623 lines
20 KiB
Plaintext
623 lines
20 KiB
Plaintext
A Draft Security Policy
|
|
|
|
|
|
|
|
This draft policy is provided as a model for your organization's consideration
|
|
and adoption. It was prepared by the National Computer Security Association.
|
|
We would appreciate your comments or revisions to it. You may write
|
|
us at Suite 309, 4401-A Connecticut Av NW, Washington, DC 20008. Or
|
|
you may call our BBS at 202-364-1304. Or you may call voice at 202-364-8252.
|
|
|
|
|
|
|
|
|
|
|
|
BASIC REQUIREMENTS
|
|
|
|
|
|
|
|
Each of the six basic requirements defined below are used by DoD in
|
|
evaluating system security, and are appropriate throughout all computer
|
|
systems, regardless of their actual security requirements.
|
|
|
|
|
|
|
|
Security Policy
|
|
|
|
|
|
|
|
<B>There must be an explicit and well-defined security policy enforced
|
|
by the system.<D> Given identified subjects and objects, there must
|
|
be a set of rules that are used by the system to determine whether
|
|
a given subject can be permitted to gain access to a specific object.
|
|
Computer systems of interest must enforce a mandatory security policy
|
|
that can effectively implement access rules for handling sensitive
|
|
information. These rules include requirements such as: <MI><169>No
|
|
person lacking proper personnel security clearance shall obtain access
|
|
to classified information.<170><D> In addition, discretionary security
|
|
controls are required to ensure that only selected users or groups
|
|
of users may obtain access to data <197> for instance, based on a
|
|
need-to-know basis.
|
|
|
|
|
|
|
|
Marking
|
|
|
|
|
|
|
|
<B>Access control labels must be associated with objects<D>. In order
|
|
to control access to information stored in a computer, according to
|
|
the rules of a mandatory security policy, it must be possible to mark
|
|
every object with a label that reliably identifies the object's sensitivity
|
|
level and/or the modes of access accorded those subjects who may potentially
|
|
access the object.
|
|
|
|
|
|
|
|
Identification
|
|
|
|
|
|
|
|
<B>Individual subjects must be identified<D>. Each access to information
|
|
must be mediated based on who is accessing the information and what
|
|
classes of information they are authorized to deal with. This identification
|
|
and authorization information must be securely maintained by the computer
|
|
system and be associated with every active element that performs some
|
|
security-relevant action in the system.
|
|
|
|
|
|
|
|
Accountability
|
|
|
|
|
|
|
|
<B>Audit information must be selectively kept and protected so that
|
|
actions affecting security can be traced to the responsible party.<D>
|
|
A trusted system must be able to record the occurrences of security-relevant
|
|
events in an audit log. The capability to select the audit events
|
|
to be recorded is necessary to minimize the expense of auditing and
|
|
to allow efficient analysis. Audit data must be protected from modification
|
|
and unauthorized destruction to permit detection and after-the-fact
|
|
investigations of security violations.
|
|
|
|
|
|
|
|
Assurance
|
|
|
|
|
|
|
|
<B>The computer system must contain hardware/software mechanisms that
|
|
can be independently evaluated to provide sufficient assurance that
|
|
the system enforces the policy, marking, identification, and accountability
|
|
requirements described above.<D> In order to assure that the four
|
|
requirements are enforced by a computer system, there must be some
|
|
identified and unified collection of hardware and software controls
|
|
that perform these functions. These mechanisms are typically embedded
|
|
in the operating system of mainframes, or a combination of operating
|
|
system features and added application software on LANs, and are designed
|
|
to carry out the assigned tasks in a secure manner. The basis for
|
|
trusting such system mechanisms in their operational setting must
|
|
be clearly documented such that it is possible to independently examine
|
|
the evidence to evaluate their sufficiency.
|
|
|
|
|
|
|
|
Continuous Protection
|
|
|
|
|
|
|
|
<B>The trusted mechanisms that enforce these basic requirements must
|
|
be continuously protected against tampering and/or unauthorized changes.<D>
|
|
No computer system can be considered truly secure if the basic hardware
|
|
and software mechanisms that enforce the security policy are themselves
|
|
subject to unauthorized modification or subversion. The continuous
|
|
protection requirement has direct implications throughout the computer
|
|
system's lifecycle.
|
|
|
|
|
|
|
|
|
|
|
|
IMPLEMENTATION CONCERNS
|
|
|
|
|
|
|
|
<MU>Creating<D> a security policy is fairly simple. You can copy
|
|
the material that follows, for instance, and get the chief to sign
|
|
it. <MU>Implementing<D> a security policy is more difficult.
|
|
|
|
* The organizations with the most success in implementing security
|
|
policies with PC users are those who get away from a project orientation
|
|
and somehow convince all staff that security is an ongoing business
|
|
function.
|
|
|
|
While seemingly everyone concerned with security agree that a policy
|
|
is important, not everyone agrees that it should be agency-wide. For
|
|
example, NASA's Richard W. Carr believes that a standard approach
|
|
like the NSA's C2 level of safeguarding is not cost-effective. Because
|
|
so much of NASA's scientific data is made public, Carr has opted for
|
|
local approaches to safeguarding information, rather than an agency-wide
|
|
approach.
|
|
|
|
|
|
|
|
|
|
|
|
HARDWARE CONCERNS
|
|
|
|
|
|
|
|
Before reviewing sophisticated data security issues, it is necessary
|
|
to consider the basic physical protection of the equipment itself.
|
|
|
|
|
|
|
|
Access
|
|
|
|
|
|
|
|
Access to micros should be physically limited to authorized users. Untrained
|
|
or malicious individuals could damage or make inappropriate use of
|
|
the equipment or the accessible data. At some organizations, such
|
|
as GTE, the entire microcomputer is kept in a locked room. If users
|
|
are reluctant to do this when they are finished with it, then they
|
|
are provided with an external hard disk that can be locked up.
|
|
|
|
* Do not permit users to leave workstations or micros unattended,
|
|
particularly if they are tied to a network.
|
|
|
|
* Install timelocks that activate after an interval of no keyboard
|
|
activity, and require password to resume entry.
|
|
|
|
* Change all passwords immediately whenever an employee leaves the
|
|
organization.
|
|
|
|
* Change passwords routinely - perhaps every other month - of all
|
|
employees.
|
|
|
|
|
|
|
|
Theft
|
|
|
|
|
|
|
|
Personal computers and their component parts are high-value items. Secure
|
|
the rooms where the hardware is located, or install lockdown systems
|
|
securing the equipment to a table or desk.
|
|
|
|
|
|
|
|
Environmental Damage
|
|
|
|
|
|
|
|
Electrical Power
|
|
|
|
|
|
|
|
Computers are sensitive to the quality of electrical power. Use surge
|
|
protectors. Also, micros should be powered from a source isolated
|
|
from heavy appliances or office equipment.
|
|
|
|
|
|
|
|
Smoking, Eating, and Drinking
|
|
|
|
|
|
|
|
Smoke can damage disks. Food and ashes that are dropped in the keyboard
|
|
can work down into the mechanism and cause malfunctions. Smoking,
|
|
eating, and drinking should be prohibited in the vicinity of computers.
|
|
|
|
|
|
|
|
Static Electricity
|
|
|
|
|
|
|
|
Static electricity can badly damage a computer. This danger can be
|
|
minimized through the use of anti-static sprays, carpets, or pads.
|
|
|
|
|
|
|
|
Magnetic Media Protection
|
|
|
|
|
|
|
|
Particular attention should be given to the protection of magnetic
|
|
media, as it is the primary means of data storage.
|
|
|
|
|
|
|
|
Floppy Disks
|
|
|
|
|
|
|
|
Floppy disks should be handled with care.
|
|
|
|
* Always store in the protective jacket.
|
|
|
|
* Protect from bending or similar handling.
|
|
|
|
* Maintain an acceptable temperature range (50-125 degrees F.)
|
|
|
|
* Avoid contact with magnetic fields, such as telephone handsets.
|
|
|
|
* Do not write on the diskette, either directly or through the jacket
|
|
or sleeve.
|
|
|
|
|
|
|
|
Hard Disks
|
|
|
|
|
|
|
|
Rough handling of hard disks may damage the device. Take care not
|
|
to jostle the unit unnecessarily. Never power off the system without
|
|
performing the recommended shutdown procedures.
|
|
|
|
|
|
|
|
Media Declassification or Destruction
|
|
|
|
|
|
|
|
Magnetic media, such as disks and tapes, that contain sensitive or
|
|
classified information should not be put in regular waste containers. They
|
|
should be cleared by degaussing and reused, or rendered useless by
|
|
shredding or burning.
|
|
|
|
Defective or damaged magnetic storage media that have been used in
|
|
a sensitive environment should not be returned to the vendor unless
|
|
they have been degaussed. This is required since many <169>ERASE<170>
|
|
commands do not actually erase the file. The DoD-approved erasure
|
|
method requires three overwrites of the file: first overwriting with
|
|
<169>1"s, then <170>0"s, and then random bits. Each overwrite should
|
|
be verified by visually inspecting the file contents, using some low-level
|
|
facility.
|
|
|
|
|
|
|
|
Electromagnetic Emanations
|
|
|
|
|
|
|
|
All electronic equipment emanates electromagnetic signals. Emanations
|
|
produced by computers, terminals, and communication lines can be detected
|
|
and translated into readable form by monitoring devices. Secure measures
|
|
intended to combat these radio frequency emissions are known as <169>TEMPEST<170>
|
|
controls. TEMPEST-certified equipment is available, and used regularly
|
|
by government organizations and contractors processing classified
|
|
data.
|
|
|
|
|
|
|
|
Hardware Modifications
|
|
|
|
|
|
|
|
Hardware modifications should be strictly controlled. Uncontrolled
|
|
or poorly considered hardware modifications can adversely affect the
|
|
operation of the computer. For example, any modifications to TEMPEST-approved
|
|
devices may invalidate their emanation-shielding ability. The configuration
|
|
of any hardware systems used for sensitive processing should be very
|
|
carefully monitored. Such devices should be sealed to prevent tampering,
|
|
and modifications made only by trusted, qualified personnel.
|
|
|
|
|
|
|
|
Trusted, Authorized Technicians
|
|
|
|
|
|
|
|
Advanced microelectronic techniques make computers vulnerable to <169>bugging.<170> A
|
|
transmitter chip can be installed by a hostile technician under the
|
|
guise of a system repair or upgrade. Therefore, the user should be
|
|
certain that the technician performing maintenance is both authorized
|
|
and qualified. Also, circuit boards or components removed in the
|
|
course of any maintenance at a classified facility should not leave
|
|
without qualified technical review.
|
|
|
|
|
|
|
|
|
|
|
|
DATA CONCERNS
|
|
|
|
|
|
|
|
|
|
|
|
Classification
|
|
|
|
|
|
|
|
Classify your information. IBM uses five classes of data, from unclassified,
|
|
with no restrictions, to <169>registered IBM confidential<170>, available
|
|
only to employees with a predetermined need to know. If your organization
|
|
has an approved classification system, use it. If not, develop one.
|
|
|
|
|
|
|
|
Labeling
|
|
|
|
|
|
|
|
Sensitive or classified information resources must be clearly labeled
|
|
as such. These <169>resources<170> include both the hardware and
|
|
the storage media.
|
|
|
|
|
|
|
|
External Classification Labels on Micros
|
|
|
|
|
|
|
|
Micros should have external classification labels indicating the highest
|
|
sensitivity of data processed on the device. Avoid using hard disk
|
|
systems for sensitive processing, as the data stored on a hard disk
|
|
cannot be reliably removed except by degaussing the entire disk surface. Also,
|
|
it is very difficult to ascertain that sensitive information has not
|
|
been stored on the disk. Consequently, hard disk systems must be
|
|
labeled to indicate the highest level of data sensitivity to which
|
|
they have ever been exposed.
|
|
|
|
|
|
|
|
Floppy Disk Labels
|
|
|
|
|
|
|
|
Label all floppy disks to indicate the type and sensitivity of data
|
|
on the disk. A floppy must be considered to assume the sensitivity
|
|
level of the device in which it is inserted. For example, a hard
|
|
disk that has some sensitive data must always be considered to be
|
|
a sensitive device, and any floppy disk inserted into any machine
|
|
connected (directly or through cabling) to such a hard disk must assume
|
|
that level of sensitivity. Conversely, if the floppy were more sensitive
|
|
than the hard disk, the hard disk now assumes the higher sensitivity
|
|
of the floppy.
|
|
|
|
|
|
|
|
Files
|
|
|
|
|
|
|
|
Files stored on a hard disk containing any sensitive files must be
|
|
handled as carefully as the most sensitive information stored on the
|
|
system. On such a system, even files that are assumed to be not sensitive
|
|
cannot be readily confirmed as such. Visual inspection of a file's
|
|
printed image does not really confirm what is physically stored in
|
|
the file space. Sensitive files, if they must be stored on hard disks,
|
|
should be handled very carefully. One means of emphasizing which
|
|
files are sensitive is to store them in a separated disk partition. However,
|
|
such methods, no matter how carefully controlled, do not ensure data
|
|
integrity.
|
|
|
|
|
|
|
|
Encryption
|
|
|
|
|
|
|
|
Data encryption provides a partial solution to the problem of labeling
|
|
as well as providing access control. Encryption is a technique for
|
|
rendering information unintelligible to those who don't have access
|
|
to the tools necessary to see it.
|
|
|
|
Hardware implementations of encryption can provide a higher degree
|
|
of security, since software-based implementations are susceptible
|
|
to penetration by interlopers. However, take steps to ensure the
|
|
integrity of the device. Sensitive equipment should be sealed and
|
|
the internal configuration audited.
|
|
|
|
|
|
|
|
Securing Data Media
|
|
|
|
|
|
|
|
Lock Floppy Disks
|
|
|
|
|
|
|
|
Diskettes should be locked in a secure container. Be sure that the
|
|
keys are unique and not interchangeable with the keys to other locks.
|
|
|
|
|
|
|
|
Use Removable Hard Disk Systems
|
|
|
|
|
|
|
|
When feasible, use removable hard disk systems instead of fixed disk
|
|
storage. At a minimum, keep hard disk systems in a secure area. Also,
|
|
consider installing power-on locks that restrict access to the machine
|
|
to individuals with lock keys. Again, the keys should be unique.
|
|
|
|
|
|
|
|
Backup
|
|
|
|
|
|
|
|
Make backup copies of all important software and data files.
|
|
|
|
|
|
|
|
Clearing Memory
|
|
|
|
|
|
|
|
Clear the micro's memory between users. Turning most micros off for
|
|
10 seconds is usually enough to accomplish this.
|
|
|
|
|
|
|
|
Data Transmission
|
|
|
|
|
|
|
|
Microcomputers can enable users to transfer data to or from a mainframe. Transferring
|
|
sensitive data should be carefully controlled and monitored. The
|
|
micro user is responsible for ensuring that sensitive or classified
|
|
information is transferred only to other computers designated for
|
|
sensitive data. The micro user is also responsible for the data transferred
|
|
from mainframe to micro. Note that such transmissions may include
|
|
information which the user may not have perceived as being transferred.
|
|
|
|
|
|
|
|
|
|
|
|
SOFTWARE CONCERNS
|
|
|
|
|
|
|
|
|
|
|
|
Software Vulnerabilities
|
|
|
|
|
|
|
|
The lack of micro hardware security engenders software insecurity. Because
|
|
modifications cannot be prevented, critical software, including operating
|
|
system routines, can be modified or destroyed. For example, encryption
|
|
schemes implemented in software can be forced to reveal their decryption
|
|
key.
|
|
|
|
|
|
|
|
Operating System Weaknesses
|
|
|
|
|
|
|
|
Unlike many mainframe computer operating systems, most micro operating
|
|
systems have not been developed for security considerations.
|
|
|
|
|
|
|
|
User Identification and Authentication
|
|
|
|
|
|
|
|
User identification is the process by which an individual identifies
|
|
himself to the system as a valid user. Authentication is the procedure
|
|
by which the user establishes that he is indeed that user, and has
|
|
a right to use the system. During the login process, the user enters
|
|
name or account number (identification) and password (authentication).
|
|
|
|
* Add password systems - software or hardware - to micros.
|
|
|
|
* Do not permit employees to use inappropriate passwords that are
|
|
easy to guess (first name, spouse's name, pet's name, birthday, etc.)
|
|
|
|
* Authentication (and, for multi-user micros and LANs, identification)
|
|
should occur whenever the system is powered up or rebooted.
|
|
|
|
|
|
|
|
Software Attacks - Trapdoors/Trojan Horses/Viruses
|
|
|
|
|
|
|
|
Don't use any software that is not a <169>known quantity<170>. Isolate
|
|
and test new software on a test system, where Trojan horses and viruses
|
|
can do little damage.
|
|
|
|
Consider a policy which prohibits users from bringing unapproved software
|
|
into the building. (Rockwell International has had such a written
|
|
policy since 1988.) If a user must bring in software, consider requiring
|
|
that it be tested by your virus test group first.
|
|
|
|
Follow the advice in the chapter on viruses.
|
|
|
|
|
|
|
|
Communication Attacks
|
|
|
|
|
|
|
|
Information transmitted over unprotected communications lines can
|
|
be intercepted by someone masquerading as you, actively receiving
|
|
your information, or through passive eavesdropping. Therefore, sensitive
|
|
information should be protected during transmission. Masquerading
|
|
can be thwarted through the use of dial-back. Dial-back is an interactive
|
|
security measure that works like this: The answering modem requests
|
|
the identification of the caller, then disconnects. If the caller's
|
|
ID matches an authorized ID in the answering system's user directory,
|
|
the answering system will call back the originating system at a prearranged
|
|
number. The effectiveness of dial-back as a security measure is questionable
|
|
due to digital PBXs (private branch exchange telephone systems) and
|
|
convenience features like call forwarding. Also, various methods
|
|
of call-back protection have been broken by hackers. Encryption is
|
|
one sure method of transmission protection.
|
|
|
|
Encryption can be adapted as a means of remote user authentication. A
|
|
user key, entered at the keyboard, authenticates the user. A second
|
|
encryption key can be stored in encrypted form in the calling system
|
|
firmware that authenticates the calling system as an approved communication
|
|
endpoint. When dial-back is used in conjunction with two-key encryption,
|
|
data access can be restricted to authorized users (with the user key)
|
|
with authorized systems (those whose modems have the correct second
|
|
key), located at authorized locations (those with phone numbers listed
|
|
in the answering system's phone directory).
|
|
|
|
Remote connections to other systems make micros susceptible to remote
|
|
attacks. A micro connected to a network, for example, may be subjected
|
|
to attack by other network users. The attacker could transmit control
|
|
characters that affect the interrupt logic of the micro in such a
|
|
way as to permit him to obtain full access to the micro and its peripherals,
|
|
even if he is incapable of passing the system's login challenge. The
|
|
attacker could use other techniques to examine the user's communication
|
|
package for dial-up phone numbers, access codes, passwords, etc.
|
|
|
|
|
|
|
|
|
|
|
|
HUMAN CONCERNS
|
|
|
|
|
|
|
|
To create computer security, four basic changes must occur in the
|
|
organization:
|
|
|
|
* <B>senior management must provide strong, overt support of the
|
|
program<D>. They must require personal accountability in their subordinates,
|
|
and they must set good examples.
|
|
|
|
* <B>employees must be educated<D>. Employees would support security
|
|
programs much more if they understood the need and the methods, and
|
|
felt that they were part of the program. Educate and involve them.
|
|
|
|
* <B>all members of the organization must participate in the program<D>.
|
|
Because information is handled by all employees, all must understand
|
|
the value of their contribution to security, and the value of the
|
|
information they access.
|
|
|
|
* <B>staff effort must be rewarded<D>. Be sure to reward those
|
|
who provide suggestions for improving security, who comply with security
|
|
policy, and who contribute in other ways.
|
|
|
|
The <169>human factors<170> in computer security are probably far
|
|
more important than the hardware or software you throw at the problem.
|
|
|
|
Perhaps security would be improved with some world-wide attitude change,
|
|
too. Ken Thompson, one of the co-developers of UNIX, writes <169>It
|
|
is only the inadequacy of the criminal code that saves the hackers
|
|
from very serious prosecution... There is an explosive situation brewing.
|
|
On the one hand, the press, television, and movies make heroes of
|
|
vandals by calling them whiz kids. On the other hand, the acts performed
|
|
by these kids will soon be punishable by years in prison... The act
|
|
of breaking into a computer system has to have the same social stigma
|
|
as breaking into a neighbor's house. It should not matter that the
|
|
neighbor's door is unlocked. The press must learn that misguided use
|
|
of a computer is no more amazing than drunk driving of an automobile.<170>
|
|
|
|
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|