterion must be met individu-
|
|
ally by all NTCB partitions. Implementation of the require-
|
|
ment that the NTCB maintain a domain for its own execution
|
|
is achieved by having each NTCB partition maintain a domain
|
|
for its own execution. Since each component is itself a dis-
|
|
tinct domain in the overall network system, this also satis-
|
|
fies the requirement for process isolation through distinct
|
|
address spaces in the special case where a component has
|
|
only a single subject.
|
|
|
|
The NTCB must be internally structured into well-
|
|
defined largely independent modules and meet the hardware
|
|
requirements. This is satisfied by having each NTCB parti-
|
|
tion so structured. The NTCB controls all network resources.
|
|
These resources are the union of the sets of resources over
|
|
which the NTCB partitions have control. Code and data
|
|
structures belonging to the NTCB, transferred among NTCB
|
|
subjects (i.e., subjects outside the reference monitor but
|
|
inside the NTCB) belonging to different NTCB partitions,
|
|
must be protected against external interference or tamper-
|
|
ing. For example, a cryptographic checksum or physical
|
|
means may be employed to protect user authentication data
|
|
exchanged between NTCB partitions.
|
|
|
|
Each NTCB partition must enforce the principle of least
|
|
privilege within its component. Additionally, the NTCB must
|
|
be structured so that the principle of least privilege is
|
|
enforced in the system as a whole.
|
|
|
|
THE NTCB MUST BE DESIGNED AND STRUCTURED ACCORDING TO
|
|
THE NETWORK SECURITY ARCHITECTURE TO USE A COMPLETE, CONCEP-
|
|
TUALLY SIMPLE PROTECTION MECHANISM. FURTHERMORE, EACH NTCB
|
|
PARTITION MUST ALSO BE SO DESIGNED AND STRUCTURED.
|
|
|
|
SIGNIFICANT SYSTEM ENGINEERING SHOULD BE DIRECTED
|
|
TOWARD MINIMIZING THE COMPLEXITY OF EACH NTCB PARTITION, AND
|
|
OF THE NTCB. CARE SHALL BE TAKEN TO EXCLUDE MODULES (AND
|
|
COMPONENTS) THAT ARE NOT PROTECTION-CRITICAL FROM THE NTCB.
|
|
|
|
IT IS RECOGNIZED THAT SOME MODULES AND/OR COMPONENTS
|
|
MAY NEED TO BE INCLUDED IN THE NTCB AND MUST MEET THE NTCB
|
|
REQUIREMENTS EVEN THOUGH THEY MAY NOT APPEAR TO BE DIRECTLY
|
|
PROTECTION-CRITICAL. THE CORRECT OPERATION OF THESE
|
|
MODULES/COMPONENTS IS NECESSARY FOR THE CORRECT OPERATION OF
|
|
THE PROTECTION-CRITICAL MODULES AND COMPONENTS. HOWEVER,
|
|
THE NUMBER AND SIZE OF THESE MODULES/COMPONENTS SHOULD BE
|
|
KEPT TO A MINIMUM.
|
|
|
|
Each NTCB partition provides isolation of resources
|
|
(within its component) in accord with the network system
|
|
architecture and security policy so that "supporting ele-
|
|
ments" (e.g., DAC and user identification) for the security
|
|
mechanisms of the network system are strengthened compared
|
|
to C2, from an assurance point of view, through the provi-
|
|
sion of distinct address spaces under control of the NTCB.
|
|
|
|
As discussed in the Discretionary Access Control sec-
|
|
tion, the DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. When distributed in NTCB sub-
|
|
jects (i.e., when outside the reference monitor), the
|
|
assurance requirements for the design and implementation of
|
|
the DAC shall be those of class C2 for all networks of class
|
|
C2 or above.
|
|
|
|
+ Rationale
|
|
|
|
|
|
The requirement that the NTCB be structured into
|
|
modules and meet the hardware requirements applies within
|
|
the NTCB partitions in the various components.
|
|
|
|
The principle of least privilege requires that each
|
|
user or other individual with access to the system be given
|
|
only those resources and authorizations required for the
|
|
performance of this job. In order to enfore this principle
|
|
in the system it must be enforced in every NTCB partition
|
|
that supports users or other individuals. For example,
|
|
prohibiting access by administrators to objects outside the
|
|
NTCB partition (e.g., games) lessens the opportunity of dam-
|
|
age by a Trojan Horse.
|
|
|
|
The requirement for the protection of communications
|
|
between NTCB partitions is specifically directed to subjects
|
|
that are part of the NTCB partitions. Any requirements for
|
|
such protection for the subjects that are outside the NTCB
|
|
partitions are addressed in response to the integrity
|
|
requirements of the security policy.
|
|
|
|
THERE ARE CERTAIN PARTS OF A NETWORK (MODULES AND/OR
|
|
COMPONENTS) THAT MAY NOT APPEAR TO BE DIRECTLY PROTECTION-
|
|
CRITICAL IN THAT THEY ARE NOT INVOLVED IN ACCESS CONTROL
|
|
DECISIONS, DO NOT DIRECTLY AUDIT, AND ARE NOT INVOLVED IN
|
|
THE IDENTIFICATION/AUTHENTICATION PROCESS. HOWEVER, THE
|
|
SECURITY OF THE NETWORK MUST DEPEND ON THE CORRECT OPERATION
|
|
OF THESE MODULES AND/OR COMPONENTS. AN EXAMPLE OF THIS IS A
|
|
SINGLE LEVEL PACKET SWITCH. ALTHOUGH IT MAY NOT NORMALLY BE
|
|
INVOLVED DIRECTLY IN ENFORCING THE DISCRETIONARY SECURITY
|
|
POLICY, THIS SWITCH MAY BE TRUSTED NOT TO MIX DATA FROM DIF-
|
|
FERENT MESSAGE STREAMS. IF THE SWITCH DOES NOT OPERATE
|
|
CORRECTLY, DATA COULD GET MIXED, AND UNAUTHORIZED ACCESS
|
|
COULD RESULT. THEREFORE, THESE MODULES/COMPONENTS MUST BE
|
|
INCLUDED IN THE NTCB AND MUST MEET THE NTCB REQUIREMENTS
|
|
APPLICABLE TO THE POLICY ELEMENT(S) FOR WHICH THEY ARE
|
|
RESPONSIBLE.
|
|
|
|
|
|
3.3.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Hardware and/or software features shall be provided that can
|
|
be used to periodically validate the correct operation of
|
|
the on-site hardware and firmware elements of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Implementation of the requirement is partly achieved by
|
|
having hardware and/or software features that can be used to
|
|
periodically validate the correct operation of the hardware
|
|
and firmware elements of each component's NTCB partition.
|
|
Features shall also be provided to validate the identity and
|
|
correct operation of a component prior to its incorporation
|
|
in the network system and throughout system operation. For
|
|
example, a protocol could be designed that enables the com-
|
|
ponents of the partitioned NTCB to exchange messages period-
|
|
ically and validate each other's correct response. The pro-
|
|
tocol shall be able to determine the remote entity's ability
|
|
to respond. NTCB partitions shall provide the capability to
|
|
report to network administrative personnel the failures
|
|
detected in other NTCB partitions.
|
|
|
|
Intercomponent protocols implemented within a NTCB
|
|
shall be designed in such a way as to provide correct opera-
|
|
tion in the case of failures of network communications or
|
|
individual components. The allocation of mandatory and dis-
|
|
cretionary access control policy in a network may require
|
|
communication between trusted subjects that are part of the
|
|
NTCB partitions in different components. This communication
|
|
is normally implemented with a protocol between the subjects
|
|
as peer entities. Incorrect access within a component shall
|
|
not result from failure of an NTCB partition to communicate
|
|
with other components.
|
|
|
|
+ Rationale
|
|
|
|
The first paragraph of the interpretation is a
|
|
straightforward extension of the requirement into the con-
|
|
text of a network system and partitioned NTCB as defined for
|
|
these network criteria.
|
|
|
|
NTCB protocols should be robust enough so that they
|
|
permit the system to operate correctly in the case of local-
|
|
ized failure. The purpose of this protection is to preserve
|
|
the integrity of the NTCB itself. It is not unusual for one
|
|
or more components in a network to be inoperative at any
|
|
time, so it is important to minimize the effects of such
|
|
failures on the rest of the network. Additional integrity
|
|
and denial of service issues are addressed in Part II.
|
|
|
|
IT SHOULD BE CLEAR THAT SOME INTEGRITY AND DENIAL OF
|
|
SERVICE FEATURES CAN RESIDE OUTSIDE THE NTCB. OTHERWISE ALL
|
|
SOFTWARE IN A NETWORK WOULD BE IN THE NTCB. EVERY PIECE OF
|
|
SOFTWARE THAT HAS AN OPPORTUNITY TO WRITE TO SOME DATA OR
|
|
PROTOCOL FIELD IS "TRUSTED" TO PRESERVE INTEGRITY OR NOT
|
|
CAUSE DENIAL OF SERVICE TO SOME EXTENT. FOR EXAMPLE, IT IS
|
|
NECESSARY TO "TRUST" TELNET TO CORRECTLY TRANSLATE USER
|
|
DATA, AND TO EVENTUALLY TRANSMIT PACKETS. FTP ALSO HAS TO
|
|
BE "TRUSTED" TO NOT INAPPROPRIATELY MODIFY FILES, AND TO
|
|
ATTEMPT TO COMPLETE THE FILE TRANSFER. THESE PROTOCOLS CAN
|
|
BE DESIGNED, HOWEVER TO EXIST OUTSIDE THE NTCB (FROM A PRO-
|
|
TECTION PERSPECTIVE). IT IS BENEFICIAL TO DO THIS TYPE OF
|
|
SECURITY ENGINEERING SO THAT THE AMOUNT OF CODE THAT MUST BE
|
|
TRUSTED TO NOT DISCLOSE DATA IS MINIMIZED. PUTTING EVERY-
|
|
THING INSIDE THE NTCB CONTRADICTS THE REQUIREMENT TO PERFORM
|
|
"SIGNIFICANT SYSTEM ENGINEERING ... DIRECTED TOWARD ...
|
|
EXCLUDING FROM THE TCB MODULES THAT ARE NOT PROTECTION CRIT-
|
|
ICAL," WHICH REMOVES THE PRIMARY DIFFERENCE BETWEEN B2 AND
|
|
B3. IF EVERYTHING HAS TO BE IN THE TCB TO ENSURE DATA
|
|
INTEGRITY AND PROTECTION AGAINST DENIAL OF SERVICE, THERE
|
|
WILL BE CONSIDERABLY LESS ASSURANCE THAT DISCLOSURE PROTEC-
|
|
TION IS MAXIMIZED.
|
|
|
|
|
|
|
|
3.3.3.1.3 Covert Channel Analysis
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall conduct a thorough search for
|
|
COVERT CHANNELS and make a determination (either by actual
|
|
measurement or by engineering estimation) of the maximum
|
|
bandwidth of each identified channel. (See the Covert Chan-
|
|
nels Guideline section.)
|
|
|
|
+ Interpretation
|
|
|
|
The requirement, including the TCSEC Covert Channel
|
|
Guideline, applies as written. In a network, there are
|
|
additional instances of covert channels associated with com-
|
|
munication between components.
|
|
|
|
+ Rationale
|
|
|
|
The exploitation of network protocol information (e.g.,
|
|
headers) can result in covert storage channels. EXPLOITATION
|
|
OF FREQUENCY OF TRANSMISSION CAN RESULT IN COVERT TIMING
|
|
CHANNELS. The topic has been addressed in the literature.-
|
|
|
|
|
|
|
|
3.3.3.1.4 Trusted Facility Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support separate operator and administrator
|
|
functions. THE FUNCTIONS PERFORMED IN THE ROLE OF A SECU-
|
|
RITY ADMINISTRATOR SHALL BE IDENTIFIED. THE ADP SYSTEM
|
|
ADMINISTRATIVE PERSONNEL SHALL ONLY BE ABLE TO PERFORM SECU-
|
|
RITY ADMINISTRATOR FUNCTIONS AFTER TAKING A DISTINCT AUDIT-
|
|
ABLE ACTION TO ASSUME THE SECURITY ADMINISTRATOR ROLE ON THE
|
|
ADP SYSTEM. NON-SECURITY FUNCTIONS THAT CAN BE PERFORMED IN
|
|
THE SECURITY ADMINISTRATION ROLE SHALL BE LIMITED STRICTLY
|
|
TO THOSE ESSENTIAL TO PERFORMING THE SECURITY ROLE EFFEC-
|
|
TIVELY.
|
|
|
|
_________________________
|
|
- See, for example, Girling, C. G., "Covert Channels
|
|
in LAN's," IEEE Transactions on Software Engineering,
|
|
____ ____________ __ ________ ___________
|
|
Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
|
|
Snow, D. P., and Karger, P. A., Limitations of End-to-
|
|
___________ __ ___ __
|
|
End Encryption in Secure Computer Networks, MITRE
|
|
___ __________ __ ______ ________ ________
|
|
Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
|
|
78-158, DTIC AD A059221).
|
|
|
|
|
|
|
|
+ Interpretation
|
|
|
|
This requirement applies as written to both the network
|
|
as a whole and to individual components which support such
|
|
personnel.
|
|
|
|
+ Rationale
|
|
|
|
It is recognized that based on the allocated policy
|
|
elements some components may operate with no human inter-
|
|
face.
|
|
|
|
|
|
|
|
3.3.3.1.5 Trusted Recovery
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
PROCEDURES AND/OR MECHANISMS SHALL BE PROVIDED TO ASSURE
|
|
THAT, AFTER AN ADP SYSTEM FAILURE OR OTHER DISCONTINUITY,
|
|
RECOVERY WITHOUT A PROTECTION COMPROMISE IS OBTAINED.
|
|
|
|
+ Interpretation
|
|
|
|
THE RECOVERY PROCESS MUST BE ACCOMPLISHED WITHOUT A
|
|
PROTECTION COMPROMISE AFTER THE FAILURE OR OTHER DISCON-
|
|
TINUITY OF ANY NTCB PARTITION. IT MUST ALSO BE ACCOMPLISHED
|
|
AFTER A FAILURE OF THE ENTIRE NTCB.
|
|
|
|
+ Rationale
|
|
|
|
THIS IS A STRAIGHT-FORWARD EXTENSION OF THE REQUIREMENT
|
|
INTO THE NETWORK CONTEXT, AND TAKES INTO ACCOUNT THAT IT IS
|
|
POSSIBLE FOR PARTS OF THE SYSTEM TO FAIL WHILE OTHER PARTS
|
|
CONTINUE TO OPERATE NORMALLY. THIS MAY BE A SECURITY-
|
|
RELEVANT EVENT; IF SO IT MUST BE AUDITED.
|
|
|
|
|
|
3.3.3.2 Life-Cycle Assurance
|
|
|
|
|
|
3.3.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The security mechanisms of the ADP system shall be tested
|
|
and found to work as claimed in the system documentation. A
|
|
team of individuals who thoroughly understand the specific
|
|
implementation of the TCB shall subject its design documen-
|
|
tation, source code, and object code to through analysis and
|
|
testing. Their objectives shall be: to uncover all design
|
|
and implementation flaws that would permit a subject exter-
|
|
nal to the TCB to read, change, or delete data normally
|
|
denied under the mandatory or discretionary security policy
|
|
enforced by the TCB; as well as to assure that no subject
|
|
(without authorization to do so) is able to cause the TCB to
|
|
enter a state such that it is unable to respond to
|
|
communications initiated by other users. The TCB shall be
|
|
FOUND RESISTANT to penetration. All discovered flaws shall
|
|
be removed or neutralized and the TCB retested to demon-
|
|
strate that they have been eliminated and that new flaws
|
|
have not been introduced. Testing shall demonstrate that the
|
|
TCB implementation is consistent with the descriptive top-
|
|
level specification. NO DESIGN FLAWS AND NO MORE THAN A FEW
|
|
CORRECTABLE IMPLEMENTATION FLAWS MAY BE FOUND DURING TESTING
|
|
AND THERE SHALL BE REASONABLE CONFIDENCE THAT FEW REMAIN.
|
|
(See the Security Testing Guidelines.)
|
|
|
|
+ Interpretation
|
|
|
|
Testing of a component will require a testbed that
|
|
exercises the interfaces and protocols of the component
|
|
including tests under exceptional conditions. The testing
|
|
of a security mechanism of the network system for meeting
|
|
this criterion shall be an integrated testing procedure
|
|
involving all components containing an NTCB partition that
|
|
implement the given mechanism. This integrated testing is
|
|
additional to any individual component tests involved in the
|
|
evaluation of the network system. The sponsor should iden-
|
|
tify the allowable set of configurations including the sizes
|
|
of the networks. Analysis or testing procedures and tools
|
|
shall be available to test the limits of these configura-
|
|
tions. A change in configuration within the allowable set
|
|
of configurations does not require retesting.
|
|
|
|
The testing of each component will include the intro-
|
|
duction of subjects external to the NTCB partition for the
|
|
component that will attempt to read, change, or delete data
|
|
normally denied. If the normal interface to the component
|
|
does not provide a means to create the subjects needed to
|
|
conduct such a test, then this portion of the testing shall
|
|
use a special version of the untrusted software for the com-
|
|
ponent that results in subjects that make such attempts.
|
|
The results shall be saved for test analysis. Such special
|
|
versions shall have an NTCB partition that is identical to
|
|
that for the normal configuration of the component under
|
|
evaluation.
|
|
|
|
The testing of the mandatory controls shall include
|
|
tests to demonstrate that the labels for information
|
|
imported and/or exported to/from the component accurately
|
|
represent the labels maintained by the NTCB partition for
|
|
the component for use as the basis for its mandatory access
|
|
control decisions. The tests shall include each type of
|
|
device, whether single-level or multilevel, supported by the
|
|
component.
|
|
|
|
The NTCB must be FOUND RESISTANT to penetration. This
|
|
applies to the NTCB as a whole, and to each NTCB partition
|
|
in a component of this class.
|
|
|
|
|
|
+ Rationale
|
|
|
|
The phrase "no subject (without authorization to do so)
|
|
is able to cause the TCB to enter a state such that it is
|
|
unable to respond to communications initiated by other
|
|
users" relates to the security services (Part II of this
|
|
TNI) for the Denial of Service problem, and to correctness
|
|
of the protocol implementations.
|
|
|
|
Testing is an important method available in this
|
|
evaluation division to gain any assurance that the security
|
|
mechanisms perform their intended function. A major purpose
|
|
of testing is to demonstrate the system's response to inputs
|
|
to the NTCB partition from untrusted (and possibly mali-
|
|
cious) subjects.
|
|
|
|
In contrast to general purpose systems that allow for
|
|
the dynamic creation of new programs and the introductions
|
|
of new processes (and hence new subjects) with user speci-
|
|
fied security properities, many network components have no
|
|
method for introducing new programs and/or processes during
|
|
their normal operation. Therefore, the programs necessary
|
|
for the testing must be introduced as special versions of
|
|
the software rather than as the result of normal inputs by
|
|
the test team. However, it must be insured that the NTCB
|
|
partition used for such tests is identical to the one under
|
|
evaluation.
|
|
|
|
Sensitivity labels serve a critical role in maintaining
|
|
the security of the mandatory access controls in the net-
|
|
work. Especially important to network security is the role
|
|
of the labels for information communicated between com-
|
|
ponents - explicit labels for multilevel devices and impli-
|
|
cit labels for single-level devices. Therefore the testing
|
|
for correct labels is highlighted.
|
|
|
|
The requirement for testing to demonstrate consistency
|
|
between the NTCB implementation and the DTLS is a straight-
|
|
forward extension of the TCSEC requirement into the context
|
|
of a network system.
|
|
|
|
|
|
|
|
3.3.3.2.2 Design Specification and Verification
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A formal model of the security policy supported by the TCB
|
|
shall be maintained over the life cycle of the ADP system
|
|
that is proven and demonstrated to be consistent with its
|
|
axioms. A descriptive top-level specification (DTLS) of the
|
|
TCB shall be maintained that completely and accurately
|
|
describes the TCB in terms of exceptions, error messages,
|
|
and effects. It shall be shown to be an accurate descrip-
|
|
tion of the TCB interface. A CONVINCING ARGUMENT SHALL BE
|
|
GIVEN THAT THE DTLS IS CONSISTENT WITH THE MODEL.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The overall network security policy expressed in this
|
|
model will provide the basis for the mandatory access con-
|
|
trol policy exercised by the NTCB over subjects and storage
|
|
objects in the entire network. The policy will also be the
|
|
basis for the discretionary access control policy exercised
|
|
by the NTCB to control access of named users to named
|
|
objects. Data integrity requirements addressing the effects
|
|
of unauthorized MSM need not be included in this model. The
|
|
overall network policy must be decomposed into policy ele-
|
|
ments that are allocated to appropriate components and used
|
|
as the basis for the security policy model for those com-
|
|
ponents.
|
|
|
|
The level of abstraction of the model, and the set of
|
|
subjects and objects that are explicitly represented in the
|
|
model, will be affected by the NTCB partitioning. Subjects
|
|
and objects must be represented explicitly in the model for
|
|
the partition if there is some network component whose NTCB
|
|
partition exercises access control over them. The model
|
|
shall be structured so that the axioms and entities applica-
|
|
ble to individual network components are manifest. Global
|
|
network policy elements that are allocated to components
|
|
shall be represented by the model for that component.
|
|
|
|
The requirements for a network DTLS are given in the
|
|
Design Documentation section.
|
|
|
|
+ Rationale
|
|
|
|
The treatment of the model depends to a great extent on
|
|
the degree of integration of the communications service into
|
|
a distributed system. In a closely coupled distributed sys-
|
|
tem, one might use a model that closely resembles one
|
|
appropriate for a stand-alone computer system.
|
|
|
|
In ALL cases, the model of each partition will be
|
|
expected to show the role of the NTCB partition in each kind
|
|
of component. It will most likely clarify the model,
|
|
although not part of the model, to show access restrictions
|
|
implied by the system design; for example, subjects
|
|
representing protocol entities might have access only to
|
|
objects containing data units at the same layer of protocol.
|
|
The allocation of subjects and objects to different proto-
|
|
col layers is a protocol design choice which need not be
|
|
reflected in the security policy model.
|
|
|
|
|
|
|
|
3.3.3.2.3 Configuration Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
During development and maintenance of the TCB, a configura-
|
|
tion management system shall be in place that maintains con-
|
|
trol of changes to the descriptive top-level specification,
|
|
other design data, implementation documentation, source
|
|
code, the running version of the object code, and test fix-
|
|
tures and documentation. The configuration management sys-
|
|
tem shall assure a consistent mapping among all documenta-
|
|
tion and code associated with the current version of the
|
|
TCB. Tools shall be provided for generation of a new ver-
|
|
sion of the TCB from source code. Also available shall be
|
|
tools for comparing a newly generated version with the pre-
|
|
vious TCB version in order to ascertain that only the
|
|
intended changes have been made in the code that will actu-
|
|
ally be used as the new version of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement applies as written, with the following
|
|
extensions:
|
|
|
|
1. A configuration management system must be in place
|
|
for each NTCB partition.
|
|
|
|
2. A configuration management plan must exist for the
|
|
entire system. If the configuration management sys-
|
|
tem is made up of the conglomeration of the confi-
|
|
guration management systems of the various NTCB par-
|
|
titions, then the configuration management plan must
|
|
address the issue of how configuration control is
|
|
applied to the system as a whole.
|
|
|
|
+ Rationale
|
|
|
|
Each NTCB partition must have a configuration manage-
|
|
ment system in place, or else there will be no way for the
|
|
NTCB as a whole to have an effective configuration manage-
|
|
ment system. The other extensions are merely reflections of
|
|
the way that networks operate in practice.
|
|
|
|
|
|
|
|
|
|
3.3.4 Documentation.
|
|
_ _ _ _____________
|
|
|
|
|
|
3.3.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A single summary, chapter, or manual in user documentation
|
|
shall describe the protection mechanisms provided by the
|
|
TCB, interpretations on their use, and how they interact
|
|
with one another.
|
|
|
|
+ Interpretation
|
|
|
|
This user documentation describes user visible protec-
|
|
tion mechanisms at the global (network system) level and at
|
|
the user interface of each component, and the interaction
|
|
among these.
|
|
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system as defined for these
|
|
network criteria. Documentation of protection mechanisms
|
|
provided by individual components is required by the cri-
|
|
teria for trusted computer systems that are applied as
|
|
appropriate for the individual components.
|
|
|
|
|
|
3.3.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A manual addressed to the ADP system administrator shall
|
|
present cautions about functions and privileges that should
|
|
be controlled when running a secure facility. The procedures
|
|
for examining and maintaining the audit files as well as the
|
|
detailed audit record structure for each type of audit event
|
|
shall be given. The manual shall describe the operator and
|
|
administrator functions related to security, to include
|
|
changing the security characteristics of a user. It shall
|
|
provide interpretations on the consistent and effective use
|
|
of the protection features of the system, how they interact,
|
|
how to securely generate a new TCB, and facility procedures,
|
|
warnings, and privileges that need to be controlled in order
|
|
to operate the facility in a secure manner. The TCB modules
|
|
that contain the reference validation mechanism shall be
|
|
identified. The procedures for secure generation of a new
|
|
TCB from source after modification of any modules in the TCB
|
|
shall be described. IT SHALL INCLUDE THE PROCEDURES TO
|
|
ENSURE THAT THE SYSTEM IS INITIALLY STARTED IN A SECURE
|
|
MANNER. PROCEDURES SHALL ALSO BE INCLUDED TO RESUME SECURE
|
|
SYSTEM OPERATION AFTER ANY LAPSE IN SYSTEM OPERATION.
|
|
|
|
+ Interpretation
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator(s) maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address the following:
|
|
|
|
1. The hardware configuration of the network itself;
|
|
|
|
2. The implications of attaching new components to the
|
|
network;
|
|
|
|
3. The case where certain components may periodically
|
|
leave the network (e.g., by crashing, or by being
|
|
disconnected) and then rejoin;
|
|
|
|
4. Network configuration aspects that can impact the
|
|
security of the network system; (For example, the
|
|
manual should describe for the network system
|
|
administrator the interconnections among components
|
|
that are consistent with the overall network system
|
|
architecture.)
|
|
|
|
5. Loading or modifying NTCB software or firmware
|
|
(e.g., down-line loading).
|
|
|
|
6. Incremental updates; that is, it must explicitly
|
|
indicate which components of the network may change
|
|
without others also changing.
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
The components of the network that form the NTCB must
|
|
be identified. Furthermore, the modules within an NTCB par-
|
|
tition that contain the reference validation mechanism (if
|
|
any) within that partition must be identified.
|
|
|
|
The procedures for the secure generation of a new ver-
|
|
sion (or copy) of each NTCB partition from source must be
|
|
described. The procedures and requirements for the secure
|
|
generation of the NTCB necessitated by changes in the net-
|
|
work configuration shall be described.
|
|
|
|
PROCEDURES FOR STARTING EACH NTCB PARTITION IN A SECURE
|
|
STATE SHALL BE SPECIFIED. PROCEDURES MUST ALSO BE INCLUDED
|
|
TO RESUME SECURE OPERATION OF EACH NTCB PARTITION AND/OR THE
|
|
NTCB AFTER ANY LAPSE IN SYSTEM OR SUBSYSTEM OPERATION.
|
|
|
|
+ Rationale
|
|
|
|
There may be multiple system administrators with
|
|
diverse responsibilities. The technical security measures
|
|
described by these criteria must be used in conjunction with
|
|
other forms of security in order to achieve security of the
|
|
network. Additional forms include administrative security,
|
|
physical security, emanations security, etc.
|
|
|
|
Extension of this criterion to cover configuration
|
|
aspects of the network is needed because, for example,
|
|
proper interconnection of components is typically essential
|
|
to achieve a correct realization of the network architec-
|
|
ture.
|
|
|
|
As mentioned in the section on Label Integrity, cryp-
|
|
tography is one common mechanism employed to protect commun-
|
|
ication circuits. Encryption transforms the representation
|
|
of information so that it is unintelligible to unauthorized
|
|
subjects. Reflecting this transformation, the sensitivity
|
|
of the ciphertext is generally lower than the cleartext. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency (NSA).
|
|
|
|
The encryption algorithm and its implementation are
|
|
outside the scope of these interpretations. This algorithm
|
|
and implementation may be implemented in a separate device
|
|
or may be a function of a subject in a component not dedi-
|
|
cated to encryption. Without prejudice, either implementa-
|
|
tion packaging is referred to as an encryption mechanism
|
|
herein.
|
|
|
|
The requirements for descriptions of NTCB generation
|
|
and identification of modules and components that form the
|
|
NTCB are straightforward extensions of the TCSEC require-
|
|
ments into the network context. In those cases where the
|
|
vendor does not provide source code, an acceptable procedure
|
|
shall be to request the vendor to perform the secure genera-
|
|
tion.
|
|
|
|
GIVEN THE NATURE OF NETWORK SYSTEMS (E.G., VARIOUS COM-
|
|
PONENTS TEND TO BE DOWN AT DIFFERENT TIMES, AND THE NETWORK
|
|
SYSTEM MUST CONTINUE OPERATION WITHOUT THAT COMPONENT), IT
|
|
IS IMPERATIVE TO KNOW BOTH HOW TO SECURELY START UP AN NTCB
|
|
PARTITION, AND HOW TO RESUME OPERATION SECURELY. IT IS ALSO
|
|
NECESSARY TO KNOW HOW TO RESUME SECURE OPERATION OF THE NTCB
|
|
AFTER ANY PARTITION HAS BEEN DOWN.
|
|
|
|
|
|
3.3.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall provide to the evaluators a docu-
|
|
ment that describes the test plan, test procedures that show
|
|
how the security mechanisms were tested, and results of the
|
|
security mechanisms' functional testing. It shall include
|
|
results of testing the effectiveness of the methods used to
|
|
reduce covert channel bandwidths.
|
|
|
|
+ Interpretation
|
|
|
|
The "system developer" is interpreted as "the network
|
|
system sponsor". The description of the test plan should
|
|
establish the context in which the testing was or should be
|
|
conducted. The description should identify any additional
|
|
test components that are not part of the system being
|
|
evaluated. This includes a description of the test-relevant
|
|
functions of such test components and a description of the
|
|
interfacing of those test components to the system being
|
|
evaluated. The description of the test plan should also
|
|
demonstrate that the tests adequately cover the network
|
|
security policy. The tests should include the features
|
|
described in the System Architecture and the System
|
|
Integrity sections. The tests should also include network
|
|
configuration and sizing.
|
|
|
|
+ Rationale
|
|
|
|
The entity being evaluated may be a networking subsys-
|
|
tem (see Appendix A) to which other components must be added
|
|
to make a complete network system. In that case, this
|
|
interpretation is extended to include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
The bandwidths of covert channels are used to determine
|
|
the suitability of a network system for a given environment.
|
|
The effectiveness of the methods used to reduce these
|
|
bandwidths must therefore be accurately determined.
|
|
|
|
|
|
3.3.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Documentation shall be available that provides a description
|
|
of the manufacturer's philosophy of protection and an expla-
|
|
nation of how this philosophy is translated into the TCB.
|
|
The interfaces between the TCB modules shall be described.
|
|
A formal description of the security policy model enforced
|
|
by the TCB shall be available and an explanation provided to
|
|
show that it is sufficient to enforce the security policy.
|
|
The specific TCB protection mechanisms shall be identified
|
|
and an explanation given to show that they satisfy the
|
|
model. The descriptive top-level specification (DTLS) shall
|
|
be shown to be an accurate description of the TCB interface.
|
|
Documentation shall describe how the TCB implements the
|
|
reference monitor concept and give an explanation why it is
|
|
tamper resistant, cannot be bypassed, and is correctly
|
|
implemented. THE TCB IMPLEMENTATION (I.E., IN HARDWARE,
|
|
FIRMWARE, AND SOFTWARE) SHALL BE INFORMALLY SHOWN TO BE CON-
|
|
SISTENT WITH THE DTLS. THE ELEMENTS OF THE DTLS SHALL BE
|
|
SHOWN, USING INFORMAL TECHNIQUES, TO CORRESPOND TO THE ELE-
|
|
MENTS OF THE TCB. Documentation shall describe how the TCB
|
|
is structured to facilitate testing and to enforce least
|
|
privilege. This documentation shall also present the
|
|
results of the covert channel analysis and the tradeoffs
|
|
involved in restricting the channels. All auditable events
|
|
that may be used in the exploitation of known covert storage
|
|
channels shall be identified. The bandwidths of known
|
|
covert storage channels, the use of which is not detectable
|
|
by the auditing mechanisms, shall be provided. (See the
|
|
Covert Channel Guideline section.)
|
|
|
|
+ Interpretation
|
|
|
|
Explanation of how the sponsor's philosophy of protec-
|
|
tion is translated into the NTCB shall include a description
|
|
of how the NTCB is partitioned. The security policy also
|
|
shall be stated. The description of the interfaces between
|
|
the NTCB modules shall include the interface(s) between NTCB
|
|
partitions and modules within the partitions if the modules
|
|
exist. The sponsor shall describe the security architecture
|
|
and design, including the allocation of security require-
|
|
ments among components.
|
|
|
|
The documentation includes both a system description
|
|
and a set of component DTLS's. The system description
|
|
addresses the network security architecture and design by
|
|
specifying the types of components in the network, which
|
|
ones are trusted, and in what way they must cooperate to
|
|
support network security objectives. A component DTLS shall
|
|
be provided for each trusted network component, i.e., each
|
|
component containing an NTCB partition. Each component DTLS
|
|
shall describe the interface to the NTCB partition of its
|
|
component. BOTH THE SYSTEM DESCRIPTION AND EACH COMPONENT
|
|
DTLS SHALL BE SHOWN CONSISTENT WITH THOSE ASSERTIONS IN THE
|
|
MODEL THAT APPLY TO IT. Appendix A addresses component
|
|
evaluation issues.
|
|
|
|
TO SHOW THE CORRESPONDENCE BETWEEN THE DTLS AND THE
|
|
NTCB IMPLEMENTATION, IT SUFFICES TO SHOW CORRESPONDENCE
|
|
BETWEEN EACH COMPONENT DTLS AND THE NTCB PARTITION IN THAT
|
|
COMPONENT.
|
|
|
|
As stated in the introduction to Division B, the spon-
|
|
sor must demonstrate that the NTCB employs the reference
|
|
monitor concept. The security policy model must be a model
|
|
for a reference monitor.
|
|
|
|
The security policy model for each partition implement-
|
|
ing a reference monitor shall fully represent the access
|
|
control policy supported by the partition, including the
|
|
discretionary and mandatory security policy for secrecy
|
|
and/or integrity. For the mandatory policy the single domi-
|
|
nance relation for sensitivity labels, including secrecy
|
|
and/or integrity components, shall be precisely defined.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system as
|
|
defined for this network interpretation. Other documenta-
|
|
tion, such as description of components and description of
|
|
operating environment(s) in which the networking subsystem
|
|
or network system is designed to function, is required else-
|
|
where, e.g., in the Trusted Facility Manual.
|
|
|
|
In order to be evaluated, a network must possess a
|
|
coherent Network Security Architecture and Design. (Inter-
|
|
connection of components that do not adhere to such a single
|
|
coherent Network Security Architecture is addressed in the
|
|
Interconnection of Accredited AIS, Appendix C.) The Network
|
|
Security Architecture must address the security-relevant
|
|
policies, objectives, and protocols. The Network Security
|
|
Design specifies the interfaces and services that must be
|
|
incorporated into the network so that it can be evaluated as
|
|
a trusted entity. There may be multiple designs that con-
|
|
form to the same architecture but are more or less incompa-
|
|
tible and non-interoperable (except through the Interconnec-
|
|
tion Rules). Security related mechanisms requiring coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms having no visible
|
|
interfaces are not specified in this document but are left
|
|
as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network security Architecture and
|
|
Design are satisfied. That is, the components can be assem-
|
|
bled into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization that is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and unambi-
|
|
guously define the security functionality of components as
|
|
well as the interfaces between or among components. The
|
|
Network Security Architecture and Design must be evaluated
|
|
to determine that a network constructed to its specifica-
|
|
tions will in fact be trusted, that is, it will be evaluat-
|
|
able under these interpretations.
|
|
|
|
|
|
The term "model" is used in several different ways in a
|
|
network context, e.g., a "protocol reference model," a "for-
|
|
mal network model," etc. Only the "security policy model" is
|
|
addressed by this requirement and is specifically intended
|
|
to model the interface, viz., "security perimeter," of the
|
|
reference monitor and must meet all the requirements defined
|
|
in the TCSEC. It must be shown that all parts of the TCB
|
|
are a valid interpretation of the security policy model,
|
|
i.e., that there is no change to the secure state except as
|
|
represented by the model.
|
|
|
|
|
|
4.0 DIVISION A: VERIFIED PROTECTION
|
|
_ _ ________ _ ________ __________
|
|
|
|
|
|
This division is characterized by the use of formal security
|
|
methods to assure that the mandatory and discretionary secu-
|
|
rity controls employed in the network system can effectively
|
|
protect classified or other sensitive information stored or
|
|
processed by the system. Extensive documentation is re-
|
|
quired to demonstrate that the NTCB meets the security re-
|
|
quirements in all aspects of design, development and imple-
|
|
mentation.
|
|
|
|
4.1 CLASS (A1): VERIFIED DESIGN
|
|
_ _ _____ __ ________ ______
|
|
|
|
|
|
SYSTEMS IN CLASS (A1) ARE FUNCTIONALLY EQUIVALENT
|
|
TO THOSE IN CLASS (B3) IN THAT NO ADDITIONAL
|
|
ARCHITECTURAL FEATURES OR POLICY REQUIREMENTS ARE
|
|
ADDED. THE DISTINGUISHING FEATURE OF SYSTEMS IN
|
|
THIS CLASS IS THE ANALYSIS DERIVED FROM FORMAL
|
|
DESIGN SPECIFICATION AND VERIFICATION TECHNIQUES
|
|
AND THE RESULTING HIGH DEGREE OF ASSURANCE THAT
|
|
THE NTCB IS CORRECTLY IMPLEMENTED. THIS ASSURANCE
|
|
IS DEVELOPMENTAL IN NATURE, STARTING WITH A FORMAL
|
|
MODEL OF THE SECURITY POLICY AND A FORMAL TOP-
|
|
LEVEL SPECIFICATION (FTLS) OF THE DESIGN.
|
|
INDEPENDENT OF THE PARTICULAR SPECIFICATION
|
|
LANGUAGE OR VERIFICATION SYSTEM USED, THERE ARE
|
|
FIVE IMPORTANT CRITERIA FOR CLASS (A1) DESIGN
|
|
VERIFICATION:
|
|
|
|
+ A FORMAL MODEL OF THE SECURITY POLICY MUST BE
|
|
CLEARLY IDENTIFIED AND DOCUMENTED, INCLUDING A
|
|
MATHEMATICAL PROOF THAT THE MODEL IS CONSISTENT
|
|
WITH ITS AXIOMS AND IS SUFFICIENT TO SUPPORT THE
|
|
SECURITY POLICY.
|
|
|
|
+ AN FTLS MUST BE PRODUCED THAT INCLUDES ABSTRACT
|
|
DEFINITIONS OF THE FUNCTIONS THE NTCB PERFORMS
|
|
AND OF THE HARDWARE AND/OR FIRMWARE MECHANISMS
|
|
THAT ARE USED TO SUPPORT SEPARATE EXECUTION
|
|
DOMAINS.
|
|
|
|
+ THE FTLS OF THE NTCB MUST BE SHOWN TO BE CON-
|
|
SISTENT WITH THE MODEL BY FORMAL TECHNIQUES WHERE
|
|
POSSIBLE (I.E., WHERE VERIFICATION TOOLS EXIST)
|
|
AND INFORMAL ONES OTHERWISE.
|
|
|
|
+ THE NTCB IMPLEMENTATION (I.E., IN HARDWARE,
|
|
FIRMWARE, AND SOFTWARE) MUST BE INFORMALLY SHOWN
|
|
TO BE CONSISTENT WITH THE FTLS. THE ELEMENTS OF
|
|
THE FTLS MUST BE SHOWN, USING INFORMAL TECH-
|
|
NIQUES, TO CORRESPOND TO THE ELEMENTS OF THE
|
|
NTCB. THE FTLS MUST EXPRESS THE UNIFIED PROTEC-
|
|
TION MECHANISM REQUIRED TO SATISFY THE SECURITY
|
|
POLICY, AND IT IS THE ELEMENTS OF THIS PROTECTION
|
|
MECHANISM THAT ARE MAPPED TO THE ELEMENTS OF THE
|
|
NTCB.
|
|
|
|
+ FORMAL ANALYSIS TECHNIQUES MUST BE USED TO IDEN-
|
|
TIFY AND ANALYZE COVERT CHANNELS. INFORMAL TECH-
|
|
NIQUES MAY BE USED TO IDENTIFY COVERT TIMING
|
|
CHANNELS. THE CONTINUED EXISTENCE OF IDENTIFIED
|
|
COVERT CHANNELS IN THE SYSTEM MUST BE JUSTIFIED.
|
|
|
|
IN KEEPING WITH THE EXTENSIVE DESIGN AND DEVELOP-
|
|
MENT ANALYSIS OF THE NTCB REQUIRED OF SYSTEMS IN
|
|
CLASS (A1), MORE STRINGENT CONFIGURATION MANAGE-
|
|
MENT IS REQUIRED AND PROCEDURES ARE ESTABLISHED
|
|
FOR SECURELY DISTRIBUTING THE SYSTEM TO SITES. A
|
|
SYSTEM SECURITY ADMINISTRATOR IS SUPPORTED.
|
|
|
|
THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEM
|
|
ASSIGNED A CLASS (A1) RATING:
|
|
|
|
|
|
4.1.1 Security Policy
|
|
_ _ _ ________ ______
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Implied from the Introduction to the TCSEC.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The network sponsor shall describe the overall network
|
|
security policy enforced by the NTCB. At a minimum, this
|
|
policy shall include the discretionary and mandatory
|
|
requirements applicable to this class. The policy may
|
|
require data secrecy, or data integrity, or both. The pol-
|
|
icy is an access control policy having two primary com-
|
|
ponents: mandatory and discretionary. The policy shall
|
|
include a discretionary policy for protecting the informa-
|
|
tion being processed based on the authorizations of indivi-
|
|
duals, users, or groups of users. This access control pol-
|
|
icy statement shall describe the requirements on the network
|
|
to prevent or detect "reading or destroying" sensitive
|
|
information by unauthorized users or errors. The mandatory
|
|
policy must define the set of distinct sensitivity levels
|
|
that it supports. For the Class B1 or above the mandatory
|
|
policy shall be based on the labels associated with the
|
|
information that reflects its sensitivity with respect to
|
|
secrecy and/or integrity, where applicable, and labels asso-
|
|
ciated with users to reflect their authorization to access
|
|
such information. Unauthorized users include both those
|
|
that are not authorized to use the network at all (e.g., a
|
|
user attempting to use a passive or active wire tap) or a
|
|
legitimate user of the network who is not authorized to
|
|
access a specific piece of information being protected.
|
|
|
|
Note that "users" does not include "operators," "system
|
|
programmers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network sys-
|
|
tem, for example, by defining membership of a group. These
|
|
individuals may also have the separate role of users.
|
|
|
|
|
|
SECRECY POLICY: The network sponsor shall define the
|
|
form of the discretionary and mandatory secrecy
|
|
policy that is enforced in the network to prevent
|
|
unauthorized users from reading the sensitive infor-
|
|
mation entrusted to the network.
|
|
|
|
|
|
DATA INTEGRITY POLICY: The network sponsor shall
|
|
define the discretionary and mandatory integrity
|
|
policy to prevent unauthorized users from modifying,
|
|
viz., writing, sensitive information. The defini-
|
|
tion of data integrity presented by the network
|
|
sponsor refers to the requirement that the informa-
|
|
tion has not been subjected to unauthorized modifi-
|
|
cation in the network. The mandatory integrity pol-
|
|
icy enforced by the NTCB cannot, in general, prevent
|
|
modification while information is being transmitted
|
|
between components. However, an integrity sensi-
|
|
tivity label may reflect the confidence that the
|
|
information has not been subjected to transmission
|
|
errors because of the protection afforded during
|
|
transmission. This requirement is distinct from the
|
|
requirement for label integrity.
|
|
|
|
+ Rationale
|
|
|
|
The word "sponsor" is used in place of alternatives
|
|
(such as "vendor," "architect," "manufacturer," and
|
|
"developer") because the alternatives indicate people who
|
|
may not be available, involved, or relevant at the time that
|
|
a network system is proposed for evaluation.
|
|
|
|
A trusted network is able to control both the reading
|
|
and writing of shared sensitive information. Control of
|
|
writing is used to protect against destruction of informa-
|
|
tion. A network normally is expected to have policy require-
|
|
ments to protect both the secrecy and integrity of the
|
|
information entrusted to it. In a network the integrity is
|
|
frequently as important or more important than the secrecy
|
|
requirements. Therefore the secrecy and/or integrity policy
|
|
to be enforced by the network must be stated for each net-
|
|
work regardless of its evaluation class. The assurance that
|
|
the policy is faithfully enforced is reflected in the
|
|
evaluation class of the network.
|
|
|
|
This control over modification is typically used to
|
|
protect information so that it may be relied upon and to
|
|
control the potential harm that would result if the informa-
|
|
tion were corrupted. The overall network policy require-
|
|
ments for integrity includes the protection for data both
|
|
while being processed in a component and while being
|
|
transmitted in the network. The access control policy
|
|
enforced by the NTCB relates to the access of subjects to
|
|
objects within each component. Communications integrity
|
|
addressed within Part II relates to information while being
|
|
transmitted.
|
|
|
|
The mandatory integrity policy (at class B1 and above)
|
|
in some architectures may be useful in supporting the link-
|
|
age between the connection oriented abstraction introduced
|
|
in the Introduction and the individual components of the
|
|
network. For example, in a key distribution center for
|
|
end-to-end encryption, a distinct integrity category may be
|
|
assigned to isolate the key generation code and data from
|
|
possible modification by other supporting processes in the
|
|
same component, such as operator interfaces and audit.
|
|
|
|
The mandatory integrity policy for some architecture
|
|
may define an integrity sensitivity label that reflects the
|
|
specific requirements for ensuring that information has not
|
|
been subject to random errors in excess of a stated limit
|
|
nor to unauthorized message stream modification (MSM) -.
|
|
The specific metric associated with an integrity sensitivity
|
|
label will generally reflect the intended applications of
|
|
the network.
|
|
|
|
|
|
4.1.1.1 Discretionary Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall define and control access between named users
|
|
and named objects (e.g., files and programs) in the ADP sys-
|
|
tem. The enforcement mechanism (e.g., access control lists)
|
|
shall allow users to specify and control sharing of those
|
|
objects and shall provide controls to limit propagation of
|
|
access rights. The discretionary access control mechanism
|
|
shall, either by explicit user action or by default, provide
|
|
that objects are protected from unauthorized access. These
|
|
access controls shall be capable of specifying, for each
|
|
named object, a list of named individuals and a list of
|
|
groups of named individuals with their respective modes of
|
|
access to that object. Furthermore, for each such named
|
|
object, it shall be possible to specify a list of named
|
|
individuals and a list of groups of named individuals for
|
|
which no access to the object is given. Access permission
|
|
to an object by users not already possessing access
|
|
_________________________
|
|
- See Voydock, Victor L. and Stephen T. Kent, "Secu-
|
|
rity Mechanisms in High-Level Network Protocols," Com-
|
|
___
|
|
puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
|
|
______ _______
|
|
|
|
|
|
permission shall only be assigned by authorized users.
|
|
|
|
+ Interpretation
|
|
|
|
The discretionary access control (DAC) mechanism(s) may
|
|
be distributed over the partitioned NTCB in various ways.
|
|
Some part, all, or none of the DAC may be implemented in a
|
|
given component of the network system. In particular, com-
|
|
ponents that support only internal subjects (i.e., that have
|
|
no subjects acting as direct surrogates for users), such as
|
|
a public network packet switch, might not implement the DAC
|
|
mechanism(s) directly (e.g., they are unlikely to contain
|
|
access control lists).
|
|
|
|
Identification of users by groups may be achieved in
|
|
various ways in the networking environment. For example,
|
|
the network identifiers (e.g., internet addresses) for vari-
|
|
ous components (e.g., hosts, gateways) can be used as iden-
|
|
tifiers of groups of individual users (e.g., "all users at
|
|
Host A," "all users of network Q") so long as the individu-
|
|
als involved in the group are implied by the group identif-
|
|
ier. For example, Host A might employ a particular group-id,
|
|
for which it maintains a list of explicit users in that
|
|
group, in its network exchange with Host B, which accepts
|
|
the group-id under the conditions of this interpretation.
|
|
|
|
For networks, individual hosts will impose need-to-know
|
|
controls over their users on the basis of named individuals
|
|
- much like (in fact, probably the same) controls used when
|
|
there is no network connection.
|
|
|
|
When group identifiers are acceptable for access con-
|
|
trol, the identifier of some other host may be employed, to
|
|
eliminate the maintenance that would be required if indivi-
|
|
dual identification of remote users was employed. In class
|
|
C2 and higher, however, it must be possible from that audit
|
|
record to identify (immediately or at some later time)
|
|
exactly the individuals represented by a group identifier at
|
|
the time of the use of that identifier. There is allowed to
|
|
be an uncertainty because of elapsed time between changes in
|
|
the group membership and the enforcement in the access con-
|
|
trol mechanisms.
|
|
|
|
The DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. The reference monitor manages
|
|
all the physical resources of the system and from them
|
|
creates the abstraction of subjects and objects that it con-
|
|
trols. Some of these subjects and objects may be used to
|
|
implement a part of the NTCB. When the DAC mechanism is
|
|
distributed in such NTCB subjects (i.e., when outside the
|
|
reference monitor), the assurance requirements (see the
|
|
Assurance section) for the design and implementation of the
|
|
DAC shall be those of class C2 for all networks of class C2
|
|
or above.
|
|
|
|
When integrity is included as part of the network dis-
|
|
cretionary security policy, the above interpretations shall
|
|
be specifically applied to the controls over modification,
|
|
viz, the write mode of access, within each component based
|
|
on identified users or groups of users.
|
|
|
|
+ Rationale
|
|
|
|
In this class, the supporting elements of the overall
|
|
DAC mechanism are required to isolate information (objects)
|
|
that supports DAC so that it is subject to auditing require-
|
|
ments (see the System Architecture section). The use of
|
|
network identifiers to identify groups of individual users
|
|
could be implemented, for example, as an X.25 community of
|
|
interest in the network protocol layer (layer 3). In all
|
|
other respects, the supporting elements of the overall DAC
|
|
mechanism are treated exactly as untrusted subjects are
|
|
treated with respect to DAC in an ADP system, with the same
|
|
result as noted in the interpretation.
|
|
|
|
A typical situation for DAC is that a surrogate process
|
|
for a remote user will be created in some host for access to
|
|
objects under the control of the NTCB partition within that
|
|
host. The interpretation requires that a user identifier be
|
|
assigned and maintained for each such process by the NTCB,
|
|
so that access by a surrogate process is subject to essen-
|
|
tially the same discretionary controls as access by a pro-
|
|
cess acting on behalf of a local user would be. However,
|
|
within this interpretation a range of possible interpreta-
|
|
tions of the assigned user identification is permitted.
|
|
|
|
The most obvious situation would exist if a global
|
|
database of network users were to be made permanently avail-
|
|
able on demand to every host, (i.e., a name server existed)
|
|
so that all user identifications were globally meaningful.
|
|
|
|
It is also acceptable, however, for some NTCB parti-
|
|
tions to maintain a database of locally-registered users for
|
|
its own use. In such a case, one could choose to inhibit
|
|
the creation of surrogate processes for locally unregistered
|
|
users, or (if permitted by the local policy) alternatively,
|
|
to permit the creation of surrogate processes with
|
|
preselected user and group identifiers which, in effect,
|
|
identify the process as executing on behalf of a member of a
|
|
group of users on a particular remote host. The intent of
|
|
the words concerning audit in the interpretation is to pro-
|
|
vide a minimally acceptable degree of auditability for cases
|
|
such as the last described. What is required is that there
|
|
be a capability, using the audit facilities provided by the
|
|
network NTCB partitions involved, to determine who was
|
|
logged in at the actual host of the group of remote users at
|
|
the time the surrogate processing occured.
|
|
|
|
Associating the proper user id with a surrogate process
|
|
is the job of identification and authentication. This means
|
|
that DAC is applied locally, with respect to the user id of
|
|
the surrogate process. The transmission of the data back
|
|
across the network to the user's host, and the creation of a
|
|
copy of the data there, is not the business of DAC.
|
|
|
|
Components that support only internal subjects impact
|
|
the implementation of the DAC by providing services by which
|
|
information (e.g., a user-id) is made available to a com-
|
|
ponent that makes a DAC decision. An example of the latter
|
|
would be the case that a user at Host A attempts to access a
|
|
file at Host B. The DAC decision might be (and usually
|
|
would be) made at Host B on the basis of a user-id transmit-
|
|
ted from Host A to Host B.
|
|
|
|
Unique user identification may be achieved by a variety
|
|
of mechanisms, including (a) a requirement for unique iden-
|
|
tification and authentication on the host where access takes
|
|
place; (b) recognition of fully qualified network
|
|
addresses authenticated by another host and forwarded to the
|
|
host where access takes place; or (c) administrative support
|
|
of a network-wide unique personnel identifier that could be
|
|
authenticated and forwarded by another host as in (b) above,
|
|
or could be authenticated and forwarded by a dedicated net-
|
|
work identification and authentication server. The proto-
|
|
cols which implement (b) or (c) are subject to the System
|
|
Architecture requirements.
|
|
|
|
Network support for DAC might be handled in other ways
|
|
than that described as "typical" above. In particular, some
|
|
form of centralized access control is often proposed. An
|
|
access control center may make all decisions for DAC, or it
|
|
may share the burden with the hosts by controlling host-to-
|
|
host connections, and leaving the hosts to decide on access
|
|
to their objects by users at a limited set of remote hosts.
|
|
In this case the access control center provides the linkage
|
|
between the connection oriented abstraction (as discussed in
|
|
the Introduction) and the overall network security policy
|
|
for DAC. In all cases the enforcement of the decision must
|
|
be provided by the host where the object resides.
|
|
|
|
There are two forms of distribution for the DAC mechan-
|
|
ism: implementing portions of the DAC in separate com-
|
|
ponents, and supporting the DAC in subjects contained within
|
|
the NTCB partition in a component. Since "the ADP system"
|
|
is understood to be "the computer network" as a whole, each
|
|
network component is responsible for enforcing security in
|
|
the mechanisms allocated to it to ensure secure implementa-
|
|
tion of the network security policy. For traditional host
|
|
systems it is frequently easy to also enforce the DAC along
|
|
with the MAC within the reference monitor, per se, although
|
|
a few approaches, such as virtual machine monitors, support
|
|
DAC outside this interface.
|
|
|
|
In contrast to the universally rigid structure of man-
|
|
datory policies (see the Mandatory Access Control section),
|
|
DAC policies tend to be very network and system specific,
|
|
with features that reflect the natural use of the system.
|
|
For networks it is common that individual hosts will impose
|
|
controls over their local users on the basis of named
|
|
individuals-much like the controls used when there is no
|
|
network connection. However, it is difficult to manage in a
|
|
centralized manner all the individuals using a large net-
|
|
work. Therefore, users on other hosts are commonly grouped
|
|
together so that the controls required by the network DAC
|
|
policy are actually based on the identity of the hosts or
|
|
other components. A gateway is an example of such a com-
|
|
ponent.
|
|
|
|
The assurance requirements are at the very heart of the
|
|
concept of a trusted system. It is the assurance that
|
|
determines if a system or network is appropriate for a given
|
|
environment, as reflected, for example, in the Environments
|
|
Guideline-. In the case of monolithic systems that have DAC
|
|
integral to the reference monitor, the assurance require-
|
|
ments for DAC are inseparable from those of the rest of the
|
|
reference monitor. For networks there is typically a much
|
|
clearer distinction due to distributed DAC. The rationale
|
|
for making the distinction in this network interpretation is
|
|
that if major trusted network components can be made signi-
|
|
ficantly easier to design and implement without reducing the
|
|
ability to meet security policy, then trusted networks will
|
|
be more easily available.
|
|
|
|
|
|
4.1.1.2 Object Reuse
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
All authorizations to the information contained within a
|
|
storage object shall be revoked prior to initial assignment,
|
|
allocation or reallocation to a subject from the TCB's pool
|
|
of unused storage objects. No information, including
|
|
encrypted representations of information, produced by a
|
|
prior subject's actions is to be available to any subject
|
|
that obtains access to an object that has been released back
|
|
to the system.
|
|
|
|
+ Interpretation
|
|
|
|
The NTCB shall ensure that any storage objects that it
|
|
controls (e.g., message buffers under the control of a NTCB
|
|
partition in a component) contain no information for which a
|
|
subject in that component is not authorized before granting
|
|
access. This requirement must be enforced by each of the
|
|
NTCB partitions.
|
|
|
|
|
|
|
|
_________________________
|
|
- Guidance for Applying the Department of Defense
|
|
________ ___ ________ ___ __________ __ _______
|
|
Trusted Computer System Evaluation Criteria in Specific
|
|
_______ ________ ______ __________ ________ __ ________
|
|
Environments, CSC-STD-003-85.
|
|
____________
|
|
|
|
|
|
+ Rationale
|
|
|
|
In a network system, storage objects of interest are
|
|
things that the NTCB directly controls, such as message
|
|
buffers in components. Each component of the network system
|
|
must enforce the object reuse requirement with respect to
|
|
the storage objects of interest as determined by the network
|
|
security policy. For example, the DAC requirement in this
|
|
division leads to the requirement here that message buffers
|
|
be under the control of the NTCB partition. A buffer
|
|
assigned to an internal subject may be reused at the discre-
|
|
tion of that subject which is responsible for preserving the
|
|
integrity of message streams. Such controlled objects may
|
|
be implemented in physical resources, such as buffers, disk
|
|
sectors, tape space, and main memory, in components such as
|
|
network switches.
|
|
|
|
|
|
|
|
4.1.1.3 Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels associated with each ADP system resource
|
|
(e.g., subject, storage object, ROM) that is directly or
|
|
indirectly accessible by subjects external to the TCB shall
|
|
be maintained by the TCB. These labels shall be used as the
|
|
basis for mandatory access control decisions. In order to
|
|
import non-labeled data, the TCB shall request and receive
|
|
from an authorized user the sensitivity level of the data,
|
|
and all such actions shall be auditable by the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Non-labeled data imported under the control of the NTCB
|
|
partition will be assigned a label constrained by the device
|
|
labels of the single-level device used to import it. Labels
|
|
may include secrecy and integrity- components in accordance
|
|
with the overall network security policy described by the
|
|
network sponsor. Whenever the term "label" is used
|
|
throughout this interpretation, it is understood to include
|
|
both components as applicable. Similarly, the terms
|
|
"single-level" and "multilevel" are understood to be based
|
|
on both the secrecy and integrity components of the policy.
|
|
The mandatory integrity policy will typically have require-
|
|
ments, such as the probability of undetected message stream
|
|
modification, that will be reflected in the label for the
|
|
data so protected. For example, when data is imported its
|
|
integrity label may be assigned based on mechanisms, such as
|
|
cryptography, used to provide the assurance required by the
|
|
policy. The NTCB shall assure that such mechanism are pro-
|
|
tected from tampering and are always invoked when they are
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Computer Systems," ESD-TR-76-372, MTR-
|
|
3153, The MITRE Corporation, Bedford, MA, April 1977.
|
|
|
|
|
|
the basis for a label.
|
|
|
|
|
|
If the security policy includes an integrity policy,
|
|
all activities that result in message-stream modification
|
|
during transmission are regarded as unauthorized accesses in
|
|
violation of the integrity policy. The NTCB shall have an
|
|
automated capability for testing, detecting, and reporting
|
|
those errors/corruptions that exceed specified network
|
|
integrity policy requirements. Message-stream modification
|
|
(MSM) countermeasures shall be identified. A technology of
|
|
adequate strength shall be selected to resist MSM. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency.
|
|
|
|
All objects must be labeled within each component of
|
|
the network that is trusted to maintain separation of multi-
|
|
ple levels of information. The label associated with any
|
|
objects associated with single-level components will be
|
|
identical to the level of that component. Objects used to
|
|
store network control information, and other network struc-
|
|
tures, such as routing tables, must be labeled to prevent
|
|
unauthorized access and/or modification.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system and partitioned NTCB as
|
|
defined for these network interpretations. A single-level
|
|
device may be regarded either as a subject or an object. A
|
|
multilevel device is regarded as a trusted subject in which
|
|
the security range of the subject is the minimum-maximum
|
|
range of the data expected to be transmitted over the dev-
|
|
ice.
|
|
|
|
The sensitivity labels for either secrecy or integrity
|
|
or both may reflect non-hierarchical categories or hierarch-
|
|
ical classification or both.
|
|
|
|
For a network it is necessary that this requirement be
|
|
applied to all network system resources at the (B2) level
|
|
and above.
|
|
|
|
The NTCB is responsible for implementing the network
|
|
integrity policy, when one exists. The NTCB must enforce
|
|
that policy by ensuring that information is accurately
|
|
transmitted from source to destination (regardless of the
|
|
number of intervening connecting points). The NTCB must be
|
|
able to counter equipment failure, environmental disrup-
|
|
tions, and actions by persons and processes not authorized
|
|
to alter the data. Protocols that perform code or format
|
|
conversion shall preserve the integrity of data and control
|
|
information.
|
|
|
|
The probability of an undetected transmission error may
|
|
be specified as part of the network security policy so that
|
|
the acceptability of the network for its intended
|
|
application may be determined. The specific metrics (e.g.,
|
|
probability of undetected modification) satisfied by the
|
|
data can be reflected in the integrity sensitivity label
|
|
associated with the data while it is processed within a com-
|
|
ponent. It is recognized that different applications and
|
|
operational environments (e.g., crisis as compared to logis-
|
|
tic) will have different integrity requirements.
|
|
|
|
The network shall also have an automated capability of
|
|
testing for, detecting, and reporting errors that exceed a
|
|
threshold consistent with the operational mode requirements.
|
|
The effectiveness of integrity countermeasures must be esta-
|
|
blished with the same rigor as the other security-relevant
|
|
properties such as secrecy.
|
|
|
|
Cryptography is often utilized as a basis to provide
|
|
data integrity assurance. Mechanisms, such as Manipulation
|
|
Detection Codes (MDC)-, may be used. The adequacy of the
|
|
encryption or MDC algorithm, the correctness of the protocol
|
|
logic, and the adequacy of implementation must be esta-
|
|
blished in MSM countermeasures design.
|
|
|
|
|
|
|
|
4.1.1.3.1 Label Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Sensitivity labels shall accurately represent sensitivity
|
|
levels of the specific subjects or objects with which they
|
|
are associated. When exported by the TCB, sensitivity
|
|
labels shall accurately and unambiguously represent the
|
|
internal labels and shall be associated with the information
|
|
being exported.
|
|
|
|
+ Interpretation
|
|
|
|
The phrase "exported by the TCB" is understood to
|
|
include transmission of information from an object in one
|
|
component to an object in another component. Information
|
|
transferred between NTCB partitions is addressed in the Sys-
|
|
tem Integrity Section. The form of internal and external
|
|
(exported) sensitivity labels may differ, but the meaning
|
|
shall be the same. The NTCB shall, in addition, ensure that
|
|
correct association of sensitivity labels with the informa-
|
|
tion being transported across the network is preserved.
|
|
|
|
As mentioned in the Trusted Facility Manual Section,
|
|
encryption transforms the representation of information so
|
|
that it is unintelligible to unauthorized subjects.
|
|
Reflecting this transformation, the sensitivity level of the
|
|
ciphertext is generally lower than the cleartext. It fol-
|
|
lows that cleartext and ciphertext are contained in
|
|
_________________________
|
|
- See Jueneman, R. R., "Electronic Document Authenti-
|
|
cation," IEEE Network Magazine, April 1987, pp 17-23.
|
|
____ _______ ________
|
|
|
|
|
|
different objects, each possessing its own label. The label
|
|
of the cleartext must be preserved and associated with the
|
|
ciphertext so that it can be restored when the cleartext is
|
|
subsequently obtained by decrypting the ciphertext. If the
|
|
cleartext is associated with a single-level device, the
|
|
label of that cleartext may be implicit. The label may also
|
|
be implicit in the key.
|
|
|
|
When information is exported to an environment where it
|
|
is subject to deliberate or accidental modification, the TCB
|
|
shall support the means, such as cryptographic checksums, to
|
|
assure the accuracy of the labels. When there is a manda-
|
|
tory integrity policy, the policy will define the meaning of
|
|
integrity labels.
|
|
|
|
+ Rationale
|
|
|
|
Encryption algorithms and their implementation are out-
|
|
side the scope of these interpretations. Such algorithms
|
|
may be implemented in a separate device or may be incor-
|
|
porated in a subject of a larger component. Without preju-
|
|
dice, either implementation packaging is referred to as an
|
|
encryption mechanism herein. If encryption methodologies are
|
|
employed in this regard, they shall be approved by the
|
|
National Security Agency (NSA). The encryption process is
|
|
part of the Network Trusted Computer Base partition in the
|
|
components in which it is implemented.
|
|
|
|
The encryption mechanism is not necessarily a mul-
|
|
tilevel device or multilevel subject, as these terms are
|
|
used in these criteria. The process of encryption is mul-
|
|
tilevel by definition. The cleartext and ciphertext inter-
|
|
faces carry information of different sensitivity. An
|
|
encryption mechanism does not process data in the sense of
|
|
performing logical or arithmetic operations on that data
|
|
with the intent of producing new data. The cleartext and
|
|
ciphertext interfaces on the encryption mechanism must be
|
|
separately identified as being single-level or multilevel.
|
|
If the interface is single-level, then the sensitivity of
|
|
the data is established by a trusted individual and impli-
|
|
citly associated with the interface; the Exportation to
|
|
Single-Level Devices criterion applies.
|
|
|
|
If the interface is multilevel, then the data must be
|
|
labeled; the Exportation to Multilevel Devices criterion
|
|
applies. The network architect is free to select an accept-
|
|
able mechanism for associating a label with an object. With
|
|
reference to encrypted objects, the following examples are
|
|
possible:
|
|
|
|
1. Include a label field in the protocol definition of
|
|
the object.
|
|
|
|
2. Implicitly associate the label with the object
|
|
through the encryption key. That is, the encryption
|
|
key uniquely identifies a sensitivity level. A sin-
|
|
gle or private key must be protected at the level of
|
|
the data that it encrypts.
|
|
|
|
|
|
4.1.1.3.2 Exportation of Labeled Information
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall designate each communication channel and I/O
|
|
device as either single-level or multilevel. Any change in
|
|
this designation shall be done manually and shall be audit-
|
|
able by the TCB. The TCB shall maintain and be able to
|
|
audit any change in the sensitivity level or levels associ-
|
|
ated with a communications channel or I/O device.
|
|
|
|
+ Interpretation
|
|
|
|
Each communication channel and network component shall
|
|
be designated as either single-level or multilevel. Any
|
|
change in this designation shall be done with the cognizance
|
|
and approval of the administrator or security officer in
|
|
charge of the affected components and the administrator or
|
|
security officer in charge of the NTCB. This change shall
|
|
be auditable by the network. The NTCB shall maintain and be
|
|
able to audit any change in the device labels associated
|
|
with a single-level communication channel or the range asso-
|
|
ciated with a multilevel communication channel or component.
|
|
The NTCB shall also be able to audit any change in the set
|
|
of sensitivity levels associated with the information which
|
|
can be transmitted over a multilevel communication channel
|
|
or component.
|
|
|
|
+ Rationale
|
|
|
|
Communication channels and components in a network are
|
|
analogous to communication channels and I/O devices in
|
|
stand-alone systems. They must be designated as either mul-
|
|
tilevel (i.e., able to distinguish and maintain separation
|
|
among information of various sensitivity levels) or single-
|
|
level. As in the TCSEC, single-level devices may only be
|
|
attached to single-level channels.
|
|
|
|
The level or set of levels of information that can be
|
|
sent to a component or over a communication channel shall
|
|
only change with the knowledge and approval of the security
|
|
officers (or system administrator, if there is no security
|
|
officer) of the network, and of the affected components.
|
|
This requirement ensures that no significant security-
|
|
relevant changes are made without the approval of all
|
|
affected parties.
|
|
|
|
|
|
4.1.1.3.2.1 Exportation to Multilevel Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
When the TCB exports an object to a multilevel I/O device,
|
|
the sensitivity label associated with that object shall also
|
|
be exported and shall reside on the same physical medium as
|
|
the exported information and shall be in the same form
|
|
(i.e., machine-readable or human-readable form). When the
|
|
TCB exports or imports an object over a multilevel communi-
|
|
cations channel, the protocol used on that channel shall
|
|
provide for the unambiguous pairing between the sensitivity
|
|
labels and the associated information that is sent or
|
|
received.
|
|
|
|
+ Interpretation
|
|
|
|
The components, including hosts, of a network shall be
|
|
interconnected over "multilevel communication channels,"
|
|
multiple single-level communication channels, or both, when-
|
|
ever the information is to be protected at more than a sin-
|
|
gle sensitivity level. The protocol for associating the
|
|
sensitivity label and the exported information shall provide
|
|
the only information needed to correctly associate a sensi-
|
|
tivity level with the exported information transferred over
|
|
the multilevel channel between the NTCB partitions in indi-
|
|
vidual components. This protocol definition must specify the
|
|
representation and semantics of the sensitivity labels
|
|
(i.e., the machine-readable label must uniquely represent
|
|
the sensitivity level).
|
|
|
|
The "unambiguous" association of the sensitivity level
|
|
with the communicated information shall meet the same level
|
|
of accuracy as that required for any other label within the
|
|
NTCB, as specified in the criterion for Label Integrity.
|
|
This may be provided by protected and highly reliable direct
|
|
physical layer connections, or by traditional cryptographic
|
|
link protection in which any errors during transmission can
|
|
be readily detected, or by use of a separate channel. The
|
|
range of information imported or exported must be con-
|
|
strained by the associated device labels.
|
|
|
|
+ Rationale
|
|
|
|
This protocol must specify the representation and
|
|
semantics of the sensitivity labels. See the Mandatory
|
|
Access Control Policies section in Appendix B. The mul-
|
|
tilevel device interface to (untrusted) subjects may be
|
|
implemented either by the interface of the reference moni-
|
|
tor, per se, or by a multilevel subject (e.g., a "trusted
|
|
subject" as defined in the Bell-LaPadula Model) that pro-
|
|
vides the labels based on the internal labels of the NTCB
|
|
partition.
|
|
|
|
The current state of the art limits the support for
|
|
mandatory policy that is practical for secure networks.
|
|
Reference monitor support to ensure the control over all the
|
|
operations of each subject in the network must be completely
|
|
provided within the single NTCB partition on which that sub-
|
|
ject interfaces to the NTCB. This means that the entire
|
|
portion of the "secure state" represented in the formal
|
|
security policy model that may be changed by transitions
|
|
invoked by this subject must be contained in the same
|
|
component.
|
|
|
|
The secure state of an NTCB partition may be affected
|
|
by events external to the component in which the NTCB parti-
|
|
tion resides (e.g., arrival of a message). The effect
|
|
occurs asynchronusly after being initiated by an event in
|
|
another component or partition. For example, indeterminate
|
|
delays may occur between the initiation of a message in one
|
|
component, the arrival of the message in the NTCB partition
|
|
in another component, and the corresponding change to the
|
|
secure state of the second component. Since each component
|
|
is executing concurrently, to do otherwise would require
|
|
some sort of network-wide control to synchronize state tran-
|
|
sitions, such as a global network-wide clock for all proces-
|
|
sors; in general, such designs are not practical and prob-
|
|
ably not even desirable. Therefore, the interaction between
|
|
NTCB partitions is restricted to just communications between
|
|
pairs (at least logically) of devices-multilevel devices if
|
|
the device(s) can send/receive data of more than a single
|
|
level. For broadcast channels the pairs are the sender and
|
|
intended receiver(s). However, if the broadcast channel
|
|
carries multiple levels of information, additional mechanism
|
|
(e.g., cryptochecksum maintained by the TCB) may be required
|
|
to enforce separation and proper delivery.
|
|
|
|
A common representation for sensitivity labels is
|
|
needed in the protocol used on that channel and understood
|
|
by both the sender and receiver when two multilevel devices
|
|
(in this case, in two different components) are intercon-
|
|
nected. Each distinct sensitivity level of the overall net-
|
|
work policy must be represented uniquely in these labels.
|
|
|
|
Within a monolithic TCB, the accuracy of the sensi-
|
|
tivity labels is generally assured by simple techniques,
|
|
e.g., very reliable connections over very short physical
|
|
connections, such as on a single printed circuit board or
|
|
over an internal bus. In many network environments there is
|
|
a much higher probability of accidentally or maliciously
|
|
introduced errors, and these must be protected against.
|
|
|
|
|
|
4.1.1.3.2.2 Exportation to Single-Level Devices
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Single-level I/O devices and single-level communication
|
|
channels are not required to maintain the sensitivity labels
|
|
of the information they process. However, the TCB shall
|
|
include a mechanism by which the TCB and an authorized user
|
|
reliably communicate to designate the single sensitivity
|
|
level of information imported or exported via single-level
|
|
communication channels or I/O devices.
|
|
|
|
+ Interpretation
|
|
|
|
Whenever one or both of two directly connected com-
|
|
ponents is not trusted to maintain the separation of
|
|
information of different sensitivity levels, or whenever the
|
|
two directly connected components have only a single sensi-
|
|
tivity level in common, the two components of the network
|
|
shall communicate over a single-level channel. Single-level
|
|
components and single-level communication channels are not
|
|
required to maintain the sensitivity labels of the informa-
|
|
tion they process. However, the NTCB shall include a reli-
|
|
able communication mechanism by which the NTCB and an
|
|
authorized user (via a trusted path) or a subject within an
|
|
NTCB partition can designate the single sensitivity level of
|
|
information imported or exported via single-level communica-
|
|
tion channels or network components. The level of informa-
|
|
tion communicated must equal the device level.
|
|
|
|
+ Rationale
|
|
|
|
Single-level communications channels and single-level
|
|
components in networks are analogous to single level chan-
|
|
nels and I/O devices in stand-alone systems in that they are
|
|
not trusted to maintain the separation of information of
|
|
different sensitivity levels. The labels associated with
|
|
data transmitted over those channels and by those components
|
|
are therefore implicit; the NTCB associates labels with the
|
|
data because of the channel or component, not because of an
|
|
explicit part of the bit stream. Note that the sensitivity
|
|
level of encrypted information is the level of the cipher-
|
|
text rather than the original level(s) of the plaintext.
|
|
|
|
|
|
4.1.1.3.2.3 Labeling Human-Readable Output
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The ADP system administrator shall be able to specify the
|
|
printable label names associated with exported sensitivity
|
|
labels. The TCB shall mark the beginning and end of all
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the output. The TCB
|
|
shall, by default, mark the top and bottom of each page of
|
|
human-readable, paged, hardcopy output (e.g., line printer
|
|
output) with human-readable sensitivity labels that prop-
|
|
erly1 represent the sensitivity of the page. The TCB shall,
|
|
by default and in an appropriate manner, mark other forms of
|
|
human readable output (e.g., maps, graphics) with human-
|
|
readable sensitivity labels that properly1 represent the
|
|
sensitivity of the output. Any override of these markings
|
|
defaults shall be auditable by the TCB.
|
|
_________________________
|
|
1 The hierarchical classification component in human-
|
|
readable sensitivity labels shall be equal to the
|
|
greatest hierarchical classification of any of the in-
|
|
formation in the output that the labels refer to; the
|
|
non-hierarchical category component shall include all
|
|
of the non-hierarchical categories of the information
|
|
in the output the labels refer to, but no other non-
|
|
hierarchical categories.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion imposes no requirement to a component
|
|
that produces no human-readable output. For those that do
|
|
produce human-readable output, each sensitivity level that
|
|
is defined to the network shall have a uniform meaning
|
|
across all components. The network administrator, in con-
|
|
junction with any affected component administrator, shall be
|
|
able to specify the human-readable label that is associated
|
|
with each defined sensitivity level.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system and
|
|
partitioned NTCB as defined for these network interpreta-
|
|
tions.
|
|
|
|
|
|
4.1.1.3.3 Subject Sensitivity Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall immediately notify a terminal user of each
|
|
change in the sensitivity level associated with that user
|
|
during an interactive session. A terminal user shall be
|
|
able to query the TCB as desired for a display of the
|
|
subject's complete sensitivity label.
|
|
|
|
+ Interpretation
|
|
|
|
An NTCB partition shall immediately notify a terminal
|
|
user attached to its component of each change in the sensi-
|
|
tivity level associated with that user.
|
|
|
|
+ Rationale
|
|
|
|
The local NTCB partition must ensure that the user
|
|
understands the sensitivity level of information sent to and
|
|
from a terminal. When a user has a surrogate process in
|
|
another component, adjustments to its level may occur to
|
|
maintain communication with the user. These changes may
|
|
occur asynchronously. Such adjustments are necessitated by
|
|
mandatory access control as applied to the objects involved
|
|
in the communication path.
|
|
|
|
|
|
4.1.1.3.4 Device Labels
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support the assignment of minimum and maximum
|
|
sensitivity levels to all attached physical devices. These
|
|
sensitivity levels shall be used by the TCB to enforce con-
|
|
straints imposed by the physical environments in which the
|
|
devices are located.
|
|
|
|
+ Interpretation
|
|
|
|
This requirement applies as written to each NTCB parti-
|
|
tion that is trusted to separate information based on sensi-
|
|
tivity level. Each I/O device in a component, used for com-
|
|
munication with other network components, is assigned a dev-
|
|
ice range, consisting of a set of labels with a maximum and
|
|
minimum. (A device range usually contains, but does not
|
|
necessarily contain, all possible labels "between" the max-
|
|
imum and minimum, in the sense of dominating the minimum and
|
|
being dominated by the maximum.)
|
|
|
|
The NTCB always provides an accurate label for informa-
|
|
tion exported through devices. Information exported or
|
|
imported using a single-level device is labelled implicitly
|
|
by the sensitivity level of the device. Information
|
|
exported from one multilevel device and imported at another
|
|
must be labelled through an agreed-upon protocol, unless it
|
|
is labelled implicitly by using a communication link that
|
|
always carries a single level.
|
|
|
|
Information exported at a given sensitivity level can
|
|
be sent only to an importing device whose device range con-
|
|
tains that level or a higher level. If the importing device
|
|
range does not contain the given level, the information is
|
|
relabelled upon reception at a higher level within the
|
|
importing device range. Relabelling should not occur other-
|
|
wise.
|
|
|
|
+ Rationale
|
|
|
|
The purpose of device labels is to reflect and con-
|
|
strain the sensitivity levels of information authorized for
|
|
the physical environment in which the devices are located.
|
|
|
|
The information transfer restrictions permit one-way
|
|
communication (i.e., no acknowledgements) from one device to
|
|
another whose ranges have no level in common, as long as
|
|
each level in the sending device range is dominated by some
|
|
level in the receiving device range. It is never permitted
|
|
to send information at a given level to a device whose range
|
|
does not contain a dominating level. (See Appendix C for
|
|
similar interconnection rules for the interconnected AIS
|
|
view.)
|
|
|
|
4.1.1.4 Mandatory Access Control
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall enforce a mandatory access control policy over
|
|
all resources (i.e., subjects, storage objects, and I/O dev-
|
|
ices) that are directly or indirectly accessible by subjects
|
|
external to the TCB. These subjects and objects shall be
|
|
assigned sensitivity labels that are a combination of
|
|
hierarchical classification levels and non-hierarchical
|
|
categories, and the labels shall be used as the basis for
|
|
mandatory access control decisions. The TCB shall be able
|
|
to support two or more such sensitivity levels. (See the
|
|
Mandatory Access Control interpretations.) The following
|
|
requirements shall hold for all accesses between all sub-
|
|
jects external to the TCB and all objects directly or
|
|
indirectly accessible by these subjects. A subject can
|
|
read an object only if the hierarchical classification in
|
|
the subject's sensitivity level is greater than or equal to
|
|
the hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level include all the non-hierarchical
|
|
categories in the object's sensitivity level. A subject can
|
|
write an object only if the hierarchical classification in
|
|
the subject's sensitivity level is less than or equal to the
|
|
hierarchical classification of the object's sensitivity
|
|
level and the non-hierarchical categories in the subject's
|
|
sensitivity level are included in the non-hierarchical
|
|
categories in the object's sensitivity level. Identification
|
|
and authentication data shall be used by the TCB to authen-
|
|
ticate the user's identity and to ensure that the sensi-
|
|
tivity level and authorization of subjects external to the
|
|
TCB that may be created to act on behalf of the individual
|
|
user are dominated by the clearance and authorization of
|
|
that user.
|
|
|
|
+ Interpretation
|
|
|
|
Each partition of the NTCB exercises mandatory access
|
|
control policy over all subjects and objects in its com-
|
|
ponent. In a network, the responsibility of an NTCB parti-
|
|
tion encompasses all mandatory access control functions in
|
|
its component that would be required of a TCB in a stand-
|
|
alone system. In particular, subjects and objects used for
|
|
communication with other components are under the control of
|
|
the NTCB partition. Mandatory access control includes
|
|
secrecy and integrity control to the extent that the network
|
|
sponsor has described in the overall network security pol-
|
|
icy.
|
|
|
|
Conceptual entities associated with communication
|
|
between two components, such as sessions, connections and
|
|
virtual circuits, may be thought of as having two ends, one
|
|
in each component, where each end is represented by a local
|
|
object. Communication is viewed as an operation that copies
|
|
information from an object at one end of a communication
|
|
path to an object at the other end. Transient data-carrying
|
|
entities, such as datagrams and packets, exist either as
|
|
information within other objects, or as a pair of objects,
|
|
one at each end of the communication path.
|
|
|
|
The requirement for "two or more" sensitivity levels
|
|
can be met by either secrecy or integrity levels. When
|
|
there is a mandatory integrity policy, the stated require-
|
|
ments for reading and writing are generalized to: A subject
|
|
can read an object only if the subject's sensitivity level
|
|
dominates the object's sensitivity level, and a subject can
|
|
write an object only if the object's sensitivity level dom-
|
|
inates the subject's sensitivity level. Based on the
|
|
integrity policy, the network sponsor shall define the domi-
|
|
nance relation for the total label, for example, by combin-
|
|
ing secrecy and integrity lattices. -
|
|
|
|
+ Rationale
|
|
|
|
An NTCB partition can maintain access control only over
|
|
subjects and objects in its component. At levels B2 and
|
|
above, the NTCB partition must maintain access control over
|
|
all subjects and objects in its component. Access by a sub-
|
|
ject in one component to information contained in an object
|
|
in another component requires the creation of a subject in
|
|
the remote component which acts as a surrogate for the first
|
|
subject.
|
|
|
|
The mandatory access controls must be enforced at the
|
|
interface of the reference monitor (viz. the mechanism that
|
|
controls physical processing resources) for each NTCB parti-
|
|
tion. This mechanism creates the abstraction of subjects
|
|
and objects which it controls. Some of these subjects out-
|
|
side the reference monitor, per se, may be designated to
|
|
implement part of an NTCB partition's mandatory policy,
|
|
e.g., by using the ``trusted subjects" defined in the Bell-
|
|
LaPadula model.
|
|
|
|
The prior requirements on exportation of labeled infor-
|
|
mation to and from I/O devices ensure the consistency
|
|
between the sensitivity labels of objects connected by a
|
|
communication path. As noted in the introduction, the net-
|
|
work architecture must recognize the linkage between the
|
|
overall mandatory network security policy and the connection
|
|
oriented abstraction. For example, individual data-carrying
|
|
entities such as datagrams can have individual sensitivity
|
|
labels that subject them to mandatory access control in each
|
|
component. The abstraction of a single-level connection is
|
|
realized and enforced implicitly by an architecture while a
|
|
connection is realized by single-level subjects that neces-
|
|
sarily employ only datagrams of the same level.
|
|
|
|
The fundamental trusted systems technology permits the
|
|
DAC mechanism to be distributed, in contrast to the require-
|
|
ments for mandatory access control. For networks this
|
|
separation of MAC and DAC mechanisms is the rule rather than
|
|
_________________________
|
|
- See, for example, Grohn, M. J., A Model of a Pro-
|
|
_ _____ __ _ ___
|
|
tected Data Management System, ESD-TR-76-289, I. P.
|
|
______ ____ __________ ______
|
|
Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
|
|
Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
|
|
and Shockley, W., Secure Distributed Data Views, Secu-
|
|
______ ___________ ____ _____ ____
|
|
rity Policy and Interpretation for a Class A1 Multilev-
|
|
____ ______ ___ ______________ ___ _ _____ __ ________
|
|
el Secure Relational Database System,SRI International,
|
|
__ ______ __________ ________ ______
|
|
November 1986.
|
|
|
|
|
|
the exception.
|
|
|
|
The set of total sensitivity labels used to represent
|
|
all the sensitivity levels for the mandatory access control
|
|
(combined data secrecy and data integrity) policy always
|
|
forms a partially ordered set. Without loss of generality,
|
|
this set of labels can always be extended to form a lattice,
|
|
by including all the combinations of non-hierarchical
|
|
categories. As for any lattice, a dominance relation is
|
|
always defined for the total sensitivity labels. For admin-
|
|
istrative reasons it may be helpful to have a maximum level
|
|
which dominates all others.
|
|
|
|
|
|
4.1.2 Accountability
|
|
_ _ _ ______________
|
|
|
|
|
|
4.1.2.1 Identification and Authentication
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall require users to identify themselves to it
|
|
before beginning to perform any other actions that the TCB
|
|
is expected to mediate. Furthermore, the TCB shall maintain
|
|
authentication data that includes information for verifying
|
|
the identify of individual users (e.g., passwords) as well
|
|
as information for determining the clearance and authoriza-
|
|
tions of individual users. This data shall be used by the
|
|
TCB to authenticate the user's identity and to ensure that
|
|
the sensitivity level and authorization of subjects external
|
|
to the TCB that may be created to act on behalf of the indi-
|
|
vidual user are dominated by the clearance and authorization
|
|
of that user. The TCB shall protect authentication data so
|
|
that it cannot be accessed by any unauthorized user. The
|
|
TCB shall be able to enforce individual accountability by
|
|
providing the capability to uniquely identify each indivi-
|
|
dual ADP system user. The TCB shall also provide the capa-
|
|
bility of associating this identity with all auditable
|
|
actions taken by that individual.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement for identification and authentication
|
|
of users is the same for a network system as for an ADP sys-
|
|
tem. The identification and authentication may be done by
|
|
the component to which the user is directly connected or
|
|
some other component, such as an identification and authen-
|
|
tication server. Available techniques, such as those
|
|
described in the Password Guideline=, are generally also
|
|
applicable in the network context. However, in cases where
|
|
the NTCB is expected to mediate actions of a host (or other
|
|
network component) that is acting on behalf of a user or
|
|
group of users, the NTCB may employ identification and
|
|
_________________________
|
|
= Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, CSC-STD-002-85
|
|
____
|
|
|
|
|
|
authentication of the host (or other component) in lieu of
|
|
identification and authentication of an individual user, so
|
|
long as the component identifier implies a list of specific
|
|
users uniquely associated with the identifier at the time of
|
|
its use for authentication. This requirement does not apply
|
|
to internal subjects.
|
|
|
|
Authentication information, including the identity of a
|
|
user (once authenticated) may be passed from one component
|
|
to another without reauthentication, so long as the NTCB
|
|
protects (e.g., by encryption) the information from unau-
|
|
thorized disclosure and modification. This protection shall
|
|
provide at least a similar level of assurance (or strength
|
|
of mechanism) as pertains to the protection of the authenti-
|
|
cation mechanism and authentication data.
|
|
|
|
+ Rationale
|
|
|
|
The need for accountability is not changed in the con-
|
|
text of a network system. The fact that the NTCB is parti-
|
|
tioned over a set of components neither reduces the need nor
|
|
imposes new requirements. That is, individual accountabil-
|
|
ity is still the objective. Also, in the context of a net-
|
|
work system at the (C2) level or higher "individual accoun-
|
|
tability" can be satisfied by identification of a host (or
|
|
other component) so long as the requirement for traceability
|
|
to individual users or a set of specific individual users
|
|
with active subjects is satisfied. There is allowed to be an
|
|
uncertainty in traceability because of elapsed time between
|
|
changes in the group membership and the enforcement in the
|
|
access control mechanisms. In addition, there is no need in
|
|
a distributed processing system like a network to reauthen-
|
|
ticate a user at each point in the network where a projec-
|
|
tion of a user (via the subject operating on behalf of the
|
|
user) into another remote subject takes place.
|
|
|
|
The passing of identifiers and/or authentication infor-
|
|
mation from one component to another is usually done in sup-
|
|
port to the implementation of the discretionary access con-
|
|
trol (DAC). This support relates directly to the DAC
|
|
regarding access by a user to a storage object in a dif-
|
|
ferent NTCB partition than the one where the user was
|
|
authenticated. Employing a forwarded identification implies
|
|
additional reliance on the source and components along the
|
|
path. If the authenticated identification is used as the
|
|
basis of determining a sensitivity label for a subject, it
|
|
must satisfy the Label Integrity criterion.
|
|
|
|
An authenticated identification may be forwarded
|
|
between components and employed in some component to iden-
|
|
tify the sensitivity level associated with a subject created
|
|
to act on behalf of the user so identified.
|
|
|
|
4.1.2.1.1 Trusted Path
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support a trusted communication path between
|
|
itself and users for use when a positive TCB-to-user connec-
|
|
tion is required (e.g., login, change subject sensitivity
|
|
level). Communications via this trusted path shall be
|
|
activated exclusively by a user or the TCB and shall be
|
|
logically and unmistakably distinguishable from other paths.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
A trusted path is supported between a user (i.e.,
|
|
human) and the NTCB partition in the component to which the
|
|
user is directly connected.
|
|
|
|
+ Rationale
|
|
|
|
When a user logs into a remote component, the user id
|
|
is transmitted securely between the local and remote NTCB
|
|
partitions in accordance with the requirements in Identifi-
|
|
cation and Authentication.
|
|
|
|
Trusted Path is necessary in order to assure that the
|
|
user is communicating with the NTCB and only the NTCB when
|
|
security relevant activities are taking place (e.g., authen-
|
|
ticate user, set current session sensitivity level). How-
|
|
ever, Trusted Path does not address communications within
|
|
the NTCB, only communications between the user and the NTCB.
|
|
If, therefore, a component does not support any direct user
|
|
communication then the component need not contain mechanisms
|
|
for assuring direct NTCB to user communications.
|
|
|
|
The requirement for trusted communication between one
|
|
NTCB partition and another NCTB partition is addressed in
|
|
the System Architecture section. These requirements are
|
|
separate and distinct from the user to NTCB communication
|
|
requirement of a trusted path. However, it is expected that
|
|
this trusted communication between one NTCB partition and
|
|
another NTCB partition will be used in conjunction with the
|
|
trusted path to implement trusted communication between the
|
|
user and the remote NTCB partition.
|
|
|
|
|
|
4.1.2.2 Audit
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall be able to create, maintain, and protect from
|
|
modification or unauthorized access or destruction an audit
|
|
trail of accesses to the objects it protects. The audit
|
|
data shall be protected by the TCB so that read access to it
|
|
is limited to those who are authorized for audit data. The
|
|
TCB shall be able to record the following types of events:
|
|
use of identification and authentication mechanisms,
|
|
introduction of objects into a user's address space (e.g.,
|
|
file open, program initiation), deletion of objects, actions
|
|
taken by computer operators and system administrators and/or
|
|
system security officers, and other security relevant
|
|
events. The TCB shall also be able to audit any override of
|
|
human-readable output markings. For each recorded event,
|
|
the audit record shall identify: date and time of the event,
|
|
user, type of event, and success or failure of the event.
|
|
For identification/authentication events the origin of
|
|
request (e.g., terminal ID) shall be included in the audit
|
|
record. For events that introduce an object into a user's
|
|
address space and for object deletion events the audit
|
|
record shall include the name of the object and the object's
|
|
sensitivity level. The ADP system administrator shall be
|
|
able to selectively audit the actions of any one or more
|
|
users based on individual identify and/or object sensitivity
|
|
level. The TCB shall be able to audit the identified
|
|
events that may be used in the exploitation of covert
|
|
storage channels. The TCB shall contain a mechanism that
|
|
is able to monitor the occurrence or accumulation of secu-
|
|
rity auditable events that may indicate an imminent viola-
|
|
tion of security policy. This mechanism shall be able to
|
|
immediately notify the security administrator when thres-
|
|
holds are exceeded and, if the occurrence or accumulation of
|
|
these security relevant events continues, the system shall
|
|
take the least disruptive action to terminate the event.
|
|
|
|
+ Interpretation
|
|
|
|
This criterion applies as stated. The sponsor must
|
|
select which events are auditable. If any such events are
|
|
not distinguishable by the NTCB alone (for example those
|
|
identified in Part II), the audit mechanism shall provide an
|
|
interface, which an authorized subject can invoke with
|
|
parameters sufficient to produce an audit record. These
|
|
audit records shall be distinguishable from those provided
|
|
by the NTCB. In the context of a network system, "other
|
|
security relevant events" (depending on network system
|
|
architecture and network security policy) might be as fol-
|
|
lows:
|
|
|
|
|
|
1. Identification of each access event (e.g., estab-
|
|
lishing a connection or a connectionless association
|
|
between processes in two hosts of the network) and
|
|
its principal parameters (e.g., host identifiers of
|
|
the two hosts involved in the access event and user
|
|
identifier or host identifier of the user or host
|
|
that is requesting the access event)
|
|
|
|
2. Identification of the starting and ending times of
|
|
each access event using local time or global syn-
|
|
chronized time
|
|
|
|
3. Identification of security-relevant exceptional con-
|
|
ditions (e.g., potential violation of data
|
|
integrity, such as misrouted datagrams) detected
|
|
during the transactions between two hosts
|
|
|
|
4. Utilization of cryptographic variables
|
|
|
|
5. Changing the configuration of the network (e.g., a
|
|
component leaving the network and rejoining)
|
|
|
|
In addition, identification information should be
|
|
included in appropriate audit trail records, as necessary,
|
|
to allow association of all related (e.g., involving the
|
|
same network event) audit trail records (e.g., at different
|
|
hosts) with each other. Furthermore, a component of the
|
|
network system may provide the required audit capability
|
|
(e.g., storage, retrieval, reduction, analysis) for other
|
|
components that do not internally store audit data but
|
|
transmit the audit data to some designated collection com-
|
|
ponent. Provisions shall be made to control the loss of
|
|
audit data due to unavailability of resources.
|
|
|
|
In the context of a network system, the "user's address
|
|
space" is extended, for object introduction and deletion
|
|
events, to include address spaces being employed on behalf
|
|
of a remote user (or host). However, the focus remains on
|
|
users in contrast to internal subjects as discussed in the
|
|
DAC criterion. In addition, audit information must be
|
|
stored in machine-readable form.
|
|
|
|
The capability must exist to audit the identified
|
|
events that may be used in the exploitation of covert
|
|
storage channels. To accomplish this, each NTCB partition
|
|
must be able to audit those events locally that may lead to
|
|
the exploitation of a covert storage channel which exist
|
|
because of the network.
|
|
|
|
The sponsor shall identify the specific auditable
|
|
events that may indicate an imminent violation of security
|
|
policy. The component which detects the occurrence or accu-
|
|
mulation of such events must be able to notify an appropri-
|
|
ate administrator when thresholds are exceeded, and to ini-
|
|
tiate actions which will result in termination of the event
|
|
if the accumulation continues. For example, when the thres-
|
|
hold of unsuccessful login attempts within a period of time
|
|
is exceeded, login shall be inhibited for a specific time
|
|
period.
|
|
|
|
+ Rationale
|
|
|
|
For remote users, the network identifiers (e.g., inter-
|
|
net address) can be used as identifiers of groups of indivi-
|
|
dual users (e.g., "all users at Host A") to eliminate the
|
|
maintenance that would be required if individual identifica-
|
|
tion of remote users was employed. In this class (C2), how-
|
|
ever, it must be possible to identify (immediately or at
|
|
some later time) the individuals represented by a group
|
|
identifier. In all other respects, the interpretation is a
|
|
straightforward extension of the criterion into the context
|
|
of a network system. Identification of covert channel
|
|
events is addressed in the Covert Channel Analysis section.
|
|
|
|
Because of concurrency and synchronization problems, it
|
|
may not be possible to detect in real time the accumulation
|
|
of security auditable events that are occurring in different
|
|
NTCB partitions. However, each NTCB partition that has been
|
|
allocated audit responsibility must have the capability to
|
|
detect the local accumulation of events, to notify the par-
|
|
tition security administrator and/or the network security
|
|
administrator, and to initiate actions which will result in
|
|
termination of the event locally.
|
|
|
|
|
|
4.1.3 Assurance
|
|
_ _ _ _________
|
|
|
|
|
|
4.1.3.1 Operational Assurance
|
|
|
|
|
|
4.1.3.1.1 System Architecture
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall maintain a domain for its own execution that
|
|
protects it from external interference or tampering (e.g.,
|
|
by modification of its code or data structures). The TCB
|
|
shall maintain process isolation through the provision of
|
|
distinct address spaces under its control. The TCB shall be
|
|
internally structured into well-defined largely independent
|
|
modules. It shall make effective use of available hardware
|
|
to separate those elements that are protection-critical from
|
|
those that are not. The TCB modules shall be designed such
|
|
that the principle of least privilege is enforced. Features
|
|
in hardware, such as segmentation, shall be used to support
|
|
logically distinct storage objects with separate attributes
|
|
(namely: readable, writable). The user interface to the TCB
|
|
shall be completely defined and all elements of the TCB
|
|
identified. The TCB shall be designed and structured to
|
|
use a complete, conceptually simple protection mechanism
|
|
with precisely defined semantics. This mechanism shall play
|
|
a central role in enforcing the internal structuring of the
|
|
TCB and the system. The TCB shall incorporate significant
|
|
use of layering, abstraction and data hiding. Significant
|
|
system engineering shall be directed toward minimizing the
|
|
complexity of the TCB and excluding from the TCB modules
|
|
that are not protection-critical.
|
|
|
|
+ Interpretation
|
|
|
|
The system architecture criterion must be met individu-
|
|
ally by all NTCB partitions. Implementation of the require-
|
|
ment that the NTCB maintain a domain for its own execution
|
|
is achieved by having each NTCB partition maintain a domain
|
|
for its own execution. Since each component is itself a dis-
|
|
tinct domain in the overall network system, this also satis-
|
|
fies the requirement for process isolation through distinct
|
|
address spaces in the special case where a component has
|
|
only a single subject.
|
|
|
|
The NTCB must be internally structured into well-
|
|
defined largely independent modules and meet the hardware
|
|
requirements. This is satisfied by having each NTCB parti-
|
|
tion so structured. The NTCB controls all network resources.
|
|
These resources are the union of the sets of resources over
|
|
which the NTCB partitions have control. Code and data
|
|
structures belonging to the NTCB, transferred among NTCB
|
|
subjects (i.e., subjects outside the reference monitor but
|
|
inside the NTCB) belonging to different NTCB partitions,
|
|
must be protected against external interference or tamper-
|
|
ing. For example, a cryptographic checksum or physical
|
|
means may be employed to protect user authentication data
|
|
exchanged between NTCB partitions.
|
|
|
|
Each NTCB partition must enforce the principle of least
|
|
privilege within its component. Additionally, the NTCB must
|
|
be structured so that the principle of least privilege is
|
|
enforced in the system as a whole.
|
|
|
|
The NTCB must be designed and structured according to
|
|
the network security architecture to use a complete, concep-
|
|
tually simple protection mechanism. Furthermore, each NTCB
|
|
partition must also be so designed and structured.
|
|
|
|
Significant system engineering should be directed
|
|
toward minimizing the complexity of each NTCB partition, and
|
|
of the NTCB. Care shall be taken to exclude modules (and
|
|
components) that are not protection-critical from the NTCB.
|
|
|
|
It is recognized that some modules and/or components
|
|
may need to be included in the NTCB and must meet the NTCB
|
|
requirements even though they may not appear to be directly
|
|
protection-critical. The correct operation of these
|
|
modules/components is necessary for the correct operation of
|
|
the protection-critical modules and components. However,
|
|
the number and size of these modules/components should be
|
|
kept to a minimum.
|
|
|
|
Each NTCB partition provides isolation of resources
|
|
(within its component) in accord with the network system
|
|
architecture and security policy so that "supporting ele-
|
|
ments" (e.g., DAC and user identification) for the security
|
|
mechanisms of the network system are strengthened compared
|
|
to C2, from an assurance point of view, through the provi-
|
|
sion of distinct address spaces under control of the NTCB.
|
|
|
|
As discussed in the Discretionary Access Control sec-
|
|
tion, the DAC mechanism of a NTCB partition may be imple-
|
|
mented at the interface of the reference monitor or may be
|
|
distributed in subjects that are part of the NTCB in the
|
|
same or different component. When distributed in NTCB sub-
|
|
jects (i.e., when outside the reference monitor), the
|
|
assurance requirements for the design and implementation of
|
|
the DAC shall be those of class C2 for all networks of class
|
|
C2 or above.
|
|
|
|
+ Rationale
|
|
|
|
|
|
The requirement that the NTCB be structured into
|
|
modules and meet the hardware requirements applies within
|
|
the NTCB partitions in the various components.
|
|
|
|
The principle of least privilege requires that each
|
|
user or other individual with access to the system be given
|
|
only those resources and authorizations required for the
|
|
performance of this job. In order to enfore this principle
|
|
in the system it must be enforced in every NTCB partition
|
|
that supports users or other individuals. For example,
|
|
prohibiting access by administrators to objects outside the
|
|
NTCB partition (e.g., games) lessens the opportunity of dam-
|
|
age by a Trojan Horse.
|
|
|
|
The requirement for the protection of communications
|
|
between NTCB partitions is specifically directed to subjects
|
|
that are part of the NTCB partitions. Any requirements for
|
|
such protection for the subjects that are outside the NTCB
|
|
partitions are addressed in response to the integrity
|
|
requirements of the security policy.
|
|
|
|
There are certain parts of a network (modules and/or
|
|
components) that may not appear to be directly protection-
|
|
critical in that they are not involved in access control
|
|
decisions, do not directly audit, and are not involved in
|
|
the identification/authentication process. However, the
|
|
security of the network must depend on the correct operation
|
|
of these modules and/or components. An example of this is a
|
|
single level packet switch. Although it may not normally be
|
|
involved directly in enforcing the discretionary security
|
|
policy, this switch may be trusted not to mix data from dif-
|
|
ferent message streams. If the switch does not operate
|
|
correctly, data could get mixed, and unauthorized access
|
|
could result. Therefore, these modules/components must be
|
|
included in the NTCB and must meet the NTCB requirements
|
|
applicable to the policy element(s) for which they are
|
|
responsible.
|
|
|
|
|
|
4.1.3.1.2 System Integrity
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Hardware and/or software features shall be provided that can
|
|
be used to periodically validate the correct operation of
|
|
the on-site hardware and firmware elements of the TCB.
|
|
|
|
+ Interpretation
|
|
|
|
Implementation of the requirement is partly achieved by
|
|
having hardware and/or software features that can be used to
|
|
periodically validate the correct operation of the hardware
|
|
and firmware elements of each component's NTCB partition.
|
|
Features shall also be provided to validate the identity and
|
|
correct operation of a component prior to its incorporation
|
|
in the network system and throughout system operation. For
|
|
example, a protocol could be designed that enables the com-
|
|
ponents of the partitioned NTCB to exchange messages period-
|
|
ically and validate each other's correct response. The pro-
|
|
tocol shall be able to determine the remote entity's ability
|
|
to respond. NTCB partitions shall provide the capability to
|
|
report to network administrative personnel the failures
|
|
detected in other NTCB partitions.
|
|
|
|
Intercomponent protocols implemented within a NTCB
|
|
shall be designed in such a way as to provide correct opera-
|
|
tion in the case of failures of network communications or
|
|
individual components. The allocation of mandatory and dis-
|
|
cretionary access control policy in a network may require
|
|
communication between trusted subjects that are part of the
|
|
NTCB partitions in different components. This communication
|
|
is normally implemented with a protocol between the subjects
|
|
as peer entities. Incorrect access within a component shall
|
|
not result from failure of an NTCB partition to communicate
|
|
with other components.
|
|
|
|
+ Rationale
|
|
|
|
The first paragraph of the interpretation is a
|
|
straightforward extension of the requirement into the con-
|
|
text of a network system and partitioned NTCB as defined for
|
|
these network criteria.
|
|
|
|
NTCB protocols should be robust enough so that they
|
|
permit the system to operate correctly in the case of local-
|
|
ized failure. The purpose of this protection is to preserve
|
|
the integrity of the NTCB itself. It is not unusual for one
|
|
or more components in a network to be inoperative at any
|
|
time, so it is important to minimize the effects of such
|
|
failures on the rest of the network. Additional integrity
|
|
and denial of service issues are addressed in Part II.
|
|
|
|
It should be clear that some integrity and denial of
|
|
service features can reside outside the NTCB. Otherwise all
|
|
software in a network would be in the NTCB. Every piece of
|
|
software that has an opportunity to write to some data or
|
|
protocol field is "trusted" to preserve integrity or not
|
|
cause denial of service to some extent. For example, it is
|
|
necessary to "trust" TELNET to correctly translate user
|
|
data, and to eventually transmit packets. FTP also has to
|
|
be "trusted" to not inappropriately modify files, and to
|
|
attempt to complete the file transfer. These protocols can
|
|
be designed, however to exist outside the NTCB (from a pro-
|
|
tection perspective). It is beneficial to do this type of
|
|
security engineering so that the amount of code that must be
|
|
trusted to not disclose data is minimized. Putting every-
|
|
thing inside the NTCB contradicts the requirement to perform
|
|
"significant system engineering ... directed toward ...
|
|
excluding from the TCB modules that are not protection crit-
|
|
ical," which removes the primary difference between B2 and
|
|
B3. If everything has to be in the TCB to ensure data
|
|
integrity and protection against denial of service, there
|
|
will be considerably less assurance that disclosure protec-
|
|
tion is maximized.
|
|
|
|
|
|
|
|
4.1.3.1.3 Covert Channel Analysis
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall conduct a thorough search for
|
|
covert channels and make a determination (either by actual
|
|
measurement or by engineering estimation) of the maximum
|
|
bandwidth of each identified channel. (See the Covert Chan-
|
|
nels Guideline section.) FORMAL METHODS SHALL BE USED IN THE
|
|
ANALYSIS.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement, including the TCSEC Covert Channel
|
|
Guideline, applies as written. In a network, there are
|
|
additional instances of covert channels associated with com-
|
|
munication between components. THE FORMAL METHODS SHALL BE
|
|
USED IN THE ANALYSIS OF EACH INDIVIDUAL COMPONENT DESIGN AND
|
|
IMPLEMENTATION.
|
|
|
|
+ Rationale
|
|
|
|
The exploitation of network protocol information (e.g.,
|
|
headers) can result in covert storage channels. Exploitation
|
|
of frequency of transmission can result in covert timing
|
|
channels. The topic has been addressed in the literature.-
|
|
|
|
|
|
|
|
4.1.3.1.4 Trusted Facility Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The TCB shall support separate operator and administrator
|
|
functions. The functions performed in the role of a secu-
|
|
rity administrator shall be identified. The ADP system
|
|
administrative personnel shall only be able to perform secu-
|
|
rity administrator functions after taking a distinct audit-
|
|
able action to assume the security administrator role on the
|
|
ADP system. Non-security functions that can be performed in
|
|
the security administration role shall be limited strictly
|
|
_________________________
|
|
- See, for example, Girling, C. G., "Covert Channels
|
|
in LAN's," IEEE Transactions on Software Engineering,
|
|
____ ____________ __ ________ ___________
|
|
Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
|
|
Snow, D. P., and Karger, P. A., Limitations of End-to-
|
|
___________ __ ___ __
|
|
End Encryption in Secure Computer Networks, MITRE
|
|
___ __________ __ ______ ________ ________
|
|
Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
|
|
78-158, DTIC AD A059221).
|
|
|
|
to those essential to performing the security role effec-
|
|
tively.
|
|
|
|
+ Interpretation
|
|
|
|
This requirement applies as written to both the network
|
|
as a whole and to individual components which support such
|
|
personnel.
|
|
|
|
+ Rationale
|
|
|
|
It is recognized that based on the allocated policy
|
|
elements some components may operate with no human inter-
|
|
face.
|
|
|
|
|
|
|
|
4.1.3.1.5 Trusted Recovery
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Procedures and/or mechanisms shall be provided to assure
|
|
that, after an ADP system failure or other discontinuity,
|
|
recovery without a protection compromise is obtained.
|
|
|
|
+ Interpretation
|
|
|
|
The recovery process must be accomplished without a
|
|
protection compromise after the failure or other discon-
|
|
tinuity of any NTCB partition. It must also be accomplished
|
|
after a failure of the entire NTCB.
|
|
|
|
+ Rationale
|
|
|
|
This is a straight-forward extension of the requirement
|
|
into the network context, and takes into account that it is
|
|
possible for parts of the system to fail while other parts
|
|
continue to operate normally. This may be a security-
|
|
relevant event; if so it must be audited.
|
|
|
|
|
|
4.1.3.2 Life-Cycle Assurance
|
|
|
|
|
|
4.1.3.2.1 Security Testing
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The security mechanisms of the ADP system shall be tested
|
|
and found to work as claimed in the system documentation. A
|
|
team of individuals who thoroughly understand the specific
|
|
implementation of the TCB shall subject its design documen-
|
|
tation, source code, and object code to through analysis and
|
|
testing. Their objectives shall be: to uncover all design
|
|
and implementation flaws that would permit a subject exter-
|
|
nal to the TCB to read, change, or delete data normally
|
|
denied under the mandatory or discretionary security policy
|
|
enforced by the TCB; as well as to assure that no subject
|
|
(without authorization to do so) is able to cause the TCB to
|
|
enter a state such that it is unable to respond to communi-
|
|
cations initiated by other users. The TCB shall be found
|
|
resistant to penetration. All discovered flaws shall be
|
|
removed or neutralized and the TCB retested to demonstrate
|
|
that they have been eliminated and that new flaws have not
|
|
been introduced. Testing shall demonstrate that the TCB
|
|
implementation is consistent with the descriptive top-level
|
|
specification. No design flaws and no more than a few
|
|
correctable implementation flaws may be found during testing
|
|
and there shall be reasonable confidence that few remain.
|
|
MANUAL OR OTHER MAPPING OF THE FTLS TO THE SOURCE CODE MAY
|
|
FORM A BASIS FOR PENETRATION TESTING. (See the Security
|
|
Testing Guidelines.)
|
|
|
|
+ Interpretation
|
|
|
|
Testing of a component will require a testbed that
|
|
exercises the interfaces and protocols of the component
|
|
including tests under exceptional conditions. The testing
|
|
of a security mechanism of the network system for meeting
|
|
this criterion shall be an integrated testing procedure
|
|
involving all components containing an NTCB partition that
|
|
implement the given mechanism. This integrated testing is
|
|
additional to any individual component tests involved in the
|
|
evaluation of the network system. The sponsor should iden-
|
|
tify the allowable set of configurations including the sizes
|
|
of the networks. Analysis or testing procedures and tools
|
|
shall be available to test the limits of these configura-
|
|
tions. A change in configuration within the allowable set
|
|
of configurations does not require retesting.
|
|
|
|
The testing of each component will include the intro-
|
|
duction of subjects external to the NTCB partition for the
|
|
component that will attempt to read, change, or delete data
|
|
normally denied. If the normal interface to the component
|
|
does not provide a means to create the subjects needed to
|
|
conduct such a test, then this portion of the testing shall
|
|
use a special version of the untrusted software for the com-
|
|
ponent that results in subjects that make such attempts.
|
|
The results shall be saved for test analysis. Such special
|
|
versions shall have an NTCB partition that is identical to
|
|
that for the normal configuration of the component under
|
|
evaluation.
|
|
|
|
The testing of the mandatory controls shall include
|
|
tests to demonstrate that the labels for information
|
|
imported and/or exported to/from the component accurately
|
|
represent the labels maintained by the NTCB partition for
|
|
the component for use as the basis for its mandatory access
|
|
control decisions. The tests shall include each type of
|
|
device, whether single-level or multilevel, supported by the
|
|
component.
|
|
|
|
The NTCB must be found resistant to penetration. This
|
|
applies to the NTCB as a whole, and to each NTCB partition
|
|
in a component of this class.
|
|
|
|
+ Rationale
|
|
|
|
The phrase "no subject (without authorization to do so)
|
|
is able to cause the TCB to enter a state such that it is
|
|
unable to respond to communications initiated by other
|
|
users" relates to the security services (Part II of this
|
|
TNI) for the Denial of Service problem, and to correctness
|
|
of the protocol implementations.
|
|
|
|
Testing is an important method available in this
|
|
evaluation division to gain any assurance that the security
|
|
mechanisms perform their intended function. A major purpose
|
|
of testing is to demonstrate the system's response to inputs
|
|
to the NTCB partition from untrusted (and possibly mali-
|
|
cious) subjects.
|
|
|
|
In contrast to general purpose systems that allow for
|
|
the dynamic creation of new programs and the introductions
|
|
of new processes (and hence new subjects) with user speci-
|
|
fied security properities, many network components have no
|
|
method for introducing new programs and/or processes during
|
|
their normal operation. Therefore, the programs necessary
|
|
for the testing must be introduced as special versions of
|
|
the software rather than as the result of normal inputs by
|
|
the test team. However, it must be insured that the NTCB
|
|
partition used for such tests is identical to the one under
|
|
evaluation.
|
|
|
|
Sensitivity labels serve a critical role in maintaining
|
|
the security of the mandatory access controls in the net-
|
|
work. Especially important to network security is the role
|
|
of the labels for information communicated between com-
|
|
ponents - explicit labels for multilevel devices and impli-
|
|
cit labels for single-level devices. Therefore the testing
|
|
for correct labels is highlighted.
|
|
|
|
The requirement for testing to demonstrate consistency
|
|
between the NTCB implementation and the FTLS is a straight-
|
|
forward extension of the TCSEC requirement into the context
|
|
of a network system.
|
|
|
|
|
|
|
|
4.1.3.2.2 Design Specification and Verification
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A formal model of the security policy supported by the TCB
|
|
shall be maintained over the life cycle of the ADP system
|
|
that is proven and demonstrated to be consistent with its
|
|
axioms. A descriptive top-level specification (DTLS) of the
|
|
TCB shall be maintained that completely and accurately
|
|
describes the TCB in terms of exceptions, error messages,
|
|
and effects. A FORMAL TOP-LEVEL SPECIFICATION (FTLS) OF THE
|
|
TCB SHALL BE MAINTAINED THAT ACCURATELY DESCRIBES THE TCB IN
|
|
TERMS OF EXCEPTIONS, ERROR MESSAGES, AND EFFECTS. THE DTLS
|
|
AND FTLS SHALL INCLUDE THOSE COMPONENTS OF THE TCB THAT ARE
|
|
IMPLEMENTED AS HARDWARE AND/OR FIRMWARE IF THEIR PROPERTIES
|
|
ARE VISIBLE AT THE TCB INTERFACE. THE FTLS SHALL BE SHOWN
|
|
to be an accurate description of the TCB interface. A con-
|
|
vincing argument shall be given that the DTLS is consistent
|
|
with the model AND A COMBINATION OF FORMAL AND INFORMAL
|
|
TECHNIQUES SHALL BE USED TO SHOW THAT THE FTLS IS CONSISTENT
|
|
WITH THE MODEL. THIS VERIFICATION EVIDENCE SHALL BE CON-
|
|
SISTENT WITH THAT PROVIDED WITHIN THE STATE-OF-THE-ART OF
|
|
THE PARTICULAR NATIONAL COMPUTER SECURITY CENTER-ENDORSED
|
|
FORMAL SPECIFICATION AND VERIFICATION SYSTEM USED. MANUAL
|
|
OR OTHER MAPPING OF THE FTLS TO THE TCB SOURCE CODE SHALL BE
|
|
PERFORMED TO PROVIDE EVIDENCE OF CORRECT IMPLEMENTATION.
|
|
|
|
+ Interpretation
|
|
|
|
The overall network security policy expressed in this
|
|
model will provide the basis for the mandatory access con-
|
|
trol policy exercised by the NTCB over subjects and storage
|
|
objects in the entire network. The policy will also be the
|
|
basis for the discretionary access control policy exercised
|
|
by the NTCB to control access of named users to named
|
|
objects. Data integrity requirements addressing the effects
|
|
of unauthorized MSM need not be included in this model. The
|
|
overall network policy must be decomposed into policy ele-
|
|
ments that are allocated to appropriate components and used
|
|
as the basis for the security policy model for those com-
|
|
ponents.
|
|
|
|
The level of abstraction of the model, and the set of
|
|
subjects and objects that are explicitly represented in the
|
|
model, will be affected by the NTCB partitioning. Subjects
|
|
and objects must be represented explicitly in the model for
|
|
the partition if there is some network component whose NTCB
|
|
partition exercises access control over them. The model
|
|
shall be structured so that the axioms and entities applica-
|
|
ble to individual network components are manifest. Global
|
|
network policy elements that are allocated to components
|
|
shall be represented by the model for that component.
|
|
|
|
AN FTLS FOR A NETWORK CONSISTS OF A COMPONENT FTLS FOR
|
|
EACH UNIQUE TRUSTED NETWORK COMPONENT, PLUS ANY GLOBAL
|
|
DECLARATIONS AND ASSERTIONS THAT APPLY TO MORE THAN ONE COM-
|
|
PONENT. IF THE MODEL FOR EACH COMPONENT REPRESENTS ALL THE
|
|
GLOBAL MANDATORY POLICY ELEMENTS ALLOCATED TO THAT COM-
|
|
PONENT, THERE MAY NOT BE ANY GLOBAL ASSERTIONS NEEDED, AND
|
|
IN THIS CASE THE COLLECTION OF COMPONENT FTLS, WITH ANY
|
|
SHARED DECLARATIONS, IS THE NETWORK FTLS. EACH COMPONENT
|
|
FTLS SHALL DESCRIBE THE INTERFACE TO THE NTCB PARTITION OF
|
|
ITS COMPONENTS. The requirements for a network DTLS are
|
|
given in the Design Documentation section.
|
|
|
|
+ Rationale
|
|
|
|
The treatment of the model depends to a great extent on
|
|
the degree of integration of the communications service into
|
|
a distributed system. In a closely coupled distributed sys-
|
|
tem, one might use a model that closely resembles one
|
|
appropriate for a stand-alone computer system.
|
|
|
|
In all cases, the model of each partition will be
|
|
expected to show the role of the NTCB partition in each kind
|
|
of component. It will most likely clarify the model,
|
|
although not part of the model, to show access restrictions
|
|
implied by the system design; for example, subjects
|
|
representing protocol entities might have access only to
|
|
objects containing data units at the same layer of protocol.
|
|
The allocation of subjects and objects to different proto-
|
|
col layers is a protocol design choice which need not be
|
|
reflected in the security policy model.
|
|
|
|
THE FTLS MUST REPRESENT THE UNDERLYING REFERENCE MONI-
|
|
TOR AND ANY SUBJECTS IMPLEMENTING THE MANDATORY POLICY.
|
|
OTHER POLICY ELEMENTS DISTRIBUTED IN NTCB SUBJECTS (SEE THE
|
|
INTERPRETATION OF SYSTEM ARCHITECTURE) NEED NOT BE
|
|
REPRESENTED BY THE FTLS.
|
|
|
|
|
|
|
|
4.1.3.2.3 Configuration Management
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
During THE ENTIRE LIFE-CYCLE, I.E. DURING THE DESIGN,
|
|
DEVELOPMENT, and maintenance of the TCB, a configuration
|
|
management system shall be in place FOR ALL SECURITY-
|
|
RELEVANT HARDWARE, FIRMWARE, AND SOFTWARE that maintains
|
|
control of changes to THE FORMAL MODEL, the descriptive AND
|
|
FORMAL top-level SPECIFICATIONS, other design data, imple-
|
|
mentation documentation, source code, the running version of
|
|
the object code, and test fixtures and documentation. The
|
|
configuration management system shall assure a consistent
|
|
mapping among all documentation and code associated with the
|
|
current version of the TCB. Tools shall be provided for
|
|
generation of a new version of the TCB from source code.
|
|
Also available shall be tools, MAINTAINED UNDER STRICT CON-
|
|
FIGURATION CONTROL, for comparing a newly generated version
|
|
with the previous TCB version in order to ascertain that
|
|
only the intended changes have been made in the code that
|
|
will actually be used as the new version of the TCB. A COM-
|
|
BINATION OF TECHNICAL, PHYSICAL, AND PROCEDURAL SAFEGUARDS
|
|
SHALL BE USED TO PROTECT FROM UNAUTHORIZED MODIFICATION OR
|
|
DESTRUCTION THE MASTER COPY OR COPIES OF ALL MATERIAL USED
|
|
TO GENERATE THE TCB.
|
|
|
|
+ Interpretation
|
|
|
|
The requirement applies as written, with the following
|
|
extensions:
|
|
|
|
1. A configuration management system must be in place
|
|
for each NTCB partition.
|
|
|
|
2. A configuration management plan must exist for the
|
|
entire system. If the configuration management sys-
|
|
tem is made up of the conglomeration of the confi-
|
|
guration management systems of the various NTCB par-
|
|
titions, then the configuration management plan must
|
|
address the issue of how configuration control is
|
|
applied to the system as a whole.
|
|
|
|
ALL MATERIAL USED IN GENERATING A NEW VERSION OF THE
|
|
NTCB AND EACH NTCB PARTITION MUST BE PROTECTED, REGARDLESS
|
|
OF WHERE IT PHYSICALLY RESIDES.
|
|
|
|
+ Rationale
|
|
|
|
Each NTCB partition must have a configuration manage-
|
|
ment system in place, or else there will be no way for the
|
|
NTCB as a whole to have an effective configuration manage-
|
|
ment system. The other extensions are merely reflections of
|
|
the way that networks operate in practice.
|
|
|
|
THIS NEW REQUIREMENT EXPLICITLY MANDATES THE PROTECTION
|
|
OF MATERIAL USED TO GENERATE AN NTCB PARTITION, EVEN WHEN
|
|
THE GENERATION OCCURS BY DOWN-LINE LOADING OF A REMOTE COM-
|
|
PONENT.
|
|
|
|
|
|
|
|
|
|
4.1.3.2.4 Trusted Distribution
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A TRUSTED ADP SYSTEM CONTROL AND DISTRIBUTION FACILITY SHALL
|
|
BE PROVIDED FOR MAINTAINING THE INTEGRITY OF THE MAPPING
|
|
BETWEEN THE MASTER DATA DESCRIBING THE CURRENT VERSION OF
|
|
THE TCB AND THE ON-SITE MASTER COPY OF THE CODE FOR THE
|
|
CURRENT VERSION. PROCEDURES (E.G., SITE SECURITY ACCEPTANCE
|
|
TESTING) SHALL EXIST FOR ASSURING THAT THE TCB SOFTWARE,
|
|
FIRMWARE, AND HARDWARE UPDATES DISTRIBUTED TO A CUSTOMER ARE
|
|
EXACTLY AS SPECIFIED BY THE MASTER COPIES.
|
|
|
|
+ Interpretation
|
|
|
|
THIS REQUIREMENT APPLIES AS STATED, WITH THE ADDITIONAL
|
|
REQUIREMENT THAT, IF DOWN-LINE LOADING IS USED, THERE MUST
|
|
BE A TRUSTED METHOD OF GENERATING, SENDING, AND LOADING ANY
|
|
SOFTWARE INVOLVED.
|
|
|
|
+ Rationale
|
|
|
|
THIS IS A STRAIGHTFORWARD EXTENSION OF THE REQUIREMENT
|
|
INTO THE NETWORK CONTEXT.
|
|
|
|
|
|
4.1.4 Documentation.
|
|
_ _ _ _____________
|
|
|
|
|
|
4.1.4.1 Security Features User's Guide
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A single summary, chapter, or manual in user documentation
|
|
shall describe the protection mechanisms provided by the
|
|
TCB, interpretations on their use, and how they interact
|
|
with one another.
|
|
|
|
+ Interpretation
|
|
|
|
This user documentation describes user visible protec-
|
|
tion mechanisms at the global (network system) level and at
|
|
the user interface of each component, and the interaction
|
|
among these.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is an extension of the requirement
|
|
into the context of a network system as defined for these
|
|
network criteria. Documentation of protection mechanisms
|
|
provided by individual components is required by the cri-
|
|
teria for trusted computer systems that are applied as
|
|
appropriate for the individual components.
|
|
|
|
|
|
4.1.4.2 Trusted Facility Manual
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
A manual addressed to the ADP system administrator shall
|
|
present cautions about functions and privileges that should
|
|
be controlled when running a secure facility. The procedures
|
|
for examining and maintaining the audit files as well as the
|
|
detailed audit record structure for each type of audit event
|
|
shall be given. The manual shall describe the operator and
|
|
administrator functions related to security, to include
|
|
changing the security characteristics of a user. It shall
|
|
provide interpretations on the consistent and effective use
|
|
of the protection features of the system, how they interact,
|
|
how to securely generate a new TCB, and facility procedures,
|
|
warnings, and privileges that need to be controlled in order
|
|
to operate the facility in a secure manner. The TCB modules
|
|
that contain the reference validation mechanism shall be
|
|
identified. The procedures for secure generation of a new
|
|
TCB from source after modification of any modules in the TCB
|
|
shall be described. It shall include the procedures to
|
|
ensure that the system is initially started in a secure
|
|
manner. Procedures shall also be included to resume secure
|
|
system operation after any lapse in system operation.
|
|
|
|
+ Interpretation
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator(s) maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address the following:
|
|
|
|
1. The hardware configuration of the network itself;
|
|
|
|
2. The implications of attaching new components to the
|
|
network;
|
|
|
|
3. The case where certain components may periodically
|
|
leave the network (e.g., by crashing, or by being
|
|
disconnected) and then rejoin;
|
|
|
|
4. Network configuration aspects that can impact the
|
|
security of the network system; (For example, the
|
|
manual should describe for the network system
|
|
administrator the interconnections among components
|
|
that are consistent with the overall network system
|
|
architecture.)
|
|
|
|
5. Loading or modifying NTCB software or firmware
|
|
(e.g., down-line loading).
|
|
|
|
6. Incremental updates; that is, it must explicitly
|
|
indicate which components of the network may change
|
|
without others also changing.
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
The components of the network that form the NTCB must
|
|
be identified. Furthermore, the modules within an NTCB par-
|
|
tition that contain the reference validation mechanism (if
|
|
any) within that partition must be identified.
|
|
|
|
The procedures for the secure generation of a new ver-
|
|
sion (or copy) of each NTCB partition from source must be
|
|
described. The procedures and requirements for the secure
|
|
generation of the NTCB necessitated by changes in the net-
|
|
work configuration shall be described.
|
|
|
|
Procedures for starting each NTCB partition in a secure
|
|
state shall be specified. Procedures must also be included
|
|
to resume secure operation of each NTCB partition and/or the
|
|
NTCB after any lapse in system or subsystem operation.
|
|
|
|
+ Rationale
|
|
|
|
There may be multiple system administrators with
|
|
diverse responsibilities. The technical security measures
|
|
described by these criteria must be used in conjunction with
|
|
other forms of security in order to achieve security of the
|
|
network. Additional forms include administrative security,
|
|
physical security, emanations security, etc.
|
|
|
|
Extension of this criterion to cover configuration
|
|
aspects of the network is needed because, for example,
|
|
proper interconnection of components is typically essential
|
|
to achieve a correct realization of the network architec-
|
|
ture.
|
|
|
|
As mentioned in the section on Label Integrity, cryp-
|
|
tography is one common mechanism employed to protect commun-
|
|
ication circuits. Encryption transforms the representation
|
|
of information so that it is unintelligible to unauthorized
|
|
subjects. Reflecting this transformation, the sensitivity
|
|
of the ciphertext is generally lower than the cleartext. If
|
|
encryption methodologies are employed, they shall be
|
|
approved by the National Security Agency (NSA).
|
|
|
|
The encryption algorithm and its implementation are
|
|
outside the scope of these interpretations. This algorithm
|
|
and implementation may be implemented in a separate device
|
|
or may be a function of a subject in a component not dedi-
|
|
cated to encryption. Without prejudice, either implementa-
|
|
tion packaging is referred to as an encryption mechanism
|
|
herein.
|
|
|
|
The requirements for descriptions of NTCB generation
|
|
and identification of modules and components that form the
|
|
NTCB are straightforward extensions of the TCSEC require-
|
|
ments into the network context. In those cases where the
|
|
vendor does not provide source code, an acceptable procedure
|
|
shall be to request the vendor to perform the secure genera-
|
|
tion.
|
|
|
|
Given the nature of network systems (e.g., various com-
|
|
ponents tend to be down at different times, and the network
|
|
system must continue operation without that component), it
|
|
is imperative to know both how to securely start up an NTCB
|
|
partition, and how to resume operation securely. It is also
|
|
necessary to know how to resume secure operation of the NTCB
|
|
after any partition has been down.
|
|
|
|
|
|
4.1.4.3 Test Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
The system developer shall provide to the evaluators a docu-
|
|
ment that describes the test plan, test procedures that show
|
|
how the security mechanisms were tested, and results of the
|
|
security mechanisms' functional testing. It shall include
|
|
results of testing the effectiveness of the methods used to
|
|
reduce covert channel bandwidths. THE RESULTS OF THE MAP-
|
|
PING BETWEEN THE FORMAL TOP-LEVEL SPECIFICATION AND THE TCB
|
|
SOURCE CODE SHALL BE GIVEN.
|
|
|
|
|
|
+ Interpretation
|
|
|
|
The "system developer" is interpreted as "the network
|
|
system sponsor". The description of the test plan should
|
|
establish the context in which the testing was or should be
|
|
conducted. The description should identify any additional
|
|
test components that are not part of the system being
|
|
evaluated. This includes a description of the test-relevant
|
|
functions of such test components and a description of the
|
|
interfacing of those test components to the system being
|
|
evaluated. The description of the test plan should also
|
|
demonstrate that the tests adequately cover the network
|
|
security policy. The tests should include the features
|
|
described in the System Architecture and the System
|
|
Integrity sections. The tests should also include network
|
|
configuration and sizing.
|
|
|
|
THE MAPPING BETWEEN THE FTLS AND THE NTCB SOURCE CODE
|
|
MUST BE CHECKED TO ENSURE TO THE EXTENT POSSIBLE THAT THE
|
|
FTLS IS A CORRECT REPRESENTATION OF THE SOURCE CODE, AND
|
|
THAT THE FTLS HAS BEEN STRICTLY ADHERED TO DURING THE DESIGN
|
|
AND DEVELOPMENT OF THE NETWORK SYSTEM. THIS CHECK MUST BE
|
|
DONE FOR EACH COMPONENT OF THE NETWORK SYSTEM FOR WHICH AN
|
|
FTLS EXISTS.
|
|
|
|
+ Rationale
|
|
|
|
The entity being evaluated may be a networking subsys-
|
|
tem (see Appendix A) to which other components must be added
|
|
to make a complete network system. In that case, this
|
|
interpretation is extended to include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
The bandwidths of covert channels are used to determine
|
|
the suitability of a network system for a given environment.
|
|
The effectiveness of the methods used to reduce these
|
|
bandwidths must therefore be accurately determined.
|
|
|
|
|
|
4.1.4.4 Design Documentation
|
|
|
|
+ Statement from DoD 5200.28-STD
|
|
|
|
Documentation shall be available that provides a description
|
|
of the manufacturer's philosophy of protection and an expla-
|
|
nation of how this philosophy is translated into the TCB.
|
|
The interfaces between the TCB modules shall be described.
|
|
A formal description of the security policy model enforced
|
|
by the TCB shall be available and an explanation provided to
|
|
show that it is sufficient to enforce the security policy.
|
|
The specific TCB protection mechanisms shall be identified
|
|
and an explanation given to show that they satisfy the
|
|
model. The descriptive top-level specification (DTLS) shall
|
|
be shown to be an accurate description of the TCB interface.
|
|
Documentation shall describe how the TCB implements the
|
|
reference monitor concept and give an explanation why it is
|
|
tamper resistant, cannot be bypassed, and is correctly
|
|
implemented. The TCB implementation (i.e., in hardware,
|
|
firmware, and software) shall be informally shown to be con-
|
|
sistent with the FORMAL TOP-LEVEL SPECIFICATION (FTLS). The
|
|
elements of the FTLS shall be shown, using informal tech-
|
|
niques, to correspond to the elements of the TCB. Documen-
|
|
tation shall describe how the TCB is structured to facili-
|
|
tate testing and to enforce least privilege. This documen-
|
|
tation shall also present the results of the covert channel
|
|
analysis and the tradeoffs involved in restricting the chan-
|
|
nels. All auditable events that may be used in the exploi-
|
|
tation of known covert storage channels shall be identified.
|
|
The bandwidths of known covert storage channels, the use of
|
|
which is not detectable by the auditing mechanisms, shall be
|
|
provided. (See the Covert Channel Guideline section.)
|
|
HARDWARE, FIRMWARE, AND SOFTWARE MECHANISMS NOT DEALT WITH
|
|
IN THE FTLS BUT STRICTLY INTERNAL TO THE TCB (E.G., MAPPING
|
|
REGISTERS, DIRECT MEMORY ACCESS I/O) SHALL BE CLEARLY
|
|
DESCRIBED.
|
|
|
|
+ Interpretation
|
|
|
|
Explanation of how the sponsor's philosophy of protec-
|
|
tion is translated into the NTCB shall include a description
|
|
of how the NTCB is partitioned. The security policy also
|
|
shall be stated. The description of the interfaces between
|
|
the NTCB modules shall include the interface(s) between NTCB
|
|
partitions and modules within the partitions if the modules
|
|
exist. The sponsor shall describe the security architecture
|
|
and design, including the allocation of security require-
|
|
ments among components.
|
|
|
|
The documentation includes both a system description
|
|
and a set of component DTLS's. The system description
|
|
addresses the network security architecture and design by
|
|
specifying the types of components in the network, which
|
|
ones are trusted, and in what way they must cooperate to
|
|
support network security objectives. A component DTLS shall
|
|
be provided for each trusted network component, i.e., each
|
|
component containing an NTCB partition. Each component DTLS
|
|
shall describe the interface to the NTCB partition of its
|
|
component. Both the system description and each component
|
|
DTLS shall be shown consistent with those assertions in the
|
|
model that apply to it. Appendix A addresses component
|
|
evaluation issues.
|
|
|
|
To show the correspondence between the FTLS and the
|
|
NTCB implementation, it suffices to show correspondence
|
|
between each component FTLS and the NTCB partition in that
|
|
component.
|
|
|
|
As stated in the introduction to Division B, the spon-
|
|
sor must demonstrate that the NTCB employs the reference
|
|
monitor concept. The security policy model must be a model
|
|
for a reference monitor.
|
|
|
|
The security policy model for each partition implement-
|
|
ing a reference monitor shall fully represent the access
|
|
control policy supported by the partition, including the
|
|
discretionary and mandatory security policy for secrecy
|
|
and/or integrity. For the mandatory policy the single domi-
|
|
nance relation for sensitivity labels, including secrecy
|
|
and/or integrity components, shall be precisely defined.
|
|
|
|
+ Rationale
|
|
|
|
The interpretation is a straightforward extension of
|
|
the requirement into the context of a network system as
|
|
defined for this network interpretation. Other documenta-
|
|
tion, such as description of components and description of
|
|
operating environment(s) in which the networking subsystem
|
|
or network system is designed to function, is required else-
|
|
where, e.g., in the Trusted Facility Manual.
|
|
|
|
In order to be evaluated, a network must possess a
|
|
coherent Network Security Architecture and Design. (Inter-
|
|
connection of components that do not adhere to such a single
|
|
coherent Network Security Architecture is addressed in the
|
|
Interconnection of Accredited AIS, Appendix C.) The Network
|
|
Security Architecture must address the security-relevant
|
|
policies, objectives, and protocols. The Network Security
|
|
Design specifies the interfaces and services that must be
|
|
incorporated into the network so that it can be evaluated as
|
|
a trusted entity. There may be multiple designs that con-
|
|
form to the same architecture but are more or less incompa-
|
|
tible and non-interoperable (except through the Interconnec-
|
|
tion Rules). Security related mechanisms requiring coopera-
|
|
tion among components are specified in the design in terms
|
|
of their visible interfaces; mechanisms having no visible
|
|
interfaces are not specified in this document but are left
|
|
as implementation decisions.
|
|
|
|
The Network Security Architecture and Design must be
|
|
available from the network sponsor before evaluation of the
|
|
network, or any component, can be undertaken. The Network
|
|
Security Architecture and Design must be sufficiently com-
|
|
plete, unambiguous, and free from obvious flaws to permit
|
|
the construction or assembly of a trusted network based on
|
|
the structure it specifies.
|
|
|
|
When a component is being designed or presented for
|
|
evaluation, or when a network assembled from components is
|
|
assembled or presented for evaluation, there must be a
|
|
priori evidence that the Network security Architecture and
|
|
Design are satisfied. That is, the components can be assem-
|
|
bled into a network that conforms in every way with the Net-
|
|
work Security Architecture and Design to produce a physical
|
|
realization that is trusted to the extent that its evalua-
|
|
tion indicates.
|
|
|
|
In order for a trusted network to be constructed from
|
|
components that can be built independently, the Network
|
|
Security Architecture and Design must completely and
|
|
unambiguously define the security functionality of com-
|
|
ponents as well as the interfaces between or among com-
|
|
ponents. The Network Security Architecture and Design must
|
|
be evaluated to determine that a network constructed to its
|
|
specifications will in fact be trusted, that is, it will be
|
|
evaluatable under these interpretations.
|
|
|
|
|
|
The term "model" is used in several different ways in a
|
|
network context, e.g., a "protocol reference model," a "for-
|
|
mal network model," etc. Only the "security policy model" is
|
|
addressed by this requirement and is specifically intended
|
|
to model the interface, viz., "security perimeter," of the
|
|
reference monitor and must meet all the requirements defined
|
|
in the TCSEC. It must be shown that all parts of the TCB
|
|
are a valid interpretation of the security policy model,
|
|
i.e., that there is no change to the secure state except as
|
|
represented by the model.
|
|
|
|
|
|
Part II: Other Security Services
|
|
____ __ _____ ________ ________
|
|
|
|
|
|
5. Introduction
|
|
_ ____________
|
|
|
|
Part I of this Interpretation contains interpretations
|
|
of the Department of Defense Trusted Computer System Evalua-
|
|
tion Criteria (TCSEC), DOD 5200.28-STD. Part I deals with
|
|
controlling access to information. Part II contains addi-
|
|
tional network security concerns. These concerns differen-
|
|
tiate the network environment from the stand-alone computer.
|
|
Some concerns take on increased significance in the network
|
|
environment; other concerns do not exist on stand-alone com-
|
|
puters. Some of these concerns are outside the scope of
|
|
Part I; others lack the theoretical basis and formal
|
|
analysis underlying Part I. The criteria in this Part II
|
|
address these concerns in the form of additional security
|
|
requirements that may vary among applications. Overlap
|
|
between Part I and Part II is minimized as much as possible.
|
|
However, when an overlap occurs the association between the
|
|
concerns addressed in both parts is defined. Part II ser-
|
|
vices may be provided by mechanisms outside the NTCB.
|
|
|
|
5.1. Purpose and Scope
|
|
_ _ _______ ___ _____
|
|
|
|
This Part II addresses network security disjoint from
|
|
Part I. The rating derived in Part I is not effected by Part
|
|
II. Every component or system must have a Part I evaluation
|
|
as a basis for the Part II evaluation. Part II includes
|
|
generic requirements, security features, and evaluation cri-
|
|
teria. As described below, Part II evaluations differ from
|
|
Part I. The purpose of these evaluations is similar, how-
|
|
ever: to provide guidance to network managers and accredi-
|
|
tors as to the reliance they can place in security services.
|
|
These evaluations are input to the accreditor's decisions
|
|
concerning the operational mode and range of sensitive
|
|
information entrusted to the network.
|
|
|
|
The network sponsor shall identify the security ser-
|
|
vices offered by his system or component(s). Those services
|
|
will be evaluated against the criteria for those services in
|
|
Part II.
|
|
|
|
5.2. Criteria Form
|
|
_ _ ________ ____
|
|
|
|
The general form of Part II criteria is a relatively
|
|
brief statement, followed by a discussion of functionality,
|
|
strength of mechanism, and assurance, as appropriate.
|
|
|
|
Functionality refers to the objective and approach of a
|
|
_____________
|
|
security service; it includes features, mechanism, and per-
|
|
formance. Alternative approaches to achieving the desired
|
|
functionality may be more suitable in different applications
|
|
environments.
|
|
|
|
|
|
Strength of mechanism refers to how well a specific
|
|
________ __ _________
|
|
approach may be expected to achieve its objectives. In some
|
|
cases selection of parameters, such as number of bits used
|
|
in a checksum or the number of permutations used in an
|
|
encryption algorithm, can significantly affect strength of
|
|
mechanism.
|
|
|
|
Assurance refers to a basis for believing that the
|
|
_________
|
|
functionality will be achieved; it includes tamper resis-
|
|
tance, verifiability, and resistance against circumvention
|
|
or bypass. Assurance is generally based on analysis involv-
|
|
ing theory, testing, software engineering, validation and
|
|
verification, and related approaches. The analysis may be
|
|
formal or informal, theoretical or applied.
|
|
|
|
For example, consider communications integrity protec-
|
|
tion against message stream modification. A functionality
|
|
decision is to select error detection only, or detection and
|
|
correction; also one may select whether it is sufficient to
|
|
detect an odd number of bit errors, error bursts of speci-
|
|
fied duration, or a specified probability of an undetected
|
|
error. Available mechanisms include parity, longitudinal
|
|
redundancy check (LRC), cyclic redundancy check (CRC), and
|
|
cryptographic checkfunction. The strength of the CRC is
|
|
measured in the probability of an undetected error; this is
|
|
dependent upon the number of bits employed in the CRC.
|
|
There is no assurance of security associated with any of the
|
|
mentioned mechanisms except cryptographic checkfunction.
|
|
The algorithms are well known; an adversary could change
|
|
message contents and recalculate the non-cryptographic
|
|
checkfunction. The recipient would calculate the checkfunc-
|
|
tion and not discover that the message had been manipulated.
|
|
A cryptographic checkfunction would be resistant to such
|
|
manipulation.
|
|
|
|
5.3. Evaluation Ratings
|
|
_ _ __________ _______
|
|
|
|
Part II evaluations are qualitative, as compared with
|
|
the hierarchically-ordered ratings (e.g., C1, C2, ...)
|
|
resulting from Part I. At present it is not considered pos-
|
|
sible or desirable to employ the same ratings scale in Part
|
|
II. The results of a Part II evaluation for offered services
|
|
will generally be summarized using the terms none, minimum,
|
|
____ _______
|
|
fair, and good. Services not offered by the sponsor will be
|
|
____ ____
|
|
assigned a rating of not offered. For some services it will
|
|
___ _______
|
|
be most meaningful to assign a rating of none or present.
|
|
_______
|
|
The term none is used when the security service is not
|
|
offered. In some cases the functionality evaluations may be
|
|
limited to present or none.
|
|
|
|
The assurance rating for each service is bounded by the
|
|
Part I or Appendix A evaluation as appropriate because the
|
|
integrity of the service depends on the protection of the
|
|
NTCB. Table II-1 relates the Part II assurance rating to
|
|
the minimum corresponding Part I evaluation ratings.
|
|
|
|
These Part II evaluations tend to be more qualitative
|
|
and subjective, and will exhibit greater variance than the
|
|
Part I evaluations. Nevertheless, Part II evaluations are
|
|
valuable information concerning the capabilities of the
|
|
evaluated systems and their suitability for specific appli-
|
|
cations environments. If functionality, strength of mechan-
|
|
ism, and assurance are separately evaluated then a term may
|
|
be applied to each. In some cases the strength of mechanism
|
|
may be expressed quantitatively as a natural consequence of
|
|
the technology (e.g., the number of bits in a CRC, the par-
|
|
ticular function employed); this quantitative measure of
|
|
strength may be employed as the basis for rating.
|
|
|
|
The Part II evaluations may also be expected to exhibit
|
|
a greater sensitivity to technological advances than the
|
|
Part I evaluations. This sensitivity derives from the
|
|
present empirical basis of some of the Part II security ser-
|
|
vices as compared to the theoretical foundation of Part I.
|
|
Research advances may help change this situation. As the
|
|
state-of-the-art advances, the threshold for high evalua-
|
|
tions may also be expected to increase. Therefore, a rating
|
|
may become dated and may change upon reevaluation.
|
|
|
|
In general, mechanisms that only protect against
|
|
accidents and malfunctions cannot achieve an evaluation of
|
|
strength of mechanism above minimum. Mechanisms must pro-
|
|
vide protection against deliberate attacks in order to
|
|
obtain at least a good evaluation.
|
|
|
|
The summary report of a network product will contain
|
|
the rating reflecting the Part I evaluation plus a paired
|
|
list of Part II services and the evaluation for each. For
|
|
example, network product XYZ might be rated as follows: [B2,
|
|
security service-1: minimum, security service-2: not
|
|
offered, security service-3: none, ... ,security service-n:
|
|
(functionality: good, strength of mechanism: fair,
|
|
assurance: good)]. In some cases where the security service
|
|
is addressed outside this document (e.g., COMSEC), the
|
|
evaluation from the external source may be reflected in the
|
|
evaluation report. In such cases, the terms used will
|
|
differ from those listed above.
|
|
|
|
5.4. Relationship to ISO OSI-Architecture
|
|
_ _ ____________ __ ___ ___ ____________
|
|
|
|
An effort is underway to extend the ISO Open System
|
|
Interconnection (OSI) architecture by defining "general
|
|
security-related architectural elements which can be applied
|
|
appropriately in the circumstances for which protection of
|
|
communications between open systems is required." - Fami-
|
|
liarity with OSI terminology is assumed in this discussion.
|
|
The scope of this security addendum "provides a general
|
|
description of security services and related mechanisms,
|
|
_________________________
|
|
- ISO 7498/Part 2 - Security Architecture, ISO / TC
|
|
___ ____ ____ _ ________ ____________
|
|
97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
|
|
Project 97.21.18, September 1986.
|
|
|
|
|
|
|
|
which may be provided by the Reference Model; and defines
|
|
the positions within the Reference Model where the services
|
|
and mechanisms may be provided."
|
|
|
|
There is considerable overlap between the OSI Security
|
|
Addendum and Part II. At the time of writing, the OSI docu-
|
|
ment is evolving, making it difficult to exactly define the
|
|
relationship. Therefore, the following statements may have
|
|
to be modified in the future.
|
|
|
|
Some of the security services identified in the OSI
|
|
Security Addendum are covered by Part I of this Interpreta-
|
|
tion; others are addressed in Part II. The emphasis is on
|
|
making sure that all services are covered. The distinction
|
|
between the security service and the mechanism that imple-
|
|
ments the service is less strong in this Interpretation than
|
|
in the OSI Security Addendum. The OSI Addendum generally
|
|
addresses Functionality, occasionally addresses Strength of
|
|
Mechanism, and rarely addresses Assurance, while in this
|
|
Interpretation, especially in Part I, assurance is a major
|
|
factor.
|
|
|
|
The scope of the OSI Security Addendum is limited: "OSI
|
|
Security is not concerned with security measures needed in
|
|
end systems, installations and organizations except where
|
|
these have implications on the choice and position of secu-
|
|
rity services visible in OSI." The TCSEC and this Interpre-
|
|
tation include OSI concerns as a proper subset.
|
|
|
|
5.5. Selecting Security Services for a Specific Environment
|
|
_ _ _________ ________ ________ ___ _ ________ ___________
|
|
|
|
The enumeration of security services in Part II is
|
|
representative of those services that an organization may
|
|
choose to employ in a specific network for a specific
|
|
environment. But not all security services will be equally
|
|
important in a specific environment, nor will their relative
|
|
importance be the same among different environments. The
|
|
network management has to decide whether the rating achieved
|
|
by a network product for a specific criterion is satisfac-
|
|
tory for the application environment.
|
|
|
|
As an abstract example, consider the network product
|
|
XYZ which has received the rating [B2, security service-1:
|
|
minimum, security service-2: not offered, ... ]. The
|
|
management of network K may decide that they do not require
|
|
security service-2, so the absence of this service does not
|
|
effect the acceptability of the XYZ product; however, the
|
|
management of network Q may decide that security service-2
|
|
is essential, so the absence of this service disqualifies
|
|
product XYZ. The management of network P may decide secu-
|
|
rity service-1 is very important and that any rating less
|
|
than good is unacceptable, thereby disqualifying product
|
|
XYZ; while the management of network R may decide that secu-
|
|
rity service-1 need only be rated minimum.
|
|
|
|
As a more concrete example, consider an application
|
|
environment where wire-tapping is not a threat, such as
|
|
aboard an airplane or in an underground bunker. A Local
|
|
Area Network (LAN) in such an environment can be physically
|
|
protected to the system-high security mode without encryp-
|
|
tion because the system exists within a protected perimeter.
|
|
In such environments, management may decide that labeling
|
|
and access control based on labels provide sufficient pro-
|
|
tection if sufficient mechanisms exist to protect the
|
|
integrity of the labels. Cryptographic mechanisms are
|
|
deemed unnecessary. By way of contrast, when the LAN
|
|
environment involves passage through unprotected space,
|
|
management may decide that a LAN must provide integrity pro-
|
|
tection employing a cryptographic mechanism.
|
|
|
|
|
|
|
|
6. General Assurance Approaches
|
|
_ _______ _________ __________
|
|
|
|
This section addresses assurance approaches applicable
|
|
to many security services.
|
|
|
|
The logic of the protocols and the implementation of
|
|
countermeasures may be shown correct and effective by formal
|
|
methods where possible (i.e., where tools exist) and infor-
|
|
mal ones otherwise.
|
|
|
|
To provide assurance that the security service can
|
|
respond to various forms of external attacks, various
|
|
methods of real and simulated testing can be applied,
|
|
including:
|
|
|
|
|
|
1. Functional testing
|
|
|
|
|
|
2. Periodic testing
|
|
|
|
|
|
3. Penetration testing
|
|
|
|
|
|
4. Stress testing
|
|
|
|
|
|
5. Protocol testing for deadlock, liveness, and other
|
|
security properties of the protocol suites
|
|
|
|
In addition, the trusted computer base provides an exe-
|
|
cution environment that is extremely valuable in enhancing
|
|
the assurance of a variety of security services. The dis-
|
|
cretionary and mandatory access controls can be employed in
|
|
the design and implementation of these services to segregate
|
|
unrelated services. Thus, service implementation that is
|
|
complex and error-prone or obtained from an unevaluated sup-
|
|
plier can be prevented from degrading the assurance of other
|
|
services implemented in the same component. Furthermore, a
|
|
TCB ensures that the basic protection of the security and
|
|
integrity- of the information entrusted to the network is
|
|
not diluted by various supporting security services identi-
|
|
fied in this Part II. See also the discussion of Integrity
|
|
in the Supportive Primitives section.
|
|
|
|
In general, assurance may be provided by implementing
|
|
these features in a limited set of subjects in each applica-
|
|
ble NTCB partition whose code and data have a unique manda-
|
|
tory integrity level to protect against circumvention and
|
|
tampering.
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Computer Systems," ESD-TR-76-372, MTR-
|
|
3153, The MITRE Corporation, Bedford, MA, April 1977.
|
|
|
|
Assurance of trustworthiness of the design and imple-
|
|
mentation of Part II mechanisms may be related to the
|
|
assurance requirements in Part I. The following factors are
|
|
identified as contributing to an assurance evaluation: ser-
|
|
vice design and implementation, service testing, design
|
|
specification and verification, configuration management,
|
|
and distribution.
|
|
|
|
6.1. Service Design and Implementation Factors
|
|
_ _ _______ ______ ___ ______________ _______
|
|
|
|
An evaluation rating of fair indicates that the imple-
|
|
mentation of the service employs the provisions of the TCB
|
|
for a distinct address space. In addition, the implementa-
|
|
tion of the service is internally structured into well-
|
|
defined largely independent modules; makes effective use of
|
|
available hardware to separate those elements that are
|
|
protection-critical to the service from those that are not;
|
|
is designed such that the principle of least privilege is
|
|
enforced; and the user interface is completely defined and
|
|
all elements relevant to the service are identified.
|
|
|
|
An evaluation rating of good indicates that the ser-
|
|
vice, in addition, incorporates significant use of layering,
|
|
abstraction and data hiding; and employs significant system
|
|
engineering directed toward minimizing complexity and
|
|
separating modules that are critical to the service.
|
|
|
|
6.2. Service Testing Factors
|
|
_ _ _______ _______ _______
|
|
|
|
With respect to security testing, an evaluation of
|
|
minimum indicates that the service was tested and found to
|
|
work as claimed in the system documentation; that testing
|
|
was done to assure that there are no obvious ways for an
|
|
unauthorized user to bypass or otherwise defeat the security
|
|
constraints and objectives; and that testing included a
|
|
search for obvious flaws that would allow inconsistent or
|
|
improper modification of data used by the service, either by
|
|
external software or by errors in the implementation of the
|
|
service.
|
|
|
|
An evaluation rating of fair indicates that, in addi-
|
|
tion to the minimum factors, a team of individuals who
|
|
thoroughly understand the specific implementation subjected
|
|
its design documentation, source code, and object code to
|
|
through analysis and testing with the objectives of uncover-
|
|
ing all design and implementation flaws that would permit a
|
|
subject external to the NTCB to defeat the purposes of the
|
|
service. A fair system is relatively resistant to defeat of
|
|
the purpose of the service. A fair evaluation indicates
|
|
that all discovered flaws were removed or neutralized and
|
|
the system retested to demonstrate that they have been elim-
|
|
inated and that new flaws have not been introduced. Testing
|
|
demonstrates that the service implementation is consistent
|
|
with the specification.
|
|
|
|
An evaluation rating of good indicates that, in addi-
|
|
tion to the fair factors, the system is more resistant to
|
|
defeat of service; and that no design flaws and no more than
|
|
a few correctable implementation flaws were found during
|
|
testing and there is reasonable confidence that few remain.
|
|
Manual or other mapping of the specifications to the source
|
|
code may form a basis for testing.
|
|
|
|
6.3. Design Specification and Verification Factors
|
|
_ _ ______ _____________ ___ ____________ _______
|
|
|
|
With respect to design specification and verification,
|
|
an evaluation rating of minimum indicates that an informal
|
|
model of the properties of the service is maintained over
|
|
the life cycle of the system. Additional requirements for
|
|
an evaluation rating of fair have not been defined.
|
|
|
|
An evaluation rating of good indicates that, in addi-
|
|
tion, a formal model of the properties of the service is
|
|
maintained over the life cycle of the system and demon-
|
|
strated to be consistent with its axioms; and that a
|
|
descriptive specification of the service-relevant code is
|
|
maintained that completely and accurately describes it in
|
|
terms of exceptions, error messages, and effects.
|
|
|
|
6.4. Configuration Management Factors
|
|
_ _ _____________ __________ _______
|
|
|
|
With respect to configuration management, an evaluation
|
|
rating of minimum indicates that during development and
|
|
maintenance of the service, a configuration management sys-
|
|
tem was in place that maintained control of changes to
|
|
specifications, other design data, implementation documenta-
|
|
tion, source code, the running version of the object code,
|
|
test fixtures, test code, and documentation.
|
|
|
|
An evaluation rating of fair indicates that, in addi-
|
|
tion, the configuration management system assures a con-
|
|
sistent mapping among all documentation and code associated
|
|
with the current version of the system; and for comparing a
|
|
newly generated version with the previous version in order
|
|
to ascertain that only the intended changes have been made
|
|
in the code.
|
|
|
|
An evaluation rating of good indicates that, in addi-
|
|
tion, configuration management covers the entire life-
|
|
cycle; that it applies to all firmware, and hardware that
|
|
supports the service; and that a combinations of technical,
|
|
physical, and procedural safeguards are used to protect from
|
|
unauthorized modification or destruction the master copy or
|
|
copies of all material used to generate the implementation
|
|
of the service.
|
|
|
|
6.5. Distribution Factors
|
|
_ _ ____________ _______
|
|
|
|
There are currently no requirements for minimum and
|
|
fair evaluation ratings.
|
|
|
|
With respect to distribution, an evaluation rating of
|
|
good indicates that a control and distribution facility is
|
|
provided for maintaining the integrity of the mapping
|
|
between the master data describing the current version of
|
|
the service and the master copy of the code for the current
|
|
version. Procedures (e.g., site security acceptance test-
|
|
ing) shall exist for assuring that the software, firmware,
|
|
and hardware updates distributed are exactly as specified by
|
|
the master copies.
|
|
|
|
7. Supportive Primitives
|
|
_ __________ __________
|
|
|
|
This subsection describes mechanisms and assurance
|
|
techniques that apply across multiple security services.
|
|
They are grouped together here for convenience and are
|
|
referenced in the appropriate service subsections of Section
|
|
8.
|
|
|
|
Encryption is a pervasive mechanism for many security
|
|
services; protocols are of fundamental essence in networks.
|
|
The information in this Section 7 is provided as background
|
|
and support for the services addressed in Section 8.
|
|
|
|
7.1. The Encryption Mechanism
|
|
_ _ ___ __________ _________
|
|
|
|
7.1.1. Functionality Factors
|
|
_ _ _ _____________ _______
|
|
|
|
Encryption is a tool for protecting data from comprom-
|
|
ise or modification attacks. Through its use, release of
|
|
message content and traffic analysis can be prevented; mes-
|
|
sage stream modification, some denial of message service,
|
|
and masquerading can be detected. For example, an ISO docu-
|
|
ment-, describing the use of encipherment techniques in com-
|
|
munications architectures, has been published as a U.S.
|
|
member body contribution for consideration as cryptographic
|
|
security protection in the Open System Interconnection
|
|
environment. Encryption is probably the most important and
|
|
widely used security mechanism when there is a wiretap
|
|
threat; sometimes it is even confused with being a service.
|
|
|
|
Use of the encryption mechanism leads to a requirement
|
|
for key management (e.g., manually or in the form of key
|
|
distribution protocols and key-distribution centers.)
|
|
|
|
7.1.2. Strength of Mechanism Factors
|
|
_ _ _ ________ __ _________ _______
|
|
|
|
|
|
The strength of a cryptographic cipher is determined by
|
|
mathematical and statistical analysis; the results are typi-
|
|
cally expressed in the workfunction required for unauthor-
|
|
ized decryption. In many cases this analysis is classified;
|
|
the results are available only as a statement of the highest
|
|
level of classified data which may be protected by use of
|
|
the mechanism.
|
|
|
|
When encryption is used in networks, it may be combined
|
|
with network protocols to protect against disclosure. The
|
|
strength of the ciphers, the correctness of the protocol
|
|
logic, and the adequacy of implementation, are primary fac-
|
|
tors in assessing the strength of Data Confidentiality using
|
|
_________________________
|
|
- Addendum to the Transport Layer Protocol Definition
|
|
________ __ ___ _________ _____ ________ __________
|
|
for Providing Connection Oriented End-to-End Crypto-
|
|
___ _________ __________ ________ ___ __ ___ ______
|
|
graphic Data Protection Using A 64-bit Block Cipher,
|
|
_______ ____ __________ _____ _ __ ___ _____ ______
|
|
ISO TC 97 / SC 20 / WG 3, N 37, January 10, 1986.
|
|
|
|
|
|
cryptography techniques. Algorithms are characterized by
|
|
the National Security Agency on a pass/fail basis in terms
|
|
of the sensitivity of the information which the encryption
|
|
algorithm is approved to protect.
|
|
|
|
|
|
7.1.3. Assurance Factors
|
|
_ _ _ _________ _______
|
|
|
|
The analysis of encryption techniques is quite dif-
|
|
ferent from the formal specification and verification tech-
|
|
nology employed as the basis of trust in the TCSEC. Much of
|
|
this analysis is classified. Consequently, assurance of
|
|
encryption techniques will be provided by the National Secu-
|
|
rity Agency. Normally, a separate assurance rating will not
|
|
be given.
|
|
|
|
7.2. Protocols
|
|
_ _ _________
|
|
|
|
7.2.1. Functionality Factors
|
|
_ _ _ _____________ _______
|
|
|
|
Protocols are a set of rules and formats (semantic and
|
|
syntactic) that determine the communication behavior between
|
|
entities in a network. Their design and implementation is
|
|
crucial to the correct, efficient, and effective transfer of
|
|
information among network systems and sub-systems.
|
|
|
|
Many network security services are implemented with the
|
|
help of protocols, and failures and deficiencies in the pro-
|
|
tocol result in failures and deficiencies in the security
|
|
service supported by the protocol.
|
|
|
|
One class of design, or logical, deficiencies in proto-
|
|
cols are those having some form of denial of service as a
|
|
consequence. This class includes deadlocks, livelocks,
|
|
unspecified receptions, lack-of-liveness, and non-executable
|
|
interactions. A protocol with one of these design flaws can
|
|
cease to function under circumstances that can occur during
|
|
normal operation but which were not anticipated by the
|
|
designer. Such flaws result in trapping the protocol into
|
|
states that are nonproductive or which cause the protocol to
|
|
halt or have unpredictable effects.
|
|
|
|
Another class of design concerns are typical of proto-
|
|
cols that must work despite various kinds of random
|
|
interference or communication difficulties, such as noise,
|
|
message loss, and message reordering. It should be noted
|
|
that most networks are designed in a layered fashion, in
|
|
which each protocol-based service is implemented by invoking
|
|
services available from the next lower layer. This means
|
|
that if one layer provides protection from certain types of
|
|
communication difficulties, higher layers need not address
|
|
those problems in their design.
|
|
|
|
A third class of design deficiency might occur in pro-
|
|
tocols that are expected to work in the presence of mali-
|
|
cious interference, such as active wiretapping. Such proto-
|
|
cols should have countermeasures against Message Stream
|
|
|
|
Modification (MSM) attacks.
|
|
|
|
7.2.2. Strength of Mechanism Factors
|
|
_ _ _ ________ __ _________ _______
|
|
|
|
Protocol deficiencies may lie either in their design or
|
|
their implementation. By an implementation deficiency is
|
|
meant a lack of correspondence between a protocol specifica-
|
|
tion and its implementation in software.
|
|
|
|
7.2.3. Assurance Factors
|
|
_ _ _ _________ _______
|
|
|
|
Assurances of implementation correctness may be
|
|
addressed by techniques such as design specification and
|
|
verification, and testing.
|
|
|
|
Ideally, all of the network protocol functions would be
|
|
verified to operate correctly. However, verification of
|
|
large amounts of code is prohibitively expensive (if not
|
|
impossible) at the current state-of-the-art, so the code to
|
|
be verified must be kept to an absolute minimum. It seems
|
|
feasible to split up a complex protocol (e.g., the TCP) into
|
|
trusted portions (i.e., the software that performs
|
|
security-related functions) and untrusted portions (i.e.,
|
|
other software) so that only the security-related portions
|
|
must be shown to meet the requirements of Part I. However,
|
|
there is a general concern about the extent to which trusted
|
|
portions of protocols can be identified and protected from
|
|
untrusted portions.
|
|
|
|
Methods for assuring the design correctness of proto-
|
|
cols involve the use of tools and techniques specially
|
|
oriented toward the kinds of problems peculiar to protocols.
|
|
Either formal methods, or testing, or both, may be used.
|
|
|
|
Some assurance in design correctness may be obtained
|
|
simply by basing the protocol design on a well-understood
|
|
model or technique found in the literature if it is known to
|
|
address the kinds of problems likely to arise. This
|
|
assurance is lessened to the extent that the actual protocol
|
|
differs from the published version.
|
|
|
|
7.2.3.1. Formal Methods
|
|
_ _ _ _ ______ _______
|
|
|
|
Formal techniques of protocol definition and validation
|
|
have advanced to the point that they may be applied to
|
|
actual protocols to verify the absence of deadlocks,
|
|
livelocks, and incompleteness for design verification. When
|
|
the state-of-the-art of formal tools is inadequate, or when
|
|
the sponsor decides not to employ formal tools, informal
|
|
methods may be used. The evaluation of protocol specifica-
|
|
tion and verification should indicate which assurance tools
|
|
have been employed.
|
|
|
|
Formal methods for protocol specification and verifica-
|
|
tion are typically based on a finite-state machine concept,
|
|
extended in one of various ways to represent the concurrency
|
|
and communication properties characteristic of networks.
|
|
Communicating sequential machines and Petri nets have been
|
|
used as a functional modeling context for protocols, and
|
|
experimental automated verification tools based on these
|
|
models have been developed. Different models and tools may
|
|
need to be used depending on the design objective for which
|
|
assurance is desired.
|
|
|
|
To the extent that the protocol model and implementa-
|
|
tion permit separation by layers, the functional model,
|
|
proofs, demonstration, and arguments may optionally be
|
|
applied to individual layers or sets of adjacent layers.
|
|
Generally, the assurances obtained about protocols in one
|
|
layer are conditional on, or relative to, assurances for
|
|
protocols in lower layers.
|
|
|
|
7.2.3.2. Testing
|
|
_ _ _ _ _______
|
|
|
|
Protocol testing is another method to assure the
|
|
correctness of the protocols other than formal verification.
|
|
Protocol testing has been employed to certify implementation
|
|
conformance to standards such as X.25, TCP, and TP4 with a
|
|
moderate level of success.
|
|
|
|
The type of testing called for can be referred to as
|
|
conformance testing and penetration testing. The purpose of
|
|
performing these tests is to obtain a moderate level of con-
|
|
fidence on the correct operation of the protocols.
|
|
|
|
Objectives should be to uncover design and implementa-
|
|
tion flaws that would cause the protocols to perform their
|
|
functions incorrectly, and to determine if the Message
|
|
Stream Modification (MSM) countermeasures are effective, if
|
|
applicable. They may attempt to uncover all kinds of logi-
|
|
cal deficiencies, such as deadlocks, livelocks, unspecified
|
|
receptions, lack-of-liveness, and non-executable interac-
|
|
tions. All discovered flaws should be corrected and the
|
|
implementations retested to demonstrate that they have been
|
|
eliminated and that new flaws have not been introduced. For
|
|
a successful conclusion to a test suite, no design flaws and
|
|
no more than a few correctable implementation flaws may be
|
|
found during testing, and there should be reasonable confi-
|
|
dence that few remain. Manual or other mapping of the pro-
|
|
tocol specification to the source code may form a basis for
|
|
testing.
|
|
|
|
Protocols should be thoroughly analyzed and tested for
|
|
their responses to both normal and abnormal data type mes-
|
|
sages. Testing must be done for both normal and degraded
|
|
mode of operation both in controlled environment and in the
|
|
environment of deployment.
|
|
|
|
8. Documentation
|
|
_ _____________
|
|
|
|
The section headings in these Part II Documentation
|
|
criteria are the same as those employed for Part I Documen-
|
|
tation criteria. The documentation produced in response to
|
|
both sets of criteria may optionally be combined or pub-
|
|
lished separately, as the sponsor sees fit.
|
|
|
|
8.1. Security Features User's Guide
|
|
_ _ ________ ________ ____ _ _____
|
|
|
|
A single summary, chapter, or manual in user documenta-
|
|
tion shall describe the Part II security services, guide-
|
|
lines on their use, and how they interact with one another.
|
|
|
|
This user documentation describes security services at
|
|
the global (network system) level, at the user interface of
|
|
each component, and the interaction among these.
|
|
|
|
8.2. Trusted Facility Manual
|
|
_ _ _______ ________ ______
|
|
|
|
A manual addressed to the network and component sub-
|
|
system administrator shall present cautions about functions
|
|
and privileges that should be controlled to maintain network
|
|
security. The manual shall describe the operator and
|
|
administrator functions related to security services. It
|
|
shall provide guidelines on the consistent and effective use
|
|
of the network security services, how they interact, and
|
|
facility procedures, warnings, and privileges that need to
|
|
be controlled in order to maintain network security.
|
|
|
|
The software modules that provide security services
|
|
shall be identified. The procedures for secure generation
|
|
of new security service object modules from source after
|
|
modification of source code shall be described. It shall
|
|
include the procedures, if any, required to ensure that the
|
|
network is initially started in a secure manner. Procedures
|
|
shall also be included to resume secure system operation
|
|
after any lapse in operation.
|
|
|
|
This manual shall contain specifications and procedures
|
|
to assist the system administrator to maintain cognizance of
|
|
the network configuration. These specifications and pro-
|
|
cedures shall address:
|
|
|
|
1. The implications of attaching new components to the
|
|
network.
|
|
|
|
2. The case where certain components may periodically
|
|
leave the network (e.g., by crashing or by being
|
|
disconnected) and then rejoin.
|
|
|
|
3. Incremental updates; that is, it must explicitly
|
|
indicate which security services may change without
|
|
others also changing.
|
|
|
|
The physical and administrative environmental controls
|
|
shall be specified. Any assumptions about security of a
|
|
given network should be clearly stated (e.g., the fact that
|
|
all communications links must be physically protected to a
|
|
certain level).
|
|
|
|
8.3. Test Documentation
|
|
_ _ ____ _____________
|
|
|
|
A document shall be provided that describes the test
|
|
plan and test procedures that show how the security services
|
|
were tested, and results of the security services' func-
|
|
tional testing.
|
|
|
|
The description of the test plan should establish the
|
|
context in which the testing was or should be conducted.
|
|
The description should identify any additional test com-
|
|
ponents that are not part of the system being evaluated.
|
|
This includes a description of the test-relevant functions
|
|
of such test components, and a description of the interfac-
|
|
ing of those test components to the system being evaluated.
|
|
The description of the test plan should also demonstrate
|
|
that the tests adequately cover the network security policy.
|
|
The tests should also include network configuration and siz-
|
|
ing.
|
|
|
|
As identified in Appendix A, the entity being evaluated
|
|
may be a networking subsystem to which other components must
|
|
be added to make a complete network system. In that case,
|
|
test documentation must include contextual definition
|
|
because, at evaluation time, it is not possible to validate
|
|
the test plans without the description of the context for
|
|
testing the networking subsystem.
|
|
|
|
8.4. Design Documentation
|
|
_ _ ______ _____________
|
|
|
|
Documentation shall be available that provides a
|
|
description of the network philosophy of protection and an
|
|
explanation of how this philosophy is translated into the
|
|
security services offered. The interfaces between security
|
|
services shall be described. The security policy also shall
|
|
be stated.
|
|
|
|
The system description addresses the network security
|
|
architecture and design by specifying the security services
|
|
in the network, and in what way they must cooperate to sup-
|
|
port network security objectives. If a network supports a
|
|
set of security policies and permits components with dif-
|
|
ferent policies to communicate, the relationships between
|
|
the policies shall be defined.
|
|
|
|
9. Specific Security Services
|
|
_ ________ ________ ________
|
|
|
|
This section contains specific security services that
|
|
may be provided in networks. The structure of the specific
|
|
security services in the balance of Part II is represented
|
|
in Table II-2. This table shows the network security con-
|
|
cerns addressed, the criteria for each concern, and the
|
|
evaluation range for each criterion.
|
|
|
|
9.1. Communications Integrity
|
|
_ _ ______________ _________
|
|
|
|
Communications integrity is a collective term for a
|
|
number of security services. These services, described
|
|
below, are all concerned with the accuracy, faithfulness,
|
|
non-corruptibility, and believability of information
|
|
transfer between peer entities through the computer communi-
|
|
cations network.
|
|
|
|
Integrity is an important issue. However, there is
|
|
considerable confusion and inconsistency in the use of the
|
|
term. The term is used to address matters such as con-
|
|
sistency, accuracy, concurrency, and data recovery, modifi-
|
|
cation access control (write, append, delete, update) and
|
|
the credibility of information that is read by a process.-
|
|
|
|
The mechanisms that can be used to enforce communica-
|
|
tion integrity have some strong similarities to the mechan-
|
|
isms that are used to enforce discretionary and mandatory
|
|
access controls. Integrity in Part I is concerned with
|
|
access control, specifically the ability of subjects to
|
|
modify objects. This should be contrasted with the Part II
|
|
concerns for communications integrity described below.
|
|
|
|
9.1.1. Authentication
|
|
_ _ _ ______________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
The network should ensure that a data exchange is esta-
|
|
blished with the addressed peer entity (and not with an
|
|
entity attempting a masquerade or a replay of a previous
|
|
establishment). The network should assure that the data
|
|
source is the one claimed. When this service is provided in
|
|
support of a connection-oriented association, it is known as
|
|
Peer Entity Authentication; when it supports a connection-
|
|
less association, it is known as Data Origin Authentication.
|
|
|
|
Attempts to create a session under a false identity or
|
|
playing back a previous legitimate session initiation
|
|
sequence are typical threats for which peer entity
|
|
_________________________
|
|
- See, for example, Biba, K.J., "Integrity Considera-
|
|
tion for Secure Systems," ESD-TR-76-372, MTR-3153, The
|
|
Mitre Corporation, Bedford, MA, April 1977; and Juene-
|
|
man, R. R., "Electronic Document Authentication," IEEE
|
|
____
|
|
Network Magazine, April 1987, pp 17-23.
|
|
_______ ________
|
|
|
|
|
|
authentication is an appropriate countermeasure.
|
|
|
|
Authentication generally follows identification, estab-
|
|
lishing the validity of the claimed identity providing pro-
|
|
tection against fraudulent transactions. Identification,
|
|
authentication, and authorization information (e.g., pass-
|
|
words) should be protected by the network.
|
|
|
|
Available techniques which may be applied to peer
|
|
authentication mechanisms are:
|
|
|
|
1. Something known by the entity (e.g., passwords)
|
|
|
|
2. Cryptographic means
|
|
|
|
3. Use of the characteristics and/or possessions of
|
|
the entity
|
|
|
|
The above mechanisms may be incorporated into the (N)-
|
|
layer peer-to-peer protocol to provide peer entity authenti-
|
|
cation.
|
|
|
|
To tie data to a specific origin, implicit or explicit
|
|
identification information must be derived and associated
|
|
with data. Ad hoc methods exist for authentication which
|
|
may include verification through an alternate communications
|
|
channel, or a user-unique cryptographic authentication.
|
|
|
|
When encryption is used for authentication service, it
|
|
can be provided by encipherment or signature mechanisms. In
|
|
conventional private-key cryptosystems, the encryption of a
|
|
message with a secret key automatically implies data origin
|
|
authenticity, because only the holder of that key can pro-
|
|
duce an encrypted form of a message. However, the kind of
|
|
authentication provided by the conventional private-key
|
|
cryptosystem can protect both sender and receiver against
|
|
third party enemies, but it cannot protect against fraud
|
|
committed by the other. The reason is that the receiver
|
|
knowing the encryption key, could generate the encrypted
|
|
form of a message and forge messages appearing to come from
|
|
the sender. In the case where possible disputes that may
|
|
arise from the dishonesty of either sender or receiver, a
|
|
digital signature scheme is required.
|
|
|
|
In public-key cryptosystems, message secrecy and
|
|
message/sender authenticity are functionally independent.
|
|
To achieve authenticity, the message is "decrypted" with the
|
|
secret key of the sender to provide proof of its origin, but
|
|
that does not conceal the message. If both secrecy and
|
|
authenticity are required, a public-key signature scheme
|
|
must be used. This subject is extensively addressed in the
|
|
ISO/CCITT context of Directory authentication=.
|
|
_________________________
|
|
= The Directory - Authentication Framework (Mel-
|
|
___ _________ ______________ _________ ___
|
|
bourne, April 1986), ISO/CCITT Directory Convergence
|
|
______ _____ ____
|
|
Document #3.
|
|
|
|
|
|
|
|
Basis for Rating: Presence or absence.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
The security provided by the passwords mechanism is
|
|
very sensitive to how passwords are selected and protected.
|
|
The security provided by a password depends on composition,
|
|
lifetime, length, and protection from disclosure and substi-
|
|
tution. Password Management Guidance is contained in a
|
|
separate document-.
|
|
|
|
When cryptographic techniques are used, they may be
|
|
combined with "hand-shaking" protocols and "liveness"
|
|
assurance procedures to protect against masquerading and
|
|
replay. The "liveness" assurance procedures may be provided
|
|
by:
|
|
|
|
1. Synchronized clocks
|
|
|
|
2. Two and three ways handshakes
|
|
|
|
3. Non-repudiation services provided by digital sig-
|
|
nature and/or notarization mechanisms
|
|
|
|
The strength of the ciphers, the correctness of the
|
|
protocol logic, and the adequacy of implementation are three
|
|
primary factors in assessing the strength of authentication
|
|
using cryptography techniques. See also the Encryption
|
|
Mechanism section.
|
|
|
|
Basis for Rating: In order to obtain a rating of good
|
|
using passwords, such usage must conform to Password Manage-
|
|
ment Guidance-. The strength of a cryptographic mechanism
|
|
will be provided by the National Security Agency.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for rating assurance is concerned with guarantee-
|
|
ing or providing confidence that features to address authen-
|
|
tication threats have been implemented correctly and that
|
|
the control objectives of each feature have been actually
|
|
and accurately achieved.
|
|
|
|
This assurance may be addressed by analysis of the
|
|
strength of the authentication exchange mechanism. This
|
|
includes password scheme and/or cryptographic algorithm
|
|
analysis and the automated protocol testing for deadlock,
|
|
_________________________
|
|
- Department of Defense Password Management Guide-
|
|
__________ __ _______ ________ __________ _____
|
|
line, National Computer Security Center, CSC-STD-002-
|
|
____
|
|
85, 12 April 1985.
|
|
|
|
|
|
|
|
liveness, and other security properties of the "hand-
|
|
shaking" protocols.
|
|
|
|
Many of the assurance approaches are common to other
|
|
security services. See the General Assurance Approaches
|
|
section for further information. Cryptographic mechanisms
|
|
may be employed for peer entity authentication. These
|
|
mechanisms, and their assurance, are discussed in a separate
|
|
section.
|
|
|
|
Basis for Rating: See the General Assurance Approaches
|
|
section.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
9.1.2. Communications Field Integrity
|
|
_ _ _ ______________ _____ _________
|
|
|
|
Communications Field Integrity refers to protection of
|
|
any of the fields involved in communications from unauthor-
|
|
ized modification. Two well-known fields are the protocol-
|
|
information (a.k.a. header) field and the user-data field.
|
|
A protocol-data-unit (PDU) (a.k.a. packet, datagram) always
|
|
contains protocol-information; user-data is optional.
|
|
|
|
Other division and identification of fields are possi-
|
|
ble. Some communications systems identify such fields as
|
|
control and priority. For generality, this section refers
|
|
to any field as containing data; this data may in fact be
|
|
protocol-information or the contents of some other identi-
|
|
fied field. For convenience, the term data integrity will
|
|
be used synonymously with communications field integrity.
|
|
Data integrity may be provided on a selective field basis;
|
|
some selection may be made by the network architect, some
|
|
selection may be made by the network administration, and
|
|
some may be left to the user.
|
|
|
|
It should be mentioned that in a layered protocol the
|
|
combination of layer N protocol-information plus layer N
|
|
user-data is considered to be all user-data in layer N-1.
|
|
It is also important to note the definition of a message and
|
|
the relationship between PDUs and messages. Each PDU may
|
|
constitute an independent message, or a sequence of PDUs may
|
|
constitute a single message.
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
Data integrity service counters active threats and pro-
|
|
tects data against unauthorized alteration. The network
|
|
should ensure that information is accurately transmitted
|
|
from source to destination (regardless of the number of
|
|
intermittent connecting points). The network should be able
|
|
to counter both equipment failure as well as actions by per-
|
|
sons and processes not authorized to alter the data. Proto-
|
|
cols that perform code or format conversion will preserve
|
|
the integrity of data and control information.
|
|
|
|
The network should also have an automated capability of
|
|
testing for, detecting, and reporting errors that exceed a
|
|
threshold.
|
|
|
|
Since communication may be subject to jamming/spoofing
|
|
attack, line and node outages, hardware and software
|
|
failures, and active wiretapping attacks, there should exist
|
|
effective countermeasures to counter possible communications
|
|
threats. The countermeasures may include policy, procedures,
|
|
automated or physical controls, mechanisms, and protocols
|
|
means.
|
|
|
|
Basis for Rating: Data Integrity service may be
|
|
evaluated according to its ability to detect integrity vio-
|
|
lations. The following progression relates features and
|
|
evaluation.
|
|
|
|
Functionality would be evaluated as minimum if either
|
|
of the following two levels of features were provided:
|
|
|
|
1. Integrity of a single connectionless PDU. This
|
|
takes the form of determining whether a received
|
|
PDU has been modified.
|
|
|
|
2. Integrity of selected fields within a connection-
|
|
less PDU. This takes the form of determining
|
|
whether the selected fields have been modified.
|
|
|
|
Functionality would be evaluated as fair if, in addi-
|
|
tion, either of the following two levels of features were
|
|
provided:
|
|
|
|
1. Integrity of selected fields transferred over a
|
|
connection. This takes the form of determining
|
|
whether the selected fields have been modified,
|
|
inserted, deleted, or replayed.
|
|
|
|
2. Integrity of all user-data on a protocol layer
|
|
connection. This service detects any modifica-
|
|
tion, insertion, deletion, or replay of any PDU of
|
|
an entire PDU sequence with no recovery attempted.
|
|
|
|
Functionality would be evaluated as good if, in addi-
|
|
tion, the following feature is provided:
|
|
|
|
Integrity of all user-data on a protocol layer con-
|
|
nection. This service detects any modification,
|
|
insertion, deletion, or replay of any PDU of an
|
|
entire PDU sequence with recovery attempted.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Policy, procedures, automated or physical controls,
|
|
mechanisms, and protocols should exist for ensuring that
|
|
data has not been subject to excessive random errors and
|
|
unauthorized message stream modification, such as altera-
|
|
tion, substitution, reordering, replay, or insertion. Mes-
|
|
sage stream modification (MSM) countermeasures should be
|
|
identified and shown to be effective. A technology of ade-
|
|
quate strength should be selected to resist MSM.
|
|
|
|
The probability of an undetected error should be speci-
|
|
fied as an indication of the strength of mechanism. The net-
|
|
work should have an automated capability for testing,
|
|
detecting, reporting, and/or recovering from those communi-
|
|
cation errors/corruptions that exceed specified network
|
|
requirements.
|
|
|
|
Basis for Rating: When encryption is used in networks,
|
|
it is combined with network protocols to protect against
|
|
unauthorized data modification. The strength of the
|
|
ciphers, the correctness of the protocol logic, and the ade-
|
|
quacy of implementation are three primary factors in assess-
|
|
ing the strength of Data Integrity using cryptography tech-
|
|
niques. See the Encryption Mechanism section for further
|
|
information.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for rating: Assurance is concerned with guaran-
|
|
_____ ___ ______
|
|
teeing or providing confidence that features to address Data
|
|
Integrity threats have been implemented correctly and that
|
|
the control objectives of each feature have been actually
|
|
and accurately achieved.
|
|
|
|
Many of the assurance approaches for data integrity are
|
|
common to other security services. See the General
|
|
Assurance section for further information.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
9.1.3. Non-repudiation
|
|
_ _ _ ___ ___________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
Non-repudiation service provides unforgeable proof of
|
|
shipment and/or receipt of data.
|
|
|
|
This service prevents the sender from disavowing a leg-
|
|
itimate message or the recipient from denying receipt. The
|
|
network may provide either or both of the following two
|
|
forms:
|
|
|
|
1. The recipient of data is provided with proof of
|
|
origin of data that will protect against any
|
|
attempt by the sender to falsely deny sending the
|
|
data or its contents.
|
|
|
|
2. The sender is provided with proof of delivery of
|
|
data such that the recipient cannot later deny
|
|
receiving the data or its contents.
|
|
|
|
Basis for Rating: Presence or absence of each of the
|
|
two forms.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
Discussion: Digital signatures are available techniques
|
|
that may be applied to non-repudiation mechanisms. Digital
|
|
signature mechanisms define two procedures:
|
|
|
|
1. Signing a data unit
|
|
|
|
2. Verifying a signed data unit
|
|
|
|
The signing process typically employs either an enci-
|
|
pherment of the data unit or the production of a crypto-
|
|
graphic checkfunction of the data unit, using the signer's
|
|
private information as a private key.
|
|
|
|
The verification process involves using the public pro-
|
|
cedure and information to determine whether the signature
|
|
was produced with the signer's private key.
|
|
|
|
It is essential that the signature mechanism be
|
|
unforgeable and adjudicable. This means that the signature
|
|
can only be produced using the signer's private information,
|
|
and in case the signer should disavow signing the message,
|
|
it must be possible for a judge or arbitrator to resolve a
|
|
dispute arising between the signer and the recipient of the
|
|
message.
|
|
|
|
Digital signature schemes are usually classified into
|
|
one of two categories: true signatures or arbitrated signa-
|
|
tures. In a true signature scheme, signed messages produced
|
|
by the sender are transmitted directly to the receiver who
|
|
verifies their validity and authenticity. In an arbitrated
|
|
signature scheme, all signed messages are transmitted from
|
|
the sender to the receiver via an arbitrator who serves as a
|
|
notary public. In the latter case, a notarization mechanism
|
|
is needed.
|
|
|
|
Both public-key and conventional private-key cryptosys-
|
|
tems can be utilized to generate digital signatures. When a
|
|
message M is to be signed by a private-key cryptosystem, the
|
|
signature is a computed quantity catenated to M and sent
|
|
along with it. In a public-key implementation, when a mes-
|
|
sage M is to be signed, a transformation using the secret
|
|
key is applied to M before transmitting it. Thus, the signa-
|
|
ture is presented by the resulting transformed message.
|
|
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Basis for Rating: The strength and trustworthiness
|
|
given to non-repudiation service is bounded by the trust in
|
|
the underlying cryptography implementing digital signature
|
|
mechanism, the correctness of the protocol logic, and the
|
|
adequacy of protocol implementation. Additional information
|
|
may be found in the separate sections addressing these sub-
|
|
jects.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for Rating: Assurance is concerned with guaran-
|
|
teeing or providing confidence that features to provide
|
|
non-repudiation service have been implemented correctly and
|
|
that the control objectives of each feature have been actu-
|
|
ally and accurately achieved.
|
|
|
|
This assurance is addressed by analysis of the logic of
|
|
the protocols and the implementation of the digital signa-
|
|
ture mechanisms to show correctness and effectiveness by
|
|
formal methods where possible (i.e., where tools exist) and
|
|
informal ones otherwise.
|
|
|
|
The information in the General Assurance, Encryption
|
|
Mechanisms, and Protocols sections also applies.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
9.2. Denial of Service
|
|
_ _ ______ __ _______
|
|
|
|
Assurance of communications availability would probably
|
|
be more properly identified as a service, while denial-of-
|
|
service (DOS) would be identified as a threat. However, it
|
|
is traditional to employ denial of service as the identifier
|
|
of this topic.
|
|
|
|
DOS detection is highly dependent on data integrity
|
|
checking/detection mechanisms. Other mechanisms relating to
|
|
data ordering, modification, loss, or replay (e.g., sequence
|
|
numbers, frame counts) are also measures of DOS protection.
|
|
|
|
A denial-of-service condition exists whenever the
|
|
throughput falls below a pre-established threshold, or
|
|
access to a remote entity is unavailable. DOS also exists
|
|
when resources are not available to users on an equitable
|
|
basis. Priority and similar mechanisms should be taken into
|
|
account in determining equity. If a connection is active, a
|
|
DOS condition can be detected by the maximum waiting time
|
|
(MWT) or the predetermined minimum throughput. However,
|
|
when a connection is quiescent, a protocol entity at one end
|
|
of a connection has no way of determining when the next
|
|
packet should arrive from its corresponding peer entity. It
|
|
is thus unable to detect a DOS attack that completely cuts
|
|
off the flow of packets from that entity.
|
|
|
|
Denial of service conditions should be considered for
|
|
all services being provided by the network. As discussed
|
|
below for specific services, depending on the strength of
|
|
mechanism the network should be able to detect, recover,
|
|
and/or resist denial of service conditions. The specific
|
|
conditions, which the network will address, are determined
|
|
through the use of informal models, such as Mission(s)
|
|
Model, Threat Model, Life Cycle Model, and Service Oriented
|
|
Model. The network manager or sponsor shall determine the
|
|
network's denial of service requirements and shall establish
|
|
the desired service criteria accordingly.
|
|
|
|
9.2.1. Continuity of Operations
|
|
_ _ _ __________ __ __________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
The security features providing resistance against DOS
|
|
external attacks and the objectives that each feature will
|
|
achieve may include the following:
|
|
|
|
1. Use of active or passive replacement or other forms
|
|
of redundancy throughout the network components
|
|
(i.e., network nodes, connectivity, and control
|
|
capability) may enhance reliability, reduce single-
|
|
point-of-failure, enhance survivability, and provide
|
|
excess capacity.
|
|
|
|
2. Reconfiguration to provide network software mainte-
|
|
nance and program down-loading to network nodes for
|
|
software distribution, and to provide initialization
|
|
and reconfiguration after removing failed or faulty
|
|
components and replacing with replaced components
|
|
can isolate and/or confine network failures, accom-
|
|
modate the addition and deletion of network com-
|
|
ponents, and circumvent a detected fault.
|
|
|
|
3. Distribution and flexibility of network control
|
|
functions utilizing a distributed control capability
|
|
to reduce or eliminate the possibility of disabling
|
|
the network by destroying or disabling one or a few
|
|
network control facilities, and a flexible control
|
|
capability which is able to respond promptly to
|
|
emergency needs, such as increase in traffic or
|
|
quick restoration, can improve the capability to
|
|
respond promptly to the changes in network topology
|
|
and network throughput thereby enhancing survivabil-
|
|
ity and continuity of operation, perhaps by enforc-
|
|
ing precedence and preemption on traffic handling.
|
|
|
|
4. Fault tolerance mechanisms provide a capability to
|
|
deal with network failures and to maintain con-
|
|
tinuity of operations of a network including the
|
|
following features: error/fault detection, fault
|
|
treatment, damage assessment (analysis on effects of
|
|
failures), error/failure recovery, component/segment
|
|
crash recovery, and whole network crash recovery.
|
|
|
|
5. Security controls could include community of
|
|
interest separation through creation of logical sub-
|
|
nets with disjoint non-hierarchical mandatory access
|
|
control categories, and protection of control infor-
|
|
mation from active wiretapping.
|
|
|
|
Basis for Rating: The network should ensure some
|
|
minimum specified continuing level of service. The follow-
|
|
ing service would be considered minimum:
|
|
|
|
a) Detect conditions that would degrade service below
|
|
a pre-specified minimum and would report such
|
|
degradation to its operators.
|
|
|
|
The following service would be considered fair:
|
|
|
|
b) Service that would continue in the event of equip-
|
|
ment failure and actions by persons and processes
|
|
not authorized to alter the data. The resiliency
|
|
may be provided by redundancy, alternate facili-
|
|
ties, or other means. The service provided may be
|
|
degraded and/or may invoke priorities of service.
|
|
|
|
The following service would be considered good:
|
|
|
|
c) The same as (a), but with automatic adaptation.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Network operational maintenance is based on mechanisms
|
|
whose robustness may decrease inversely with network load-
|
|
ing. It may be nearly impossible to guarantee sufficiently
|
|
robust testing, regardless of whether done off-line with
|
|
simulated loading or operationally.
|
|
|
|
In addition to rigorous analysis to assure algorithmic
|
|
correctness in dealing with the "internal failures" (e.g.,
|
|
component, segment, or system failures caused by errors in
|
|
resource allocation policy or mechanism implementation),
|
|
countermeasures shall also be employed against "external
|
|
attacks" such as physical attacks.
|
|
|
|
Basis for Rating: For each DOS feature defined above,
|
|
it is possible to assign a rating such as none, minimum,
|
|
fair, and good for the assessment of a network's "DOS
|
|
strength" with respect to that particular feature.
|
|
|
|
For example, major ways of providing fault-tolerant
|
|
mechanisms include:
|
|
|
|
1. Error/fault detection
|
|
|
|
2. Fault treatment
|
|
|
|
3. Damage assessment (analysis on effects of
|
|
failures)
|
|
|
|
4. Error/failure recovery
|
|
|
|
5. Component/segment crash recovery
|
|
|
|
6. Whole network crash recovery
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Assurance is concerned with guaranteeing or providing
|
|
confidence that features to address DOS threats have been
|
|
implemented correctly and that the objectives of each
|
|
feature have been actually and accurately achieved.
|
|
|
|
This assurance may be addressed by analysis for weak-
|
|
ness or anomalous behavior of the resource allocation
|
|
policy/mechanisms of the network using various formal models
|
|
such as queuing theoretic models, hierarchical service
|
|
models, protocol models, or resource allocation models which
|
|
can be analyzed for deadlock, liveness, and other security
|
|
properties.
|
|
|
|
Basis for Rating: To provide assurance that the network
|
|
can respond to various forms of denial of service condi-
|
|
tions, the following methods may be employed:
|
|
|
|
1. Simulation
|
|
|
|
2. Testing
|
|
|
|
a. Functional
|
|
|
|
b. Periodic
|
|
|
|
c. Penetration
|
|
|
|
3. Measurement under extreme conditions
|
|
|
|
Distribution, as discussed as one of the General
|
|
Assurance Factors, can increase the assurance that the
|
|
software deployed is authentic and appropriate in the con-
|
|
text of deployment of new software and in crash recovery.
|
|
In addition, development in a closed environment can
|
|
increase assurance.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
9.2.2. Protocol Based DOS Protection Mechanisms
|
|
_ _ _ ________ _____ ___ __________ __________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
Mechanisms for addressing DOS are often protocol based
|
|
and may involve testing or probing. Any communications
|
|
availability service should consider using existing communi-
|
|
cations protocol mechanisms where feasible so as not to
|
|
increase network overhead. DOS mechanisms add overhead that
|
|
may have some adverse impact on network performance. The
|
|
benefits of value-added functions should offset the resul-
|
|
tant performance cost.
|
|
|
|
For example, in order to detect throughput denial of
|
|
service, a process may exist to measures the transmission
|
|
rate between peer entities under conditions of input queu-
|
|
ing. The measured transmission rate shall be compared with
|
|
a predetermined minimum to detect a DOS condition and
|
|
activate an alarm.
|
|
|
|
Another example is a protocol to detect failure to
|
|
respond within a predetermined time between peer entities.
|
|
This protocol would determine the remote entity's ability to
|
|
respond to the protocol.
|
|
|
|
A request-response mechanism such as "are-you-there"
|
|
message exchange may be employed to detect DOS conditions
|
|
when the connection is quiescent. The request-response
|
|
mechanism involves the periodic exchange of "hello", and
|
|
"are-you-there" messages between peer entities to verify
|
|
that an open path exists between them; such a mechanism
|
|
should be protected against selective message passing.
|
|
Based on the ability to respond and the response time to the
|
|
request-response mechanism, the "availability" of a remote
|
|
entity can be determined and the DOS condition can be
|
|
detected.
|
|
|
|
Request-response mechanisms have been known to crash
|
|
networks when coupled with hardware failures and/or abnormal
|
|
loading. Incompatibilities also sometimes show up when dis-
|
|
similar networks are interconnected. Any polling sequence
|
|
should probably be metered to prevent creating a DOS condi-
|
|
tion.
|
|
|
|
Basis for Rating: The number of protocol based mechan-
|
|
isms could be used for evaluation. If only one mechanism
|
|
were provided, the functionality might be rated as minimum.
|
|
If two or three mechanisms were provided, the functionality
|
|
might be rated as fair. If more than three mechanisms were
|
|
provided, the functionality might be rated as good.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Basis for Rating: Network protocol robustness may
|
|
decrease inversely with network loading. Testing, off-line
|
|
with simulated loading or operationally, and rigorous
|
|
analysis to assure protocol correctness in dealing with the
|
|
"internal failures" and against "external attacks" are
|
|
appropriate ways of establishing strength of mechanism.
|
|
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Assurance is concerned with guaranteeing or providing
|
|
confidence that features to address DOS threats have been
|
|
implemented correctly and that the objectives of each
|
|
feature have been actually and accurately achieved.
|
|
|
|
Basis for Rating: This assurance may be addressed by
|
|
analysis for weakness or anomalous behavior of the network
|
|
protocols using various formal models such as queuing
|
|
theoretic models, hierarchical service models, petri nets,
|
|
or resource allocation models which can be analyzed for
|
|
deadlock, liveness, and other security properties.
|
|
|
|
To provide assurance that the network can response to
|
|
various forms of external attacks, the following methods may
|
|
be employed:
|
|
|
|
1. simulation
|
|
|
|
2. testing
|
|
|
|
- functional
|
|
|
|
- periodic
|
|
|
|
- penetration
|
|
|
|
3. measurement under extreme conditions
|
|
|
|
Distribution, as discussed as one of the General
|
|
Assurance Factors, can increase the assurance that the
|
|
software deployed is authentic and appropriate in the con-
|
|
text of deployment of new software and in crash recovery.
|
|
In addition, development in a closed environment can
|
|
increase assurance.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
9.2.3. Network Management
|
|
_ _ _ _______ __________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
DOS resistance based on a system/message integrity
|
|
measure is two- tiered. Tier one deals with communications
|
|
protocols. Tier two addresses network management (and
|
|
maintenance). These tiers for the most part operate
|
|
independently.
|
|
|
|
Network management and maintenance in tier two deals
|
|
with network health, detecting failures and overt acts that
|
|
result in denial or reduced service. Simple throughput may
|
|
not necessarily be a good measure of proper performance.
|
|
Loading above capacity, flooding, replays, and protocol
|
|
retry due to noise in the channel can reduce service below
|
|
an acceptable level and/or cause selective outages. Manage-
|
|
ment protocols, such as those which configure the network or
|
|
monitor its performance, are not described well by the
|
|
existing protocol reference models.
|
|
|
|
A DOS attack may cause disruption of more than one peer
|
|
entity association. For this reason detection and correc-
|
|
tion may be implemented in tier two. The detection of a
|
|
potential DOS condition by a peer entity should be reported
|
|
by the layer management functions of those entities. The
|
|
determination of a DOS attack is an application management
|
|
function, and the corrective action is a system management
|
|
function.
|
|
|
|
Basis for Rating: Presence or absence.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Network operational maintenance is based on mechanisms
|
|
whose robustness may decrease inversely with network loading
|
|
(e.g., update of routing tables).
|
|
|
|
Basis for Rating: Integrity and adequacy of control in
|
|
a network are the keys in coping with denial of service con-
|
|
ditions. In addition to rigorous analysis to assure algo-
|
|
rithmic correctness in dealing with the "internal failures"
|
|
(e.g., component, segment, or system failures caused by
|
|
errors in resource allocation policy or mechanism implemen-
|
|
tation), countermeasures shall also be employed against
|
|
"external attacks," such as physical attacks and attacks
|
|
against network control.
|
|
|
|
Based on these characterizations, a set of ratings can
|
|
be assigned to each category under the fault tolerance
|
|
feature and an overall rating can then be determined for a
|
|
network's strength in providing "fault tolerance mechan-
|
|
isms".
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for Rating: Assurance may be addressed by
|
|
analysis for weakness or anomalous behavior of the network
|
|
management policy/mechanisms of the network using various
|
|
formal models such as queuing theoretic models, hierarchical
|
|
service models, protocol models, or resource allocation
|
|
models which can be analyzed for deadlock, liveness, and
|
|
other security properties.
|
|
|
|
Distribution, as discussed as one of the General
|
|
Assurance Factors, can increase the assurance that the
|
|
software deployed is authentic and appropriate in the con-
|
|
text of deployment of new software and in crash recovery.
|
|
In addition, development in a closed environment can
|
|
increase assurance.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
9.3. Compromise Protection
|
|
_ _ __________ __________
|
|
|
|
Compromise protection is a collective term for a number
|
|
of security services. These services, described below, are
|
|
all concerned with the secrecy, or non-disclosure of infor-
|
|
mation transfer between peer entities through the computer
|
|
communications network. Physical security, such as pro-
|
|
tected wireways, can also provide transmission security. The
|
|
network manager or sponsor must decide on the balance
|
|
between physical, administrative, and technical security.
|
|
This document only addresses technical security.
|
|
|
|
9.3.1. Data Confidentiality
|
|
_ _ _ ____ _______________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
Data confidentiality service protects data against
|
|
unauthorized disclosure. Data confidentiality is mainly
|
|
compromised by passive wiretapping attacks. Passive attacks
|
|
consist of observation of information passing on a link.
|
|
Release of message content to unauthorized users is the fun-
|
|
damental compromise.
|
|
|
|
Prevention of release of message contents can be accom-
|
|
plished by applying an encryption mechanism. (See also the
|
|
Encryption Mechanism section.) The granularity of key dis-
|
|
tribution is a trade-off between convenience and protection.
|
|
Fine granularity would employ a unique key for each sensi-
|
|
tivity level for each session; coarse granularity would
|
|
employ the same key for all sessions during a time period.
|
|
|
|
The network must provide protection of data from unau-
|
|
thorized disclosure. Confidentiality can have the following
|
|
features:
|
|
|
|
1. Confidentiality of all user-data on a specific
|
|
protocol layer connection. Note: depending on use
|
|
and layer, it may not be appropriate to protect
|
|
all data, e.g., expedited data or data in a con-
|
|
nection request.
|
|
|
|
2. Confidentiality of all user-data in a single con-
|
|
nectionless datagram
|
|
|
|
3. Confidentiality of selected fields within the
|
|
user-data of an PDU
|
|
|
|
Basis for Rating: Presence or absence of each feature.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Physical protection and encryption are the fundamental
|
|
techniques for protecting data from compromise. Through
|
|
their use, release of message content and traffic analysis
|
|
can be prevented.
|
|
|
|
Basis for Rating: The evaluation of data confidential-
|
|
ity mechanisms is outside the scope of this document. The
|
|
cognizant authorities will evaluate the mechanisms relative
|
|
to a specific environment according to their own rules and
|
|
procedures.
|
|
|
|
Evaluation Range: Sensitivity level of data approved to
|
|
protect.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis of rating: Assurance is concerned with guarantee-
|
|
_____ __ ______
|
|
ing or providing confidence that features to address Data
|
|
Confidentiality threats have been implemented correctly and
|
|
that the control objectives of each feature have been actu-
|
|
ally and accurately achieved. Blacker is an example of such
|
|
an application of a TCB for high assurance of data confiden-
|
|
tiality.
|
|
|
|
Many of the assurance approaches for data confidential-
|
|
ity are common to other security services. See the General
|
|
Assurance section for further information.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
9.3.2. Traffic Flow Confidentiality
|
|
_ _ _ _______ ____ _______________
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
Traffic flow confidentiality service protects data
|
|
against unauthorized disclosure. Traffic analysis is a
|
|
compromise in which analysis of message length, frequency,
|
|
and protocol components (such as addresses) results in
|
|
information disclosure through inference.
|
|
|
|
Traffic flow confidentiality is concerned with masking
|
|
the frequency, length, and origin-destination patterns of
|
|
communications between protocol entities. Encryption can
|
|
effectively and efficiently restrict disclosure above the
|
|
transport layer; that is, it can conceal the process and
|
|
application but not the host computer node.
|
|
|
|
The OSI Addendum- notes: "Traffic padding mechanisms
|
|
can be used to provide various levels of protection against
|
|
traffic analysis. This mechanism can be effective only if
|
|
the traffic padding is protected by a confidentiality
|
|
_________________________
|
|
- ISO 7498/Part 2 - Security Architecture, ISO / TC
|
|
___ ____ ____ _ ________ ____________
|
|
97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
|
|
Project 97.21.18, September 1986.
|
|
|
|
|
|
service."
|
|
|
|
Basis for Rating: Presence or absence.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Physical protection, encryption, and traffic padding
|
|
are the fundamental countermeasures for traffic analysis.
|
|
|
|
Basis for Rating: The evaluation of traffic confiden-
|
|
_____ ___ ______
|
|
tiality mechanisms are outside the scope of this document.
|
|
The cognizant authorities will evaluate the mechanisms rela-
|
|
tive to a specific environment according to their own rules
|
|
and procedures.
|
|
|
|
Evaluation Range: Sensitivity level of data approved to
|
|
protect.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for rating: Assurance is concerned with guaran-
|
|
_____ ___ ______
|
|
teeing or providing confidence that features to address
|
|
Traffic Confidentiality threats have been implemented
|
|
correctly and that the control objectives of each feature
|
|
have been actually and accurately achieved.
|
|
|
|
Many of the assurance approaches for traffic confiden-
|
|
tiality are common to other security services. See the Gen-
|
|
eral Assurance section for further information.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
9.3.3. Selective Routing
|
|
_ _ _ _________ _______
|
|
|
|
+ Functionality
|
|
_____________
|
|
|
|
"Routing control is the application of rules during the
|
|
process of routing so as to choose or avoid specific net-
|
|
works, links or relays-.... Routes can be chosen either
|
|
dynamically or by prearrangement so as to use only physi-
|
|
cally secure sub-networks, relays, or links. End-systems
|
|
may, on detection of persistent manipulation attacks, wish
|
|
to instruct the network service provider to establish a con-
|
|
nection via a different route. Data carrying labels may be
|
|
forbidden by the security policy to pass through certain
|
|
sub-networks, relays or links. Also the initiator of a con-
|
|
nection (or the sender of a connectionless data unit) may
|
|
specify routing caveats requesting that specific sub-
|
|
networks, links or relays be avoided."
|
|
_________________________
|
|
- ISO 7498/Part 2 - Security Architecture, ISO / TC
|
|
___ ____ ____ _ ________ ____________
|
|
97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
|
|
Project 97.21.18, September 1986.
|
|
|
|
|
|
For example, there are national laws and network
|
|
administration policies governing individual privacy rights,
|
|
encryption, and trans-border data flow. A user in a end
|
|
system may wish to specify countries through which certain
|
|
information should not flow.
|
|
|
|
Basis for Rating: Presence or absence.
|
|
|
|
Evaluation Range: None or present.
|
|
|
|
+ Strength of Mechanism
|
|
________ __ _________
|
|
|
|
Basis for Rating: The factors discussed under Suppor-
|
|
tive Primitives (Section 7) apply.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
+ Assurance
|
|
_________
|
|
|
|
Basis for Rating: The General Assurance Approaches
|
|
apply.
|
|
|
|
Evaluation Range: None to good.
|
|
|
|
|
|
Table II-1. Part II Assurance Rating Relationship to Part I Evaluation
|
|
_____ __ _ ____ __ _________ ______ ____________ __ ____ _ __________
|
|
|
|
|
|
(note: Table not included)
|
|
|
|
|
|
|
|
|
|
|
|
Table II-2. Evaluation Structure for the Network Security Services
|
|
_____ __ _ __________ _________ ___ ___ _______ ________ ________
|
|
|
|
(note: Table not included)
|
|
|
|
|
|
|
|
|
|
Appendix A
|
|
________ _
|
|
|
|
|
|
Evaluation of Network Components
|
|
__________ __ _______ __________
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A.1. Purpose
|
|
_ _ _______
|
|
|
|
Part I of this Trusted Network Interpretation (TNI)
|
|
provides interpretations of the Trusted Computer Security
|
|
Evaluation Criteria (TCSEC) appropriate for evaluating a
|
|
network of computer and communication devices as a single
|
|
system with a single Trusted Computing Base (TCB), called
|
|
the Network Trusted Computing Base (NTCB), which is physi-
|
|
cally and logically partitioned among the components of the
|
|
network. These interpretations stem from the recognition
|
|
that networks form an important and recognizable subclass of
|
|
ADP systems with distinctive technical characteristics that
|
|
allow tailored interpretations of the TCSEC to be formulated
|
|
for them.
|
|
|
|
An extension of this view of networks can be taken:
|
|
that a trusted network represents a composition of trusted
|
|
components. This view is sound, consistent with the first,
|
|
and useful. The approach to evaluation of a network sug-
|
|
gested by this view is to partition the system into com-
|
|
ponents, rate each component to determine its security-
|
|
relevant characteristics, and then evaluate the composition
|
|
of the components to arrive at an overall rating class for
|
|
the network. This approach aids in the assigning of an
|
|
overall network evaluation class in two ways: 1) it allows
|
|
for the evaluation of components which in and of themselves
|
|
do not support all the policies required by the TCSEC (which
|
|
will then contribute to the overall evaluation of any net-
|
|
work which uses the evaluated component), and 2) it allows
|
|
for the reuse of the evaluated component in different net-
|
|
works without the need for a re-evaluation of the component.
|
|
|
|
This approach to evaluation does not negate or override
|
|
any of the interpretations presented in Part I of this docu-
|
|
ment, which describe the global characteristics of a trusted
|
|
network. In order to present a unified and self-consistent
|
|
exposition within Part I of the document, a deliberate
|
|
choice was made to express the basic network interpretations
|
|
in terms of the view that networks are instances of ADP sys-
|
|
tems to which the TCSEC are applied on a system-wide basis.
|
|
This choice allows Part I to follow the TCSEC closely
|
|
because the basic structural model underlying the TCSEC,
|
|
that of a system with a single Trusted Computer Base (TCB),
|
|
has not been altered.
|
|
|
|
This appendix provides guidance for the evaluation of
|
|
the individual components of a trusted network. The com-
|
|
ponent evaluation guidelines constitute a refinement and
|
|
application of the total network interpretations expressed
|
|
within Part I and Part II of this document, and are intended
|
|
to support the eventual evaluation of a network or network
|
|
subsystem product to attain an overall network class using
|
|
the Part I interpretations. Note that Part II applies to
|
|
components without further interpretation. No implication
|
|
is intended in this appendix that all networks must be com-
|
|
posed from evaluated components: it is conceivable that a
|
|
complete network could be evaluated as a whole using the
|
|
system interpretations presented in Part I. In many practi-
|
|
cal cases, however, the techniques presented here for con-
|
|
sidering first the individual components, and then their
|
|
composition into an evaluatable whole, constitutes a viable
|
|
and attractive means for actually conducting the evaluation
|
|
of the system under Part I interpretations.
|
|
|
|
Three major issues must be confronted by the architect
|
|
or evaluator of a trusted system when the partitioned
|
|
viewpoint is applied:
|
|
|
|
1. How is the network to be partitioned in such a way
|
|
that evaluation of individual components will sup-
|
|
port eventual evaluation of the entire network?
|
|
|
|
2. What evaluation criteria should be applied to each
|
|
component when rating that component?
|
|
|
|
3. How can the composition of rated components be
|
|
evaluated?
|
|
|
|
The first of these issues is addressed in the separate
|
|
Appendix B, Rationale Behind NTCB Partitions. The remaining
|
|
two issues are addressed in this Appendix: the first, in
|
|
section A.1.1 and section A.3, and the last in section A.2.
|
|
|
|
Section A.1.1 presents a taxonomy (classification
|
|
scheme) for processing components based upon subordinate
|
|
policy elements to be enforced, as well as the rating struc-
|
|
ture for individual components.
|
|
|
|
Section A.2 presents techniques and guidelines for the
|
|
composition of rated processing components to achieve par-
|
|
ticular system ratings for the assembled network. This gui-
|
|
dance is based on characterizing each component according to
|
|
the policy elements supported where these are organized into
|
|
the four broad policy areas of Mandatory Access Controls,
|
|
Discretionary Access Controls, Identification and Authenti-
|
|
cation, and Audit support.
|
|
|
|
Section A.3 presents specific evaluation guidance in
|
|
terms of the network interpretations articulated in Part I
|
|
of this document, to allow individual processing components
|
|
to be rated preparatory to their utilization in a trusted
|
|
network. The sections are organized according to component
|
|
type, as defined in section A.1.1. For each component type,
|
|
the applicable interpretations, from Part I, are provided,
|
|
organized according to rating class.
|
|
|
|
A.1.1. Component Taxonomy and Rating Structure
|
|
_ _ _ _________ ________ ___ ______ _________
|
|
|
|
The primary difference between a processing component,
|
|
regarded as part of a larger network system, and regarded as
|
|
a stand-alone ADP system is that as a stand-alone system all
|
|
of the TCSEC requirements for a particular class must be
|
|
met: for policy requirements (i.e., what features the sys-
|
|
tem must support) the intent of the TCSEC is to enforce a
|
|
collection of features which are felt to be operationally
|
|
complete and consistent for a total system. In the context
|
|
of a larger system, however, it may well be (and usually is)
|
|
the case that the set of policy-related features to be sup-
|
|
ported by the component need not be the complete set
|
|
required for a stand-alone system: features not supplied by
|
|
one component for the system are supplied by another.
|
|
|
|
In rating a product for potential use as a network com-
|
|
ponent, we would like, in theory, to be able to characterize
|
|
its security properties exactly: in practice, we shall be
|
|
content to identify the component as being of a particular
|
|
type (which identifies the general policy elements the com-
|
|
ponent supports) and of a particular evaluation class (which
|
|
identifies the assurance levels provided for each supported
|
|
feature), and the target architecture. The description of
|
|
the target architecture shall include a description of the
|
|
services that must be provided by other devices.
|
|
|
|
In order to limit the number of component types we
|
|
break the ``maximal'' set of policy-related features,
|
|
defined by the TCSEC for A1 systems, into four relatively
|
|
independent categories which can be characterized as sup-
|
|
porting Mandatory Access Controls (MAC), Discretionary
|
|
Access Controls (DAC), Audit, and Identification and Authen-
|
|
tication. (In various tables and text in the remainder of
|
|
this appendix, these categories will be given the one-letter
|
|
designations M, D, A, and I, respectively).
|
|
|
|
A given component can be intended (by the component
|
|
sponsor) or required (by the network sponsor) to provide any
|
|
combination of M, D, A or I functionality. Logically, then,
|
|
there are sixteen different component types which can be
|
|
rated using the guidelines of section A.3, corresponding to
|
|
the sixteen possible combinations of M, D, A, and I theoret-
|
|
ically possible. Of these combinations one (no M, no D, no
|
|
A, no I) typifies a component intended (or required) to
|
|
enforce no security policy whatsoever, and therefore has no
|
|
TCSEC requirements to meet and need not be evaluated. How-
|
|
ever, it is still possible to utilize such components as
|
|
part of a secure network system, if the architecture of the
|
|
system induces a nil subordinate policy upon the component.
|
|
The remaining component types are denoted M, D, A, I, MD,
|
|
MA, MI, DA, DI, IA, MDA, MDI, MIA, IAD, and MIAD with the
|
|
obvious meanings (for example, an "MIA component" supports
|
|
aspects of Mandatory, Audit, and Authentication and ID poli-
|
|
cies, with the exact features provided being specified in
|
|
section A.3 depending upon both evaluation class and type).
|
|
|
|
Table A1. Component Type Maximum and Minimum Class
|
|
|
|
COMPONENT TYPE MIN CLASS MAX CLASS
|
|
M B1 A1
|
|
D C1 C2+
|
|
I C1 C2
|
|
A C2 C2+
|
|
DI C1 C2+
|
|
DA C2 C2+
|
|
IA C2 C2+
|
|
IAD C2 C2+
|
|
MD B1 A1
|
|
MA B1 A1
|
|
MI B1 A1
|
|
MDA B1 A1
|
|
MDI B1 A1
|
|
MIA B1 A1
|
|
MIAD B1 A1
|
|
|
|
|
|
|
|
In addition to a type based upon the policy elements
|
|
supported, an evaluated processing component is assigned a
|
|
single evaluation class. In order to achieve a particular
|
|
class, the component must meet all of the guidelines for
|
|
that rating level for the applicable component type provided
|
|
in section A.3. In general, these guidelines are straight-
|
|
forward interpretations of the TCSEC for the subset of pol-
|
|
icy features to be provided. Each component type has a max-
|
|
imum and minimum class listed in Table A1 below. To achieve
|
|
a particular class, a component must meet appropriate
|
|
requirements for policy, assurance, accountability, and
|
|
documentation.
|
|
|
|
The maximum class for each component type is derived
|
|
from the TCSEC, and is that evaluation class which imposes
|
|
the highest requirement relevant to the component type.
|
|
Similarly, the lowest class available for each component
|
|
type is the TCSEC evaluation class which first imposes a
|
|
requirement relevant to that component type.
|
|
|
|
Exceptions to this general approach have been made for
|
|
the requirements for DAC and Audit support at the B3 level
|
|
as the additional support for these policy categories at
|
|
these levels (namely, the provision of ACL's for DAC and for
|
|
real-time alarms for Audit) are not at the high level of
|
|
assurance provided for the B3 MAC support. It is considered
|
|
more appropriate to use the notation of C2+ for component
|
|
types including D or A, but not M which meet the functional
|
|
requirements of the B3 system ratings for D or A.
|
|
|
|
Components including support for I may be required to
|
|
provide identification and authentication support for DAC
|
|
(at possibly relatively low levels of assurance) or both DAC
|
|
and MAC (at relatively high levels of assurance). There-
|
|
fore, rating levels ranging from C1 to A1 for type I com-
|
|
ponents have been provided. The ratings above B2 reflect
|
|
the need for added assurance for the label integrity for the
|
|
MAC label information, rather than any additional require-
|
|
ments for features.
|
|
|
|
Components including support for I are required to pro-
|
|
vide Identification and Authentication which supports the
|
|
DAC Policy. The TCSEC Identification-Authentication
|
|
requirements for establishing a user clearance are reflected
|
|
in M Components, since this requirement is in essence estab-
|
|
lishing a security label for a user.
|
|
|
|
Components of multiple types have been given minimum
|
|
and maximum levels based upon meaningful combinations of the
|
|
included types.
|
|
|
|
It might be noted in passing that a C1 stand-alone sys-
|
|
tem has exactly the same certification requirements as a C1
|
|
DI component, a C2 system as a C2 IAD component, and B1-A1
|
|
systems as B1-A1 MIAD components.
|
|
|
|
A.2. Composition Rules
|
|
_ _ ___________ _____
|
|
|
|
A.2.1. Purpose
|
|
_ _ _ _______
|
|
|
|
In order for a (sub)system composed of components to be
|
|
assigned a rating, the components that make up the network
|
|
must be interconnected in such a way that the connections do
|
|
not violate the assumptions made at the time the components
|
|
were individually evaluated. This section presents the
|
|
rules for the composition of evaluated components to form an
|
|
evaluatable (sub)system and the method for assigning a rat-
|
|
ing to a (sub)system conforming to the rules.
|
|
|
|
This section does not consider the relative risk of
|
|
utilizing the evaluated (sub)system to separate data at
|
|
various levels of sensitivity: that is the role of the
|
|
environmental security requirements, such as those of Com-
|
|
____
|
|
puter Security Requirements, Guidance for applying the
|
|
_____ ________ ____________ ________ ___ ________ ___
|
|
Department of Defense Trusted Computer System Evaluation
|
|
__________ __ _______ _______ ________ ______ __________
|
|
Criteria in Specific Environments, CSC-STD-003-85. This
|
|
________ __ ________ ____________
|
|
section presents a technical basis for assigning a rating to
|
|
a (sub)system which is composed of more than one component.
|
|
The rating assigned indicates a minimum level of security as
|
|
provided by the rated (sub)system as a whole.
|
|
|
|
Components must provide interfaces to support the other
|
|
policies as required.
|
|
|
|
The composition rules are divided up according to the
|
|
15 possible combinations of the four policies supported by
|
|
evaluated components (i.e., Mandatory Access Control, Dis-
|
|
cretionary Access Control, Audit, and Identification-
|
|
Authentication).
|
|
|
|
A.2.2. Discretionary Access Control (D-Only) Composition
|
|
_ _ _ _____________ ______ _______ _ ____ ___________
|
|
Rules
|
|
_____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a new component from previously evaluated
|
|
components. Specifically, the rules presented in this sec-
|
|
tion deal with the composition of a component with respect
|
|
to the DAC Policy of the Network. It is expected that the
|
|
composition of a D-Component will require significant
|
|
engineering and system architectural consideration.
|
|
|
|
When a D-Component is evaluated, it will be evaluated
|
|
against some stated Network DAC Policy and a stated target
|
|
Network Security Architecture. Included in the component
|
|
definition will be a statement of supported protocol for
|
|
passing Identifiers which will be used as the basis for mak-
|
|
ing DAC decisions. The stated protocol will be evaluated to
|
|
assure that it is sufficient to support the target Network
|
|
DAC Policy (e.g., if the Network DAC Policy is that access
|
|
be designated down to the granularity of a single user, then
|
|
an Identification Protocol which maps all users into a sin-
|
|
gle Network ID would not suffice).
|
|
|
|
The type of Components discussed below, D-Components,
|
|
are components that have received a rating relative to DAC
|
|
(e.g., C1-C2+ D-Only Component, C1-C2+ DI Component, B1-A1
|
|
MD Component, etc.). The rules of this section are con-
|
|
cerned only with the composition of these components with
|
|
respect to the DAC Policy.
|
|
|
|
A.2.2.1. Composition of Two D-Components
|
|
_ _ _ _ ___________ __ ___ _ __________
|
|
|
|
Whenever two D-Components are directly connected the
|
|
Identification Passing Protocol used to pass identifiers
|
|
from one component to the other (for the purposes of making
|
|
DAC decisions) must be the same in both components. It must
|
|
be the case that the Identification Passing Protocol pro-
|
|
vided by the composed component must support the Identifica-
|
|
tion Passing Protocol of the target Network Architecture.
|
|
In addition, the composed DAC Policy (defined by the combi-
|
|
nation of the DAC Policy provided by one component over the
|
|
named objects under its control and by the DAC Policy pro-
|
|
vided by the other component over the named objects under
|
|
its control) must be shown to be able to support the target
|
|
Network DAC Policy.
|
|
|
|
A.2.2.2. Discretionary Access Control Policy Composition
|
|
_ _ _ _ _____________ ______ _______ ______ ___________
|
|
Rating
|
|
______
|
|
|
|
Given that a component is composed as described above,
|
|
the evaluation class assigned to the composed component,
|
|
with relation to DAC, will be the rating of the lowest class
|
|
assigned to any D-Component within the composed component.
|
|
|
|
A.2.3. Identification-Authentication (I-Only) Composition
|
|
_ _ _ ______________ ______________ _ ____ ___________
|
|
Rules
|
|
_____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the Identifi-
|
|
cation and Authentication Policy of the Network. It is
|
|
expected that the composition of an I-Component will require
|
|
significant engineering and system architectural
|
|
consideration.
|
|
|
|
When an I-Component is evaluated it will be evaluated
|
|
against some stated Network Identification-Authentication
|
|
Policy and a stated target Network architecture. Included
|
|
in the component definition will be a statement of the sup-
|
|
ported protocol for communicating User Identification and
|
|
Authentication Information, and the interfaces provided by
|
|
the I-Component. The composition of two I-Components must
|
|
maintain the protocol which supports the Identification-
|
|
Authentication Policy of the Network. In addition the
|
|
interfaces provided by the composed I-Component, which sup-
|
|
port the stated protocol, must be identified.
|
|
|
|
A.2.3.1. Identification-Authentication Composition Rating
|
|
_ _ _ _ ______________ ______________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
the evaluation class assigned to the composed component,
|
|
with relation to Identification-Authentication, will be the
|
|
rating of the lowest class assigned to any I-Component
|
|
within the composed component.
|
|
|
|
A.2.4. Audit (A-Only) Composition Rules
|
|
_ _ _ _____ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the Audit
|
|
Policy of the Network. It is expected that the composition
|
|
of an A-Component will require significant engineering and
|
|
system architectural consideration.
|
|
|
|
When an A-Component is evaluated it will be evaluated
|
|
against some stated Network Audit Policy and a stated target
|
|
Network architecture. Included in the component definition
|
|
will be a statement of the supported protocol that the com-
|
|
ponent uses for receiving Audit information. The composi-
|
|
tion of two A-Components must maintain the protocol which
|
|
supports the Audit Policy of the Network.
|
|
|
|
A.2.4.1. Audit Composition Rating
|
|
_ _ _ _ _____ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
the evaluation class assigned to the composed component,
|
|
with relation to Audit, will be the rating of the lowest
|
|
class assigned to any A-Component within the composed com-
|
|
ponent.
|
|
|
|
A.2.5. Mandatory Access Control (M-Only) Composition Rules
|
|
_ _ _ _________ ______ _______ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from two directly connected
|
|
(at the physical layer) components. Specifically, the rules
|
|
presented in this section deal with the composition of a
|
|
component with respect to the MAC Policy of the Network.
|
|
|
|
The MAC Composition Rules provide a strong guarantee
|
|
that if the network is composed of directly connected,
|
|
evaluated components, and each connection meets the MAC
|
|
Composition Rules, the Network MAC Policy will be supported.
|
|
These rules permit the recursive definition of a component
|
|
based on the MAC Policy.
|
|
|
|
The MAC Composition Rules are divided into two sec-
|
|
tions. The first section addresses the composition of a
|
|
component from two directly connected components with mul-
|
|
tilevel devices at each end of the connection. The second
|
|
section addresses the composition of a component from two
|
|
directly connected components with single-level devices at
|
|
each end of the connection.
|
|
|
|
The type of Components discussed below, M-Components,
|
|
are components which have received a rating relative to the
|
|
MAC Policy (e.g., B1-A1 M-Only Components, B1-A1 MD-
|
|
Components, B1-A1 MI-Components, etc.).
|
|
|
|
A.2.5.1. Multilevel Devices
|
|
_ _ _ _ __________ _______
|
|
|
|
Whenever two M-Components are directly connected, via a
|
|
communication channel, with a multilevel device at each end
|
|
of the connection, the labeling protocol (as required by the
|
|
Exportation to Multilevel Devices requirements, sections
|
|
3.1.1.3.2.1, 3.2.1.3.2.1, 3.3.1.3.2.1, and 4.1.1.3.2.1) must
|
|
be the same at the network interface to both devices.
|
|
|
|
Whenever two Class B1 M-Component are directly con-
|
|
nected, the range of sensitivity labels denoted by the max-
|
|
imum and minimum levels (System High and System Low) associ-
|
|
ated with each of the Class B1 M-Components must be the
|
|
same. (This is because there are no explicit device labels
|
|
for Class B1.)
|
|
|
|
Whenever a Class B1 M-Component is directly connected
|
|
to a Class B2-A1 M-Component, the range of sensitivity
|
|
labels denoted by the maximum and minimum levels (System
|
|
High and System Low) associated with the Class B1 M-
|
|
Component must be the same as the range of sensitivity
|
|
labels denoted by the maximum and minimum levels associated
|
|
with the multilevel device of the Class B2-A1 M-Component.
|
|
|
|
Whenever two Class B2-A1 M-Components are directly con-
|
|
nected with a multilevel device at each end of the connec-
|
|
tion, the range of sensitivity labels denoted by the maximum
|
|
and minimum levels associated with the each of the connected
|
|
devices must be the same.
|
|
|
|
A.2.5.2. Single-Level Devices
|
|
_ _ _ _ ______ _____ _______
|
|
|
|
Whenever two M-Components are directly connected with a
|
|
single-level device at each end of the connection, the sen-
|
|
sitivity level associated with the two devices must be the
|
|
same.
|
|
|
|
Whenever two Non-M-Components are directly connected
|
|
the maximum sensitivity level of data processed by the two
|
|
Non-M-Components must be the same.
|
|
|
|
A.2.5.3. Mandatory Access Control Policy Composition Rating
|
|
_ _ _ _ _________ ______ _______ ______ ___________ ______
|
|
|
|
Given that a component is composed as described in sec-
|
|
tions 2.5.1 and 2.5.2 above, the evaluation class assigned
|
|
to the composed component, with regard to MAC, will be the
|
|
rating of the lowest class assigned to any M-Component
|
|
within the composed component.
|
|
|
|
A.2.6. DI-Component (D-Only and I-Only) Composition Rules
|
|
_ _ _ __ _________ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the DAC Pol-
|
|
icy and the Identification-Authentication Policy of the Net-
|
|
work. It is expected that the composition of a DI-Component
|
|
will require significant engineering and system architec-
|
|
tural consideration.
|
|
|
|
Whenever an I-Component and a D-Component are composed
|
|
to form a DI-Component the DI-Component must preserve the
|
|
Network DAC Policy of the D-Component. This implies that,
|
|
depending on the DAC Policy, a protocol for receiving DAC
|
|
information and returning data might be required for each
|
|
DAC interface. This protocol must be able to support the
|
|
Network DAC policy. (Note that if the Network DAC policy is
|
|
defined such that access decisions are based on the user
|
|
being a "member of the network group", i.e., is a legitimate
|
|
user of another component, then the DAC interface may not
|
|
require any identifiers to be passed to the DI-Component.)
|
|
|
|
In addition, for class C2 and above, the composed DI-
|
|
Component must preserve the Audit Interface(s) used for
|
|
exporting audit information from the D-Component and the I-
|
|
Component. This implies that the DI-Component must provide
|
|
a means for exporting audit information generated by actions
|
|
taken within each of its parts.
|
|
|
|
The DI-Component may provide Identification-
|
|
Authentication support services to other components. In
|
|
this case the Identification Interface of the DI-Component
|
|
must be defined and a protocol established for this inter-
|
|
face which is able to support the Network I/A Policy. In
|
|
this case the DI-Component may be further composed with
|
|
other D-Only Components to form new DI-Components, using the
|
|
rules defined above.
|
|
|
|
However, it is not necessary that the DI-Component pro-
|
|
vide Identification-Authentication services to other com-
|
|
ponents. In this case the DI-Component may only be composed
|
|
with other components (i.e., DI-Components, MIAD-Components,
|
|
MI-Components, etc.) which are also self sufficient with
|
|
respect to Identification-Authentication services.
|
|
|
|
If the composed DI-Component supports directly con-
|
|
nected users then the DI-Component must, minimally, meet all
|
|
the requirements for a Class C1 Network System.
|
|
|
|
A.2.6.1. DI-Component Composition Rating
|
|
_ _ _ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C1, the
|
|
evaluation class assigned to the composed DI-Component, will
|
|
be C1.
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2, the
|
|
evaluation class assigned to the composed DI-Component, will
|
|
be equal to the evaluation class of the D-Component.
|
|
|
|
A.2.7. DA (D-Only and A-Only) Composition Rules
|
|
_ _ _ __ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the DAC Pol-
|
|
icy and the Audit Policy of the Network. It is expected
|
|
that the composition of a DA-Component will require signifi-
|
|
cant engineering and system architectural consideration.
|
|
|
|
Whenever an A-Component and a D-Component are composed
|
|
to form a DA-Component, the DA-Component must preserve the
|
|
Network DAC Policy of the D-Component. This implies that,
|
|
depending on the DAC Policy, a protocol for receiving DAC
|
|
information and returning data, might be required for each
|
|
DAC interface. This protocol must be able to support the
|
|
Network DAC policy. (Note that if the Network DAC policy is
|
|
defined such that access decisions are based on the user
|
|
being a "member of the network group", i.e., is a legitimate
|
|
user of another component, then the DAC interface may not
|
|
require any identifiers to be passed to the DI-Component.)
|
|
|
|
The DA-Component may provide Audit support services to
|
|
other components. In this case the Audit Interface of the
|
|
DA-Component must be defined and a protocol established for
|
|
this interface, which is able to support the Network Audit
|
|
Policy. In this case the DA-Component may be further com-
|
|
posed with other D-Only Components to form new DA-
|
|
Components, using the rules defined above.
|
|
|
|
However, it is not necessary that the DA-Component pro-
|
|
vide Audit services to other components. In this case the
|
|
DA-Component may only be composed with other components
|
|
(i.e., DA-Components, MIAD-Components, MA-Components, etc.)
|
|
that are also self sufficient with respect to Audit ser-
|
|
vices.
|
|
|
|
A.2.7.1. DA-Component Composition Rating
|
|
_ _ _ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the D-Component has an evaluation class of at least
|
|
C2, the evaluation class assigned to the composed DA-
|
|
Component, will be the rating of the lowest class assigned
|
|
to either of the two components which make up the composed
|
|
component.
|
|
|
|
A.2.8. IA (I-Only and A-Only) Composition Rules
|
|
_ _ _ __ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the
|
|
Identification-Authentication Policy and the Audit Policy of
|
|
the Network. It is expected that the composition of a IA-
|
|
Component will require significant engineering and system
|
|
architectural consideration.
|
|
|
|
Whenever an IA-Component is composed of an I-Component
|
|
connected to an A-Component, the IA-Component must preserve
|
|
both the Network Audit Interface and Protocol of the A-
|
|
Component and the Network Identification-Authentication
|
|
Interface and Protocol of the I-Component. This implies
|
|
that the composed IA-Component must provide an Audit Inter-
|
|
face as well as a Identification-Authentication Interface. A
|
|
protocol, for receiving Audit data, must be defined for each
|
|
Audit Interface. This protocol must be able to support the
|
|
Network Audit Policy. In addition, a protocol, for receiv-
|
|
ing Identification-Authentication data and returning authen-
|
|
ticated user-ids, must be defined for each Identification
|
|
Interface. This protocol must be able to support the Net-
|
|
work I/A policy.
|
|
|
|
A.2.8.1. IA-Component Composition Rating
|
|
_ _ _ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of at least
|
|
C2, the evaluation class assigned to the composed IA-
|
|
Component, will be the rating of the A-Component.
|
|
|
|
A.2.9. MD (M-Only and D-Only) Composition Rules
|
|
_ _ _ __ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy and the DAC Policy of the Network. It is expected that
|
|
the composition of an MD-Component will require significant
|
|
engineering and system architectural consideration.
|
|
|
|
Whenever an MD-Component is composed from an M-
|
|
Component directly connected to a D-Component, the composi-
|
|
tion rules, with respect to the MAC Policy, are that the M-
|
|
Component must only connect to the D-Component via a
|
|
single-level device, and the sensitivity level of the device
|
|
must be the same as the maximum sensitivity level of data
|
|
processed by the D-Component. Any network interfaces pro-
|
|
vided by the MD-Component via direct connections to the D-
|
|
Component must be at the level of the D-Component.
|
|
|
|
The composition rules, with respect to the DAC Policy,
|
|
are that any network interfaces provided by the MD-Component
|
|
(including those which only involve direct connections to
|
|
the M-Component) must support the Identification Passing
|
|
Protocol used by the D-Component. (Note that if the Network
|
|
DAC policy is defined such that access decisions are based
|
|
on the user being a ``member of the network group'', i.e.,
|
|
is a legitimate user of another component, then the DAC
|
|
interface may not require any identifiers to be passed to
|
|
the DI-Component.)
|
|
|
|
In addition, the composed MD-Component must ensure that
|
|
any external requests for access to data under the control
|
|
of the composed component are subject to both the MAC and
|
|
DAC Policies of the original M and D Components.
|
|
|
|
A.2.9.1. MD-Component Composition Rating
|
|
_ _ _ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the D-Component has an evaluation class of C2, the
|
|
evaluation class assigned to the composed MD-Component, will
|
|
be either B1 (if the evaluation class of the M-Component is
|
|
B1) or B2 (if the evaluation class of the M-Component is
|
|
greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the D-Component has an evaluation class of C2+, the
|
|
evaluation class assigned to the composed MD-Component, will
|
|
be equal to the evaluation class of the M-Component.
|
|
|
|
A.2.10. MI (M-Only and I-Only) Composition Rules
|
|
_ _ __ __ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy and the Identification-Authentication Policy of the Net-
|
|
work. It is expected that the composition of an MI-Component
|
|
will require significant engineering and system architec-
|
|
tural consideration.
|
|
|
|
Whenever an MI-Component is composed from an M-
|
|
Component directly connected to an I-Component, the composi-
|
|
tion rules, with respect to the MAC Policy, are that the M-
|
|
Component must only connect to the I-Component via a
|
|
single-level device, and the sensitivity level of the device
|
|
must be the same as the maximum sensitivity level of data
|
|
processed by the I-Component. Any network interfaces pro-
|
|
vided by the MI-Component via direct connections to the I-
|
|
Component must be at the level of the I-Component.
|
|
|
|
In addition, the composed MI-Component must preserve
|
|
the Audit Interface(s) used for exporting audit information
|
|
from the M-Component and the I-Component. This implies that
|
|
the MI-Component must provide a means for exporting audit
|
|
information generated by actions taken within each of its
|
|
parts.
|
|
|
|
The MI-Component may provide Identification-
|
|
Authentication support services to other components. In
|
|
this case the Identification Interface of the MI-Component
|
|
must be defined and a protocol established for this inter-
|
|
face, which is able to support the Network I/A Policy. In
|
|
this case the MI-Component may be further composed with
|
|
other M-Only Components to form new MI-Components, using the
|
|
rules defined above.
|
|
|
|
However, it is not necessary that the MI-Component pro-
|
|
vide Identification-Authentication services to other com-
|
|
ponents. In this case the MI-Component may only be composed
|
|
with other components (i.e., MI-Components, MIAD-Components,
|
|
DI-Components, etc.) that are also self sufficient with
|
|
respect to Identification-Authentication services.
|
|
|
|
The composed MI-Component must assure that MAC Policy
|
|
and the Identification-Authentication Policy of the Network
|
|
is supported on any direct User connections to the MI-
|
|
Component. This implies that if the M-Component supports
|
|
direct User connections, the M-Component must support a pro-
|
|
tocol on these connections such that Identification-
|
|
Authentication information may be exchanged (with the I-
|
|
Component) which will fully support the IA Policy of the
|
|
Network.
|
|
|
|
A.2.10.1. MI-Component Composition Rating
|
|
_ _ __ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2, the
|
|
evaluation class assigned to the composed MI-Component will
|
|
be equal to the evaluation class of the M-Component.
|
|
|
|
A.2.11. MA (M-Only and A-Only) Composition Rules
|
|
_ _ __ __ _ ____ ___ _ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy and the Audit Policy of the Network. It is expected
|
|
that the composition of an MA-Component will require signi-
|
|
ficant engineering and system architectural consideration.
|
|
|
|
Whenever an MA-Component is composed from an M-
|
|
Component directly connected to an A-Component, the composi-
|
|
tion rules, with respect to the MAC Policy, are that the M-
|
|
Component must only connect to the A-Component via a
|
|
single-level device and the sensitivity level of the device
|
|
must be the same as the maximum sensitivity level of data
|
|
processed by the A-Component (probably Network High). Any
|
|
network interfaces provided by the MA-Component via direct
|
|
connections to the A-Component must be at the level of the
|
|
A-Component.
|
|
|
|
The MA-Component may provide Audit support services to
|
|
other components. In this case the Audit Interface of the
|
|
MA-Component must be defined and a protocol established for
|
|
this interface which is able to support the Network Audit
|
|
Policy. In this case the MA-Component may be further com-
|
|
posed with other M-Only Components to form new MA-
|
|
Components, using the rules defined above.
|
|
|
|
However, it is not necessary that the MA-Component
|
|
provide Audit services to other components. In this case
|
|
the MA-Component may only be composed with other components
|
|
(i.e., MA-Components, MIAD-Components, DA-Components, etc.)
|
|
which are also self sufficient with respect to Audit ser-
|
|
vices.
|
|
|
|
A.2.11.1. MA-Component Composition Rating
|
|
_ _ __ _ __ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the A-Component has an evaluation class of C2, the
|
|
evaluation class assigned to the composed MA-Component, will
|
|
be either B1 (if the evaluation class of the M-Component is
|
|
B1) or B2 (if the evaluation class of the M-Component is
|
|
greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the A-Component has an evaluation class of C2+, the
|
|
evaluation class assigned to the composed MA-Component will
|
|
be equal to the evaluation class of the M-Component.
|
|
|
|
A.2.12. IAD Composition Rules
|
|
_ _ __ ___ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the DAC Pol-
|
|
icy, the Identification-Authentication Policy, and the Audit
|
|
Policy of the Network. It is expected that the composition
|
|
of a IAD-Component will require significant engineering and
|
|
system architectural consideration.
|
|
|
|
Whenever a IAD-Component is composed from directly con-
|
|
nected components, the IAD-Component must conform to the
|
|
composition rules for a DI-Component, a DA-Component, and an
|
|
IA-Component. If the IAD-Component supports directly con-
|
|
nected users then the IAD-Component must, minimally, meet
|
|
all the requirements for a Class C2 Network System.
|
|
|
|
A.2.12.1. IAD-Component Composition Rating
|
|
_ _ __ _ ___ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component and D-Component each have an
|
|
evaluation class of C2, the evaluation class assigned to the
|
|
composed IAD-Component will be C2.
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2 and
|
|
the D-Component has an evaluation class of C2+, the evalua-
|
|
tion class assigned to the composed IAD-Component will be
|
|
the evaluation class of the A-Component.
|
|
|
|
A.2.13. MDA Composition Rules
|
|
_ _ __ ___ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy, the DAC Policy, and the Audit Policy of the Network.
|
|
It is expected that the composition of a MDA-Component will
|
|
require significant engineering and system architectural
|
|
consideration.
|
|
|
|
Whenever a MDA-Component is composed from directly con-
|
|
nected components, the MDA-Component must conform to the
|
|
composition rules for an MD-Component, an MA-Component, and
|
|
a DA-Component.
|
|
|
|
A.2.13.1. MDA-Component Composition Rating
|
|
_ _ __ _ ___ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the A-Component has an evaluation class of C2, and
|
|
the D-Component has an evaluation class of C2 or higher, the
|
|
evaluation class assigned to the composed MDA-Component will
|
|
be either B1 (if the evaluation class of the M-Component is
|
|
B1) or B2 (if the evaluation class of the M-Component is
|
|
greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the D-Component and A-Component each have an
|
|
evaluation class of C2+, the evaluation class assigned to
|
|
the composed MDA-Component will be equal to the evaluation
|
|
class of the M-Component.
|
|
|
|
A.2.14. MDI Composition Rules
|
|
_ _ __ ___ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy, the DAC Policy, and the Identification-Authentication
|
|
Policy of the Network. It is expected that the composition
|
|
of a MDI-Component will require significant engineering and
|
|
system architectural consideration.
|
|
|
|
Whenever a MDI-Component is composed from directly con-
|
|
nected components, the MDI-Component must conform to the
|
|
composition rules for an MD-Component, an MI-Component, and
|
|
a DI-Component.
|
|
|
|
A.2.14.1. MDI-Component Composition Rating
|
|
_ _ __ _ ___ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component and the D-Component each have an
|
|
evaluation class of C2, the evaluation class assigned to the
|
|
composed MDA-Component will be either B1 (if the evaluation
|
|
class of the M-Component is B1) or B2 (if the evaluation
|
|
class of the M-Component is greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2, and
|
|
the D-Component has an evaluation class of C2+, the evalua-
|
|
tion class assigned to the composed MDI-Component will be
|
|
equal to the evaluation class of the M-Component.
|
|
|
|
A.2.15. MIA Composition Rules
|
|
_ _ __ ___ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy, the Identification-Authentication Policy, and the Audit
|
|
Policy of the Network. It is expected that the composition
|
|
of a MIA-Component will require significant engineering and
|
|
system architectural consideration.
|
|
|
|
Whenever a MIA-Component is composed from directly con-
|
|
nected components, the MIA-Component must conform to the
|
|
composition rules for an MI-Component, an MA-Component, and
|
|
a IA-Component.
|
|
|
|
A.2.15.1. MIA-Component Composition Rating
|
|
_ _ __ _ ___ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component and the A-Component each have an
|
|
evaluation class of C2, the evaluation class assigned to the
|
|
composed MIA-Component, will be either B1 (if the evaluation
|
|
class of the M-Component is B1) or B2 (if the evaluation
|
|
class of the M-Component is greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2 and
|
|
the A-Component has an evaluation class of C2+, the evalua-
|
|
tion class assigned to the composed MIA-Component, will be
|
|
equal to the evaluation class of the M-Component.
|
|
|
|
A.2.16. MIAD Composition Rules
|
|
_ _ __ ____ ___________ _____
|
|
|
|
The rules presented below are based on the concept of
|
|
properly composing a component from evaluated components.
|
|
Specifically, the rules presented in this section deal with
|
|
the composition of a component with respect to the MAC Pol-
|
|
icy, the DAC Policy, the Identification-Authentication Pol-
|
|
icy, and the Audit Policy of the Network. It is expected
|
|
that the composition of a MIA-Component will require signi-
|
|
ficant engineering and system architectural consideration.
|
|
|
|
Whenever an MIAD-Component is composed from directly
|
|
connected components, the MIAD-Component must conform to the
|
|
composition rules for an MIA-Component, an MDA-Component, an
|
|
MDI-Component, and a IAD-Component. If the MIAD-Component
|
|
supports directly connected users then the MIAD-Component
|
|
must, minimally, meet all the requirements for a Class B1
|
|
Network System.
|
|
|
|
A.2.16.1. MIAD-Component Composition Rating
|
|
_ _ __ _ ____ _________ ___________ ______
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component and the D-Component each have an
|
|
evaluation class of C2, the evaluation class assigned to the
|
|
composed MIAD-Component will be either B1 (if the evaluation
|
|
class of the M-Component is B1) or B2 (if the evaluation
|
|
class of the M-Component is greater than B1).
|
|
|
|
Given that a component is composed as described above,
|
|
and that the I-Component has an evaluation class of C2, and
|
|
the D-Component and the A-Component each have an evaluation
|
|
class of C2+, the evaluation class assigned to the composed
|
|
MIAD-Component will be equal to the evaluation class of the
|
|
M-Component.
|
|
|
|
A.3. Guidelines for Specific Component Evaluation
|
|
_ _ __________ ___ ________ _________ __________
|
|
|
|
A.3.1. Mandatory Only Components (M-Components)
|
|
_ _ _ _________ ____ __________ _ __________
|
|
|
|
Mandatory Only Components are components that provide
|
|
network support of the MAC Policy as specified in the Net-
|
|
work Interpretation of the DoD Trusted Computer System
|
|
Evaluation TCSEC. M-Components do not include the mechan-
|
|
isms necessary to completely support any of the 3 other net-
|
|
work policies (i.e., DAC, Identification-Authentication, and
|
|
Audit) as defined in the Interpretation.
|
|
|
|
M-Components belong to one of four classes B1, B2, B3,
|
|
and A1 (as defined by the requirements below).
|
|
|
|
M-Components are rated according to the highest level
|
|
for which all the requirements of a given class are met.
|
|
|
|
A.3.1.1. Overall Interpretation
|
|
_ _ _ _ _______ ______________
|
|
|
|
In the requirements referenced, TCB will be understood
|
|
to refer to the NTCB Partition of the M-Component. Also any
|
|
reference to audit for an M-Component will be interpreted to
|
|
mean "the M-Component shall produce audit data about any
|
|
auditable actions performed by the M-Component". In addi-
|
|
tion the M-Component shall contain a mechanism for making
|
|
the audit data available to an audit collection component.
|
|
|
|
A.3.1.2. Generally Interpreted Requirements
|
|
_ _ _ _ _________ ___________ ____________
|
|
|
|
The requirements listed in the Table A2 apply directly
|
|
to M-Components as interpreted in Part I of this
|
|
interpretation.
|
|
|
|
Table A2. M-Component Requirements That Can Be Applied
|
|
_____ __ _ _________ ____________ ____ ___ __ _______
|
|
Without Further Interpretation
|
|
_______ _______ ______________
|
|
(NOTE: Table not included)
|
|
|
|
|
|
|
|
A.3.1.3. Specifically Interpreted Requirements
|
|
_ _ _ _ ____________ ___________ ____________
|
|
|
|
The following requirements require additional interpre-
|
|
tation as indicated. -
|
|
|
|
A.3.1.3.1. Subject Sensitivity Labels
|
|
_ _ _ _ _ _______ ___________ ______
|
|
|
|
+ Criteria
|
|
(Class B2 - Section 3.2.1.3.3; Class B3 -
|
|
Section 3.3.1.3.3; Class A1 - Section 4.1.1.3.3)
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component need not support direct terminal input
|
|
in which case this requirement is not applicable. Any M-
|
|
Component which does support direct terminal input must meet
|
|
_________________________
|
|
- For brevity, the following TCSEC sections contain
|
|
pointers to the sections of Part I of the Network In-
|
|
terpretation being interpreted, instead of the actual
|
|
requirements.
|
|
|
|
|
|
the requirement as stated.
|
|
|
|
|
|
+ Rationale
|
|
|
|
The only way that a user can change the current level
|
|
of the session is to be directly connected to a component
|
|
that supports the MAC Policy. If the user is directly con-
|
|
nected to a component that does not support the MAC Policy
|
|
then the user will always operate at the level of the com-
|
|
ponent to which he is directly attached. If the user is
|
|
directly connected to a M-Component then this M-Component
|
|
must meet the requirements as stated. M-Components which
|
|
may be part of the network which do not directly communicate
|
|
with users need not support this requirement since the
|
|
requirement will be met by the M-Component with which the
|
|
user is directly communicating.
|
|
|
|
A.3.1.3.2. Trusted Path
|
|
_ _ _ _ _ _______ ____
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class B2 - Section 3.2.2.1.1; Class B3 -
|
|
Section 3.3.2.1.1; Class A1 - Section 4.1.2.1.1)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component need not support direct user input
|
|
(e.g., the M-Component may not be attached to any user I/O
|
|
devices such as terminals) in which case this requirement is
|
|
not applicable. Any M-Component which does support direct
|
|
communication with users must meet the requirement as
|
|
stated. In addition, an M-Component with directly connected
|
|
users must provide mechanisms which establish the clearance
|
|
of users and associate that clearance with the users current
|
|
session.
|
|
|
|
|
|
+ Rationale
|
|
|
|
Trusted Path is necessary in order to assure that the
|
|
user is communicating with the TCB and only the TCB when
|
|
security relevant activities are taking place (e.g., authen-
|
|
ticate user, set current session security level). However,
|
|
Trusted Path does not address communications within the TCB,
|
|
only communications between the user and the TCB. If,
|
|
therefore, an M-Component does not support any direct user
|
|
communication then the M-Component need not contain mechan-
|
|
isms for assuring direct TCB to user communications.
|
|
|
|
In the case where an M-Component does support direct
|
|
user communication the Clearance of the user must be esta-
|
|
blished by the M-Component. There are three possible means
|
|
of providing this support: a) all direct user connections
|
|
are via single-level channels, where the maximum level of
|
|
the channel equals the minimum level of the channel, and
|
|
physical access to the channel implies clearance to the
|
|
level of the channel; in this case there may exist no secu-
|
|
rity relevant activities so that the applicable trusted path
|
|
requirements may be met by reason of the device labels
|
|
alone, b) some direct user connections are via single-level
|
|
channels, where the maximum level of the channel does not
|
|
equal the minimum level of the channel, and physical access
|
|
to the channel implies clearance to the maximum level of the
|
|
channel, c) some direct user connections are via single-
|
|
level channels, where the maximum level of the channel does
|
|
not equal the minimum level of the channel, and the M-
|
|
Component contains some internal mechanism for mapping the
|
|
user clearance to the range on the channel. The first two
|
|
options map the user clearance to the activities of the user
|
|
through external means. The third option requires some
|
|
internal mechanism. Such a mechanism might be a user
|
|
id/password/clearance database maintained by the M-
|
|
Component. Another acceptable mechanism might be a protocol
|
|
and interface definition within the M-Component for obtain-
|
|
ing such information (via a multilevel channel - the channel
|
|
is multilevel because it is passing labels, i.e., the user
|
|
clearance) from some other M-Component.
|
|
|
|
A.3.1.3.3. System Architecture
|
|
_ _ _ _ _ ______ ____________
|
|
|
|
+ Criteria
|
|
|
|
(Class B1 - Section 3.1.3.1.1; Class B2 - Section
|
|
3.2.3.1.1; Class B3 - Section 3.3.3.1.1; Class A1 -
|
|
Section 4.1.3.1.1)
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component must meet the requirement as stated. In
|
|
this interpretation the words "The user interface to the TCB
|
|
shall be completely defined..." shall be interpreted to mean
|
|
the interface between the reference monitor of the M-
|
|
Component and the subjects external to the reference monitor
|
|
shall be completely defined.
|
|
|
|
+ Rationale
|
|
|
|
The M-Component may not have a direct user interface
|
|
but is expected to support subjects which are not part of
|
|
the TCB. It is important that the interface between the TCB
|
|
and subjects external to the TCB be completely defined.
|
|
(Note that in such a case the subjects are always internal
|
|
to the component, viz., are "internal subjects").
|
|
|
|
A.3.1.3.4. Covert Channel Analysis
|
|
_ _ _ _ _ ______ _______ ________
|
|
|
|
+ Criteria
|
|
|
|
(Class B2 - Section 3.2.3.1.3; Class B3 -
|
|
Section 3.3.3.1.3; Class A1 - Section 4.1.3.1.3)
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component must meet the requirement as stated. In
|
|
addition, if the analysis indicates that channels exist that
|
|
need to be audited (according to the Covert Channel Analysis
|
|
Guideline), the M-Component shall contain a mechanism for
|
|
making audit data (related to possible use of covert chan-
|
|
nels) available outside of the M-Component (e.g., by passing
|
|
the data to an audit collection component).
|
|
|
|
+ Rationale
|
|
|
|
If an M-Component contains covert channels that need
|
|
to be audited the M-Component must produce the audit data
|
|
such that auditing can be performed. Since all covert chan-
|
|
nels in the network occur in an M-Component, the M-Component
|
|
must be the source of the audit record which records the
|
|
possible use of the covert channel.
|
|
|
|
A.3.1.3.5. Security Testing
|
|
_ _ _ _ _ ________ _______
|
|
|
|
+ Criteria
|
|
|
|
(Class B1 - Section 3.1.3.2.1; Class B2 -
|
|
Section 3.2.3.2.1; Class B3 - Section 3.3.3.2.1; Class
|
|
A1 - Section 4.1.3.2.1)
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component must meet the requirement as stated
|
|
except for the words ``normally denied under the ... discre-
|
|
tionary security policy,'' which are not applicable to an
|
|
M-Component.
|
|
|
|
+ Rationale
|
|
|
|
An M-Component does not support a discretionary secu-
|
|
rity policy, and therefore testing for violations of such a
|
|
policy is of no value.
|
|
|
|
A.3.1.3.6. Design Specification and Verification
|
|
_ _ _ _ _ ______ _____________ ___ ____________
|
|
|
|
|
|
+ Criteria
|
|
(Class B1 - Section 3.1.3.2.2; Class B2 - Section
|
|
3.2.3.2.2; Class B3 - Section 3.3.3.2.2; Class A1 -
|
|
Section 4.1.3.2.2)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component must meet the requirement as stated.
|
|
|
|
Security Policy is interpreted to mean the MAC Policy
|
|
supported by the component. Model is interpreted to be
|
|
those portions of a reference monitor model that are
|
|
relevant to the MAC Policy supported by the Component (e.g.,
|
|
the representation of the current access set and the sensi-
|
|
tivity labels of subjects and objects, and the Simple Secu-
|
|
rity and Confinement Properties of the Bell and LaPadula
|
|
Model).
|
|
|
|
A.3.1.3.7. Trusted Facility Manual
|
|
_ _ _ _ _ _______ ________ ______
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class B1 - Section 3.1.4.2; Class B2 - Section 3.2.4.2;
|
|
Class B3 - Section 3.3.4.2; Class A1 - Section 4.1.4.2)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An M-Component must meet the requirement as stated
|
|
except for the words ``The procedures for examining and
|
|
maintaining the audit files as well as...''. These words are
|
|
interpreted to mean "the mechanisms and protocols associated
|
|
with exporting of audit data must be defined." Also, the
|
|
words "...to include changing the security characteristics
|
|
of a user", shall not be applicable to an M-Component.
|
|
|
|
+ Rationale
|
|
|
|
An M-Component does not maintain the audit files nor
|
|
does it provide mechanisms for examining them. It must,
|
|
however provide mechanisms for exporting the audit files and
|
|
these mechanisms need to be defined in the Trusted Facility
|
|
Manual. The M-Component also does not maintain user infor-
|
|
mation.
|
|
|
|
A.3.1.4. Representative Application of M-Components
|
|
_ _ _ _ ______________ ___________ __ _ __________
|
|
|
|
As an example of an M-Component, consider a MLS packet
|
|
switch that provides MAC through a verified Security Kernel,
|
|
as shown in Figure A1. This component supports 16 levels
|
|
and 64 categories for non-discretionary access classes. The
|
|
MLS packet switch is rated as an A1 M-Component against the
|
|
requirements described above.
|
|
|
|
Such an A1 M-Component may, as an example, be used in a
|
|
network as a Multilevel Packet Switch. The M-Component
|
|
could be configured with several single-level channels and
|
|
some number of multilevel channels. As part of the example,
|
|
assume that the multilevel channels each have a maximum of
|
|
Top Secret and a minimum of Secret. Also imagine that the
|
|
single-level channels are either Top Secret or Secret. The
|
|
Multilevel channels are directly connected to B2 hosts each
|
|
with a system high of Top Secret and a system low of Secret.
|
|
The single-level channels are directly connected to C2 hosts
|
|
with some of them running at dedicated Secret and some run-
|
|
ning at dedicated Top Secret. One of the Dedicated Top
|
|
Secret Hosts and one of the Dedicated Secret Hosts would be
|
|
responsible for collecting the audit messages sent from the
|
|
M-Component. In this fashion one could create a network
|
|
which could permit the multilevel hosts to securely communi-
|
|
cate with each other as well as with the single-level hosts.
|
|
The separation necessary for such communications would be
|
|
provided by the M-Component being used as a Multilevel
|
|
Secure Packet Switch. It is noted that the composition
|
|
rules of Section A.2 (A.2.5 in particular) result in an
|
|
evaluation class of B2 for the overall NTCB.
|
|
|
|
A.3.2. Discretionary Only Components (D-Components)
|
|
_ _ _ _____________ ____ __________ _ __________
|
|
|
|
Discretionary Only Components are components that pro-
|
|
vide network support of the DAC Policy as specified in the
|
|
Network Interpretation of the DoD Trusted Computer System
|
|
Evaluation TCSEC. D-Components do not include the mechan-
|
|
isms necessary to completely support any of the three other
|
|
network policies (i.e., MAC, Identification-Authentication,
|
|
and Audit) as defined in the Interpretation.
|
|
|
|
D-Components belong to one of three classes, C1, C2,
|
|
and C2+ (as defined by the requirements below).
|
|
|
|
D-Components are rated according to the highest level
|
|
for which all the requirements of a given class are met.
|
|
|
|
A.3.3. Overall Interpretation
|
|
_ _ _ _______ ______________
|
|
|
|
In the requirements referenced, TCB will be understood
|
|
to refer to the NTCB Partition of the D-Component. Also any
|
|
reference to audit for an D-Component will be interpreted to
|
|
mean "the D-Component shall produce audit data about any
|
|
auditable actions performed by the D-Component." In addi-
|
|
tion the D-Component shall contain a mechanism for making
|
|
the audit data available to an audit collection component.
|
|
|
|
A.3.3.1. Generally Interpreted Requirements
|
|
_ _ _ _ _________ ___________ ____________
|
|
|
|
The requirements listed in Table A3 apply directly to
|
|
D-Components as interpreted in Part I of this interpreta-
|
|
tion.
|
|
|
|
A.3.3.2. Specifically Interpreted Requirements
|
|
_ _ _ _ ____________ ___________ ____________
|
|
|
|
The following requirements require additional interpre-
|
|
tation as indicated. -
|
|
|
|
|
|
_________________________
|
|
- For brevity, the following TCSEC sections contain
|
|
pointers to the sections of Part I of the Network In-
|
|
terpretation being interpreted, instead of the actual
|
|
requirements.
|
|
|
|
|
|
|
|
|
|
|
|
A.3.3.2.1. Trusted Facility Manual
|
|
_ _ _ _ _ _______ ________ ______
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class C1 - Section 2.1.4.2; Class C2 - Section 2.2.4.2;
|
|
Class C2+ - Section 2.2.4.2)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
A D-Component must meet the requirement as stated
|
|
except for the words ``The procedures for examining and
|
|
maintaining the audit files as well as...''. These words are
|
|
interpreted to mean "the mechanisms and protocols associated
|
|
with exporting of audit data must be defined."
|
|
|
|
+ Rationale
|
|
|
|
A D-Component does not maintain the audit files, nor
|
|
does it provide mechanisms for examining them. It must,
|
|
however provide mechanisms for exporting audit data to an
|
|
audit component, and these mechanisms need to be defined in
|
|
the Trusted Facility Manual.
|
|
|
|
A.3.3.2.2. Design Documentation
|
|
_ _ _ _ _ ______ _____________
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class C1 - Section 2.1.4.4; Class C2 - Section 2.2.4.4;
|
|
Class C2+ - Section 2.2.4.4)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
A D-Component must meet the requirement as stated. In
|
|
addition the Design Documentation must include a description
|
|
of the protocol used by the D-Component to communicate Sub-
|
|
ject permissions (i.e., user ids), where applicable, with
|
|
other components. This protocol must be shown to be suffi-
|
|
cient to support the DAC policy enforced by the D-Component.
|
|
|
|
+ Rationale
|
|
|
|
A D-Component does not maintain the user
|
|
Identification-Authentication information. It may, however,
|
|
use some form of authenticated user identification as a
|
|
basis for making DAC decisions. Such information must be
|
|
provided to the D-Component through the identification pro-
|
|
tocol. The protocol used by the D-Component may vary, but
|
|
it must be shown to be adequate to support the DAC policy
|
|
supported by the D-Component. As an example consider a sim-
|
|
ple DAC policy in which access is granted, or denied, on a
|
|
per host basis. In this case the protocol used might be to
|
|
staticly assign a host-id to each port. All requests coming
|
|
in from a given port would be associated with the access
|
|
permissions allowed for that host. This protocol would not
|
|
be adequate to support a DAC policy of access granted, or
|
|
denied, on a per user basis.)
|
|
|
|
A.3.3.3. Representative Application of D-Components
|
|
_ _ _ _ ______________ ___________ __ _ __________
|
|
|
|
As an example of a D-Component, consider a system that
|
|
provides DAC through Access Control Lists on files, as shown
|
|
in Figure A2. The system is rated as a C2+ D-Component
|
|
against the requirements described above.
|
|
|
|
Figure A2. Representative Application of D-Components
|
|
______ __ ______________ ___________ __ _ __________
|
|
|
|
B1: box wid 1.15i ht .95i "Class B3" "Host" B2: box wid
|
|
1.15i ht .96i "Class C2+" "Host" "(Network Audit" "Collec-
|
|
tion" "Facility)" at B1.e +(3i,0) B3: box wid 1.15i ht .96i
|
|
"Class C2+" "D-Component" "(Single Level" "File Server" at
|
|
B2.s -(1.75i,.30i) B4: box wid 1.85i ht .96i "Class C2"
|
|
"Host" "(Network Identification &" "Authentication" "Facili-
|
|
ty)" at B1.s -(0,1.05i) B5: box wid 1.15i ht .96i "Class A1"
|
|
"Host" at B2.s -(0,1.05i) B6: box invis "(S)" at B1.e
|
|
+(.50i,.30i) B7: box invis "(S)" at B2.w -(.50i, -.30i) B8:
|
|
box invis "(S)" at B4.e +(.50i,.2) B9: box invis "(S)" at
|
|
B5.w -(.50i,.2) A1: arrow <-> from B4.e to (B3.s.x-
|
|
(B3.s.x+.2,B5.w.y) to (B3.s.x+.2,B3.s.y) A3: arrow left 1i
|
|
from B6.c +(.48,-.15i) A4: arrow right 1i from B7.c
|
|
-(.48i,.15i) A5: arrow down .39i from A4.w A6: arrow down
|
|
|
|
|
|
Such a C2+ D-Component may, as an example, be used in a
|
|
network as a Single Level File Server. The D-Component
|
|
could be configured with several communication channels
|
|
(each of which would be connected to single-level devices
|
|
with the same access class). As part of the example, con-
|
|
sider all files on the system to be secret and all channels
|
|
leaving the system to be connected to other single-level
|
|
secret components or, in the case of multi-level components,
|
|
to be connected to single-level secret devices. The docu-
|
|
mentation associated with the D-Component must specify the
|
|
protocol used to pass user-ids and filenames. This protocol
|
|
must be followed on each connection to the component. In
|
|
addition the documentation must specify the protocol used to
|
|
output audit information. The audit protocol must be
|
|
exactly the same as the protocol of the audit node to which
|
|
it is attached. It is noted that the composition rules of
|
|
Section A.2 result in an evaluation class of B3 for the
|
|
overall NTCB.
|
|
|
|
A.3.4. Identification-Authentication Only Components (I-
|
|
_ _ _ ______________ ______________ ____ __________ _
|
|
Components)
|
|
__________
|
|
|
|
Identification-Authentication Only Components are com-
|
|
ponents that provide network support of the Identification-
|
|
Authentication Policy as specified in the Network Interpre-
|
|
tation of the DoD Trusted Computer System Evaluation TCSEC.
|
|
I-Components do not include the mechanisms necessary to
|
|
completely support any of the three other network policies
|
|
(i.e., MAC, DAC, and Audit) as defined in the Interpreta-
|
|
tion.
|
|
|
|
I-Components belong to one of two classes, C1 and C2
|
|
(as defined by the requirements below).
|
|
|
|
I-Components are rated according to the highest level
|
|
for which all the requirements of a given class are met.
|
|
|
|
A.3.4.1. Overall Interpretation
|
|
_ _ _ _ _______ ______________
|
|
|
|
In the requirements referenced, TCB will be understood
|
|
to refer to the NTCB Partition of the I-Component. Also any
|
|
reference to audit for an I-Component will be interpreted to
|
|
mean "the I-Component shall produce audit data about any
|
|
auditable actions performed by the I-Component.'' In addi-
|
|
tion the I-Component shall contain a mechanism for making
|
|
the audit data available to an audit collection component.
|
|
|
|
A.3.4.2. Generally Interpreted Requirements
|
|
_ _ _ _ _________ ___________ ____________
|
|
|
|
The requirements listed in Table A4 apply directly to
|
|
I-Components as interpreted in Part I of this interpreta-
|
|
tion.
|
|
|
|
Table A4. I-Component Requirements That Can Be Applied
|
|
_____ __ _ _________ ____________ ____ ___ __ _______
|
|
Without Further Interpretation
|
|
_______ _______ ______________
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
A.3.4.3. Specifically Interpreted Requirements
|
|
_ _ _ _ ____________ ___________ ____________
|
|
|
|
The following requirements require additional interpre-
|
|
tation as indicated. -
|
|
|
|
A.3.4.3.1. Trusted Facility Manual
|
|
_ _ _ _ _ _______ ________ ______
|
|
|
|
|
|
|
|
_________________________
|
|
- For brevity, the following TCSEC sections contain
|
|
pointers to the sections of Part I of the Network In-
|
|
terpretation being interpreted, instead of the actual
|
|
requirements.
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class C1 - Section 2.1.4.2; Class C2 - Section 2.2.4.2;
|
|
Class C2+ - Section 2.2.4.2)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An I-Component must meet the requirement as stated
|
|
except for the words ``The procedures for examining and
|
|
maintaining the audit files as well as...''. These words are
|
|
interpreted to mean "the mechanisms and protocols associated
|
|
with exporting of audit data must be defined."
|
|
|
|
+ Rationale
|
|
|
|
An I-Component does not maintain the audit files, nor
|
|
does it provide mechanisms for examining them. It must,
|
|
however, provide mechanisms for exporting audit data to an
|
|
audit component, and these mechanisms need to be defined in
|
|
the Trusted Facility Manual.
|
|
|
|
A.3.4.3.2. Design Documentation
|
|
_ _ _ _ _ ______ _____________
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class C1 - Section 2.1.4.4; Class C2 - Section 2.2.4.4;
|
|
Class C2+ - Section 2.2.4.4)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An I-Component must meet the requirement as stated. In
|
|
addition the Design Documentation must include a description
|
|
of the protocol used by the I-Component to export Authenti-
|
|
cated Subject Identifiers to other components.
|
|
|
|
+ Rationale
|
|
|
|
The Authenticated Identifiers provided by an I-
|
|
Component will not be primarily used on the I-Component
|
|
itself but instead will be used by other Components enforc-
|
|
ing the network DAC policy. It is therefore necessary for
|
|
the I-Component to define the protocol which it will use to
|
|
pass authenticated user-ids to other components.
|
|
|
|
A.3.4.4. Representative Application of I-Components
|
|
_ _ _ _ ______________ ___________ __ _ __________
|
|
|
|
As an example of an I-Component, consider a system
|
|
which provides Identification and Authentication facilities,
|
|
such as a TAC with a name server, as shown in Figure A3. The
|
|
system is rated as a C2 I-Component against the requirements
|
|
described above. The I-Component could be configured with
|
|
several communication channels (each of which would be con-
|
|
nected to single-level devices with the same access class).
|
|
As part of the example, consider the TAC to be an
|
|
unclassified TAC (i.e., accessible through the phone system
|
|
without any encryption support) and all channels leaving
|
|
the system to be connected to other single-level unclassi-
|
|
fied components or, in the case of multi-level components,
|
|
to be connected to single-level unclassified devices. All
|
|
authentication is done in the TAC, and Authenticated Ids are
|
|
passed to the other nodes of the network to be used as a
|
|
basis for DAC decisions and audit entries. The documenta-
|
|
tion associated with the I-Component must specify the proto-
|
|
col used to pass user-ids to the attached components. This
|
|
protocol must be supported on each connection to the com-
|
|
ponent. In addition the documentation must specify the pro-
|
|
tocol used to output audit information. The audit protocol
|
|
must be exactly the same as the protocol of the audit com-
|
|
ponent to which it is attached. It is noted that the compo-
|
|
sition rules of Section 3 result in an evaluation class of
|
|
B3 for the overall NTCB.
|
|
|
|
A.3.5. Audit Only Components (A-Components)
|
|
_ _ _ _____ ____ __________ _ __________
|
|
|
|
Audit Only Components are components which provide net-
|
|
work support of the Audit Policy as specified in the Network
|
|
Interpretation of the DoD Trusted Computer System Evaluation
|
|
TCSEC. A-Components do not include the mechanisms necessary
|
|
to completely support any of the three other network poli-
|
|
cies (i.e., MAC, DAC, and Identification-Authentication) as
|
|
defined in the Interpretation.
|
|
|
|
A-Components belong to one of two classes C2 and C2+
|
|
(as defined by the requirements below). (The difference
|
|
between a C2 A-Component and a C2+ A-Component is the sup-
|
|
port of real time alarms required by class B3 Audit.)
|
|
|
|
A-Components are rated according to the highest level
|
|
for which all the requirements of a given class are met.
|
|
|
|
A.3.5.1. Overall Interpretation
|
|
_ _ _ _ _______ ______________
|
|
|
|
In the requirements referenced, TCB will be understood
|
|
to refer to the NTCB Partition of the A-Component.
|
|
|
|
A.3.5.2. Generally Interpreted Requirements
|
|
_ _ _ _ _________ ___________ ____________
|
|
|
|
The requirements listed in Table A5 apply directly to
|
|
A-Components as interpreted in Part I of this interpreta-
|
|
tion.
|
|
|
|
A.3.5.3. Specifically Interpreted Requirements
|
|
_ _ _ _ ____________ ___________ ____________
|
|
|
|
The following requirements require additional interpre-
|
|
tation as indicated. -
|
|
|
|
_________________________
|
|
- For brevity, the following TCSEC sections contain
|
|
pointers to the sections of Part I of the TNI being in-
|
|
terpreted, instead of the actual requirements.
|
|
|
|
|
|
A.3.5.3.1. Design Documentation
|
|
_ _ _ _ _ ______ _____________
|
|
|
|
|
|
+ Criteria
|
|
|
|
(Class C2 - Section 2.2.4.4; Class C2+ - Section 2.2.4.4)
|
|
|
|
|
|
+ Interpretation
|
|
|
|
An A-Component must meet the requirement as stated. In
|
|
addition the Design Documentation must include a description
|
|
of the protocol used by the A-Component to import Audit Data
|
|
from other nodes.
|
|
|
|
+ Rationale
|
|
|
|
The Audit component will potentially be used for col-
|
|
lection of audit data generated on many different com-
|
|
ponents. Each of these components must be able to transfer
|
|
the information to the A-component in a form that will allow
|
|
the A-Component to create an audit record. The mechanism
|
|
for defining the acceptable form of information is the pro-
|
|
tocol used by the audit component.
|
|
|
|
A.3.5.4. Representative Application of A-Components
|
|
_ _ _ _ ______________ ___________ __ _ __________
|
|
|
|
As an example of an A-Component, consider a system that
|
|
provides Audit Collection and review facilities for a net-
|
|
work environment, as illustrated in Figure A4. The system
|
|
is rate C2+ against the requirements described above.
|
|
|
|
As part of the example, consider the A-Component to be
|
|
operating at System High (Top Secret) collecting information
|
|
from several components through single-level (Top Secret)
|
|
channels. The A-Component provides auditing functions for
|
|
the network as a whole. The A-Component defines an audit
|
|
protocol which is used by each of the components to communi-
|
|
cate information to the A-Component which results in the
|
|
creation of audit records. Note that in this example the
|
|
Auditor (i.e., the person responsible for reviewing audit
|
|
files) is accessing the A-Component through an operators
|
|
console attached to the A-Component. In a different
|
|
scenario, it might be the case that the Auditor accesses the
|
|
A-Component via another component, in which case the A-
|
|
Component would be responsible for enforcing an access con-
|
|
trol policy that defined which users (i.e., the auditor)
|
|
could view audit data. This would require the A-Component
|
|
to establish a user-id passing protocol much like a D-
|
|
Component. It is noted that the composition rules of Sec-
|
|
tion 3 result in an evaluation class of B3 for the overall
|
|
NTCB.
|
|
|
|
|
|
Figure A1. Representative Application of M-Components
|
|
______ __ ______________ ___________ __ _ __________
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
Table A3. D-Component Requirements That Can Be Applied
|
|
_____ __ _ _________ ____________ ____ ___ __ _______
|
|
Without Further Interpretation
|
|
_______ _______ ______________
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
Figure A3. Representative Application of I-Component
|
|
______ __ ______________ ___________ __ _ _________
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
Table A5. Audit Component Requirements That Can Be Applied
|
|
_____ __ _____ _________ ____________ ____ ___ __ _______
|
|
Without Further Interpretation
|
|
_______ _______ ______________
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
Appendix B
|
|
________ _
|
|
|
|
|
|
Rationale Behind NTCB Partitions
|
|
_________ ______ ____ __________
|
|
|
|
|
|
|
|
|
|
|
|
B.1. Purpose
|
|
_ _ _______
|
|
|
|
Part I of this Trusted Network Interpretation (TNI)
|
|
provides interpretations of the Trusted Computer Security
|
|
Evaluation Criteria (TCSEC) appropriate for evaluating a
|
|
network of computer and communication devices as a single
|
|
system with a single Trusted Computing Base (TCB), called
|
|
the Network Trusted Computing Base (NTCB), which is physi-
|
|
cally and logically partitioned among the components of the
|
|
network. Implicit to this approach is the view that the
|
|
network to be evaluated (including the interconnected hosts)
|
|
is analogous to a single stand-alone computer system, and
|
|
can therefore be evaluated using the TCSEC under appropriate
|
|
interpretation. It is the purpose of this appendix to pro-
|
|
vide the main technical rationale and illustrative examples
|
|
supporting this view. This underlying rationale may also be
|
|
of help to the sponsors and evaluators of networks and net-
|
|
work components in understanding how a network can be
|
|
cleanly partitioned into components in a way that will
|
|
facilitate its eventual evaluation and certification. It is
|
|
recognized that this appendix is in places quite theoretical
|
|
and philosophical. Therefore, readers whose interest is
|
|
primarily in applying the TNI without reviewing its deriva-
|
|
tion may choose not to study this appendix in detail.
|
|
|
|
The separate Appendix A, providing Interpretations for
|
|
the Evaluation of Network Components, rests upon this view
|
|
as well: the evaluation of particular network components is
|
|
viewed as a useful preliminary step for the eventual evalua-
|
|
tion of the network as a whole, which must proceed, however,
|
|
in the context of an overall network architecture providing
|
|
a clean decomposition of an overall network security policy
|
|
into policies for the individual components. The overall
|
|
architecture and design will, once individual component
|
|
evaluations have been finished, support the final evaluation
|
|
of the network as a sound composition of trusted elements,
|
|
each enforcing its allocated policy, and together enforcing
|
|
the policy defined for the entire network. Specific guide-
|
|
lines for actually partitioning the various network policy
|
|
elements to components are presented under the relevant
|
|
headings in the separate Appendix A for Evaluation of Net-
|
|
work Components: the general rationale supporting the view
|
|
that such a partitioning is possible is presented here.
|
|
|
|
It is emphasized that the view of what a network is
|
|
(and how its NTCB may be partitioned into NTCB partitions
|
|
completely contained in individual network components)
|
|
described in this appendix is adopted with one goal in mind:
|
|
the evaluation and assignment to the network of a single
|
|
certification as meeting the TCSEC criteria for a given
|
|
evaluation class. It is recognized that this goal may not
|
|
be appropriate for every circumstance, or meet the needs of
|
|
sponsors wishing to interconnect already existing systems.
|
|
The risk assessment and accreditation of such systems is an
|
|
important and interesting problem. It is not, however, the
|
|
problem being addressed here, viz., the evaluation of an
|
|
entire network which is to support a network security policy
|
|
given a priori.
|
|
_ ______
|
|
|
|
B.2. Background and Overview
|
|
_ _ __________ ___ ________
|
|
|
|
B.2.1. Organization of this Appendix
|
|
_ _ _ ____________ __ ____ ________
|
|
|
|
The material within this appendix is organized as fol-
|
|
lows. Section B.3 discusses some considerations for properly
|
|
formulating the policy to be enforced by the network NTCB,
|
|
and its allocation to the various components of the network.
|
|
Section B.4 presents an argument supporting the adequacy of
|
|
the partitioned NTCB view and the conclusion that the refer-
|
|
ence monitor for an entire network may be implemented as a
|
|
collection of locally autonomous reference monitors. Sec-
|
|
tion B.5 discusses the idealization of intercomponent com-
|
|
munications channels, assumed as an axiom in Section B.4, in
|
|
the context of real communications channels, and provides
|
|
insight into when the techniques of communications security,
|
|
and when the techniques of trusted systems technology are
|
|
applicable. Section B.6 provides additional rationale sup-
|
|
porting the partitioned NTCB view.
|
|
|
|
B.3. Security Policy
|
|
_ _ ________ ______
|
|
|
|
The TCSEC Glossary defines ``Security Policy'' as ``the
|
|
set of laws, rules, and practices that regulate how an
|
|
organization manages, protects, and distributes sensitive
|
|
information''. It should be noted that ``Security Policy''
|
|
is a distinct notion from that of ``Formal Security Policy
|
|
Model'' and a ``Security Policy Model''. The ``Security
|
|
Policy'' of an organization has the ultimate goal of con-
|
|
trolling the access of people to information.
|
|
______
|
|
|
|
Because a Security Policy concerns, by definition, the
|
|
access of people to sensitive information and includes both
|
|
secrecy and integrity; it can, ideally, be stated in a
|
|
manner that is free of computer, network, or communication
|
|
jargon. Moreover, we would observe that the evaluation of a
|
|
network ultimately is possible only if a single, uniform
|
|
network security policy can be adopted by the organizations
|
|
whose information is to be stored, transmitted, or processed
|
|
by the network and its components. The existence of such a
|
|
policy is a precondition of any attempt to evaluate a net-
|
|
work or its components in the sense of this appendix. If a
|
|
network is to be used to allow the sharing of information
|
|
among many organizations, the definition of a mutually
|
|
acceptable Security Policy applicable to that sharing must
|
|
be an early goal during the design of the network if the
|
|
successful certification of a network providing that capa-
|
|
bility is desired.
|
|
|
|
B.3.1. Mandatory Access Control Policies
|
|
_ _ _ _________ ______ _______ ________
|
|
|
|
One may observe that, for those access controls nor-
|
|
mally denoted as ``Mandatory Access Controls'', the defini-
|
|
tion of a mutually acceptable joint policy may be expected
|
|
to be relatively straightforward, as such controls are
|
|
based, by definition, upon the comparison of a label denot-
|
|
ing the sensitivity of the information contained within an
|
|
information repository with a user clearance denoting the
|
|
formal authorization of a user to access that information.
|
|
The definition of a jointly acceptable policy may involve
|
|
the merging of several systems of classifications and clear-
|
|
ances into a unified system; in practice, if the systems in
|
|
use by the various organizations are not already identical,
|
|
those responsible for the protection of information within
|
|
each organization must determine which external user clear-
|
|
ances will be honored as an adequate basis for providing
|
|
access to which classes of information.
|
|
|
|
It may also be true that a particular organization may
|
|
have no explicit policy describable as ``mandatory'' in the
|
|
__
|
|
sense defined by the TCSEC. (In particular, many commercial
|
|
or private institutions may be so characterized)-. It is
|
|
possible to formulate a trivial mandatory access control
|
|
policy for such organizations, however, with a single access
|
|
class and clearance level (i.e., every user belonging to the
|
|
institution has clearance to access all information belong-
|
|
ing to the institution, except as refined by less rigorous
|
|
access controls). Thus, it could well be that an overall
|
|
system of mandatory access controls, at the policy level,
|
|
for an arbitrary collection of institutions wishing to share
|
|
information using a network, can be resolved in a relatively
|
|
straightforward way; at least in the sense that the policy
|
|
issues and effects of particular decisions are easy to
|
|
understand.
|
|
|
|
B.3.2. Discretionary Access Control Policies
|
|
_ _ _ _____________ ______ _______ ________
|
|
|
|
Turning to those policies characterizable as involving
|
|
Discretionary Access Controls, one finds substantially
|
|
greater freedom in the sorts of policies an organization
|
|
might adopt. The notion of ``Discretionary Access Con-
|
|
trols'', as defined in the TCSEC Glossary, involves the res-
|
|
triction of access by users to information based upon the
|
|
identity of the users or their membership in a particular
|
|
group, as well as the ability of a user with authorized
|
|
access to an object containing information to pass that
|
|
authorization to other users or groups either directly, or
|
|
_________________________
|
|
- See, for example, Steven B. Lipner, ``Non-
|
|
Discretionary Controls for Commercial Applications'',
|
|
IEEE Proceedings of the 1982 Symposium on Security and
|
|
____ ___________ __ ___ ____ _________ __ ________ ___
|
|
Privacy, April 26-28, 1982, Oakland, CA.
|
|
_______
|
|
|
|
|
|
indirectly (viz., by copying it and providing authorization
|
|
to access the copy). Within these limits, there is an
|
|
extremely broad range of permissible policies, differing in
|
|
how users may be grouped, the sorts of named information
|
|
repositories that may form the basis for access controls,
|
|
the modes of access that may form the basis for controls,
|
|
and the mechanisms that may be defined for users to limit or
|
|
propagate permission to access information. One would
|
|
expect, therefore, that when designing a network, the formu-
|
|
lation of an overall Discretionary Policy by a group of
|
|
organizations may require a period of intensive generaliza-
|
|
tion of policy. Moreover, the overall policy resulting from
|
|
this activity may be expected to depend, to a relatively
|
|
large extent, upon the underlying capabilities and func-
|
|
tionality ascribed to the network.
|
|
|
|
B.3.3. Supporting Policies
|
|
_ _ _ __________ ________
|
|
|
|
In addition to the basic access control policies (man-
|
|
datory and discretionary) addressed by the TCSEC are addi-
|
|
tional capabilities relating to the accountability of indi-
|
|
viduals for their security-relevant actions. These capabil-
|
|
ities are usually thought of as comprising ``supporting''
|
|
policy: they provide an environment that allows for the
|
|
effective enforcement and monitoring of the basic access
|
|
policies enforced.
|
|
|
|
Accountability requirements are comprised of two major
|
|
policy subcategories: identification and authentication pol-
|
|
icy, and audit policy. The former supports both mandatory
|
|
and discretionary access control policy by specifying the
|
|
requirements for authenticating the identity and clearance
|
|
of an individual prior to permitting access, is the basis
|
|
for determining the clearance of an individual in the case
|
|
of mandatory access policy, is the basis for determining the
|
|
group membership of an individual in the case of discretion-
|
|
ary access policy, and is the basis for recording the iden-
|
|
tity of the individual taking or causing an auditable
|
|
action.
|
|
|
|
Audit policy proper provides for the recording of those
|
|
security-relevant events that can be uniquely associated
|
|
with an individual user, so that those responsible for the
|
|
security of sensitive information may hold users accountable
|
|
for the security-relevant actions they take.
|
|
|
|
The supporting policies adopted by different organiza-
|
|
tions may differ even more widely than discretionary access
|
|
control policies. The task of formulating a mutually
|
|
acceptable set of overall supporting policies may be
|
|
expected to be even more challenging for the sponsors of a
|
|
network than for discretionary policy.
|
|
|
|
B.3.4. Formal Security Policy Model
|
|
_ _ _ ______ ________ ______ _____
|
|
|
|
As defined in the TCSEC, a Formal Security Policy Model
|
|
has a mathematically precise statement of a Security Policy.
|
|
Whereas the objective of stating Security Policy is to
|
|
reflect the requirements imposed upon a system by external
|
|
authority, the purpose of a Formal Security Policy Model is
|
|
to serve as a precise starting point in the chain of argu-
|
|
ments leading to the higher levels of assurance required for
|
|
systems of the higher evaluation classes. Thus, the
|
|
requirement to state a Formal Security Policy Model con-
|
|
sistent with its axioms is first introduced at Evaluation
|
|
Class B2; it is not introduced earlier because the chain of
|
|
arguments needed for lower evaluation classes does not
|
|
require mathematical precision at their onset. The point of
|
|
this observation is that the definition of a Formal Security
|
|
Model is not a gratuitous requirement, but serves the pur-
|
|
pose of facilitating construction of the chain of arguments
|
|
required for the higher evaluation Classes.
|
|
|
|
Current practice requires a formal security policy
|
|
model only for the access control policies to be enforced.
|
|
The model is a representation of the reference monitor for a
|
|
specific class of systems. The choice of model representa-
|
|
tion is strongly influenced by the technical characteristics
|
|
of the system to be built, as the feasibility and economy of
|
|
constructing the chain of assurance arguments needed to sup-
|
|
port a class B2 or above evaluation is typically substan-
|
|
tially increased by utilizing a model that has an intui-
|
|
tively attractive resemblance to the abstractions of sub-
|
|
ject, object, and access properties of the target system.
|
|
|
|
As previously described, the reference monitor for a
|
|
partitioned NTCB is composed of a collection of security
|
|
kernels for individual components. In order to obtain the
|
|
required levels of assurance that each such security kernel
|
|
works correctly, a Formal Security Policy Model must be for-
|
|
mulated for each such component. We would argue, however,
|
|
that it is too restrictive to require that the formal model
|
|
for each security kernel be the same, or that an overall
|
|
model be formulated for the network, provided that each
|
|
model is shown by convincing arguments to correctly
|
|
represent the overall Security Policy, as allocated to the
|
|
component. As the only function of a formal model is to
|
|
support the evaluation of a security kernel, the sponsors
|
|
and designers of network components should be free to choose
|
|
that model which will most efficiently serve this purpose,
|
|
relative to the engineering characteristics of the com-
|
|
ponent; subject, of course, to the requirement that the
|
|
model be an accurate representation of the Security Policy
|
|
to be enforced by the component.
|
|
|
|
B.3.5. Summary of Policy Considerations for a Network
|
|
_ _ _ _______ __ ______ ______________ ___ _ _______
|
|
|
|
In summary, a precondition for the evaluation of a
|
|
networked system of computers is the formulation of overall
|
|
mandatory (when applicable), discretionary, and supporting
|
|
policies, mutually acceptable to the managements of the
|
|
organizations involved, and stated in terms of people
|
|
accessing information (i.e., free, to the extent feasible,
|
|
of computer and network jargon). In the case of mandatory
|
|
policy, we would expect the formulation of an overall policy
|
|
to involve the relatively straightforward issues of how
|
|
clearances in use by one organization are to relate to the
|
|
information access classes in use by another organization:
|
|
the formulation of appropriate discretionary and supporting
|
|
policies may be expected to be more challenging and signifi-
|
|
cantly influenced by the particular network architecture
|
|
chosen.
|
|
|
|
B.4. Derivation of the Partitioned NTCB View
|
|
_ _ __________ __ ___ ___________ ____ ____
|
|
|
|
B.4.1. Introduction to the Partitioned NTCB Concept
|
|
_ _ _ ____________ __ ___ ___________ ____ _______
|
|
|
|
Using the definitions provided above, the following
|
|
conclusion may be stated: if it is supposed (1) that a sub-
|
|
ject is confined to a single component throughout its life-
|
|
time, (2) that it may directly access only objects within
|
|
its component, (3) that every component contains a component
|
|
reference monitor that mediates all accesses made locally
|
|
(and enforce the same access control policy), and (4) that
|
|
all communications channels linking components do not
|
|
compromise the security of the information entrusted to
|
|
them, one may conclude that the total collection of com-
|
|
ponent reference monitors is a reference monitor for the
|
|
network. The conclusion follows because (1) all network
|
|
accesses are mediated (because there are no non-local
|
|
accesses); and (2) the network reference monitor cannot be
|
|
tampered with (because none of its component reference moni-
|
|
tors can be tampered with), and it is simple enough to vali-
|
|
date (its correct operation, under the suppositions given,
|
|
is assured if the correct operation of each of its component
|
|
reference monitors is individually assured - the stricture
|
|
against access across components prevents the introduction
|
|
of additional complexity).
|
|
|
|
It is useful, before expanding this basic argument
|
|
within the context of non-idealized network systems, to
|
|
examine briefly the individual preconditions (axioms) that
|
|
must be met in order for the conclusion to be valid, and
|
|
state concisely why there is reason to believe that each can
|
|
be achieved within the current state of network technology.
|
|
Generally, the crucial step the sponsors and architects of a
|
|
proposed network must perform (prior to its evaluation) is
|
|
its partitioning into components and communication channels
|
|
in such a way that all of the axioms can be easily validated
|
|
by the evaluators.
|
|
|
|
The first axiom is that regarding confinement of sub-
|
|
jects (to a single component). Adoption of the conventional
|
|
notion of a subject as a <process, domain> pair is adequate
|
|
to fulfill this axiom, provided it is recognized that limit-
|
|
ing the access of subjects to objects within the same com-
|
|
ponent ensures that no domain encompasses objects from more
|
|
than one component. It follows that no subject may ``move''
|
|
from one component to another. Even if we permit (as is
|
|
sometimes done) the notion of a ``remote process'', once
|
|
execution begins in a remote component a new subject has
|
|
been introduced (because there has been a change in protec-
|
|
tion domains).
|
|
|
|
The second axiom requires that a subject be able to
|
|
directly access objects only within the component with which
|
|
the subject is associated. The major theoretical issue to
|
|
be confronted is to understand how information may be
|
|
transmitted between components without the sharing of
|
|
objects between them. This issue is explored in some depth
|
|
in Section B.5. Logically, the connection of components by
|
|
an ideal communication channel is viewed as involving the
|
|
transfer of information from one device to another without
|
|
the existence of an intermediate object. (i.e., information
|
|
``in motion'' is not regarded as an object - a view which
|
|
seems valid provided that no subjects may access it until it
|
|
``comes to rest'' within the destination component - and is
|
|
then within an object again). This view is consistent with
|
|
the TCSEC Glossary definition of ``object'' which includes
|
|
the sentence, ``Access to an object potentially implies
|
|
access to the information it contains''. For a Security-
|
|
Compliant communication channel (discussed in Section
|
|
B.6.2), there are no subjects with potential access to the
|
|
information being transmitted while it is in transit: it is
|
|
_____ __ __ __ _______
|
|
therefore unnecessary (and misleading) to treat such infor-
|
|
mation as an object. (This argument is invalid for complex
|
|
channels, which contain internal subjects, which is the rea-
|
|
son that such channels must be further partitioned.)
|
|
|
|
The third axiom requires that every component contain a
|
|
component reference monitor which enforces that part of the
|
|
network access control policy relevant to subjects and
|
|
objects within the component. In validating this axiom, it
|
|
is important to understand that for certain components, a
|
|
degenerate component reference monitor may suffice (e.g.,
|
|
for a dedicated component for which all subjects and objects
|
|
have, by virtue of the system architecture, the same author-
|
|
ization and sensitivity, respectively, so that no local
|
|
access attempts need be denied on the basis of policy
|
|
enforcement). It is logically equivalent, in such cases, to
|
|
claim that there is a reference monitor (which never does
|
|
anything) or that there is no reference monitor (because
|
|
nothing ever needs to be done). It is also important to
|
|
understand that each reference monitor need only to enforce
|
|
that subset of access control policy relevant (in terms of
|
|
the network system architecture) to the local accesses pos-
|
|
sible within the component.
|
|
|
|
The fourth axiom requires that communications channels
|
|
between components not compromise the security of sensitive
|
|
information entrusted to them. Establishing that this axiom
|
|
is actually met is a complex problem with some issues dealt
|
|
with during system evaluation, and others during accredita-
|
|
tion for use. A detailed discussion of the issues involved
|
|
is provided in Section B.6 of this Appendix. Until that
|
|
discussion, the validity of the axiom is assumed as a boun-
|
|
dary condition allowing the evaluation of individual trusted
|
|
components of the network, and their composition into a com-
|
|
plete system.
|
|
|
|
B.4.2. Overview of the Argument for a Partitioned NTCB
|
|
_ _ _ ________ __ ___ ________ ___ _ ___________ ____
|
|
|
|
To present the concept of a partitioned NTCB, and show
|
|
how the TCSEC Criteria may be applied to it, an application
|
|
analogous to a network of ``loosely-coupled'' NTCB parti-
|
|
tions is described as running upon a single, stand-alone
|
|
computer system with a TCB assumed to be evaluatable in
|
|
terms of the existing Criteria. A series of transformations
|
|
is then performed upon the simulation, that convert it into
|
|
the hypothesized network with a single, partitioned NTCB.
|
|
This argument is meant to demonstrate that the notion of
|
|
partitioning a single NTCB into a set of loosely-coupled
|
|
NTCB partitions is conceptually sound and does not require a
|
|
radical departure from current evaluation practice. In
|
|
effect, the argument serves as a constructive proof
|
|
(although informally stated) that a trusted network is sim-
|
|
ply an instance of a trusted computer system.
|
|
|
|
B.4.3. Characterization of the Target Monolithic System
|
|
_ _ _ ________________ __ ___ ______ __________ ______
|
|
|
|
Consider first a multiprocessor, multiprogrammed monol-
|
|
ithic computer system, presumed to conform to the TCSEC Cri-
|
|
teria at, for example, a Class B2 level or higher. It has a
|
|
Formal Security Policy Model, e.g., the Bell and LaPadula
|
|
model, and it has been shown that the system is a valid
|
|
interpretation of that model. In the presumed system, sup-
|
|
pose that the code and data of the TCB is shared among the
|
|
concurrently executing processors, which are tightly-coupled
|
|
on a single bus. (Worked examples of such systems targeted
|
|
for Class B2 or higher exist). Since this is a monolithic
|
|
system with (it is presumed) an ``ordinary'' secure mul-
|
|
tiprogramming operating system, it can support a given pro-
|
|
cess on any processor, which can (potentially) access any
|
|
memory segments it may need to share with any other process
|
|
on any other processor. Additionally, each process can use
|
|
devices through I/O channels that are accessed by service
|
|
calls to the TCB. In particular, assume that there are
|
|
available multilevel I/O channels which can be controlled by
|
|
multilevel trusted processes executing under the control of
|
|
the TCB. Each multilevel channel conforms to the concept of
|
|
a connected multilevel device as identified in the TCSEC
|
|
Criteria.
|
|
|
|
B.4.4. Characterization of the Loosely-Coupled Trusted Net-
|
|
_ _ _ ________________ __ ___ _______ _______ _______ ____
|
|
work
|
|
____
|
|
|
|
Next, consider an arbitrary network architecture, con-
|
|
sisting of various types of nodes (e.g., packet switches,
|
|
network interface units, hosts, etc.) processing information
|
|
at various levels, connected with communication channels,
|
|
possibly multilevel. It is assumed that the network is
|
|
secure, and meets the axioms described in section B.3.1,
|
|
viz., (1) each subject is confined to a single component,
|
|
(2) no subject may access an object within a different com-
|
|
ponent, (3) each component possesses a locally autonomous
|
|
reference monitor, (4) the communications channels are
|
|
secure, in the sense that they do not compromise the secu-
|
|
rity of the information entrusted to them. Host components
|
|
are interconnected via a multilevel communications subnet
|
|
(which may itself be composed of components and simple com-
|
|
munications channels. Subjects within one component can (by
|
|
interacting with the appropriate device drivers) cause
|
|
information to be exchanged between components in a secure
|
|
way.
|
|
|
|
Note that a point-to-point connection may be abstracted
|
|
as a pair of devices (one at each end) linked by a communi-
|
|
cation medium. A broadcast channel may be abstracted as a
|
|
set of devices (one for each host) linked by a shared com-
|
|
munication medium. The hypothesized network may contain
|
|
both single-level and multi-level connections.
|
|
|
|
B.4.5. Simulation of the Network on the Monolithic System
|
|
_ _ _ __________ __ ___ _______ __ ___ __________ ______
|
|
|
|
The proposed system may be simulated in a very natural
|
|
way on the evaluated monolithic computer system.
|
|
|
|
Each component subject (in the network) is simulated as
|
|
a single subject (on the monolithic target system.) For rea-
|
|
sons that will become clear later, all of the network sub-
|
|
jects within a single component are allocated to a single
|
|
processor of the monolithic system, and it is assumed that
|
|
there is a processor available for each network component.
|
|
|
|
All of the communication devices are provided as I/O
|
|
devices within the computer system; single- or multi- level
|
|
as appropriate. For each device, it is supposed that there
|
|
is a server subject, which correctly implements the protocol
|
|
ascribed to the communication channel and, for multilevel
|
|
devices, has the trust properties required to function as a
|
|
trusted subject. As each device is local to a processing
|
|
node in the network system, it is made local to the associ-
|
|
ated processor in the monolithic computer system (i.e., it
|
|
is accessible only by that processor).
|
|
|
|
Finally, the I/O devices are linked using the appropri-
|
|
ate physical media, (which is considered to be external to
|
|
the system): in pairs, for point-to-point channels, and in
|
|
sets, for broadcast channels.
|
|
|
|
The simulation is now an accurate representation of the
|
|
hypothesized network. Since it runs on an evaluated monol-
|
|
ithic system, it is secure to the degree of assurance
|
|
ascribed to the monolithic system, subject, of course, to
|
|
the provision of appropriate levels of communication secu-
|
|
rity to the various communications channels. The Criteria
|
|
Interpretations provided in the TNI may be viewed (for the
|
|
higher evaluation Classes) as specifying the characteristics
|
|
a network must have to be simulated in the way described.
|
|
|
|
B.4.6. Transformation of the Monolithic Simulation to a
|
|
_ _ _ ______________ __ ___ __________ __________ __ _
|
|
Distributed System
|
|
___________ ______
|
|
|
|
It is instructive to examine certain of the properties
|
|
of the network simulation.
|
|
|
|
It may be observed that there are no application memory
|
|
segments shared by subjects allocated to different proces-
|
|
sors. This stems from the allocation of all subjects within
|
|
a single network component to a single processor of the
|
|
monolithic system, and from the rule (for the network) that
|
|
no subjects access objects in a different component.
|
|
|
|
Furthermore subjects executing on different processors
|
|
do not utilize any of the inter-process communications
|
|
mechanisms provided by the TCB; all inter-processor communi-
|
|
cation is provided by means of the I/O device protocols
|
|
embedded in the I/O device drivers, which are part of the
|
|
TCB. Moreover, the (correct) operation of these protocols
|
|
does not depend upon the sharing of memory since they were
|
|
usable in the network being simulated, and thus presumably
|
|
provide for the cooperation of remote devices coupled by a
|
|
shared physical medium.
|
|
|
|
Thus, outside of the security kernel, no memory seg-
|
|
ments are shared by any two processes running on different
|
|
processors. Assuming that each processor has local memory,
|
|
all application segments may be moved (without effect) to
|
|
the appropriate processor-local memory address space. Sup-
|
|
posing the TCB code is ``pure'' (i.e., re-entrant), complete
|
|
copies of the TCB code may also be removed to the local
|
|
memory address space of each processor without effect.
|
|
Similarly, internal TCB data structures that have elements
|
|
that are accessed only by a single processor can be removed
|
|
to the local memory of that processor without effect.
|
|
|
|
It may be noted (based upon available worked examples)
|
|
that the only data structures within the TCB, that must be
|
|
____
|
|
shared by processors, are those representing resources
|
|
shared by processes running on the various processors. How-
|
|
ever, in the simulation just described, there are no such
|
|
shared resources. Devices in the network are local to net-
|
|
work components and are therefore accessed only by subjects
|
|
running on one processor in the computer system. No inter-
|
|
process communication takes place between processors (it is
|
|
all via external communication channels), and the only
|
|
shared global memory required is for the table controlling
|
|
global memory allocated to the subjects, of which there is
|
|
none.
|
|
|
|
Thus, in the particular network simulation described,
|
|
despite the potential for shared resources assumed by the
|
|
underlying TCB, that potential is never exercised. The par-
|
|
titioning of code and data described allows the internal
|
|
restructuring of the TCB in such a way that the TCB is par-
|
|
titioned and removed to processor local memory throughout,
|
|
with no residual code or data in global memory. This inter-
|
|
nal restructuring in no way affects the operation of the
|
|
system and in no way impacts its compliance with the TCSEC
|
|
Criteria (for the specific application).
|
|
|
|
Another result of the described partitioning and local-
|
|
ization of the TCB is that no communication ever takes place
|
|
over the system bus: all of the TCB tables may be locked
|
|
locally so that no inter-processor communication within the
|
|
TCB is required, and there are no global memory segments.
|
|
It follows that the bus may be completely severed without
|
|
affecting either the operation of the system or its compli-
|
|
ance (in this particular case) with the Criteria. An
|
|
interesting observation is that no single step in the res-
|
|
tructuring described can be regarded as changing the fact
|
|
that the collection of processors is utilizing a single TCB,
|
|
which is compliant with the Criteria. It is this observa-
|
|
tion that impels one to conclude that a single TCB can be
|
|
properly implemented as a collection of TCB partitions.
|
|
|
|
The resulting partitioned TCB is now examined. Within
|
|
the TCB are a set of (trusted or untrusted, as appropriate)
|
|
I/O device drivers, one for each I/O device. As con-
|
|
structed, a particular device is utilized only by the sub-
|
|
jects being executed by a single processor: the driver sub-
|
|
ject for that device exists, but is quiescent, on all other
|
|
processors (because none of the application subjects are
|
|
attempting to utilize that device). The driver subject, its
|
|
code, and its data may therefore be removed from the TCB
|
|
partitions for all of the processors except that for which
|
|
the device is local. Again, the system remains a valid
|
|
interpretation of the model, and remains compliant with the
|
|
Criteria.
|
|
|
|
The resulting system still has only one TCB, parti-
|
|
tioned among a number of asynchronous processors, with the
|
|
code and data for supporting various devices provided only
|
|
within those TCB partitions where they are needed to support
|
|
local devices. The only links between the physical proces-
|
|
____
|
|
sors are the various single- and multi-level communication
|
|
channels provided. These channels are afforded, it has been
|
|
assumed, the appropriate levels of physical security by com-
|
|
munications security techniques, just as they would be if
|
|
they were media connecting a computer to a remote terminal:
|
|
the provision of this physical security is an axiom in the
|
|
_____
|
|
context of evaluating the validity of the system from a
|
|
``computer security'' point of view. (This is discussed
|
|
fully in section B.6, as the importance of communications
|
|
security techniques in the context of a network of systems
|
|
must not be trivialized).
|
|
|
|
Each processor, and its associated devices, is now
|
|
packaged in a separate physical box. There is now little
|
|
difference between the hypothesized ``monolithic computer
|
|
system'' (with an admittedly very specialized application
|
|
running on it) and the network originally hypothesized. The
|
|
single TCB of the partitioned ``monolithic system'' remains
|
|
a single TCB, which has, however, been transformed into a
|
|
______
|
|
collection of TCB partitions, each of which is responsible
|
|
for enforcing access control policy within its ``local par-
|
|
tition'', or component.
|
|
|
|
The TCB in a particular box may now be replaced by an
|
|
equivalent TCB (that is, a TCB with the same top-level
|
|
specifications, and with an equivalent degree of assurance)
|
|
without impacting the overall security of the system or its
|
|
adherence to the TCSEC Criteria. In fact, both the hardware
|
|
and software TCB bases within a partition could be replaced,
|
|
as long as the replacement has the same (or greater) evalua-
|
|
tion class and completely honors the interface protocols
|
|
(and thus, for example, correctly receives and transmits
|
|
labeled datagrams) defined for the devices connecting it it
|
|
with the other processors.
|
|
|
|
Finally, the particular Formal Security Policy Models
|
|
upon which the TCBs within each box are based might be
|
|
allowed to differ without adverse impact, so long as each
|
|
model used was a valid representation of the single Network
|
|
Security Policy to be enforced, as allocated to the activi-
|
|
ties of the application subjects within the box.
|
|
|
|
B.4.7. Conclusions Regarding the Simulation Argument
|
|
_ _ _ ___________ _________ ___ __________ ________
|
|
|
|
This informal argument shows how a network of process-
|
|
ing nodes, which are ``locally autonomous'' (with respect to
|
|
their enforcement of a global Security Policy for access
|
|
controls), can be simulated upon a clearly evaluatable
|
|
monolithic system with a security kernel, and, in turn, how
|
|
that system can be physically partitioned into a confedera-
|
|
tion of components, each with its own TCB partition. The
|
|
resulting system is the originally desired network in all of
|
|
its essential features, and is clearly in harmony with the
|
|
intent of the TCSEC Criteria. This argument provides an
|
|
intuitive basis for the interpretation of the Criteria pro-
|
|
vided in the TNI. It also shows the sense in which the col-
|
|
lection of NTCB partitions may be viewed as forming a single
|
|
______
|
|
NTCB: there is a single NTCB because there is a single Secu-
|
|
rity Policy for the network, which is locally enforced by
|
|
each NTCB partition upon its local subjects and objects
|
|
(i.e., upon the resources it controls).
|
|
|
|
Of significance for the design and evaluation of net-
|
|
works targeted for the higher evaluation classes is the fact
|
|
that under the assumptions that an overall Network Security
|
|
Policy has been defined, and that the communication channels
|
|
between components function correctly, (i.e., maintain the
|
|
proper associations between labels, user identifications,
|
|
clearances, and names of objects), there is no compelling
|
|
reason to insist that the required assurance for each pro-
|
|
cessing node be obtained using the same Formal Security Pol-
|
|
icy Model.
|
|
|
|
B.5. Cooperation Among Partitions
|
|
_ _ ___________ _____ __________
|
|
|
|
In this section we focus on that part of the NTCB out-
|
|
side the security kernel, i.e., that part involved in the
|
|
implementation of supporting policies and typically carried
|
|
out by trusted subjects. Some non-kernel NTCB functions are
|
|
essentially the same as those normally provided in a non-
|
|
networked trusted computer system, such as login authentica-
|
|
tion of local users. Such functions in an NTCB partition
|
|
can be understood in terms of the services they perform
|
|
within the network component.
|
|
|
|
Other non-kernel NTCB functions provide distinctively
|
|
network-related services that can best be understood in the
|
|
context of the network security architecture. We shall
|
|
refer to these as trusted network services. Very often, an
|
|
essential task of these functions is to implement a protocol
|
|
for conveying security-critical information between trusted
|
|
subjects in different components. The trusted protocol is
|
|
not an end in itself, but a means to accomplish services for
|
|
which cooperation between NTCB partitions is needed. A sim-
|
|
ple example would be the need to change the security level
|
|
of a single-level communications channel. While each com-
|
|
ponent could internally relabel the I/O device connected to
|
|
its own end of a channel, a trusted protocol is required to
|
|
coordinate the changes.
|
|
|
|
In this section there will be two brief examples illus-
|
|
trating the relationship between a network security archi-
|
|
tecture and an associated trusted network service. One
|
|
example network uses trusted network interface units and
|
|
protected wire distribution, and the other uses end-to-end
|
|
encryption. After the examples, design specification and
|
|
verification of trusted network services will be discussed.
|
|
|
|
B.5.1. Trusted Interface Unit Example
|
|
_ _ _ _______ _________ ____ _______
|
|
|
|
Consider a network in which untrusted hosts operating
|
|
at various single security levels communicate through
|
|
trusted network interface units (TIU's) that send and
|
|
receive labeled messages in the clear over a protected com-
|
|
munication subnet. The function of a TIU is to place mes-
|
|
sage sensitivity labels on outgoing messages, and to check
|
|
labels on incoming messages, so that hosts may send and
|
|
receive only messages labeled in accordance with their
|
|
accreditation.
|
|
|
|
Because the communication subnet carries messages at
|
|
all levels, the I/O device connecting any TIU and the subnet
|
|
is single-level system-high. But the connection between any
|
|
TIU and its host is at the level of the host. Thus, a TIU
|
|
for a low-level host must contain a trusted subject that
|
|
reads high and writes low.
|
|
|
|
There is a trusted protocol in this example, though it
|
|
is relatively trivial, since it merely identifies a header
|
|
field in each message that should contain a sensitivity
|
|
label, and perhaps also a checksum to guard against
|
|
transmission errors. A protocol of this kind is required
|
|
whenever information is exported or imported over a mul-
|
|
tilevel communications channel. See section 3.1.1.3.2.1 of
|
|
Part I of this document.
|
|
|
|
B.5.2. End-to-End Encryption Example
|
|
_ _ _ ___ __ ___ __________ _______
|
|
|
|
Consider a network in which hosts operating at various
|
|
security levels communicate through trusted front-end pro-
|
|
cessors (TFE's) that send and receive encrypted messages
|
|
over a public communication subnet. Suppose that the TFE's
|
|
obtain encryption keys at the level of the information to be
|
|
protected from a central key distribution center (KDC) sup-
|
|
porting the various security levels of the network, attached
|
|
to the network in the same way as a host. A key is sent
|
|
from the KDC to a TFE upon request, using an appropriately
|
|
certified protocol that authenticates both the requester and
|
|
the new key.
|
|
|
|
The purpose of key distribution is really to support a
|
|
trusted local service within the TFE, namely, the ability to
|
|
transform classified messages from the host into unclassi-
|
|
fied encrypted messages suitable for transmission over the
|
|
subnet. In other words, there is a trusted subject that
|
|
reads high and writes low.
|
|
|
|
Part of the trusted network service is implemented
|
|
within the KDC, which must generate new keys for the level
|
|
of information being communicated, and must also decide, on
|
|
the basis of an access control policy, which TFE's may share
|
|
keys. A single level subject in the KDC at the level of the
|
|
information which the key is for does not necessarily
|
|
require privileged treatment from the kernel in the KDC;
|
|
however, such trusted network service subjects at the vari-
|
|
ous levels must correctly implement a certain policy and a
|
|
certain protocol.
|
|
|
|
B.5.3. Design Specification and Documentation
|
|
_ _ _ ______ _____________ ___ _____________
|
|
|
|
To obtain the level of assurance needed for systems of
|
|
Evaluation Class A1, a formal top-level specification (FTLS)
|
|
of the NTCB is required, including a component FTLS for each
|
|
NTCB partition. As in the case of stand-alone computer sys-
|
|
tems, non-kernel portions of the NTCB must be specified even
|
|
though they support policies that are not part of the access
|
|
control policy represented in the formal security policy
|
|
model. In particular, software supporting trusted network
|
|
services in each component must be specified.
|
|
|
|
Where a trusted network service supporting the manda-
|
|
tory policy depends on a protocol, the protocol will neces-
|
|
sarily appear in FTLS of some component(s) of the network.
|
|
As a minimum, the role of the trusted subject in each NTCB
|
|
partition will be implicit in each component FTLS. Trying
|
|
to understand a protocol by looking at each participating
|
|
process separately, however, is like trying to read a play
|
|
in which the lines have been sorted by character. For pur-
|
|
poses of documentation, it is desirable to provide a
|
|
representation of each trusted protocol in a fashion that
|
|
exhibits the interactions between participants, and the
|
|
correspondence between this representation and the relevant
|
|
parts of component FTLS's should be shown.
|
|
|
|
Just as the FTLS of a stand-alone TCB contains
|
|
representations of operating system conceptual entities,
|
|
such as processes, devices, memory segments, and access
|
|
tables, the FTLS of an NTCB contains representations of pro-
|
|
tocol entities and concepts, such as connections, where they
|
|
occur, such as in trusted network service specifications.
|
|
|
|
In the end-to-end encryption example, correspondence of
|
|
the FTLS to the trusted network services supporting policy
|
|
should include the demonstration of at least the properties
|
|
that all data transmitted over the communication subnet is
|
|
encrypted with the proper key (e.g., for the correct secu-
|
|
rity level), and that the KDC allows keys to be shared only
|
|
in accordance with its access control restrictions. Both
|
|
properties might be stated and proved in terms of connec-
|
|
tions between hosts. In the trusted interface unit example,
|
|
the correspondence should show that each TIU marks and
|
|
checks message labels in accordance with a given host label.
|
|
|
|
B.5.4. Summary
|
|
_ _ _ _______
|
|
|
|
Some non-kernel NTCB functions in a network may be
|
|
characterized as trusted network services. They provide
|
|
trusted protocols to implement security-critical cooperation
|
|
between trusted subjects in different NTCB partitions.
|
|
Showing correspondence between the FTLS for these services
|
|
and their supporting policies implies proving certain pro-
|
|
perties, expressed in terms of network-specific concepts,
|
|
which convey essential features of the network security
|
|
architecture.
|
|
|
|
B.6. Communication Channels Between Components
|
|
_ _ _____________ ________ _______ __________
|
|
|
|
In this section the communication channels used to con-
|
|
nect components are examined more closely, with the goal of
|
|
understanding when the characteristics of a particular chan-
|
|
nel are relevant to the security characteristics of the sys-
|
|
tem, how the characteristics of such a channel are to be
|
|
evaluated and related to the overall evaluation of the net-
|
|
work, and those factors that must be deferred to the assess-
|
|
ment of the adequacy of the network to support a particular
|
|
application of it preceding its accreditation.
|
|
|
|
The discussion is organized into the following major
|
|
parts. In section B.6.1, the notion of a ``communication
|
|
channel'' is related to the technical terminology provided
|
|
by the TCSEC Glossary. In section B.6.2, the notion of a
|
|
``Security-Compliant communication channel'' is defined.
|
|
The remaining parts of the section discuss the important
|
|
cases of channels that are single-level and multilevel (in
|
|
the mandatory policy sense).
|
|
|
|
B.6.1. Basic Notion of A Communication Channel
|
|
_ _ _ _____ ______ __ _ _____________ _______
|
|
|
|
For the purposes of the TNI the network is viewed as a
|
|
system of components, connected (at the physical layer) by
|
|
communication channels. The term ``communication channel''
|
|
is used as a refinement of the term ``channel'', defined in
|
|
the TCSEC Glossary as ``an information transfer path within
|
|
a system.'' The term may also refer to the mechanism by
|
|
which the path is effected. It is further required, for the
|
|
purposes of applying the TNI to a network, that the network
|
|
architecture be formulated in sufficient detail that all
|
|
communication channels are Security-Compliant as defined
|
|
below.
|
|
|
|
``Point-to-point'' communication channels are discussed
|
|
first. The notions of ``communication channel'' and ``I/O
|
|
device'' are distinct: a point-to-point communication chan-
|
|
nel is viewed as consisting of two I/O devices (each local
|
|
to the component it is attached to) coupled by a communica-
|
|
tions medium (which may in reality consist of a complex
|
|
arrangement of internal devices, switches, and communica-
|
|
tions links). From the point of view of the components,
|
|
information is transmitted via the transmitting and receiv-
|
|
ing devices in a sufficiently error-free, physically secure
|
|
fashion to merit the particular labels associated with the
|
|
device. It is, of course, the concern of both the sponsor
|
|
and evaluator of a particular network to confirm that this
|
|
condition is met to an appropriate level of assurance,
|
|
depending upon the security policy allocated to the channel.
|
|
This requirement, which is a boundary condition upon which
|
|
the evaluation of the NTCB partition itself, will typically
|
|
be met by a combination of error-detection and recovery
|
|
techniques, cryptographic techniques, and other communica-
|
|
tions security techniques as addressed in Section 9 of Part
|
|
II.
|
|
|
|
|
|
(Note: Figure not included)
|
|
|
|
Figure B1. Point-to-point communication channel.
|
|
|
|
For example, two processing nodes connected by a single
|
|
channel would be modeled as shown in Figure B1. Here, we
|
|
would speak of processing component P1 using I/O Device D1
|
|
to communicate, via I/O Device D2, with processing component
|
|
P2. D1 and D2 are assumed to be linked by some sort of phy-
|
|
sical medium M (perhaps a set of wires, perhaps something
|
|
more complicated.) Subject S1 in component P1 may transmit
|
|
information to a subject S2 in P2 as follows: each subject
|
|
obtains an object of the appropriate class for use as a
|
|
buffer. Each subject attaches its locally available device.
|
|
Subject S1 in P1 then transmits the information in its
|
|
buffer to D1; subject S2 receives the information via D2 in
|
|
its buffer. Note that in this description, it was quite
|
|
unnecessary to introduce the notion of either a shared
|
|
object or a shared device. Of course, the details of the
|
|
inter-communication will depend upon a shared communications
|
|
protocol.
|
|
|
|
Broadcast communication channels are only slightly dif-
|
|
ferent, from the point of view adopted within the TNI, from
|
|
point-to-point communication channels. Instead of a pair of
|
|
I/O devices linked by a physical medium, there is a set of
|
|
I/O devices linked by a physical medium. Each device may be
|
|
a receiver, a transmitter, or a transceiver in nature. It
|
|
is assumed that anything transmitted by a transmitter can be
|
|
received by any receiver. (It is, of course, determined by
|
|
the communication protocols being executed by the various
|
|
devices whether reception actually results in any meaningful
|
|
action by a particular receiver.)
|
|
|
|
B.6.2. Security-Compliant Channels as the Basis for Evalua-
|
|
_ _ _ ________ _________ ________ __ ___ _____ ___ _______
|
|
tion
|
|
____
|
|
|
|
Communication channels in trusted network architecture
|
|
must be Security-Compliant. A channel is Security-Compliant
|
|
________ _________
|
|
if the enforcement of the network policy depends only upon
|
|
characteristics of the channel either (1) included in the
|
|
evaluation, or (2) assumed as a installation constraint and
|
|
clearly documented in the Trusted Facility Manual. The first
|
|
approach tends to produce evaluated network systems whose
|
|
security characteristics are relatively immune to installa-
|
|
tion or configuration choices. The second approach yields
|
|
evaluated network systems whose security is more strongly
|
|
conditioned upon the appropriateness of installation or con-
|
|
figuration choices; however, the conditions and limitations
|
|
of the evaluation are clearly documented.
|
|
|
|
The overall security of the network can be assessed by
|
|
verifying the correctness of the NTCB partitions (an evalua-
|
|
tion issue) and by verifying that the required environmental
|
|
constraints documented for all communications channels are,
|
|
in fact, met by the installation (an accreditation issue).
|
|
The thrust of this section is to show that channels that are
|
|
not Security-Compliant may be reduced to Security-Compliant
|
|
channels so that the resulting architecture will support a
|
|
viable network evaluation. Three general techniques are
|
|
available for rendering a channel Security-Compliant: 1) the
|
|
utilization of the channel for security-critical transmis-
|
|
sions may be restricted by using controls internal to the
|
|
NTCB partitions of the components linked by the channel; 2)
|
|
end-to-end communications technologies (such as encryption)
|
|
may be installed and evaluated as part of the linked NTCB
|
|
partitions to eliminate the influence of the channel's phy-
|
|
sical environment on the security properties of the channel;
|
|
and 3) constraints on the intrinsic characteristics assumed
|
|
for the channel may be documented in the Trusted Facilities
|
|
Manual. The last approach, in effect, reserves determination
|
|
of the adequacy of a particular channel to the accreditor:
|
|
the evaluation proper will be based upon a communications
|
|
channel, which will be assumed to have the desired charac-
|
|
teristics.
|
|
|
|
The evaluation effort is focused upon establishing the
|
|
correctness of the technique, or combination of techniques
|
|
employed. The adequacy of the mechanisms is an accreditation
|
|
issue. For example, the issues related to the adequacy of
|
|
data confidentiality service are discussed in Part II.
|
|
|
|
A channel can be made Security-Compliant by using a
|
|
combination of the above techniques: cryptographic sealing,
|
|
for example, addresses the issues of both prevention of
|
|
unauthorized modification and error-detection. In evaluating
|
|
each channel, three vulnerabilities related to external
|
|
environmental factors and one related to internal exploita-
|
|
tion must be addressed. They are as follows:
|
|
|
|
1. Communication security - unauthorized disclosure or
|
|
modification of sensitive information in transit
|
|
|
|
2. Communication reliability - unreliable delivery of
|
|
information, (e.g., non-delivery, misdelivery, and
|
|
delivery of erroneous data) the delivery of which is
|
|
required for the correct operation of the NTCB (such
|
|
as audit records or inter-partition security coordi-
|
|
nation)
|
|
|
|
3. Communication fidelity - changes to security-
|
|
critical data, such as transmitted security labels,
|
|
due to noise. (Note that changes due to unauthor-
|
|
ized modification are categorized as a communica-
|
|
tions security problem)
|
|
|
|
4. Covert signaling - manipulation of the channel
|
|
mechanisms to signal information covertly
|
|
|
|
The use of a channel as a covert signaling mechanism
|
|
will be evaluated in the normal course of events (if
|
|
required by the Criteria) when the required covert channel
|
|
analysis of the channel drivers, which are part of the
|
|
linked NTCB partitions, is performed. See the Covert Chan-
|
|
nel Analysis section in Part I. Techniques for addressing
|
|
the remaining three vulnerabilities are listed below.
|
|
|
|
The first vulnerability, to the security of sensitive
|
|
information in transit, must be addressed by one or more of
|
|
the following techniques:
|
|
|
|
1. Documenting a constraint in the Trusted Facilities
|
|
Manual that the installed channel be completely con-
|
|
tained within an adequate security perimeter
|
|
(thereby deferring an assessment of compliance to
|
|
accreditation)
|
|
|
|
2. Providing, for the channel, suitable end-to-end com-
|
|
munications security techniques which are documented
|
|
and evaluated as part of the NTCB partitions linked
|
|
by the channel
|
|
|
|
3. Restricting utilization of the channel to the
|
|
transmission of non-sensitive information by means
|
|
of controls internal to the NTCB partitions linked
|
|
by the channel
|
|
|
|
Vulnerability of a channel to the unreliable delivery
|
|
of security-critical information must be addressed by one or
|
|
more of the following techniques:
|
|
|
|
1. Documenting a constraint in the Trusted Facilities
|
|
Manual that the channel be comprised of intrinsi-
|
|
cally reliable media and devices (thereby deferring
|
|
an assessment of compliance to accreditation)
|
|
|
|
2. Providing for the channel suitable end-to-end proto-
|
|
cols for the reliable transmission of information
|
|
within the NTCB partitions coupled by the channel,
|
|
which will thereby be evaluated for correctness
|
|
|
|
3. Restricting use of the channel to transmissions, the
|
|
delivery of which is not critical to the functioning
|
|
of the NTCB, by means of controls internal to the
|
|
NTCB partitions linked by the channel, which will
|
|
thereby be evaluated for correctness
|
|
|
|
Vulnerability of a channel to noise, which may comprom-
|
|
ise the correctness of security-relevant data (such as secu-
|
|
rity labels) must be addressed by one or more of the follow-
|
|
ing techniques:
|
|
|
|
1. Documenting a constraint in the Trusted Facilities
|
|
Manual that the channel be comprised of intrinsi-
|
|
cally noise- free media and devices (thereby defer-
|
|
ring an assessment of compliance to accreditation)
|
|
|
|
2. Providing for the channel suitable end-to-end noise
|
|
reduction techniques within the NTCB partitions
|
|
linked by the channel, which will thereby be
|
|
evaluated for correctness
|
|
|
|
3. Restricting use of the channel to transmissions, the
|
|
noise-free delivery of which is not critical to the
|
|
functioning of the NTCB, by means of controls inter-
|
|
nal to the NTCB partitions linked by the channel,
|
|
which will thereby be evaluated for correctness
|
|
|
|
Three example scenarios are provided below, showing how
|
|
these techniques might be employed.
|
|
|
|
Example A. Two loosely-coupled trusted coprocessors,
|
|
_______ _
|
|
one in active use and the other in ``hot standby'', are to
|
|
be linked by a dedicated communications channel.
|
|
Significant amounts of dynamic, security-relevant data will
|
|
be exchanged over this channel. The channel must be trusted
|
|
to preserve label integrity and provide reliable and noise-
|
|
free delivery of security-critical data. Noise is not a
|
|
design issue. The channel must reside in a physically secure
|
|
environment.
|
|
|
|
The simplest evaluation strategy would be to document
|
|
the required environmental constraints in the Trusted Facil-
|
|
ities Manual: that the channel be placed within the
|
|
``system-high'' security perimeter, and that it be comprised
|
|
of intrinsically reliable and noise-free media and devices.
|
|
During evaluation the proper documentation of these con-
|
|
straints would be verified. Compliance of the selected chan-
|
|
nel in the physical installation to them would be an accred-
|
|
itation issue which, in this case, would (apparently) be
|
|
easy to verify. This evaluation approach would have the
|
|
advantage of allowing replacement of the original channel
|
|
with a higher-performance version without inducing re-
|
|
evaluation (although the system would have to be accredited
|
|
again).
|
|
|
|
Example B. Numerous single-level hosts (at several
|
|
_______ _
|
|
levels) are interconnected via a multilevel packet switch,
|
|
which emulates multiple point-to-point networks between com-
|
|
munities of hosts of the same level. Communications between
|
|
host and packet switch are in the clear the sensitivity
|
|
level of each host is determined at the switch by internally
|
|
labeling the hard-wired communication ports. The communica-
|
|
tion channel must be secure (separation of data of different
|
|
levels must be maintained), but it need be neither reliable
|
|
nor noise-free (from the point of view of security).
|
|
|
|
Two quite different approaches might be regarded as
|
|
suitable for the evaluation of this architecture. In the
|
|
first, (and most natural), the architecture would be refor-
|
|
mulated to show the packet switch as a network component,
|
|
connected to each host with a single-level channel. Network
|
|
documentation would then indicate that each of the new chan-
|
|
nels be constrained to be located within an appropriate
|
|
security perimeter (so that physical security is main-
|
|
tained), and that no security-critical information requiring
|
|
either reliability or fidelity is transmitted over them. The
|
|
second assertion would be verified during evaluation, and
|
|
the first during accreditation.
|
|
|
|
A second (radical) approach would be to insist that the
|
|
packet switch is part of the communication channel. In this
|
|
case, it is difficult to see how the required Security-
|
|
Compliance is to be attained while encompassing the packet
|
|
switch within the evaluation, as end-to-end techniques are
|
|
not in use, and it is obvious that sensitive information is
|
|
being transmitted. The sponsor could document a constraint
|
|
upon the interconnection of hosts that the (nominally
|
|
point-to-point) channels be each confined within a security
|
|
perimeter, thereby excluding the packet switch from evalua-
|
|
tion, but it is also then dropped from the description of
|
|
the network being evaluated, and is replaced by ``nomi-
|
|
nally'' Security-Compliant point-to-point channels, docu-
|
|
mented in the Trusted Facilities Manual. The decision to use
|
|
a particular multilevel packet switch to meet the documented
|
|
requirement for an adequate security perimeter between the
|
|
point-to-point virtual channels would then be the responsi-
|
|
bility of the accreditor of such a system alone. In effect,
|
|
such a strategy when applied to the system described is a
|
|
decision to use the techniques described in Appendix C (the
|
|
system actually evaluated is an uninteresting subset of the
|
|
originally envisioned system)
|
|
|
|
Example C. Two trusted multilevel systems are to con-
|
|
_______ _
|
|
duct file transfers over a channel, which is intrinsically
|
|
noisy, unreliable, and insecure. The data is to be encrypted
|
|
and cryptographically sealed. Reliable transmission is
|
|
enforced by non-NTCB software. (This is not security-
|
|
relevant, however, because the loss of a data packet is not
|
|
an insecurity).
|
|
|
|
The communications security and cryptographic sealing
|
|
techniques must be included within the evaluated NTCB parti-
|
|
tions. Assessment of their correctness will be part of the
|
|
evaluation, and assessment of their adequacy, based upon the
|
|
true sensitivity of the information transferred, will be
|
|
part of the accreditation. In order to address channel reli-
|
|
ability, the NTCB internal control mechanisms preventing the
|
|
utilization of the channel for security data needing to be
|
|
transmitted reliably must be documented and evaluated (in
|
|
this case, the argument is probably the degenerate case:
|
|
that no such information exists.) See, for example, the
|
|
Encryption Mechanism section in Part II.
|
|
|
|
B.6.3. TCSEC Criteria for Multilevel Communication Channels
|
|
_ _ _ _____ ________ ___ __________ _____________ ________
|
|
|
|
In this section, those TCSEC Criteria relevant to the
|
|
utilization of communication channels within networks are
|
|
examined, from the point of view of countering internal
|
|
threats. As the Criteria for Class A1 are the most
|
|
stringent and are a superset of the requirements for other
|
|
classes, they are the basis for the discussion.
|
|
|
|
The Class A1 Criteria (Section 4.1.1.3.4) requires that
|
|
``the TCB shall support the assignment of minimum and max-
|
|
imum security levels to all attached physical devices.'' The
|
|
basis for making this designation is also stated in Section
|
|
4.1.1.3.4: ``these sensitivity levels [i.e., for devices]
|
|
shall be used by the TCB to enforce constraints imposed by
|
|
the physical environments in which the devices are
|
|
located''.
|
|
|
|
In the case of a communication channel connecting com-
|
|
ponents of a network, the ``physical environment'' must be
|
|
interpreted to include the environment of the devices and
|
|
the medium linking them. The range of access classes (from
|
|
the Network Mandatory Access Control Policy) to be assigned
|
|
to the channel must take into account the physical security
|
|
afforded to the medium, the communications security tech-
|
|
niques that have been applied to the secure information
|
|
being transmitted through the medium, the physical accessi-
|
|
bility of the devices involved in the channel, and the
|
|
intended use of the channel from an architectural point of
|
|
view for the network. Within these constraints, the Cri-
|
|
teria cited requires that the devices comprising the channel
|
|
be appropriately labeled (with, it may be inferred, locally
|
|
``appropriate'' internal labels). For example, a particular
|
|
channel may be designed to support the transmission of
|
|
UNCLASSIFIED through SECRET information. The receivers and
|
|
transmitters coupling the transmission medium to the hosts
|
|
(assuming all hosts receive and transmit at all levels) must
|
|
be labeled within each host with whatever the local internal
|
|
labels are designating the UNCLASSIFIED through SECRET
|
|
range. That such labels exist is guaranteed by the require-
|
|
ment to interpret properly a network Security Policy for
|
|
each NTCB partition.
|
|
|
|
In addition to the labeling of devices coupling network
|
|
processing components to the communication channels which
|
|
may exist, the TCSEC requires, for multi-level channels,
|
|
that all information exported to, and imported from, the
|
|
channel be properly labeled: ``when exported by the TCB,
|
|
sensitivity labels shall accurately and unambiguously
|
|
represent the internal labels and shall be associated with
|
|
the information being exported'' (Section 4.1.1.3.2); furth-
|
|
ermore, ``when the TCB exports or imports an object [sic]
|
|
over a multilevel channel, the protocol used on that channel
|
|
shall provide the unambiguous pairing between the sensi-
|
|
tivity labels and the associated information that is sent or
|
|
received'' (Section 4.1.1.3.2.1). The interpretation of
|
|
these Criteria appears to be straightforward: in the context
|
|
of a network communication channel, they imply that informa-
|
|
tion be properly labeled when it is exported, that there be
|
|
a shared protocol between the exporting and importing dev-
|
|
ices which unambiguously and correctly maintains the label-
|
|
_____________ ___ _________
|
|
information association, and that the resulting imported
|
|
label be honored by the receiving NTCB partition. Note that
|
|
the requirement for integrity relative to label-data associ-
|
|
ations is clearly stated and need not be hypothesized as a
|
|
requirement specific to networks.
|
|
|
|
B.6.4. Single-Level Communication Channels
|
|
_ _ _ ______ _____ _____________ ________
|
|
|
|
The Criteria states that ``the TCB shall support the
|
|
assignment of minimum and maximum security levels to all
|
|
attached physical devices'' which ``enforce constraints
|
|
imposed by the physical environments in which devices are
|
|
located'' (Section 4.1.1.3.4). Note that this capability is
|
|
required to exist for all devices, whether ``single-level''
|
|
___
|
|
or ``multilevel''. The distinguishing characteristic of
|
|
``single-level devices and channels'' is stated in Section
|
|
4.1.1.3.2.2, ``single-level I/O devices and channels are not
|
|
required to maintain the sensitivity labels of the informa-
|
|
tion they process''. Thus, a device and/or channel which
|
|
does not support the transmission of labeled information is,
|
|
by definition, ``single-level''.
|
|
|
|
There are two cases: the minimum and maximum security
|
|
levels of the devices coupling the channel to the processing
|
|
nodes may be all the same, or not.
|
|
|
|
The case in which all of the minimum and maximum secu-
|
|
rity levels are identical is the normal case (for network
|
|
communication channels) of a channel which is to transmit
|
|
information of a single, invariant, sensitivity level.
|
|
|
|
It is also possible that the minimum and maximum ranges
|
|
of the various devices associated with a single-level chan-
|
|
nel are not all the same. In this case, the channel may
|
|
carry unlabeled information, but of only one sensitivity
|
|
level at a time. It is the responsibility of each NTCB par-
|
|
tition coupled to the channel to prevent the transmission of
|
|
information of a sensitivity level different from the
|
|
current level of the channel in accordance with Section
|
|
4.1.1.3.2.2, ``the TCB shall include a mechanism by which
|
|
the TCB and an authorized user reliably communicate to
|
|
designate the single security level of information imported
|
|
or exported via single-level communication channels or I/O
|
|
devices''. In the context of a partitioned NTCB, this means
|
|
that single-level channels may be defined as part of the
|
|
network architecture which can be manually shifted from the
|
|
transmission of one level of unlabeled information to
|
|
another by an authorized user. The natural interpretation
|
|
of the criterion cited above is that a reliable protocol
|
|
must exist for informing each NTCB partition involved in
|
|
controlling access to the channel that a change in level has
|
|
been ordered, prior to the transmission of any information
|
|
over the channel (so that the ``implied'' label can be
|
|
correctly assigned by each NTCB partition to information
|
|
received).
|
|
|
|
B.7. Miscellaneous Considerations
|
|
_ _ _____________ ______________
|
|
|
|
B.7.1. Reference Monitor, Security Kernel, and Trusted Com-
|
|
_ _ _ _________ _______ ________ ______ ___ _______ ____
|
|
puting Base
|
|
______ ____
|
|
|
|
The notion of a ``reference monitor'' is the primary
|
|
abstraction allowing an orderly evaluation of a stand-alone
|
|
computer system with respect to its abilities to enforce
|
|
both mandatory and discretionary access controls for the
|
|
higher evaluation Classes.
|
|
|
|
The TCSEC Glossary defines the ``Reference Monitor Con-
|
|
cept'' as ``an access control concept that refers to an
|
|
abstract machine that mediates all accesses to objects by
|
|
subjects''. Although the reference monitor abstraction
|
|
includes the notion of protection, the abstraction itself is
|
|
independent of any particular access control policy. The
|
|
abstraction assumes that a system is comprised of a set of
|
|
active entities called ``subjects'' and a set of passive
|
|
entities called ``objects''. The control over the relation-
|
|
ships between subjects and objects, i.e., the access of
|
|
objects by subjects, is mediated by the reference monitor in
|
|
such a way that only accesses permitted by the access con-
|
|
trol policy being enforced, are permitted by the reference
|
|
monitor. The reference monitor is thus the manager of the
|
|
physical resources of a system. A distinguishing feature of
|
|
the monitor is that there is a well-defined interface, or
|
|
``perimeter'', between the reference monitor itself and the
|
|
subjects and objects it controls. To be effective in pro-
|
|
viding protection, the implementation of a reference monitor
|
|
must be (1) tamper-proof, (2) always invoked, and (3) simple
|
|
enough to support the analysis leading to a high degree of
|
|
assurance that it is correct.
|
|
|
|
The hardware and software components of a computer sys-
|
|
tem implementing a reference monitor meeting these princi-
|
|
ples is called a ``security kernel'', defined in the TCSEC
|
|
Glossary as ``the hardware, firmware, and software elements
|
|
of a Trusted Computing Base that implement the reference
|
|
monitor concept. It must mediate all accesses, be protected
|
|
___
|
|
from modification, and be verifiable as correct''.
|
|
|
|
From this definition, it is apparent that a ``security
|
|
kernel'' (if there is one) is always part of the TCB of a
|
|
computer system, defined as ``the totality of protection
|
|
mechanisms within a computer system - including hardware,
|
|
firmware, and software - the combination of which is respon-
|
|
sible for enforcing a security policy ... the ability of a
|
|
Trusted Computing Base to correctly enforce a security pol-
|
|
icy depends solely on the mechanisms within the TCB and on
|
|
the correct input by system administrative personnel of
|
|
parameters (e.g., a users' clearance) related to the secu-
|
|
rity policy.'' In particular, the TCB includes those mechan-
|
|
isms involved in the implementation of supporting policies,
|
|
while the (included) security kernel (if there is one) is
|
|
involved only with the enforcement of access control poli-
|
|
cies.
|
|
|
|
B.7.2. Network Trusted Computer Base and Reference Monitor
|
|
_ _ _ _______ _______ ________ ____ ___ _________ _______
|
|
|
|
The notions of a TCB, and, for the higher evaluation
|
|
classes, security kernel and reference monitor can, with
|
|
suitable interpretation, be applied directly to the evalua-
|
|
tion of trusted networks without significant change. In
|
|
particular, the Network Trusted Computing Base can be
|
|
defined as the totality of protective mechanisms within the
|
|
network (including mechanisms provided by connected host
|
|
systems) responsible for enforcing the (overall) security
|
|
policy. Implied in this definition is the strong notion
|
|
that an evaluated network has a single NTCB, as the NTCB is,
|
|
______
|
|
by definition, the totality of enforcement mechanisms for
|
|
________
|
|
the stated policy.
|
|
|
|
For the higher evaluation classes the TCSEC requires,
|
|
in effect, that a reference monitor be implemented as part
|
|
of the TCB. This, at least in theory, is not the only con-
|
|
ceivable technology for implementing a highly-assured system
|
|
(one could envision a completely verified system, for
|
|
instance); however, it appears to be the only current tech-
|
|
nology with a proven track record, and within the current
|
|
state-of-the-art to be able to be implemented economically.
|
|
|
|
For these reasons, the Part I of the TNI takes a prag-
|
|
matic stance with regard to specifying interpretations for
|
|
Trusted Networks: that the TCSEC notions of ``reference mon-
|
|
itor'' and ``security kernel'' be applied in the network
|
|
system context with as little change as possible for the
|
|
higher evaluation classes. We therefore assume that the
|
|
NTCB of a Trusted Network of class B2 or above must contain
|
|
the physical realization of a reference monitor which medi-
|
|
ates all references within the networked system of subjects
|
|
to objects, is tamperproof, and is small enough, in aggre-
|
|
gate, to validate.
|
|
|
|
B.7.3. NTCB Partitions
|
|
_ _ _ ____ __________
|
|
|
|
The view taken of a ``network system'' throughout the
|
|
TNI is that the network can be partitioned into ``com-
|
|
ponents'', each of which has various processing and communi-
|
|
cation capabilities. Given such a decomposition, the func-
|
|
tions of the NTCB must be allocated in some coherent way to
|
|
the various components of the network.
|
|
|
|
The following terminology is introduced: the totality
|
|
of hardware, firmware, and software mechanisms within a sin-
|
|
gle network component which is responsible for enforcing the
|
|
security policy of the network, is called the NTCB partition
|
|
within that component. As the collection of network com-
|
|
ponents and communication channels is meant to be exhaustive
|
|
(i.e., every part of the network system, including hosts, is
|
|
accounted for) and disjoint (i.e., no parts are shared
|
|
between components), the NTCB partitions collectively are a
|
|
true partition of the NTCB; they are non-overlapping and
|
|
complete.
|
|
|
|
For Mandatory Access Control Policy, a large and useful
|
|
class of networks can be envisioned, which allows a clean
|
|
decomposition of the NTCB into NTCB partitions. The result-
|
|
ing partitions can be evaluated relative to enforcement of
|
|
mandatory access controls using conservative interpretations
|
|
of the TCSEC, and the correctness of the composition of
|
|
these components into a network enforcing the overall policy
|
|
for mandatory access controls is easily confirmable as well.
|
|
For sponsors wishing to obtain an overall evaluation class
|
|
for a network system, such a ``partitionable'' network
|
|
architecture should be chosen.
|
|
|
|
Concisely, the network architecture must have the fol-
|
|
lowing salient features: (1) subjects and objects within
|
|
multilevel processing components are given the usual TCSEC
|
|
interpretation; (2) subjects and objects are confined
|
|
within their individual components, i.e., no subjects may
|
|
directly access information within a different component
|
|
________
|
|
(In practice, this means there are no directly accessible,
|
|
shared memory registers); and (3) information representing
|
|
the access-relevant security state of the subjects and
|
|
objects within a component, is maintained locally by the
|
|
NTCB partition of that component. (It may be the case that
|
|
information representing the components state may be distri-
|
|
buted to other components for the purpose of overall network
|
|
control, recovery, etc. but the decision to permit or
|
|
prohibit access is always made locally, based on locally
|
|
available state information.
|
|
|
|
A network of host processors and peripherals, intercon-
|
|
nected according to these rules, may be roughly described,
|
|
with regard to security, as a network of ``loosely-coupled''
|
|
security kernels. Each security kernel is autonomous with
|
|
regard to the accesses made locally (i.e., within the com-
|
|
ponent whose resources the reference monitor controls). A
|
|
subject within one component may transmit data, under the
|
|
control of the two security kernels, to a subject in another
|
|
component. However, the basic principle to be seen at this
|
|
point is the following: because all accesses are local
|
|
(i.e., constrained to be by a subject within a component to
|
|
an object within that component), all accesses are mediated
|
|
by the security kernel within a component. Thus, the total-
|
|
ity of all of the security kernels within the system is ade-
|
|
quate to mediate all accesses made within the system.
|
|
|
|
B.8. Summary and Conclusions
|
|
_ _ _______ ___ ___________
|
|
|
|
In this Appendix, the rationale for the partitioning of
|
|
the NTCB into a set of cooperating, loosely-coupled NTCB
|
|
partitions has been presented. Each NTCB partition may be
|
|
viewed as a locally autonomous reference monitor, enforcing
|
|
the access of local subjects to local objects and devices.
|
|
Because the partitioning is carefully constrained to reflect
|
|
the lack of sharing of objects among components, (while
|
|
allowing the transmission of information between components
|
|
through shared physical media), the aggregate of locally
|
|
autonomous NTCB partitions is adequate to mediate all
|
|
accesses of subjects to objects and thus is adequate to form
|
|
the basis for a reference monitor for the entire network
|
|
system. Under the conditions of loose coupling assumed, the
|
|
specification of a network-wide Security Policy, properly
|
|
interpreted as an individual Formal Security Policy Model
|
|
for each component enforcing access controls, suffices to
|
|
provide the basis for demonstrations that each component
|
|
meets the requirements of the Security Policy. The postu-
|
|
lated network architecture and design (that are presented by
|
|
the network sponsor) suffices to allow evaluation of the
|
|
supporting policy capabilities required to attain the tar-
|
|
geted evaluation class.
|
|
|
|
|
|
APPENDIX C
|
|
________ _
|
|
|
|
|
|
Interconnection of Accredited AIS
|
|
_______________ __ __________ ___
|
|
|
|
|
|
|
|
C.1. Purpose
|
|
_ _ _______
|
|
|
|
As was discussed in the Introduction to this document,
|
|
there are many "networks" that can not be meaningfully
|
|
evaluated as a ``single trusted system'' because they are
|
|
sufficiently complex and heterogeneous that no single
|
|
evaluation rating can adequately reflect the trust that can
|
|
be placed in the "network". The purpose of this Appendix is
|
|
to provide guidance concerning how to interconnect systems
|
|
in such a way that mandatory security policies are not
|
|
violated.
|
|
|
|
C.1.1. Problem Statement
|
|
_ _ _ _______ _________
|
|
|
|
The interconnected accredited Automated Information
|
|
System (AIS) view is an operational perspective which recog-
|
|
nizes that parts of the network may be independently
|
|
created, managed, and accredited. Interconnected accredited
|
|
AIS consist of multiple systems (some of which may be
|
|
trusted) that have been independently assigned accreditation
|
|
ranges, reflecting the various sensitivity levels of infor-
|
|
mation that may be simultaneously processed on that system.
|
|
In this view, the individual AIS may be thought of as "dev-
|
|
ices" with which neighboring systems can send and receive
|
|
information. Each AIS is accredited to handle sensitive
|
|
information at a single level or over a range of levels.
|
|
|
|
An example of when the interconnected accredited AIS
|
|
view is necessary is a network consisting of two A1 systems
|
|
and two B2 systems, all of which are interconnected and all
|
|
of which may be accessed locally by some users. It is easy
|
|
to see that, if we regard this as a single trusted system,
|
|
it would be impossible for it to achieve a rating against
|
|
Part I of this document higher than B2. This might not be an
|
|
accurate reflection of the trust that could be placed in the
|
|
two A1 systems and interconnections between them. The sin-
|
|
gle rating of B2 assigned to this network could be mislead-
|
|
ing.
|
|
|
|
While it provides much less information about a system
|
|
than does a meaningful evaluation rating, taking the inter-
|
|
connected accredited AIS view of the network provides gui-
|
|
dance on appropriate interconnection strategies.
|
|
|
|
C.1.2. Component Connection View and Global Network View
|
|
_ _ _ _________ __________ ____ ___ ______ _______ ____
|
|
|
|
There are two aspects of the Interconnected Accredited
|
|
AIS view of a network that must be addressed: the component
|
|
connection view and the global network view. These two
|
|
views are discussed below and will be examined in greater
|
|
detail later in this Appendix.
|
|
|
|
Any AIS that is connected to other AIS must enforce an
|
|
"Interconnection Rule" that limits the sensitivity levels of
|
|
information that it may send or receive. Using the com-
|
|
ponent connection view, each component responsible for main-
|
|
taining the separation of multiple levels of information
|
|
must decide locally whether or not information can be sent
|
|
or received. This view, then, does not require a component
|
|
to know the accreditation ranges of all other components on
|
|
the network; only of its immediate neighbors (i.e., those
|
|
with which it can communicate without an intermediary).
|
|
|
|
In addition to the Interconnection Rule, there may be
|
|
other constraints placed on a network to combat potential
|
|
security problems. The global network view is a way of
|
|
addressing some of the other constraints placed on a net-
|
|
work. This view requires one to have a knowledge of the
|
|
accreditation ranges of all components of the system. These
|
|
accreditation ranges are taken into account when determining
|
|
whether or not a component should be allowed to connect to
|
|
the system. In this way, the potential damage that can
|
|
occur when information is compromised or modified can be
|
|
limited to an acceptable level.
|
|
|
|
An example of a problem for which constraints may be
|
|
placed on the network is what is called the "Cascading Prob-
|
|
lem." This occurs when AIS are interconnected in such a way
|
|
that the potential damage from unauthorized disclosure or
|
|
modification is above an acceptable level. The network
|
|
sponsor may wish to limit the damage that can occur by lim-
|
|
iting the accreditation ranges of AISs that can be intercon-
|
|
nected.
|
|
|
|
C.2. Accreditation Ranges and the Interconnection Rule
|
|
_ _ _____________ ______ ___ ___ _______________ ____
|
|
|
|
C.2.1. Accreditation Ranges
|
|
_ _ _ _____________ ______
|
|
|
|
The AIS accreditation range reflects the judgement of
|
|
the accreditor on the ability of the component to appropri-
|
|
ately segregate and manage information with respect to its
|
|
network connections in accord with the designated sensi-
|
|
tivity levels. An ADP system that has been accredited for
|
|
(stand-alone) system high operation would be assigned an
|
|
accreditation range having a single sensitivity level equal
|
|
to the system high sensitivity level of the system. Such a
|
|
system is not relied upon to segregate the several actual
|
|
levels of information processed. All the information
|
|
exported from such a system must be labeled with the
|
|
system-high sensitivity label until there is a competent
|
|
manual review to assign a lower level. A multilevel
|
|
(stand-alone) AIS might be assigned an accreditation range
|
|
equal to the entire set of levels processed. In this case,
|
|
the label of the exported data is equal to the actual level
|
|
of the data processed within the accredited range.
|
|
|
|
In a network context, the accreditation range bounds
|
|
the sensitivity levels of information that may be sent
|
|
(exported) to or received (imported) from other components.
|
|
If a network has only dedicated and system-high components,
|
|
each component will be assigned single-valued accreditation
|
|
ranges (i.e., an accreditation range consisting of one sen-
|
|
sitivity level).
|
|
|
|
Consider an example, illustrated in Figure C1, which
|
|
uses accreditation ranges along with an approach based on
|
|
the Environmental Guidelines.- Component A is a class B2
|
|
_____________ __________
|
|
system and has an accreditation range of CONFIDENTIAL
|
|
through SECRET. Component B is a class A1 system and has an
|
|
accreditation range of CONFIDENTIAL through TOP SECRET.
|
|
Thus, if Component A has a direct connection to Component B,
|
|
the accreditation ranges provide a basis for both components
|
|
to be assured that any data sent or received will not
|
|
"exceed" (that is, will be dominated by) SECRET in its clas-
|
|
sification.
|
|
|
|
Figure C1. Accreditation Ranges Illustrated
|
|
______ __ _____________ ______ ___________
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
|
|
C.2.2. Interconnection Rule
|
|
_ _ _ _______________ ____
|
|
|
|
A multilevel network is one in which some users do not
|
|
have the necessary clearances for all information processed.
|
|
A multilevel network therefore is one that processes a range
|
|
of sensitive information, which must be protected from unau-
|
|
thorized disclosure or modification.
|
|
|
|
Each component of the network must be separately
|
|
accredited to operate in an approved security mode of opera-
|
|
tion and for a specific accreditation range. The component
|
|
is accredited to participate in the network at those levels
|
|
and only those levels.
|
|
|
|
According to this definition, a multilevel network may
|
|
comprise a mixture of dedicated, system high, compartmented,
|
|
controlled, and multilevel components, where two or more
|
|
differ in their classification categories and/or compart-
|
|
ments, and/or some users do not have all formal access
|
|
approvals.
|
|
|
|
The following requirement must be met in multilevel
|
|
networks.
|
|
_________________________
|
|
- Security Requirements: Guidance for Applying the
|
|
________ ____________ ________ ___ ________ ___
|
|
Department of Defense Trusted Computer System Evalua-
|
|
__________ __ _______ _______ ________ ______ ______
|
|
tion Criteria in Specific Environments,CSC-STD-003-85
|
|
____ ________ __ ________ ____________
|
|
|
|
|
|
|
|
C.2.2.1. Information Transfer Restrictions
|
|
_ _ _ _ ___________ ________ ____________
|
|
|
|
Each I/O device used by an AIS to communicate with
|
|
other AIS must have a device range associated with it. The
|
|
device range may be a single level, or it may be a set of
|
|
levels (in which case the device is referred to as mul-
|
|
tilevel), and it must be included within the AIS accredita-
|
|
tion range.
|
|
|
|
Information exported or imported using a single-level
|
|
device is labeled implicitly by the security level of the
|
|
device. Information exported from one multilevel device and
|
|
imported at another must be labeled through an agreed-upon
|
|
protocol, unless it is labeled implicitly by using a commun-
|
|
ication link that always carries a single level.
|
|
|
|
Information exported at a given security level can be
|
|
sent only to an importing device whose device range contains
|
|
that level or a higher level. If the importing device range
|
|
does not contain the given level, the information is rela-
|
|
beled upon reception at a higher level within the importing
|
|
device range. Relabeling should not occur otherwise.
|
|
|
|
C.2.2.2. Discussion
|
|
_ _ _ _ __________
|
|
|
|
The purpose of device labels is to reflect and con-
|
|
strain the security levels of information authorized for the
|
|
physical environment in which the devices are located.
|
|
|
|
The information transfer restrictions permit one-way
|
|
communication (i.e., no acknowledgements) from one device to
|
|
another whose ranges have no level in common, as long as
|
|
each level in the sending device range is dominated by some
|
|
level in the receiving device range. It is never permitted
|
|
to send information at a given level to a device whose range
|
|
does not contain a dominating level.
|
|
|
|
It is not necessary for an AIS sending information to
|
|
another AIS through several other AISs to know the accredi-
|
|
tation range of the destination system, but it may be bene-
|
|
ficial to network performance; if the originator knows that
|
|
the information cannot be delivered, then it will not try to
|
|
send it and network resources will not be used fruitlessly.
|
|
|
|
In the case of interconnected accredited AISs, the
|
|
accreditation of a component system and the device ranges of
|
|
its network interface devices are set by a component
|
|
administrator in agreement with the network administrator.
|
|
These ranges are generally static, and any change in them is
|
|
considered to be a reconfiguration of the network.
|
|
|
|
In summary, then, if the Interconnection Rule is fol-
|
|
lowed, information will never be improperly sent to a com-
|
|
ponent that is not accredited to handle information of that
|
|
sensitivity.
|
|
|
|
|
|
C.3. The Global Network View
|
|
_ _ ___ ______ _______ ____
|
|
|
|
The above rule applies for communication between any
|
|
two (or more) accredited systems. However, it does not
|
|
enforce any of the additional constraints that may be placed
|
|
on a network. Even when all components have been evaluated
|
|
(either against the TCSEC, or against Appendix A of this
|
|
document), and the interconnection rule is followed, there
|
|
may be other potential security problems. In order to
|
|
address these problems, it is necessary to adopt a global
|
|
view of the network. That is, it is no longer determinable
|
|
locally whether or not a constraint is being satisfied.
|
|
|
|
Two global concerns will be discussed below. One con-
|
|
cern is the propagation of local risk; the other is the cas-
|
|
cading problem.
|
|
|
|
C.3.1. Propagation of Local Risk
|
|
_ _ _ ___________ __ _____ ____
|
|
|
|
The Environmental Guidelines recommend minimum classes
|
|
of trusted systems for specific environments. The recommen-
|
|
dations represent an informed technical judgment on the
|
|
minimum architectural requirements and assurance appropriate
|
|
to counter a specific level of risk.
|
|
|
|
In many cases, operational needs have led to the
|
|
accreditation of systems for multilevel operation that would
|
|
not meet the requirements of the recommended class. While
|
|
the increased risk may be accepted by the users of a partic-
|
|
ular AIS, connection of such an AIS to a network exposes
|
|
users of all other AISs in the network to the additional
|
|
risk.
|
|
|
|
Consequently, when an unevaluated AIS, or one that does
|
|
not meet the class recommended for its accreditation, is
|
|
proposed for connection to a network, constraints should be
|
|
considered, such as one-way connections, manual review of
|
|
transmissions, cryptographic isolation, or other measures to
|
|
limit the risk it introduces.
|
|
|
|
C.3.2. The Cascading Problem
|
|
_ _ _ ___ _________ _______
|
|
|
|
One of the problems that the interconnection rule does
|
|
not address is the cascading problem. The cascading problem
|
|
_________ _______
|
|
exists when a penetrator can take advantage of network con-
|
|
nections to compromise information across a range of secu-
|
|
rity levels that is greater than the accreditation range of
|
|
any of the component systems he must defeat to do so. Cas-
|
|
cading is possible in any connected network that processes a
|
|
greater range of security levels than any one of its com-
|
|
ponent systems is accredited to handle, and it is possible
|
|
in others as well.
|
|
|
|
As an example of the cascading problem, consider two
|
|
systems, each of which is accredited to handle two adjacent
|
|
classifications of information, as shown in Figure C2.
|
|
System A processes SECRET and TOP SECRET information, and
|
|
all users are cleared to at least the SECRET level. System
|
|
B processes CONFIDENTIAL and SECRET information, and all
|
|
users are cleared to at least the CONFIDENTIAL level.
|
|
|
|
While the risk of compromise in each of these systems
|
|
is small enough to justify their use with two levels of
|
|
information, the system as a whole has three levels of
|
|
information, increasing the potential harm that could be
|
|
caused by a compromise. When they are connected so that
|
|
SECRET information can pass from one to the other, a pene-
|
|
trator able to defeat the protection mechanisms in these
|
|
systems can make TOP SECRET information available at the
|
|
CONFIDENTIAL level.
|
|
|
|
Figure C2. Cascade Problem, Illustration 1
|
|
______ __ _______ _______ ____________ _
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
|
|
Consider this chain of events: a penetrator (1) over-
|
|
comes the protection mechanism in System A to downgrade some
|
|
TOP SECRET information to SECRET; (2) causes this informa-
|
|
tion to be sent over the network to System B; and (3) over-
|
|
comes the protection mechanism in System B to downgrade that
|
|
same information to CONFIDENTIAL. This is the cascading
|
|
problem.
|
|
|
|
C.3.2.1. Problem Identification
|
|
_ _ _ _ _______ ______________
|
|
|
|
There are various approaches, with different degrees of
|
|
complexity and precision, for recognizing a potential cas-
|
|
cading problem. Two of these approaches will be addressed
|
|
in this Appendix. The first is a fairly simple test that
|
|
can ensure that a network does not have a cascading problem:
|
|
___
|
|
the nesting condition. The second, discussed in Section
|
|
_______ _________
|
|
C.4, is a less conservative but much more complex heuristic
|
|
that takes into account the connectivity of the network and
|
|
the evaluation classes of the component AIS.
|
|
|
|
The nesting condition is satisfied if the accreditation
|
|
ranges of every two AISs are either disjoint (have no level
|
|
in common) or nested, i.e., one is included within the
|
|
other. In most cases, the nesting condition is enough to
|
|
determine whether there is a cascading problem. However,
|
|
this is a somewhat conservative test; there are cases where
|
|
the nesting condition fails, but there is actually no cas-
|
|
cading problem.
|
|
|
|
Example 1: Consider the situation illustrated in Fig-
|
|
ure C1. The accreditation range of Component A is nested
|
|
within that of Component B (i.e., C-S is completely con-
|
|
tained within C-TS). Therefore, the nesting condition is
|
|
satisfied, and there is no cascading problem.
|
|
|
|
Example 2: Consider the situation illustrated in Fig-
|
|
ure C2. The accreditation ranges of System A and System B
|
|
are not disjoint; neither is one completely contained within
|
|
the other. Therefore, the nesting condition fails, and a
|
|
cascading condition is indicated.
|
|
|
|
Example 3: Consider the situation illustrated in Fig-
|
|
ure C3. Again, the nesting condition does not hold, because
|
|
the accreditation range of System B is neither disjoint from
|
|
nor contained in that of Systems A and C. A cascading con-
|
|
dition is thus indicated. However, it will be shown below
|
|
in this Appendix that Figure C3 actually does not contain a
|
|
cascading condition, due to the presence of the end-to-end
|
|
encryption devices.
|
|
|
|
C.3.2.2. Solutions
|
|
_ _ _ _ _________
|
|
|
|
When a cascading problem is to be addressed, there are
|
|
several ways to do so. One solution is to use a more
|
|
trusted system at appropriate nodes in the network, so that
|
|
a penetrator will be forced to overcome a protection mechan-
|
|
ism commensurate with the seriousness of the potential
|
|
compromise. In the example depicted in Figure C2, If either
|
|
system A or system B is evaluated at class B3, which is suf-
|
|
ficient according to the Environmental Guidelines for a
|
|
range of TOP SECRET to CONFIDENTIAL, then the penetrator is
|
|
presented with an acceptable level of difficulty.
|
|
|
|
Another possible solution is to eliminate certain net-
|
|
work connections, either physically or by means of end-to-
|
|
end encryption. End-to-end encryption allows hosts that need
|
|
to communicate to do so, while eliminating additional
|
|
unnecessary cascading risk on the path from one to the
|
|
other.
|
|
|
|
Figure C3. Cascade Problem, Illustration 2 (End-to-End Encryption)
|
|
______ __ _______ _______ ____________ _ ___ __ ___ __________
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
|
|
In Figure C3, suppose that System A needs only to com-
|
|
municate with System C, and B is just an intermediate node.
|
|
The possible cascade from TOP SECRET in A to CONFIDENTIAL in
|
|
B can be avoided by applying end-to-end encryption from A to
|
|
C, since encrypted data from A can be released at the CONFI-
|
|
DENTIAL level in B without compromise.
|
|
|
|
Note that end-to-end encryption is of no help in the
|
|
Figure C2 example, since the systems participating in the
|
|
cascade were required to communicate.
|
|
|
|
In some situations where the potential for a cascading
|
|
problem exists, the risk of its occurrence is actually not
|
|
significant. A penetration making use of network connec-
|
|
tions, as described above, generally requires coordination
|
|
between attacks on two connected systems. It may be possi-
|
|
ble to determine, in individual cases, that opportunities
|
|
for this kind of coordination, in the form of common
|
|
software or common users, are unlikely. One might then
|
|
disregard cascading over the connections in question.
|
|
|
|
On a more global scale, one might divide the network
|
|
into communities, with respect to the possibility of cascad-
|
|
ing. If connections between one community and another were
|
|
believed not to support a cascade threat, then a cascading
|
|
analysis would be performed only within each community.
|
|
|
|
C.3.2.3. Networks of Evaluated Systems
|
|
_ _ _ _ ________ __ _________ _______
|
|
|
|
If the systems to be interconnected can be assigned
|
|
evaluation classes, the ratings of these systems can be used
|
|
as input to analysis procedures for detecting the cascade
|
|
problem and testing proposed solutions. The first step in
|
|
developing analysis procedures is to define formally the
|
|
conditions necessary for the absence or presence of a cas-
|
|
cade problem.
|
|
|
|
An assertion called the Cascade Condition will be
|
|
_______ _________
|
|
defined below. A network satisfying the Cascade Condition
|
|
does not have a cascade problem. This condition is stated
|
|
in terms of the evaluation ratings of the interconnected
|
|
systems and the direction and sensitivity level of connec-
|
|
tions between them.
|
|
|
|
Some definitions are needed in order to state the cas-
|
|
cade condition formally. The terminology given below is
|
|
meant to be used only in the context of this section.
|
|
|
|
A protection region is a pair (h,s) such that h is a
|
|
__________ ______ _ _ _
|
|
network component and s is a sensitivity level processed by
|
|
_
|
|
component h.
|
|
_
|
|
|
|
A step is an ordered pair of protection regions
|
|
____
|
|
(h1,s1), (h2,s2) such that either
|
|
__ __ __ __
|
|
|
|
1. s1 = s2 and h1 sends to h2 at level s1 (a network
|
|
__ __ __ __ __
|
|
link), or
|
|
|
|
2. h1 = h2 (an information flow within a component).
|
|
__ __
|
|
|
|
A path is a sequence of protection regions such that
|
|
____
|
|
each consecutive pair of regions is a step.
|
|
|
|
A path is a sequence of protection regions that may be
|
|
traversed, step by step, by data. A step along a network
|
|
link is possible either when there is a direct communica-
|
|
tions link from one component to the other carrying
|
|
information at a given level, or when there is an indirect,
|
|
end-to-end encrypted connection in which intermediate com-
|
|
ponents are unable to read the data. A step between two
|
|
regions in the same component may be (but does not have to
|
|
be) a covert channel.
|
|
|
|
Given a host h, let L(h) be the minimum clearance of
|
|
_ _ _
|
|
users of h. Given a sensitivity level s, one can use the
|
|
_ _
|
|
Environmental Guidelines to determine the minimum evaluation
|
|
class C(s,h) required for a system with the associated risk
|
|
_ _ _
|
|
index. The requirement for open environments should be used
|
|
unless all systems on the path are closed. Note that C(s,h)
|
|
_ _ _
|
|
will be at least B1 if the risk index associated with s and
|
|
_
|
|
L(h) is greater than zero.
|
|
_ _
|
|
|
|
With these definitions, we can now state the Cascade
|
|
_______
|
|
Condition:
|
|
_________
|
|
|
|
For any path (h1,s1),...,(hn,sn) such that sn = L(hn)
|
|
__ __ __ __ __ _ __
|
|
and C(s1,hn) is at least B1, there must exist at least one
|
|
_ __ __
|
|
step (hi,si),(hi+1,si+1) such that hi = hi+1, the evaluation
|
|
__ __ __ _ __ _ __ __ _
|
|
class of hi is at least C(s1,hn), and si is not dominated by
|
|
__ _ __ __ __
|
|
si+1.
|
|
__ _
|
|
|
|
This condition can be paraphrased by saying that every
|
|
path that might compromise data of level s1 by making it
|
|
__
|
|
available to an insufficiently cleared user of hn must over-
|
|
__
|
|
come the protection mechanism in a component of class at
|
|
least C(s1,hn).
|
|
_ __ __
|
|
|
|
C.4. EXAMPLE: An Heuristic Procedure for Determining if an
|
|
_ _ _______ __ _________ _________ ___ ___________ __ __
|
|
Interconnection Should Be Allowed
|
|
_______________ ______ __ _______
|
|
|
|
There should be some way of determining whether a sys-
|
|
tem has a risk index that is too great for its evaluation
|
|
rating (and the evaluation ratings of its components).
|
|
Given the goal of not allowing a greater risk than is recom-
|
|
mended by the Environmental Guidelines, the following is an
|
|
heuristic algorithm that has been developed to examine sys-
|
|
tems and determine if they fall within the bounds prescribed
|
|
by the Environmental Guidelines. (In formal terms, this
|
|
algorithm is an approximate test for the Cascade Condition,
|
|
described above.) It should be noted that this algorithm is
|
|
not intended to be prescriptive: it is merely one way of
|
|
examining the problem. There are doubtless many other ways
|
|
that are just as valid.
|
|
|
|
Furthermore, as any heuristic algorithm, this cannot be
|
|
derived from first principles. It has been derived largely
|
|
through trial and error; it produces reasonable results
|
|
(e.g., it disallows systems when it seems prudent; it recom-
|
|
mends levels of security that are consistent with the
|
|
Environmental Guidelines).
|
|
|
|
This algorithm should not be taken to be anything more
|
|
than intended; it does not magically solve all network secu-
|
|
rity problems. It does, however, provide useful guidance and
|
|
recommendations as to the prudence of interconnecting vari-
|
|
ous systems.
|
|
|
|
The following describes an algorithm for determining
|
|
whether or not a given network, composed of evaluated com-
|
|
ponents, meets the risk categories of the Environmental
|
|
Guidelines. The algorithm is based on the idea of dividing
|
|
up a network into groups (where a group is defined to be a
|
|
group of components that can potentially exchange informa-
|
|
tion i.e., send and receive data at a common sensitivity
|
|
level, and have an evaluation Class at or below a given
|
|
level).
|
|
|
|
The risk presented by any given group can be compared
|
|
to the maximum allowed risk, as defined by the Yellow Book
|
|
for a system at the given evaluation class, to determine if
|
|
any community presents an unacceptable risk.
|
|
|
|
1. Create a Network Table listing all components within
|
|
the network. This table, illustrated in Table C1,
|
|
should include for each component the following
|
|
information: Component ID, Evaluation Class, Range
|
|
of Security Classifications at which the component
|
|
sends data to the network, List of Security Classif-
|
|
ications at which the component receives data from
|
|
the network, Maximum of (highest level of data
|
|
received from network and highest level of data pro-
|
|
cessed by component), Minimum of (clearance of the
|
|
user with the lowest clearance of the users with
|
|
direct access to the component and lowest level of
|
|
data sent to the network from the component).
|
|
|
|
Table C1. Example Entry:
|
|
_____ __ _______ _____
|
|
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
2. Produce a Network Table Evaluation Class, a Network
|
|
Table Maximum and a Network Table Minimum. The Net-
|
|
work Table Evaluation Class will be the highest
|
|
evaluation class of any component listed in the
|
|
table. (In Table C1, this is A1.) The Network
|
|
Table Maximum will be the maximum of the Maximums
|
|
associated with all the components listed in the
|
|
table which send data to the network. (This is
|
|
determined by taking the highest entry in the "Max-
|
|
imum" column; in Table C1, it is TS.) The Network
|
|
Table Minimum will be the minimum of the Minimums
|
|
associated with all the components listed in the
|
|
table which receive data from the network. (This is
|
|
determined by taking the lowest entry in the
|
|
"Minimum" column; in Table C1, this is FOUO.)
|
|
|
|
3. If the Network Table Evaluation Class is greater
|
|
than B1, (i.e, A1, B3, or B2) then tables for each
|
|
evaluation class lower than the Class of the Network
|
|
Table, must be produced, down to table(s) for the C1
|
|
class. These tables will be produced for each
|
|
evaluation class by first listing any one component
|
|
whose evaluation class is less than or equal to the
|
|
evaluation class for the table. Then, add to the
|
|
table all components that meet all of the following
|
|
conditions:
|
|
|
|
a) They have an evaluation class less than or
|
|
equal to the class of the table.
|
|
|
|
b) They receive data from the network at a level
|
|
that is being sent by a component who is
|
|
already in the table.
|
|
|
|
c) They send data to the network at a level that
|
|
is equal to or less than any node already in
|
|
the table.
|
|
|
|
4. After all the tables have been constructed then the
|
|
Network Table Evaluation Class of each table is com-
|
|
pared to the Maximum and Minimum for the Table with
|
|
regard to the rules specified by the Environmental
|
|
Guidelines.
|
|
|
|
5. If all Tables satisfy the assurance requirements for
|
|
the Environmental Guidelines then the Network passes
|
|
the assurance requirements. If any of the Tables
|
|
provide a greater risk index than is permitted by
|
|
the Environmental Guidelines then the Network pro-
|
|
vides a high level of risk, and should not be con-
|
|
nected as currently designed.
|
|
|
|
Table C2. B2 TABLE 1
|
|
_____ __ __ _____ _
|
|
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
Table C3. B2 TABLE 1, EXTENDED
|
|
_____ __ __ _____ _ ________
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
Table C4:
|
|
_____ __
|
|
|
|
Table C4(a). B2 TABLE 1
|
|
_____ __ _ __ _____ _
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
Table C4(b). B2 TABLE 2
|
|
_____ __ _ __ _____ _
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
C.4.1. Example B2 Table
|
|
_ _ _ _______ __ _____
|
|
|
|
As an example consider Table C2. This represents a B2
|
|
table under construction with a single entry. If in the net-
|
|
work there existed another node which was evaluated at B2
|
|
and could receive and send at C-S, this node would be added
|
|
to the table, producing Table C3. In contrast if there
|
|
existed in the network a B2 node that could receive at S-TS
|
|
but could only send at TS, this node would not be added to
|
|
Table C3 but could be used to start a second B2 table.
|
|
There would then be a set of two tables, represented in
|
|
Table C4.
|
|
|
|
C.4.2. Sample Network and Tables
|
|
_ _ _ ______ _______ ___ ______
|
|
|
|
A sample network is illustrated in Figure C4. The
|
|
tables that are produced for it are given in Tables C5(a)
|
|
through C5(h).
|
|
|
|
Notice at the B2 level the network is represented by
|
|
two tables, C5(b) and C5(c). This is due to the fact that
|
|
one of the components (Component C) is a receive-only com-
|
|
ponent. Such components will always end up in a table by
|
|
themselves due to the fact that they never can affect the
|
|
security of other nodes on the network. (The only security
|
|
consideration to make with such components is whether they
|
|
are receiving data at a level dominated by the approved max-
|
|
imum processing level for the component.)
|
|
|
|
Notice at the B1 level the components are each in a
|
|
table by themselves (Tables C5(d), C5(e), and C5(f)). This
|
|
is due to the fact that although Component B may receive
|
|
data from Component E, it never sends data to the network at
|
|
a level lower than that sent by E (i.e., B can only send TS,
|
|
never Confidential or Unclassified). Thus there is no
|
|
"added" risk in having B receive data from E. If it were the
|
|
case the B could send data at a level lower than (or equal
|
|
to) E then they would be included in the same table since
|
|
they present an added (or equal) risk.
|
|
|
|
C.5. Environmental Considerations
|
|
_ _ _____________ ______________
|
|
|
|
Because of the very nature of networks, it is necessary
|
|
to say something about the assumptions made with respect to
|
|
physical and logical protection of network links. While the
|
|
requirements stated in Part II of this document apply to the
|
|
single trusted system view, and not to the networks
|
|
addressed by this Appendix, the issues are also important in
|
|
the interconnected accredited AIS view. Therefore, this sec-
|
|
tion presents a brief description of some of the important
|
|
considerations. The interested reader is referred to Part
|
|
II of this document for further detail.
|
|
|
|
It is not, repeat, NOT the intent of this Appendix to
|
|
define the measures that are considered adequate under all
|
|
circumstances. Rather, it is to identify the requirements,
|
|
and where known, common methods of achieving the desired
|
|
protection.
|
|
|
|
This Appendix establishes the requirement for integrity
|
|
protection of control information in unclassified networks
|
|
and the requirement to preserve the integrity of both con-
|
|
trol data and information in any other network.
|
|
|
|
C.5.1. Communications Integrity
|
|
_ _ _ ______________ _________
|
|
|
|
The accreditor(s) will define transmission accuracy
|
|
requirements for interconnecting two components. All ele-
|
|
ments involved in the interconnection of the components will
|
|
demonstrate either by testing or by otherwise convincing
|
|
argument that they meet the requirements. Since absolute
|
|
transmission accuracy is not possible, a capability of test-
|
|
ing for, detecting and reporting errors will be demon-
|
|
strated. Acceptable methods of limiting errors include use
|
|
of cryptographic checksums, protected wireways, and reliable
|
|
delivery protocols used separately or in combination.
|
|
|
|
Hardware and/or software will be provided that can be
|
|
used to periodically validate the correct operation of all
|
|
elements involved in interconnecting two accredited com-
|
|
ponents.
|
|
|
|
Trusted communications paths will be provided between
|
|
network elements whenever secure element-to-element communi-
|
|
cations are required. (Initialization, cryptographic key
|
|
management, change of subject or object security levels or
|
|
access authorizations, etc.)
|
|
|
|
C.5.2. Denial of Service
|
|
_ _ _ ______ __ _______
|
|
|
|
The accreditor(s) will define denial of service condi-
|
|
tions relative to the services being provided by the inter-
|
|
connected components. Hardware and or software will be pro-
|
|
vided to periodically assure the accessibility of the inter-
|
|
connected components.
|
|
|
|
C.5.3. Data Content Protection
|
|
_ _ _ ____ _______ __________
|
|
|
|
Where classified information or sensitive but unclassi-
|
|
fied information is to be exchanged between logically con-
|
|
nected components, it is the responsibility of each of the
|
|
DAAs to assure that the content of their communication is
|
|
_______
|
|
protected from unauthorized observation. Acceptable means
|
|
of providing this protection include cryptography, and Pro-
|
|
tected Wireline Distribution Systems (PWDS).
|
|
|
|
Where the connection infrastructure is operated by a
|
|
services organization for a number of different subscribers,
|
|
suitable communications protection may be offered by the
|
|
service organization. Regardless, it is the responsibility
|
|
of the individual DAA to determine whether this protection
|
|
is adequate for the information to be exchanged.
|
|
|
|
Figure C4. A Sample Network
|
|
______ __ _ ______ _______
|
|
|
|
(Note: Figure not included)
|
|
|
|
|
|
|
|
Component ID Permitted Operations
|
|
|
|
A Send and Receive data from C through TS
|
|
B Send and Receive TS-only
|
|
C Can Receive only audit records,
|
|
all of which are treated as TS
|
|
D Can Send and Receive C through TS
|
|
E Can Send and Receive S-only
|
|
F Send and Receive S and TS data
|
|
|
|
|
|
|
|
Table C5(a). NETWORK TABLE
|
|
_____ __ _ _______ _____
|
|
|
|
NETWORK TABLE EVAL CLASS = A1
|
|
NETWORK TABLE MAXIMUM = TS
|
|
NETWORK TABLE MINIMUM = C
|
|
ENVIRONMENTAL GUIDELINES RULING = OK
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
(Note: since there are no B3 components, the B3 tables are
|
|
identical to the B2 tables and are therefore not reproduced
|
|
here.)
|
|
|
|
|
|
Table C5(b). B2 TABLE 1 Table C5(c). B2 TABLE 2
|
|
_____ __ _ __ _____ _ _____ __ _ __ _____ _
|
|
|
|
TABLE EVAL CLASS = B2 TABLE EVAL CLASS = B2
|
|
TABLE MAXIMUM = TS TABLE MAXIMUM = TS
|
|
TABLE MINIMUM = S TABLE MINIMUM = TS
|
|
ENV. GUIDELINES RULING= OK ENV. GUIDELINES RULING= OK
|
|
|
|
(Note: Tables not included)
|
|
|
|
|
|
|
|
Table C5(d). B1 TABLE 1 Table C5(e). B1 TABLE 2
|
|
_____ __ _ __ _____ _ _____ __ _ __ _____ _
|
|
|
|
TABLE EVAL CLASS = B1 TABLE EVAL CLASS = B1
|
|
TABLE MAXIMUM = S TABLE MAXIMUM = TS
|
|
TABLE MINIMUM = S TABLE MINIMUM = TS
|
|
ENV. GUIDELINES RULING = OK ENV. GUIDELINES RULING = OK
|
|
|
|
|
|
(Note: Table not included)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Acronyms
|
|
________
|
|
|
|
|
|
ACL - Access Control List
|
|
ADP - Automatic Data Processing
|
|
AIS - Automated Information System
|
|
ARPANET - Advanced Research Projects Agency Network
|
|
COMSEC - Communications Security
|
|
CPU - Central Processing Unit
|
|
CRC - Cyclic Redundancy Code or Cyclic Redundancy Check
|
|
DAA - Designated Approving Authority
|
|
DBMS - Data Base Management System
|
|
DAC - Discretionary Access Control
|
|
DDN - Defense Data Network
|
|
DoD - Department of Defense
|
|
DoDIIS - Department of Defense Intelligence Information System
|
|
DOS - Denial-of-service
|
|
DTLS - Descriptive Top-Level Specification
|
|
E3 - End-to-end Encryption
|
|
FTLS - Formal Top-Level Specification
|
|
FTP - File Transfer Protocol
|
|
IP - Internet Protocol
|
|
I S/A AMPE - Inter-Service/Agency Automatic Message Processing Exchange
|
|
ISDN - Integrated Services Digital Network
|
|
ISO - International Standards Organization
|
|
KDC - Key Distribution Center
|
|
LAN - Local Area Network
|
|
LRC - Longitudinal Redundancy Check
|
|
MAC - Mandatory Access Control
|
|
MDC - Manipulation Detection Code
|
|
MSM - Message Stream Modification
|
|
MWT - Maximum Waiting Time
|
|
NSA - National Security Agency
|
|
NTCB - Network Trusted Computing Base
|
|
OSI - Open System Interconnection
|
|
PABX - Private Automated Branch Exchange
|
|
PDU - Protocol Data Unit (a.k.a. packet, datagram)
|
|
PKC - Public Key Cryptosystem
|
|
PWDS - Protected Wireline Distribution System
|
|
ROM - Read Only Memory
|
|
SACDIN - Strategic Air Command Digital Network
|
|
TAC - Terminal Access Controller
|
|
TCB - Trusted Computer Base
|
|
TCP - Transmission Control Protocol
|
|
TELNET - Network Virtual Terminal Protocol
|
|
TLS - Top Level Specification
|
|
TCSEC - Trusted Computer System Evaluation Criteria
|
|
TFE - Trusted Front-end Processor
|
|
TIU - Trusted Network Interface Unit
|
|
TNI - Trusted Network Interpretations
|
|
VMM - Virtual Machine Monitor
|
|
|
|
|
|
|
|
Glossary
|
|
________
|
|
|
|
|
|
|
|
|
|
|
|
- A -
|
|
_
|
|
|
|
Access - (1) A specific type of interaction between a
|
|
subject and an object that results in the flow of informa-
|
|
tion from one to the other. (2) The ability and the means
|
|
necessary to approach, to store or retrieve data, to commun-
|
|
icate with, or to make use of any resource of an ADP system.
|
|
|
|
Access control - (1) The limiting of rights or capabil-
|
|
ities of a subject to communicate with other subjects, or to
|
|
use functions or services in a computer system or network.
|
|
(2) Restrictions controlling a subject's access to an
|
|
object.
|
|
|
|
Access control list - (1) A list of subjects authorized
|
|
for specific access to an object. (2) A list of entities,
|
|
together with their access rights, which are authorized to
|
|
have access to a resource.
|
|
|
|
Accountability - the quality or state which enables
|
|
actions on an ADP system to be traced to individuals who may
|
|
then be held responsible. These actions include violations
|
|
and attempted violations of the security policy, as well as
|
|
allowed actions.
|
|
|
|
Accreditation - the managerial authorization and appro-
|
|
val, granted to an ADP system or network to process sensi-
|
|
tive data in an operational environment, made on the basis
|
|
of a certification by designated technical personnel of the
|
|
extent to which design and implementation of the system meet
|
|
pre-specified technical requirements, e.g., TCSEC, for
|
|
achieving adequate data security. Management can accredit a
|
|
system to operate at a higher/lower level than the risk
|
|
level recommended (e.g., by the Requirements Guideline-) for
|
|
the certification level of the system. If management
|
|
accredits the system to operate at a higher level than is
|
|
appropriate for the certification level, management is
|
|
accepting the additional risk incurred.
|
|
|
|
Accreditation range - of a host with respect to a par-
|
|
ticular network, is a set of mandatory access control levels
|
|
_________________________
|
|
- Security Requirements: Guidance for Applying the
|
|
________ ____________ ________ ___ ________ ___
|
|
Department of Defense Trusted Computer System Evalua-
|
|
__________ __ _______ _______ ________ ______ ______
|
|
tion Criteria in Specific Environments,CSC-STD-003-85
|
|
____ ________ __ ________ ____________
|
|
|
|
|
|
for data storage, processing, and transmission. The accredi-
|
|
tation range will generally reflect the sensitivity levels
|
|
of data that the accreditation authority believes the host
|
|
can reliably keep segregated with an acceptable level of
|
|
risk in the context of the particular network for which the
|
|
accreditation range is given. Thus, although a host system
|
|
might be accredited to employ the mandatory access control
|
|
levels CONFIDENTIAL, SECRET, and TOP SECRET in stand-alone
|
|
operation, it might have an accreditation range consisting
|
|
of the single value TOP SECRET for attachment to some net-
|
|
work.
|
|
|
|
Audit trail - (1) A set of records that collectively
|
|
provide documentary evidence of processing used to aid in
|
|
tracing from original transactions forward to related
|
|
records and reports, and/or backwards from records and
|
|
reports to their component source transactions. (2) Infor-
|
|
mation collected or used to facilitate a Security Audit.
|
|
|
|
Authentication - (1) To establish the validity of a
|
|
claimed identity. (2) To provide protection against fraudu-
|
|
lent transactions by establishing the validity of message,
|
|
station, individual, or originator.
|
|
|
|
|
|
- B -
|
|
|
|
Bell-LaPadula Model - a formal state transition model
|
|
of computer security policy that describes a set of access
|
|
control rules. In this formal model, the entities in a com-
|
|
puter system are divided into abstract sets of subjects and
|
|
objects. The notion of a secure state is defined and it is
|
|
proven that each state transition preserves security by mov-
|
|
ing from secure state to secure state; thus, inductively
|
|
proving that the system is secure. A system state is
|
|
defined to be "secure" if the only permitted access modes of
|
|
subjects to objects are in accordance with a specific secu-
|
|
rity policy. In order to determine whether or not a
|
|
specific access mode is allowed, the clearance of a subject
|
|
is compared to the classification of the object and a deter-
|
|
mination is made as to whether the subject is authorized for
|
|
the specific access mode. The clearance/classifications
|
|
scheme is expressed in terms of a lattice. See also: Lat-
|
|
tice, Simple Security Property, *-Property. For further
|
|
information see Bell, D. Elliott and LaPadula, Leonard J.,
|
|
Secure Computer Systems: Unified Exposition and MULTICS
|
|
______ ________ _______ _______ __________ ___ _______
|
|
Interpretation, MTR 2997, The MITRE Corporation, April 1974.
|
|
______________
|
|
(AD/A 020 445)
|
|
|
|
|
|
- C -
|
|
|
|
Category - a grouping of objects to which an non-
|
|
hierarchical restrictive label is applied (e.g.,
|
|
proprietary, compartmented information). Subjects must be
|
|
privileged to access a category.
|
|
|
|
Certification - the technical evaluation of a system's
|
|
security features, made as part of and in support of the
|
|
approval/accreditation process, that establishes the extent
|
|
to which a particular system's design and implementation
|
|
meet a set of specified security requirements.
|
|
|
|
Closed user group - a closed user group permits users
|
|
belonging to a group to communicate with each other, but
|
|
precludes communications with other users who are not
|
|
members of the group.
|
|
|
|
Communication channel - the physical media and devices
|
|
which provide the means for transmitting information from
|
|
one component of a network to (one or more) other com-
|
|
ponents.
|
|
|
|
Communication link - the physical means of connecting
|
|
one location to another for the purpose of transmitting
|
|
and/or receiving data.
|
|
|
|
Compartment - a designation applied to a type of sensi-
|
|
tive information, indicating the special handling procedures
|
|
to be used for the information and the general class of peo-
|
|
ple who may have access to the information. It can refer to
|
|
the designation of information belonging to one or more
|
|
categories.
|
|
|
|
Component - a device or set of devices, consisting of
|
|
hardware, along with its firmware, and/or software that
|
|
performs a specific function on a computer communications
|
|
network. A component is a part of the larger system, and
|
|
may itself consist of other components. Examples include
|
|
modems, telecommunications controllers, message switches,
|
|
technical control devices, host computers, gateways, commun-
|
|
ications subnets, etc.
|
|
|
|
Component Reference Monitor - an access control concept
|
|
that refers to an abstract machine that mediates all access
|
|
to objects within a component by subjects within the com-
|
|
ponent.
|
|
|
|
Compromise - a violation of the security system such
|
|
that an unauthorized disclosure of sensitive information may
|
|
have occurred.
|
|
|
|
Confidentiality - the property that information is not
|
|
made available or disclosed to unauthorized individuals,
|
|
entities, or processes.
|
|
|
|
Configuration control - management of changes made to a
|
|
system's hardware, software, firmware, and documentation
|
|
throughout the development and operational life of the sys-
|
|
tem.
|
|
|
|
Connection - a liaison, in the sense of a network
|
|
interrelationship, between two hosts for a period of time.
|
|
The liaison is established (by an initiating host) for the
|
|
purpose of information transfer (with the associated host);
|
|
the period of time is the time required to carry out the
|
|
intent of the liaison (e.g., transfer of a file, a chatter
|
|
session, delivery of mail). In many cases, a connection (in
|
|
the sense of this glossary) will coincide with a host-host
|
|
connection (in a special technical sense) established via
|
|
TCP or equivalent protocol. However a connection (liaison)
|
|
can also exist when only a protocol such as IP is in use (IP
|
|
has no concept of a connection that persists for a period of
|
|
time). Hence, the notion of connection as used here is
|
|
independent of the particular protocols in use during a
|
|
liaison of two hosts.
|
|
|
|
Correctness - the extent to which a program satisfies
|
|
its specifications.
|
|
|
|
Covert channel - a communications channel that allows a
|
|
process to transfer information in a manner that violates
|
|
the system's security policy. A covert channel typically
|
|
communicates by exploiting a mechanism not intended to be
|
|
used for communication. See Covert storage channel and
|
|
Covert timing channel. Compare Overt channel.
|
|
|
|
Covert storage channel - a covert channel that involves
|
|
the direct or indirect writing of a storage location by one
|
|
process and the direct or indirect reading of the storage
|
|
location by another process. Covert storage channels typi-
|
|
cally involve a finite resource (e.g., sectors on a disk)
|
|
that is shared by two subjects at different security levels.
|
|
|
|
Covert timing channel - a covert channel in which one
|
|
process signals information to another by modulating its own
|
|
use of system resources (e.g., CPU time) in such a way that
|
|
this manipulation affects the real response time observed by
|
|
the second process.
|
|
|
|
|
|
- D -
|
|
|
|
Data confidentiality - the state that exists when data
|
|
is held in confidence and is protected from unauthorized
|
|
disclosure.
|
|
|
|
Data integrity - (1) The state that exists when compu-
|
|
terized data is the same as that in the source documents and
|
|
has not been exposed to accidental or malicious alteration
|
|
or destruction. (2) The property that data has not been
|
|
exposed to accidental or malicious alteration or destruc-
|
|
tion.
|
|
|
|
Dedicated Security Mode - the mode of operation in
|
|
which the system is specifically and exclusively dedicated
|
|
to and controlled for the processing of one particular type
|
|
or classification of information, either for full-time
|
|
operation or for a specific period of time. Compare Mul-
|
|
tilevel Security Mode, System High Security Mode.
|
|
|
|
Denial of service - the prevention of authorized access
|
|
to system assets or services, or the delaying of time criti-
|
|
cal operations.
|
|
|
|
Descriptive top-level specification (DTLS) - a top-
|
|
level specification that is written in a natural language
|
|
(e.g., English), an informal program design notation, or a
|
|
combination of the two.
|
|
|
|
Discretionary access control (DAC) - a means of res-
|
|
tricting access to objects based on the identity of subjects
|
|
and/or groups to which they belong. The controls are dis-
|
|
cretionary in the sense that: (a) A subject with a certain
|
|
access permission is capable of passing that permission
|
|
(perhaps indirectly) on to any other subject; (b) DAC is
|
|
often employed to enforce need-to-know; (c) Access control
|
|
may be changed by an authorized individual. Compare to Man-
|
|
datory Access Control.
|
|
|
|
Domain - the set of objects that a subject has the
|
|
ability to access.
|
|
|
|
Dominated by (the relation) - a security level A is
|
|
dominated by security level B if the
|
|
clearance/classification in A is less than or equal to the
|
|
clearance/classification in B and the set of access appro-
|
|
vals (e.g., compartment designators) in A is contained in
|
|
(the set relation) the set of access approvals in B (i.e.,
|
|
each access approval appearing in A also appears in B).
|
|
Depending upon the policy enforced (e.g., non-disclosure,
|
|
integrity) the definition of "less than or equal to" and
|
|
"contained in" may vary. For example, the level of an
|
|
object of high integrity (i.e., an object which should be
|
|
modifiable by very trustworthy individuals) may be defined
|
|
to be "less than" the level of an object of low integrity
|
|
(i.e., an object which is modifiable by everyone).
|
|
|
|
Dominates (the relation) - security level B dominates
|
|
security level A if A is dominated by B.
|
|
|
|
|
|
- E -
|
|
|
|
Exploitable channel - any channel that is usable or
|
|
detectable by subjects external to the Trusted Computing
|
|
Base.
|
|
|
|
|
|
- F -
|
|
|
|
Flaw - an error of commission, omission, or oversight
|
|
in a system that allows protection mechanisms to be
|
|
bypassed.
|
|
|
|
Flaw hypothesis methodology - a system analysis and
|
|
penetration technique where specifications and documentation
|
|
for the system are analyzed and then flaws in the system are
|
|
hypothesized. The list of hypothesized flaws is then prior-
|
|
itized on the basis of the estimated probability that a flaw
|
|
actually exists and, assuming a flaw does exist, on the ease
|
|
of exploiting it and on the extent of control or compromise
|
|
it would provide. The prioritized list is used to direct
|
|
the actual testing of the system.
|
|
|
|
Formal proof - a complete and convincing mathematical
|
|
argument, presenting the full logical justification for each
|
|
proof step, for the truth of a theorem or set of theorems.
|
|
The formal verification process uses formal proofs to show
|
|
the truth of certain properties of formal specification and
|
|
for showing that computer programs satisfy their specifica-
|
|
tions. Automated tools may (but need not) be used to formu-
|
|
late and/or check the proof.
|
|
|
|
Formal security policy model - a mathematically precise
|
|
statement of security policy. To be adequately precise,
|
|
such a model must represent the initial state of a system,
|
|
the way in which the system progresses from one state to
|
|
another, and a definition of a "secure" state of the system.
|
|
To be acceptable as a basis for a TCB, the model must be
|
|
supported by a formal proof that if the initial state of the
|
|
system satisfies the definition of a "secure" state and if
|
|
all assumptions required by the model hold, then all future
|
|
states of the system will be secure. Some formal modeling
|
|
techniques include: state transition models, temporal logic
|
|
models, denotational semantics models, algebraic specifica-
|
|
tion models. See also: Bell-LaPadula Model, Security Pol-
|
|
icy Model.
|
|
|
|
Formal top-level specification (FTLS) - a Top-Level
|
|
Specification that is written in a formal mathematical
|
|
language to allow theorems showing the correspondence of the
|
|
system specification to its formal requirements to be
|
|
hypothesized and formally proven.
|
|
|
|
Formal verification - the process of using formal
|
|
proofs to demonstrate the consistency (design verification)
|
|
between a formal specification of a system and a formal
|
|
security policy model or (implementation verification)
|
|
between the formal specification and its program implementa-
|
|
tion.
|
|
|
|
Functional testing - the portion of security testing in
|
|
which the advertised features of a system are tested for
|
|
correct operation.
|
|
|
|
|
|
- H -
|
|
|
|
Hierarchical decomposition - the ordered, structured
|
|
reduction of a system or a component to primitives.
|
|
|
|
Host - any computer-based system connected to the net-
|
|
work and containing the necessary protocol interpreter
|
|
software to initiate network access and carry out
|
|
information exchange across the communications network.
|
|
This definition encompasses typical "mainframe" hosts, gen-
|
|
eric terminal support machines (e.g., ARPANET TAC, DoDIIS
|
|
NTC), and workstations connected directly to the communica-
|
|
tions subnetwork and executing the intercomputer networking
|
|
protocols. A terminal is not a host because it does not
|
|
contain the protocol software needed to perform information
|
|
exchange; a workstation (by definition) is a host because it
|
|
does have such capability.
|
|
|
|
|
|
- I -
|
|
|
|
Integrity - See data integrity and integrity policy.
|
|
|
|
Integrity Policy - a security policy to prevent unau-
|
|
thorized users from modifying, viz., writing, sensitive
|
|
information. See also Security Policy.
|
|
|
|
Internal subject - a subject which is not acting as
|
|
direct surrogate for a user. A process which is not associ-
|
|
ated with any user but performs system-wide functions such
|
|
as packet switching, line printer spooling, and so on. Also
|
|
known as a daemon or a service machine.
|
|
|
|
|
|
- L -
|
|
|
|
Label - see Security Label and Sensitivity Label.
|
|
|
|
Lattice - a partially ordered set for which every pair
|
|
of elements has a greatest lower bound and a least upper
|
|
bound.
|
|
|
|
Least privilege - this principle requires that each
|
|
subject in a system be granted the most restrictive set of
|
|
privileges (or lowest clearance) needed for the performance
|
|
of authorized tasks. The application of this principle lim-
|
|
its the damage that can result from accident, error, or
|
|
unauthorized use.
|
|
|
|
|
|
- M -
|
|
|
|
Mandatory access control - a means of restricting
|
|
access to objects based on the sensitivity (as represented
|
|
by a label) of the information contained in the objects and
|
|
the formal authorization (i.e., clearance) of subjects to
|
|
access information of such sensitivity.
|
|
|
|
Multilevel device - a device that is used in a manner
|
|
that permits it to simultaneously process data of two or
|
|
more security levels without risk of compromise. To accom-
|
|
plish this, sensitivity labels are normally stored on the
|
|
same physical medium and in the same form (i.e., machine-
|
|
readable or human-readable) as the data being processed.
|
|
|
|
Multilevel secure - a class of system containing infor-
|
|
mation with different sensitivities that simultaneously per-
|
|
mits access by users with different security clearances and
|
|
needs-to-know, but prevents users from obtaining access to
|
|
information for which they lack authorization.
|
|
|
|
Multilevel Security Mode - the mode of operation that
|
|
allows two or more classification levels of information to
|
|
be processed simultaneously within the same system when some
|
|
users are not cleared for all levels of information present.
|
|
Compare Dedicated Security Mode, System High Security Mode.
|
|
|
|
|
|
- N -
|
|
|
|
Network architecture - the set of layers and protocols
|
|
(including formats and standards that different
|
|
hardware/software must comply with to achieve stated objec-
|
|
tives) which define a Network.
|
|
|
|
Network component - a network subsystem which is
|
|
evaluatable for compliance with the trusted network
|
|
interpretations, relative to that policy induced on the com-
|
|
ponent by the overall network policy.
|
|
|
|
Network connection - A network connection is any logi-
|
|
cal or physical path from one host to another that makes
|
|
possible the transmission of information from one host to
|
|
the other. An example is a TCP connection. But also, when
|
|
a host transmits an IP datagram employing only the services
|
|
of its "connectionless" Internet Protocol interpreter, there
|
|
is considered to be a connection between the source and the
|
|
destination hosts for this transaction.
|
|
|
|
Network Reference Monitor - an access control concept
|
|
that refers to an abstract machine that mediates all access
|
|
to objects within the network by subjects within the net-
|
|
work.
|
|
|
|
Network security - the protection of networks and their
|
|
services from unauthorized modification, destruction, or
|
|
disclosure. Providing an assurance that the network performs
|
|
its critical functions correctly and there are no harmful
|
|
side-effects. Includes providing for information accuracy.
|
|
|
|
Network security architecture - a subset of network
|
|
architecture specifically addressing security-relevant
|
|
issues.
|
|
|
|
Network sponsor - the individual or organization that
|
|
is responsible for stating the security policy enforced by
|
|
the network, for designing the network security architecture
|
|
to properly enforce that policy, and for ensuring that the
|
|
network is implemented in such a way that the policy is
|
|
enforced. For commercial, off-the- shelf systems, the net-
|
|
work sponsor will normally be the vendor. For a fielded
|
|
network system, the sponsor will normally be the project
|
|
manager or system administrator.
|
|
|
|
Network System - a system which is implemented with a
|
|
collection of interconnected network components. A network
|
|
system is based on a coherent security architecture and
|
|
design.
|
|
|
|
Network trusted computing base (NTCB) - the totality of
|
|
protection mechanisms within a network system -- including
|
|
hardware, firmware, and software -- the combination of which
|
|
is responsible for enforcing a security policy. (See also
|
|
Trusted Computing Base.)
|
|
|
|
NTCB Partition - the totality of mechanisms within a
|
|
single network component for enforcing the network policy,
|
|
as allocated to that component; the part of the NTCB within
|
|
a single network component.
|
|
|
|
|
|
- O -
|
|
|
|
Object - a passive entity that contains or receives
|
|
information. Access to an object potentially implies access
|
|
to the information it contains. Examples of objects are:
|
|
records, blocks, pages, segments, files, directories, direc-
|
|
tory trees, and programs, as well as bits, bytes, words,
|
|
fields, processors, video displays, keyboards, clocks,
|
|
printers, etc. See also Passive.
|
|
|
|
Object reuse - the reassignment of a medium (e.g., page
|
|
frame, disk sector, magnetic tape) that contained one or
|
|
more objects to some subject. To be securely reassigned,
|
|
such media must contain no residual data from the previously
|
|
contained object(s).
|
|
|
|
OSI Architecture - the International Organization for
|
|
Standardization (ISO) provides a framework for defining the
|
|
communications process between systems. This framework
|
|
includes a network architecture, consisting of seven layers.
|
|
The architecture is referred to as the Open Systems Inter-
|
|
connection (OSI) model or Reference Model. Services and the
|
|
protocols to implement them for the different layers of the
|
|
model are defined by international standards. From a sys-
|
|
tems viewpoint, the bottom three layers support the com-
|
|
ponents of the network necessary to transmit a message, the
|
|
next three layers generally pertain to the characteristics
|
|
of the communicating end systems, and the top layer supports
|
|
the end users. The seven layers are: 1. Physical Layer:
|
|
Includes the functions to activate, maintain, and deactivate
|
|
the physical connection. It defines the functional and pro-
|
|
cedural characteristics of the interface to the physical
|
|
circuit: the electrical and mechanical specifications are
|
|
considered to be part of the medium itself. 2. Data Link
|
|
Layer: Formats the messages. Covers synchronization and
|
|
error control for the information transmitted over the phy-
|
|
sical link, regardless of the content. "Point-to point
|
|
error checking" is one way to describe this layer. 3.
|
|
Network Layer: Selects the appropriate facilities. Includes
|
|
routing communications through network resources to the sys-
|
|
tem where the communicating application is: segmentation and
|
|
reassembly of data units (packets) ; and some error correc-
|
|
tion. 4. Transport Layer: Includes such functions as multi-
|
|
plexing several independent message streams over a single
|
|
connection, and segmenting data into appropriately sized
|
|
packets for processing by the Network Layer. Provides end-
|
|
to-end control of data reliability. 5. Session Layer:
|
|
Selects the type of service. Manages and synchronizes
|
|
conversations between two application processes. Two main
|
|
types of dialogue are provided: two-way simultaneous (full-
|
|
duplex), or two-way alternating (half-duplex). Provides
|
|
control functions similar to the control language in com-
|
|
puter system. 6. Presentation Layer: Ensures that informa-
|
|
tion is delivered in a form that the receiving system can
|
|
understand and use. Communicating parties determine the for-
|
|
mat and language (syntax) of messages: translates if
|
|
required, preserving the meaning (semantics). 7. Application
|
|
Layer: Supports distributed applications by manipulating
|
|
information. Provides resource management for file
|
|
transfer, virtual file and virtual terminal emulation, dis-
|
|
tributed processes and other applications.
|
|
|
|
Overt channel - an overt channel is a path within a
|
|
network which is designed for the authorized transfer of
|
|
data.
|
|
|
|
|
|
- P -
|
|
|
|
Passive - (1) A property of an object or network object
|
|
that it lacks logical or computational capability and is
|
|
unable to change the information it contains. (2) Those
|
|
threats to the confidentiality of data which, if realized,
|
|
would not result in any unauthorized change in the state of
|
|
the intercommunicating systems (e.g., monitoring and/or
|
|
recording of data).
|
|
|
|
Penetration - the successful violation of a protected
|
|
system.
|
|
|
|
Penetration testing - the portion of security testing
|
|
in which the penetrators attempt to circumvent the security
|
|
features of a system. The penetrators may be assumed to use
|
|
all system design and implementation documentation, which
|
|
may include listings of system source code, manuals, and
|
|
circuit diagrams. The penetrators work under no constraints
|
|
other than those that would be applied to ordinary users or
|
|
implementors of untrusted portions of the component.
|
|
|
|
Privacy - (1) the ability of an individual or organiza-
|
|
tion to control the collection, storage, sharing, and dis-
|
|
semination of personal and organizational information. (2)
|
|
The right to insist on adequate security of, and to define
|
|
authorized users of, information or systems. Note: The con-
|
|
cept of privacy cannot be very precise and its use should be
|
|
avoided in specifications except as a means to require secu-
|
|
rity, because privacy relates to "rights" that depend on
|
|
legislation.
|
|
|
|
Process - a program in execution. It is completely
|
|
characterized by a single current execution point
|
|
(represented by the machine state) and address space.
|
|
|
|
Protection-critical portions of the TCB - those por-
|
|
tions of the TCB whose normal function is to deal with the
|
|
control of access between subjects and objects. See also
|
|
Subject, Object, Trusted Computer Base.
|
|
|
|
Protection philosophy - an informal description of the
|
|
overall design of a system that delineates each of the pro-
|
|
tection mechanisms employed. A combination (appropriate to
|
|
the evaluation class) of formal and informal techniques is
|
|
used to show that the mechanisms are adequate to enforce the
|
|
security policy.
|
|
|
|
|
|
- R -
|
|
|
|
Read - a fundamental operation that results only in the
|
|
flow of information from an object to a subject.
|
|
|
|
Read access - permission to read information.
|
|
|
|
|
|
Reference monitor concept - an access control concept
|
|
that refers to an abstract machine that mediates all
|
|
accesses to objects by subjects. See also Security Kernel.
|
|
|
|
Reliability - the extent to which a system can be
|
|
expected to perform its intended function with required pre-
|
|
cision.
|
|
|
|
Resource - anything used or consumed while performing a
|
|
function. The categories of resources are: time, informa-
|
|
tion, objects (information containers), or processors (the
|
|
ability to use information). specific examples are: CPU
|
|
time; terminal connect time; amount of directly-addressable
|
|
memory; disk space; number of I/O requests per minute, etc.
|
|
|
|
|
|
- S -
|
|
|
|
Secrecy Policy - a security policy to prevent unauthor-
|
|
ized users from reading sensitive information. See also
|
|
Security Policy
|
|
|
|
Security architecture - the subset of computer archi-
|
|
tecture dealing with the security of the computer or network
|
|
system. See computer architecture, network architecture.
|
|
|
|
Security-Compliant Channel - A channel is Security-
|
|
Compliant if the enforcement of the network policy depends
|
|
only upon characteristics of the channel either (1) included
|
|
in the evaluation, or (2) assumed as a installation con-
|
|
straint and clearly documented in the Trusted Facility
|
|
Manual.
|
|
|
|
Security Kernel - the hardware, firmware, and software
|
|
elements of a Trusted Computing Base (or Network Trusted
|
|
Computing Base partition) that implement the reference moni-
|
|
tor concept. It must mediate all accesses, be protected
|
|
___
|
|
from modification, and be verifiable as correct.
|
|
|
|
Security label - see Sensitivity label.
|
|
|
|
Security level - the combination of hierarchical clas-
|
|
sification and a set of non-hierarchical categories that
|
|
represents the sensitivity of information.
|
|
|
|
Security policy - the set of laws, rules, and practices
|
|
that regulate how an organization manages, protects, and
|
|
distributes sensitive information.
|
|
|
|
Security policy model - an informal presentation of a
|
|
formal security policy model.
|
|
|
|
Security testing - a process used to determine that the
|
|
security features of a system are implemented as designed
|
|
and that they are adequate for a proposed application
|
|
environment. This process includes hands-on functional
|
|
testing, penetration testing, and verification. See also:
|
|
Functional Testing, Penetration Testing, Verification.
|
|
|
|
Sensitivity label - A piece of information that
|
|
represents the security level of an object and that
|
|
describes the sensitivity (e.g., classification) of the data
|
|
in the object. Sensitivity labels are used by the NTCB as
|
|
the basis for mandatory access control decisions.
|
|
|
|
Sensitivity level - See Security level.
|
|
|
|
Simple security property - a Bell-LaPadula security
|
|
model rule allowing a subject read access to an object only
|
|
if the security level of the subject dominates the security
|
|
level of the object.
|
|
|
|
Single-level device - a device that is used to process
|
|
data of a single security level at any one time. Since the
|
|
device need not be trusted to separate data of different
|
|
security levels, sensitivity labels do not have to be stored
|
|
with the data being processed.
|
|
|
|
*-property (star property) - a Bell-LaPadula security
|
|
model rule allowing a subject write access to an object only
|
|
if the security level of the subject is dominated by the
|
|
security level of the object. Also known as the Confinement
|
|
Property.
|
|
|
|
Storage object - an object that supports both read and
|
|
write accesses.
|
|
|
|
Subject - an active entity, generally in the form of a
|
|
person, process, or device that causes information to flow
|
|
among objects or changes the system state. Technically, a
|
|
process/domain pair.
|
|
|
|
Subject security level - a subject's security level is
|
|
equal to the security level of the objects to which it has
|
|
both read and write access. A subject's security level must
|
|
always be dominated by the clearance of the user the subject
|
|
is associated with.
|
|
|
|
System - an assembly of computer and/or communications
|
|
hardware, software, and firmware configured for the purpose
|
|
of classifying, sorting, calculating, computing, summariz-
|
|
ing, transmitting and receiving, storing and retrieving data
|
|
with the purpose of supporting users.
|
|
|
|
System High - the highest security level supported by a
|
|
system at a particular time or in a particular environment.
|
|
|
|
System High Security Mode - the mode of operation in
|
|
which system hardware and software is only trusted to pro-
|
|
vide discretionary protection between users. In this mode,
|
|
the entire system, to include all components electrically
|
|
and/or physically connected, must operate with security
|
|
measures commensurate with the highest classification and
|
|
sensitivity of the information being processed and/or
|
|
stored. All system users in this environment must possess
|
|
clearances and authorization for all information contained
|
|
in the system. All system output must be clearly marked
|
|
with the highest classification and all system caveats until
|
|
the information has been reviewed manually by an authorized
|
|
individual to ensure appropriate classifications and that
|
|
caveats have been affixed. Compare Dedicated Security Mode,
|
|
Multilevel Security Mode.
|
|
|
|
System Low - the lowest security level supported by a
|
|
system at a particular time or in a particular environment.
|
|
|
|
System Security Officer (SSO) - the person responsible
|
|
for the security of a system. The SSO is authorized to act
|
|
in the "security administrator" role. Functions that the
|
|
SSO is expected to perform include: auditing and changing
|
|
security characteristics of a user.
|
|
|
|
|
|
- T -
|
|
|
|
Top-level specification (TLS) - a non-procedural
|
|
description of system behavior at the most abstract level.
|
|
Typically a functional specification that omits all imple-
|
|
mentation details.
|
|
|
|
Trap-door - a hidden software or hardware mechanism
|
|
that permits system protection mechanisms to be circum-
|
|
vented. It is activated in some non-apparent manner (e.g.,
|
|
special "random" key sequence at a terminal.
|
|
|
|
Trojan horse - a computer program with an apparently or
|
|
actually useful function that contains additional (hidden)
|
|
functions that surreptitiously exploit the legitimate
|
|
authorizations of the invoking process to the detriment of
|
|
security. For example, making a "blind copy" of a sensitive
|
|
file for the creator of the Trojan Horse.
|
|
|
|
Trusted channel - a mechanism by which two NTCB parti-
|
|
tions can communicate directly. This mechanism can be
|
|
activated by either of the NTCB partitions, cannot be imi-
|
|
tated by untrusted software, and maintains the integrity of
|
|
information that is sent over it. A trusted channel may be
|
|
needed for the correct operation of other security mechan-
|
|
isms.
|
|
|
|
Trusted computer system - a system that employs suffi-
|
|
cient hardware and software integrity measures to allow its
|
|
use for processing simultaneously a range of sensitive or
|
|
classified information.
|
|
|
|
Trusted computing base (TCB) - the totality of protec-
|
|
tion mechanisms within a computer system -- including
|
|
hardware, firmware, and software -- the combination of which
|
|
is responsible for enforcing a security policy. It creates
|
|
a basic protection environment and provides additional user
|
|
services required for a trusted computer system. The abil-
|
|
ity of a trusted computing base to correctly enforce a secu-
|
|
rity policy depends solely on the mechanisms within the TCB
|
|
and on the correct input by system administrative personnel
|
|
of parameters (e.g., a user's clearance) related to the
|
|
security policy.
|
|
|
|
Trusted functionality - that which is determined to be
|
|
correct with respect to some criteria, e.g. as established
|
|
by a security policy. The functionality shall neither fall
|
|
short of nor exceed the criteria.
|
|
|
|
Trusted path - a mechanism by which a person at a ter-
|
|
minal can communicate directly with the Trusted Computing
|
|
Base. This mechanism can only be activated by the person or
|
|
the Trusted Computing Base and cannot be imitated by
|
|
untrusted software.
|
|
|
|
Trusted software - the software portion of a Trusted
|
|
Computing Base.
|
|
|
|
Trusted subject - a subject that is part of the TCB.
|
|
It has the ability to violate the security policy, but is
|
|
trusted not to actually do so. For example in the Bell-
|
|
LaPadulla model a trusted subject is not constrained by the
|
|
*-property and thus has the ability to write sensitive
|
|
information into an object whose level is not dominated by
|
|
the (maximum) level of the subject, but it is trusted to
|
|
only write information into objects with a label appropriate
|
|
for the actual level of the information.
|
|
|
|
|
|
- U -
|
|
|
|
User - any person who interacts directly with a network
|
|
system. This includes both those persons who are authorized
|
|
to interact with the system and those people who interact
|
|
without authorization (e.g., active or passive wiretappers).
|
|
Note that "users" does not include "operators," "system pro-
|
|
grammers," "technical control officers," "system security
|
|
officers," and other system support personnel. They are
|
|
distinct from users and are subject to the Trusted Facility
|
|
Manual and the System Architecture requirements. Such indi-
|
|
viduals may change the system parameters of the network sys-
|
|
tem, for example by defining membership of a group. These
|
|
individuals may also have the separate role of users.
|
|
|
|
|
|
- V -
|
|
|
|
Verification - the process of comparing two levels of
|
|
system specification for proper correspondence (e.g., secu-
|
|
rity policy model with top-level specification (TLS), TLS
|
|
with source code, or source code with object code). This
|
|
process may or may not be automated.
|
|
|
|
Virus - malicious software, a form of Trojan horse,
|
|
which reproduces itself in other executable code.
|
|
|
|
|
|
- W -
|
|
|
|
Write - a fundamental operation that results only in
|
|
the flow of information from a subject to an object.
|
|
|
|
Write access - permission to write an object.
|
|
|
|
|
|
|
|
|
|
References
|
|
__________
|
|
|
|
|
|
Abrams, M. D. and H. J. Podell, Tutorial: Computer and Net-
|
|
________ ________ ___ ____
|
|
work Security, IEEE Computer Society Press, 1987.
|
|
____ ________
|
|
|
|
Addendum to the Transport Layer Protocol Definition for Pro-
|
|
________ __ ___ _________ _____ ________ __________ ___ ____
|
|
viding Connection Oriented End-to-End Cryptographic Data
|
|
______ __________ ________ ___ __ ___ _____________ ____
|
|
Protection Using A 64-bit Block Cipher, ISO TC 97 / SC 20 /
|
|
__________ _____ _ __ ___ _____ ______
|
|
WG 3, N 37, January 10, 1986.
|
|
|
|
Biba K. J., Integrity Considerations for Secure Computer
|
|
_________ ______________ ___ ______ ________
|
|
Systems, MTR-3153, The MITRE Corporation, June 1975; ESD-
|
|
_______
|
|
TR-76-372, April 1977.
|
|
|
|
Bell, D. Elliot and LaPadula, Leonard J., Secure Computer
|
|
______ ________
|
|
Systems: Unified Exposition and Multics Interpretation, MTR
|
|
_______ _______ __________ ___ _______ ______________
|
|
2997, The MITRE Corporation, April 1974. (AD/A 020 445)
|
|
|
|
Denning, D .E., Lunt, T. F., Neumann, P. G., Schell, R. R.,
|
|
Heckman, M. and Shockley, W., Secure Distributed Data
|
|
______ ___________ ____
|
|
Views, Security Policy and Interpretation for a Class A1
|
|
_____ ________ ______ ___ ______________ ___ _ _____ __
|
|
Multilevel Secure Relational Database System, SRI Interna-
|
|
__________ ______ __________ ________ ______
|
|
tional, November 1986.
|
|
|
|
Girling, C. G., "Covert Channels in LAN's," IEEE Transac-
|
|
____ ________
|
|
tions on Software Engineering, Vol. SE-13, No. 2, February
|
|
_____ __ ________ ___________
|
|
1987.
|
|
|
|
Grohn, M. J., A Model of a Protected Data Management Sys-
|
|
_ _____ __ _ _________ ____ __________ ____
|
|
tem, ESD-TR-76-289, I. P. Sharp Assoc. Ltd., June, 1976.
|
|
___
|
|
|
|
``Integrity and Inference Group Report,'' Proceedings of the
|
|
___________ __ ___
|
|
National Computer Security Center Invitational Workshop on
|
|
________ ________ ________ ______ ____________ ________ __
|
|
Database Security, Baltimore, MD, 17-20 June 1986.
|
|
________ ________
|
|
|
|
ISO 7498/Part 2 - Security Architecture, ISO / TC 97 / SC 21
|
|
___ ____ ____ _ ________ ____________
|
|
/ N1528 / WG 1 Ad hoc group on Security, Project 97.21.18,
|
|
September 1986.
|
|
|
|
Jueneman, R. R, "Electronic Document Authentication," IEEE
|
|
____
|
|
Network Magazine, April 1987, pp 17-23.
|
|
_______ ________
|
|
|
|
Lipner, Steven B., ``Non-Discretionary Controls for Commer-
|
|
cial Applications'', IEEE Proceedings of the 1982 Symposium
|
|
____ ___________ __ ___ ____ _________
|
|
on Security and Privacy, April 26-28, 1982, Oakland, CA.
|
|
__ ________ ___ _______
|
|
|
|
National Computer Security Center, Department of Defense
|
|
__________ __ _______
|
|
Password Management Guideline, CSC-STD-002-85, 12 April
|
|
________ __________ _________
|
|
1985.
|
|
|
|
National Computer Security Center, Department of Defense
|
|
__________ __ _______
|
|
Trusted Computer Security Evaluation Criteria, DOD 5200.28-
|
|
_______ ________ ________ __________ ________
|
|
STD, December 1985.
|
|
|
|
National Computer Security Center, Security Requirements:
|
|
________ ____________
|
|
Guidance for Applying the Department of Defense Trusted Com-
|
|
________ ___ ________ ___ __________ __ _______ _______ ____
|
|
puter System Evaluation Criteria in Specific Environments,
|
|
_____ ______ __________ ________ __ ________ ____________
|
|
CSC-STD-003-85, 25 June 1985.
|
|
|
|
Padlipsky, M. A., Snow, D. P., and Karger, P. A., Limita-
|
|
_______
|
|
tions of End-to-End Encryption in Secure Computer Networks,
|
|
_____ __ ___ __ ___ __________ __ ______ ________ ________
|
|
The MITRE Corporation, MTR-3592, Vol. I, May 1978 (ESD TR
|
|
78-158, DTIC AD A059221).
|
|
|
|
The Directory - Authentication Framework (Melbourne, April
|
|
___ _________ ______________ _________ _________ _____
|
|
1986), ISO/CCITT Directory Convergence Document #3.
|
|
____
|
|
|
|
Voydock, Victor L. and Stephen T. Kent, "Security Mechanisms
|
|
in High-Level Network Protocols," Computing Surveys, Vol.
|
|
_________ _______
|
|
15, No. 2, June 1983, pp 135-171.
|
|
|
|
|
|
_________________________
|
|
ISO developmental documents are of limited lifetime and availa-
|
|
bility.
|
|
|