This section discusses the common security services and the particular technologies/standards that
could be useful in actually implementing the common service. These security
services are:
An audit service is responsible for producing records
known as audit records which contain audit record
fields, which track security relevant events. The resulting audit records may
be reduced and examined in order to address several key aspects of security
within a security domain:
· Audit records and audit trails can be used to determine if a
pre-scripted security policy is being enforced.
· Auditing and subsequently reduction tooling are used by the security
administrators within a Security Domain to determine the Security Domain’s
adherence to the stated access control and authentication policies.
· Audit records that support the recording of usage data, secure storage
of that data, analysis of that data allows Security Domains to detect fraud and
intrusion detection.
A robust auditing mechanism enables a
Non-repudiation service through the creation of an audit trail.
Key definitions:
audit: 1. To conduct an
independent review and examination of system records and activities
in order to test the adequacy and effectiveness of data security and data integrity
procedures, to ensure compliance with established policy and operational
procedures, and to recommend any necessary changes. 2. Independent
review and examination of records and activities to assess the adequacy of
system controls, to ensure compliance with established policies and operational
procedures, and to recommend necessary changes in controls, policies, or
procedures. [INFOSEC-99]
audit record field: A field containing information regarding all
entities in a transaction, and indicators of the types of processing performed
by those entities. [After X9.17/95]
audit trail: 1. A record
of both completed and attempted accesses and service. 2. Data in the form of a logical
path linking a sequence
of events, used to trace the transactions that have affected the contents of a
record. 3. [In INFOSEC,
a] chronological record of system
activities to enable the reconstruction and examination of the sequence of
events and/or changes in an event. Note: Audit trail may apply to information in an information system
(IS), to message routing in a communications
system, or to the transfer
of COMSEC material.
[INFOSEC-99]
There are several well-understood audit issues that must
be taken into account when implementing the audit trail. The audit trails need
to be analyzed to determine vulnerabilities, establish accountability, assess damage and recover the system. Manual analysis of audit
trails though cumbersome is often resorted to because of the difficulty to
construct queries to extract complex information from the audit logs. There are
many tools that help in browsing the audits. The major obstacle in developing
effective audit analysis tools is the copious amounts of data that logging
mechanisms generate.
There are a number of significant issues in creating an audit
trail from various electronic audit sources:
· A coherent
and well-defined service to query an audit provider for audit records.
There needs to be mechanism through which queries for audit records can be
issued. Although multiple protocols could carry such a request, such a deployment
strategy would require profile-mapping capabilities. While to date, there
is no security specific standards for such a service, a general purpose log
query service could be used.
· A common
and self-describing format for the audit records that can account for
specializations.
The capability to query for audit records allows the start of the information
transfer. However, in order to re-construct an Audit Trail from multiple
audit record sources, there needs to be a common Audit Record format. The
format should be self-describing with standardized contents, but allow for
additional information to be conveyed. Some of the standardized fields
might be:
<AuditRecord>, <RecordType>,<AuthBy>, <SubjectUid>,<TimeStamp> , etc… However, there is no
internationally recognized specification for such.
What is important here is that the record structure be self describing so
that a general purpose log query service could present log data intelligently.
· A well-defined
mechanism to detect tampering with the transferred audit records.
One of the major purposes for audits/audit trails/audit records is provide an
authoritative mechanism to perform non-repudiation. One of the key issues
with providing non-repudiation in an authoritative manner is to prove that the
audit trail/record has not been tampered with.
Although there is no recognized standard for such purposes, there is a
recognized approach to the problem. This is to digitally sign the audit
record or to provide a non-repeating serial number for the record. The
actual mechanics of the digital signature and how to convey the signature would
be issues for the common audit record format specification.
· The ability
to correlate audit records from multiple audit sources.
It is conceivable that different Security Domains would be in different time
zones. In order to create an inter-domain audit trail, it is necessary to
be able to correlate the times of the various audit records.
Thus all audit records should have a timestamp whose reference time is UTC.
However, the timestamp itself may not have the accuracy to differentiate
between several audit records that occur within the same timestamp
period. Thus, it is also a requirement that an audit record serial number
be provided within each audit record. The combination of the timestamp
and serial number would need to be unique. Problems with correlation can also
occur if the timestamp accuracies of the audit records are not the same.
Thus appropriate
accuracy and time synchronization skew should be specified for each
implementation.
· Determination
of where to place auditing capability.
Many security infrastructures/policies have difficulty identifying the types of
applications that need an audit trail. The use of the definition of IntelliGrid Architecture security services allows the following base recommendations to be made.
Audit records should be generated whenever/wherever the following security
services are invoked: Authorization for Access Control; Credential Conversion;
Credential Renewal; Delegation; Firewall Transversal; Identity Establishment;
Identity Mapping; Profile; Security Protocol Mapping; Setting and Verifying
User Authorization; Single Sign-On; Trust Establishment; User and Group Management.
· Determination
of the minimum-maximum audit record time availability. There is a need to
determine/specify through policy a minimum amount of time that an audit record
must be maintained within the audit trail system. In IntelliGrid Architecture
environment, this time would need to be specified so that non-repudiation for
an appropriate period of time can be provided.
· The issues
of privacy and legal relevance needs to be addressed.
There are issues regarding the privacy of emails and text messages.
However, during the 9/11 terrorism hearings, email evidence was allowed to be
submitted. However, in the Kobe Bryant trial, the subpoena for text
messages (e.g. via cell phone) is being fought on the basis of privacy.
Until recently, there have been no publicly available authoritative documents
describing best practices in this area. However, the Federal Government
(AUDT-01) and the American Bar Association (AUDT-02) have published some
initial work that should be reviewed to determine if the recommendations are
viable within a given security domain.
Technologies/Specifications
Table 6 represents a set of specifications and/or standards that are relevant to the understanding of the issues
regarding the audit service. Those specifications marked as Recommended or
Recommended Reading should be considered as materials that should be considered
prior to actually implementing the audit service.
Table 5: Relevant References in regards to Audit processes
AUDT-01
|
US Department of Justice:
LEGAL
CONSIDERATIONS IN DESIGNING AND IMPLEMENTING ELECTRONIC PROCESSES: A GUIDE
FOR FEDERAL AGENCIES
Available from:
http://www.cybercrime.gov/eprocess.htm
|
AUDT-02
|
Joint Administrative
Office/Department of Justice Working Group on Electronic Technology in the
Criminal Justice System: Working Group Report.
Available from:
http://www.abanet.org/lpm/lpt/docs/ao-doj_committee_electronic_technology_wg_report.pdf
|
Table 6: Relevant Standards/Specifications relevant to the
Audit Service
Identification
Number
|
Name
|
Comment
|
ISO/IEC
10164-8:1993
|
Information
technology -- Open Systems Interconnection -- Systems Management: Security
audit trail function
|
Recommended
|
ISO/IEC
10181-7:1996
|
Information
technology -- Open Systems Interconnection -- Security frameworks for open
systems: Security audit and alarms framework
|
|
ISO/IEC
18014-1:2002
|
Information
technology -- Security techniques -- Time-stamping services -- Part 1:
Framework
|
Recommended
Reading
|
ISO/IEC
18014-2:2002
|
Information
technology -- Security techniques -- Time-stamping services -- Part 2:
Mechanisms producing independent tokens
|
|
ISO/IEC
18014-3:2004
|
Information
technology -- Security techniques -- Time-stamping services -- Part 3: Mechanisms
producing linked tokens
|
|
21 CFR Part
11
|
Guidance
for Industry Part 11, Electronic Records; Electronic Signatures – Scope and
Application
|
Recommended
Reading
|
Technological Assessment
An inspection of Table 6 shows that there are no
technology specific specifications/standards that
address the issues/problems previously discussed in this section.
The Authorization Service for Access Control is concerned with resolving a policy based access control decision based
upon appropriate Identity Establishment. The service consumes as input a
credential/identity token which embodies the identity of a service requestor
and/or for the resource that the service requestor requests. Based upon the
credentials and trust factors and policy, the resource will determine if
authenticating the peer is to be performed. Once authenticated, the peers
may process each other’s requests based upon appropriate policy enforcement (e.g.
privilege or role based access).
It is expected that IntelliGrid Architecture environment will provide
access control functions, and it is appropriate to further expose an abstract
authorization service depending on the granularity of the access control policy
that is being enforced. Allow for controlling access to IntelliGrid Architecture services and
resources will be based on authorization policies (i.e., who can access a
service, under what conditions) attached to each service. Also allow for
service requestors to specify invocation policies (i.e. who does the client
trust to provide the requested service). Authorization should accommodate
various access control models and implementation.
It is a design objective that IntelliGrid Architecture services be
supportive of the functions and services defined within OSGA.
Key definitions:
authenticate: 1. To
establish, usually by challenge and response, that a transmission attempt is
authorized and valid. 2. [To] verify the identity of a user, user device, or other
entity, or the integrity
of data stored, transmitted,
or otherwise exposed to unauthorized modification in an information system
(IS), or establish the validity of a transmission. [INFOSEC-99] 3. A
challenge given by voice or electrical means to attest to the authenticity of a
message or transmission.
[JP1]
authentication: 1. [Any] Security measure designed to
establish the validity of a transmission, message, or originator, or a means of
verifying an individual's authorization
to receive specific categories of information. [INFOSEC-99] [After JP 1-02] 2.
A security measure designed to protect a communications
system against acceptance
of a fraudulent transmission or simulation by establishing the validity of a
transmission, message, or originator. [JP 1-02] 3. Evidence by proper signature or seal that a document
is genuine and official. [JP 1-02]
access control: 1. A service feature or
technique used to permit or deny use of the components of a communication system. 2. A technique
used to define or restrict the rights of individuals or application programs to
obtain data from, or place
data onto, a storage
device. 3. The definition or restriction of the rights of individuals or
application programs to obtain data from, or place data into, a storage device.
4. Limiting access to information system
resources only to authorized users, programs, processes, or other systems. [INFOSEC-99] 5. That
function performed by the resource controller
that allocates system resources to satisfy user requests.
Authentication for Access Control relies upon several basic
factors being achieved:
- That the identity
of the entity/person is established.
The Identity Establishment Service performs this function.
- That there is an acceptable level of Trust
established that the entity is who they claim to be.
The Trust Establishment and Quality of Identity services are involved in
providing this functionality.
- That there is a policy and management process that
has been used to determine which entity has the privileges to access
certain assets, resources, or information.
The Policy and SMI related services provide this functionality.
- That
there is a mechanism to enforce the mandates of the policy and management
process.
The Authorization for Access Control service is responsible for providing
this functionality.
There are generally three (3) categories of Access Control
that need to be addressed within a Security Domain:
Physical Access Control to Assets;
Access Control to Computational
Resources; and Access Control to Information.
The basic premise of physical
access control is intended to allow authorized individuals
to be able to enter the areas for which they have clearance to enter and to
make it difficult for un-authorized individuals to enter. Based on the
Security Domain definition, physical access control is not an inter-domain
issue. However, there are some desirable aspects to any physical access control
system:
· Audit
Trail. The system
should be capable of providing an audit trail of who actually entered a
specific area. Properly
implemented, a physical access control system can provide on-site personnel
listings/locations in the event of an emergency event.
· Intrusion
Detection. The system
should be capable of detecting intrusion attempts of an un-authorized
individual to enter an area. There are
issues in regards to the quickness/speed of enunciating intrusion or intrusion
attempts. The speed at which this enunciation can occur is a key metric
in regards to the ability of a SMI to respond to the intrusion. The system
should be robust enough that intrusions can be proven in an authoritative
manner so that legal prosecution has a probability of success.
· Authentication
Management. The choice
of access control mechanisms should allow for multi-factor authentication and
ease of management in the event that revocation of access privileges is
required (e.g. User and Group Management issues). In order to accomplish this
service function, there must be a security token that is used to enable a final
access mechanism (e.g. a lock).
· Policy.
A
policy/strategy needs to address assets that are not capable of being
physically secured. For these types of resources, informational and resource
security measures will need to be enhanced. Examples of such an assets
are wireless networks and wireless technologies.
· Recovery
Plan. A residual
risk analysis and recovery plan needs to be developed, as part of the Policy
service, to address resources for which no type of adequate security can be
provided. An example of such physical resources are transmission lines
and telephone lines.
In order to provide physical access control, there needs to
have a physical barrier that separates critical or controlled areas from
un-controlled areas. These barriers would typically be fences, walls, or
doors that have locks or security guards so that proper access privileges can
be determined.
Physical Access Technologies/Specifications
There are no relevant specifications regarding Physical Authorization for Access Control. However,
there are typical strategies that are worthy of some discussion (see Table 7).
Table 7: Typical Physical Access Control Strategies
Security Strategy
|
Authentication
Factor
|
Biometric
|
Comments
|
Single
|
Two
|
Three
|
Security Guard Only
|
|
|
|
|
Needs to be augmented in
order to provide audit capability, at a minimum.
|
Key/Lock
|
X
|
|
|
|
Adequate token that can be
properly managed but can easily be duplicated that would facilitate
un-authorized access.
|
Combination Lock
|
X
|
|
|
|
Typically adequate, but
can be stolen through observation.
|
Sign-in sheet
|
|
|
|
|
Should not be used
solely. At a minimum, verification of the person’s identity signing-in
must be facilitated.
|
Sign-in sheet with
Photo-ID
|
X
|
|
|
X
|
Requires a security
guard.
|
Sign-in sheet with
confirmed clearance to enter.
|
X
|
|
|
X
|
Typically used for guest entry.
In order to be biometric, the confirming party must visually recognize and
clear the entity requesting entry.
|
Video Surveillance
|
|
|
|
|
Should be used as
audit/security for major/sensitive entrances. Provides a good mechanism for legal
prosecution for remote sites.
|
Photo-ID with no sign-in
sheet
|
|
|
|
X
|
Should not be used since
no audit trail is possible.
|
Smart Card
|
X
|
|
|
|
It is assumed that SMART Cards would be used in conjunction with computerized
locks so that a computerized audit trail can be generated. However, it
is typical that only ½ of the audit trail is generated since the cards are
typically not required to exit the room.
|
Smart Card with Photo ID
Card
|
X
|
|
|
X
|
Has the
benefit of the Smart Card, but can also double as a Personal ID. This
is a recommended strategy.
|
Smart ID Card used
to enable Combination Lock
|
|
X
|
|
|
This is the best
mechanism for restricting access to sensitive areas.
|
Biometric Combination
Lock
|
|
X
|
|
X
|
This is the
best mechanism for restricting access to sensitive areas.
|
Another method of analyzing the same strategies are shown in
the following table.
Table 8: Physical Security Strategies vs. Security Services
Provided
Security Strategy
|
Security Service Provided
|
Comment
|
Identity
|
Trust
|
Access
Control
|
Security Guard Only
|
?
|
|
|
It is questionable that a
security guard only strategy could provide adequate identification
establishment.
|
Key/Lock
|
|
x
|
x
|
Provides a mechanism to establish a relative level of
Trust (due to the person having the key) and provides appropriate access
control.
|
Combination Lock
|
|
x
|
x
|
Provides a mechanism to establish a relative level of
Trust (due to the person having the combination) and provides appropriate
access control.
|
Sign-in sheet
|
|
|
|
Without actual identity establishment, no security can be
provided.
|
Sign-in sheet with
Photo-ID
|
x
|
|
|
|
Sign-in sheet with
confirmed clearance to enter.
|
?
|
x
|
|
Only provides Identity Establishment if a photo-ID is used
in conjunction with the sign-in sheet.
|
Video Surveillance
|
|
|
|
Provides audit and repudiation capability only.
|
Photo-ID with no sign-in
sheet
|
x
|
|
|
|
Smart Card
|
|
x
|
x
|
A Smart-Card only does not provide Identity
Establishment. Identity Establishment is a required function/service
for Access Control. Therefore, the use of Smart-Cards only should not be
considered.
|
Smart Card with Photo ID
Card
|
x
|
x
|
x
|
This is a recommended strategy for non-critical area
access.
|
Smart ID Card used
to enable Combination Lock
|
x
|
x
|
x
|
This is one of the recommended deployment strategies for
critical areas.
|
Biometric Combination
Lock
|
x
|
x
|
x
|
This is one of the recommended deployment strategies for
critical areas.
|
Technological Assessment
The suggested technology to be used to provide Access
Control to critical areas is the use of multi-factor access control. It
is further suggested that SMART-CARDs that double as personal identification
cards be utilized to enable combination locks. Furthermore, it is also
recommended that such technology deployment be used in
conjunction with an electronic audit mechanism.
It is recommended
that biometric identification mechanisms be used when applicable.
The
basic premise of computational access control is intended to allow authorized
individuals to be able to access programs for which they have clearance to make use of. Based on the Security Domain definition,
computational access control is both an inter-domain and intra-domain issue.
However, the enforcement of computation access control is purely an
intra-domain issue. For inter-domain access control the Identity Mapping
service (and its required sub-functions) actually provides the mapping from an external
identity to an identity recognized and managed intra-domain.
·
Audit Trail. The system
should be capable of providing an audit trail of who accessed a given
computational resource.
·
Intrusion Detection. The system
should be capable of detecting intrusion attempts of an un-authorized
individual to a computational resource. There are
issues in regards to the quickness/speed of enunciating intrusion or intrusion
attempts. The speed at which this enunciation can occur is a key metric
in regards to the ability of a SMI to respond to the intrusion. The system
should be robust enough that intrusions can be proven in an authoritative
manner so that legal prosecution has a probability of success.
·
Access Control Management. The choice
of access control mechanisms should allow for multi-factor authentication and
ease of management in the event that revocation of access privileges is
required (e.g. User and Group Management issues). In order to accomplish this
service function, there must be a security token that is used to enable a final
access mechanism (e.g. a lock).
·
Security Policy. A
policy/strategy needs to address assets that are not capable of being
secured. For those types of resources, the level of trust should be
considered low.
The aforementioned
issues need to be addressed for a variety of computational resources:
Operating Systems (OSs); programs within a OS that
has access control; Computer Programs within an environment where there is no OS access
control required to access the program (e.g. an RTU); and Communication Networks.
Operating Systems
Operating System
(OS) access control requires Identity Establishment (see the identity
establishment service). The access control service, for OSs, determines which programs/computational
resources the Identified User/Program has privileges to execute/access.
The major issues
regarding this access are:
· To provide an appropriate policy and SMI so that such access is granular
enough to provide enough audit capability.
· Managing the configuration in a distributed environment.
· The level of trust that can be associated with the OS to perform its
tasks in a secure manner (see ACC-01). Several issues are mitigated if a
“Trusted/Secure” OS is used. However, the use of such OSs
in IntelliGrid Architecture environment is not viable in a majority of the cases, therefore
this section will address non-Trusted OS issues.
For all OSs, the issue of access control relates to properly
managed Access Control Lists that are typically OS specific. However,
care needs to be taken to ensure that if Role Based Access is used, that an
audit mechanism is provided in order to reference back to the actual
individual/entity that has accessed the OS. Additionally, the information in
ACC-02 should be considered when developing the OS access framework in a
distributed environment.
Computer
Programs
In the cases where
an OS does not provide Access Control to the programmatic level, programs
themselves need to provide this capability. This is particularly true for
electronic protocol processes that bypass OS authentication on the destination
of the communication path. In such a situation, it is incumbent upon the
destination program/process to apply the appropriate security mechanisms.
In IntelliGrid Architecture there
will be computational and communication technologies integrated of various
capabilities. These various capabilities (e.g.
process/memory/storage capacity or bandwidth limitations) require that
different technological solutions be available. However the functional
objectives remain consistent: provide a manageable environment and to provide
enough granularity to provide a capability for non-repudiation.
Communication Networks
There are several
types of communication networks that need to be addressed:
· Inter-Domain networks
where the physical network are exposed.
The major issue with these types of physical
networks is that both domains do not manage the network segments that provide
the inter-domain interfaces. These segments are typically provided by a
third party and therefore constitutes a third Security Domain. Thus it is
important that appropriate access control be provided at the security domain
interface points.
· Intra-Domain networks
where the physical network is within a Security
Domain.
For intra-domain networks, some Security Domains may desire to control the
computers/computer users that actually have access to the network. Once a
resource is within a Security Domain, there is no reliable mechanism to prevent
physical access to the network. Thus it becomes incumbent upon the SMI to
detect that a non-authorized access to the network has been attempted or been
successful. Additionally, it may be possible to make it more difficult
for a non-authorized resource to make use of the network through proper
management of the network addresses so that no address is assigned to the
intruding resource.
· Wireless
LAN/WAN Networks whose transmissions can be easily monitored and spoofed.
This type of network represents a intra-domain network that REQUIRES management
in regards to who can actually make use of the network. The issue can be
easily demonstrated by looking at the prevalence of Wi-Fi.
In the Wi-Fi case, hot-spots (e.g. Starbucks, airports) could not recoup their
investment without a challenge response mechanism to ensure that only
authorized (e.g. paid subscription entities) are actually assigned an address
that facilitates real communications.
Such mechanisms may prevent off-segment communications, but will not prevent
denial-of-service attacks (see ACC-03). Thus such systems need to be
augmented beyond challenge-response.
· Dial-up Networks: There is a well-documented history in regards to the
vulnerabilities associated with dial-up networks. These types of networks
are inherently susceptible to denial-of-service attacks and have poor identity
establishment/access control at a physical/network level. This is
especially true for equipment that is deployed in the Transmission and
Distribution environment.
Table 9: References
regarding Computational Resource Access Control
ACC-01
|
Stephen Radford – Trusted Operating Systems and
Their Evolving Non-Trusted Counterparts ,
January 23, 2003. SANS Institute
|
ACC-02
|
Fine-Grain Authorization for
Resource Management in the Grid Environment. K. Keahey, V. Welch. Proceedings of Grid2002 Workshop,
2002.
|
ACC-03
|
AA-2004.02 -- Denial of Service Vulnerability in
IEEE 802.11 Wireless Devices (AusCERT)
|
ACC-04
|
RADIUS Protocol Security and Best Practices, Published:
January 1, 2002, By Joseph
Davies, Microsoft Corporation
Available from:
http://www.microsoft.com/technet/itsolutions/network/security/radiusec.mspx
|
Technological Assessment
Specifications/Standards
Table 10 represents
a set of specifications and/or standards that are relevant to the understanding
of the issues regarding access control for computational
resources. Those specifications marked as Recommended or Recommended
Reading should be considered as materials that should be considered prior to
actually implementing the access control service.
Table 10: Relevant
Computational Resource Access Control Standards/Specifications
Identification
Number
|
Name
|
Comment
|
ANSI INCITS
359-2004
|
Role Based
Access Control
|
Recommended
|
RFC 2244
|
ACAP -- Application Configuration Access Protocol
|
Recommended
|
RFC 1013
|
X Window System Protocol, version 11: Alpha update
April 1987
|
|
RFC 2086
|
IMAP4 ACL extension
|
|
RFC 2820
|
Access Control Requirements for LDAP
|
Recommended
for Directory Services
|
RFC 1305
|
Network Time Protocol (Version 3) Specification, Implementation
|
Recommended
for NTP
|
RFC 2753
|
A Framework for Policy-based Admission Control
|
|
RFC 2744
|
Generic Security Service API Version 2 : C-bindings
|
|
RFC 2356
|
Sun's SKIP Firewall Traversal for Mobile IP
|
|
RFC 1004
|
Distributed-protocol authentication scheme
|
|
RFC 2865
|
Remote Authentication Dial In User Service (RADIUS)
|
Recommended
for Dial-up Lines
|
RFC 2869
|
RADIUS Extensions
|
|
RFC 1221
|
Host Access Protocol (HAP) Specification - Version 2
|
|
ISO/IEC
10164-9:1995
|
Information
technology -- Open Systems Interconnection -- Systems Management: Objects and
attributes for access control
|
|
ISO/IEC
10181-3:1996
|
Information
technology -- Open Systems Interconnection -- Security frameworks for open
systems: Access control framework
|
Recommended
|
WebDAV
|
Access Control Extensions to WebDAV
|
|
Microsoft
|
Remote Access Service (RAS)
|
|
OASIS
|
Extensible Access Control Markup Language (XACML)
Available from:
http://xml.coverpages.org/xacml-schema-policy-v15.pdf
|
Recommended
when used in conjunction with other XML based technologies.
|
IBM
|
XML Access Control (XACL)
|
Proprietary
but has been implemented as part of IBM’s security framework.
|
CJCSI
6731.01
|
Global Command and Control System Security
Policy, Chairman of the Join Chiefs of Staff Instruction,
December 31, 1998
|
|
FIPS PUB 112
|
Password Usage
|
|
FIPS PUB 113
|
Computer Data Authentication
|
|
Technological
Assessment and Recommendations
OS Recommendations
It is recommended
that Trusted OSs be used whenever possible.
Additionally, ANSI INCITS 359-2004 us suggested as an implementation
strategy for Role Based Access.
Computer
Programs
It is recommended
that the appropriate access control list mechanisms be used in regards to the
applications where such technologies have been noted in Table 10. Thus, make use of:
· RFC 1013 for
X-Windows applications.
· RFC 2086 for
Internet Message Access Protocol (IMAP)-based e-mail applications.
· RFC 2045 for
Multipurpose Internet Mail Extensions (MIME) for the Simple Mail Transfer
Protocol (SMTP).
· RFC 2228 for
File Transfer Protocol (FTP) Security Extensions
· RFC 2820 for Access Control for
Lightweight Directory Access Protocol (LDAP).
· RFC 1305 in regards to
Network Time Protocol (NTP). It is recommended that the authentication,
access control, and other security
extensions in Appendix C be implemented and used. Currently, Simple Network Time
Protocol (SNTP) described in RFC 2030 does not address security (pending
work).
· RFC 3414, RFC 3411, and RFC 1351 for Security for
Simple Network Management Protocol (SNMP). It is also recommended
that SNMPv3 be utilized when possible.
There is an issue regarding the lack of definition of standardized security
related Management Information Base (MIB) objects. IEC TC57 WG15 has
undertaken the task to define security MIB objects that could facilitate
intrusion detection. It is recommended that the recommendations of IEC
62351-7 (Objects for Network Management) be reviewed carefully when these become
available.
· RFC 2817 and RFC 2818
for HyperText Transfer Protocol Security
(HTTPS) for security for the HyperText
Transfer Protocol (HTTP).
Otherwise, it is
suggested to follow the general policies/procedures set forth in ISO/IEC
10181-3:1996 and make use of any application specific access control strategies
set forth.
Communication Networks and
Protocols
In general it is
recommended that all computational resources, when possible, be assigned
dynamic addresses that allow off-segment communications.
There is no single technology that can accomplish this, but a challenge
response mechanism is suggested as part of the implementation strategy. For those resources
that require fixed addresses (e.g. servers of data), it is suggested that
network based access control lists be implement in order to prevent
un-authorized off-segment communication. There is a
substantial amount of work occurring within IEC TC57 WG15 to secure several of
the communication protocols that are intended to be used by IntelliGrid Architecture. It is
suggested that these be adopted and deployed as rapidly as is feasible.
Wireless networks
are extremely susceptible to denial-of-service attacks. In order to
mitigate this issue, AES encryption on wireless links is suggested.
Dial-up access
control should be implemented through the use of RADIUS (RFC 2865 and RFC 2869)
when this is feasible. Such access should be deployed so that there is an
additional access control list (e.g. a Firewall or router based ACL) that
provides additional security. Thus, when possible, it is suggested that
NO direct dial-up access be given to a computer or a computer process.
However, this is not
always
feasible in the Transmission and Distribution systems deployed within IntelliGrid Architecture
environment (e.g. RTUs and field devices). For this class of resource, or
resources with similar constraints, it is suggested that the devices be
implemented in such a manner that denial-of-service is mitigated:
· Dial-up
connections should be constructed such there is an inactivity time-out to
prevent a connect/hold the port open denial of service attack.
· Once the
port is connected, there should be a time-out on the connection that requires
valid communication protocol/application level information flow.
It is not suggested to implement a dial-back
strategy since these become difficult to manage and maintain and does not allow
the type of environment that IntelliGrid Architecture is attempting to promote.
Information access
control is extremely similar to a combination of OS and program access.
However, it is up to each individual program to provide
the appropriate level of access control.
ACC-04 represents
a very simple summary of the granularity required in access control for most PICOMs: Control over Reading; Control over
Changing; and Control over Storing. Additionally, for Object
Oriented access, there may need to be an ability to prevent an entity from
discovering that an Object Exists (optional).
Table 11:
References relating to Access Control for Informational Resources
ACC-04
|
Access Control on the Semantic Web (wc3.org)
Available from: http://www.w3.org/2002/03/semweb/access-control
|
Protect the
confidentiality of the underlying communication (transport) mechanism, and the
confidentiality of the messages or documents that flow over the transport mechanism in a OGSA compliant infrastructure. The
confidentiality requirement includes point–to–point transport as well as
store-and-forward mechanisms.
Key definitions:
confidentiality:
1. Of classified or sensitive data,
the degree to which the data have not been compromised; i.e., have not been
made available or disclosed to unauthorized individuals, processes, or other
entities. [After 2382-pt.8] 2. Assurance
that information is not
disclosed to unauthorized persons, processes, or devices. [INFOSEC-99]
3. A property by which information relating to an entity or party is not
made available or disclosed to unauthorized individuals, entities, or
processes. [T1.Rpt22-1993]
There are two main
mechanism to provide confidentiality for electronically transmitted information:
encryption or transmission over a secure infrastructure.
Encryption
It is important to
realize that there is no 100% effective mechanism to protect electronically
transmitted information for an indefinite length of time. Initially, when
the Data Encryption Standard (DES) was specified, it
was thought that 56-bit encryption protection could protect information for
20-30 years. However, with the increase in computational capability, and
the decrease in cost for that capability, in 1999 DES was cracked in under 22
hours (see CONF-02) . Based upon Moore’s Law, today DES could be cracked in
approximately 41 minutes considering.
To respond to the new reality, NIST and several standards organizations (in
particular IEEE) developed a more advanced and secure encryption standard known
as the Advanced Encryption Standard (AES).
“In
comparison, DES keys are 56 bits long, which means that there are approximately
7.2 x 1016 possible DES keys. Thus, there are on the order of 10 (21) times
more AES 128-bit keys than DES 56-bit keys. Assuming that one could build a
machine that could recover a DES key in a second (i.e. try 255 keys per
second), then it would take that machine approximately 149 thousand-billion
(149 trillion) years to crack a 128-bit AES key. To put this into perspective,
the Universe is believed to be less than 20 billion years old. NIST believes
that AES will remain secure beyond the next twenty years. AES implementations
will also be exportable, and AES implementations in proprietary systems will
just need a one-time review prior to export” [CONF-01]
The above claim is
similar to the claims made by DES when it was first introduced. Whereas
DES and Triple-DES (3DES) have had almost twenty years of deployment prior to
replacement due to “crackability”, the advent of
Quantum Computers (see CONF-03) may not allow the modern encryption algorithms
the same. If Quantum Computers were available today, using Grover’s
Algorithm (see CONF-04) it could be extrapolated that even 512 bit DES could be
cracked in approximately 1 second. AES is more complex and is less prone
to Grover’s Algorithm, however the NIST statement (CONF-01) will definitely not
be true in the near-term future.
The advent of
Quantum Computers raises the issue of how to make encryption effective.
Even without the advent of Quantum technology, the following recommendations
are valid:
· Choose a modern encryption algorithm for the purposes of encryption.
There are many factors that enter into an appropriate algorithmic choice.
The factors that need to be considered are the additional CPU processing that
the use of encryption will require and the bandwidth/transmission performance
characteristics desired.
At the NERC Data Exchange Working Group meeting in April 2004, the following
results were presented for Secure IEC-60870-6 TASE.2 (ICCP): the additional CPU performance requirements, for the use of TLS and AES 256,
represented an increase from 1% to 1.35% for encryption and 1% to 1.41% for
decryption (percentages based upon total CPU being 100%). It was also
found that AES 256 was more CPU efficient than either DES or 3DES.
It was found that the bandwidth overhead increased by the size of certificates
exchanged, but only increased 1% in regards to normal ICCP traffic once the initial
connection and symmetric keys were established.
· When using encryption, make sure that the technology used to “negotiate”
encryption can negotiate multiple encryption algorithms.
· If possible, make sure that the negotiation can be upgraded to newer
encryption algorithms as new, more robust algorithms, become available.
· Make use of technologies where the encryption keys can dynamically be
re-negotiated without interrupting the communication information flow.
Table 12: Reference
Relevant to Encryption Technology
Technological Assessment and
Specifications
There are several
different mechanisms through which to develop assessments regarding
encryption. For the purposes of this section, applicability
to specific communication media will be used. In general, it is
suggested to make use of X.509 certificates to provide public/private key
encryption exchanges when possible. Such a choice will ease integration
with other certificate technologies (e.g. management) that are being
recommended as part of other security services.
When X.509
certificate use is not appropriate, it is suggested that RFC 2898 (PKCS#5) be
utilized. This allows encryption to be established based upon
username/passwords.
Protocol
Basis
In general, it is
recommended to use the appropriately specified encryption standard associated
with the protocol (e.g. HTTPS for HTTP). There are further recommendation for TCP/IP:
TCP/IP
Transmissions
It is recommended
that TLS with AES (RFC 3268) or PPP Encryption Control Protocol (RFC 1968)
be used to provide encryption. These represent the most modern and secure
mechanism.
Media
Serial
If the path of the
serial link does not provide enough confidentiality nor the protocol in use over
the link, and confidentiality is still desired then the following is recommended:
·
If the peers can be upgraded to support encryption, then this should be
the preferred approach.
·
For legacy systems, that are not upgradeable, it is suggested that
external hardware be applied. Further it is recommended that AGA 12-1 be
evaluated for this purpose.
Ethernet,
SONET, FDDI, and Other Cable Media
It is recommended
to make use of Virtual Private Network (VPN) technology when possible.
Wi-Fi and
Wireless Technologies
The Web Encryption
Protocol (WEP) specified in IEEE 802.11b has been proven to be vulnerable and to
not provide adequate protection. New versions of Wi-Fi and wireless
technologies are coming equipped with AES encryption. It is the AES
encryption that is recommended. Further it is recommended that
WPA2/80211.i be adopted in order to achieve the implementation of this
recommendation.
It is further
recommended that any legacy (e.g. WEP based) Wi-Fi equipment be replaced or
upgraded, as the vulnerabilities are well known and not manageable.
Table 13:
Encryption Related Specifications/Standards
Identification
Number
|
Name
|
Comment
|
RFC 3370
|
Cryptographic Message Syntax (CMS) Algorithms
|
|
RFC 3447
|
Public-Key Cryptography Standards
(PKCS) #1: RSA Cryptography Specifications Version 2.1
|
|
RFC 2898
|
PKCS #5: Password-Based Cryptography Specification
Version 2.0
|
Recommended
when certificate exchange is not appropriate.
|
RFC 1968
|
The PPP Encryption Control Protocol (ECP)
|
|
RFC 2246
|
The TLS Protocol Version 1.0
|
|
RFC 2409
|
The Internet Key Exchange (IKE)
|
Used for
VPNs
|
RFC 1040
|
Privacy enhancement for Internet electronic mail:
Part I: Message encipherment and authentication
|
|
RFC 2946
|
Telnet Data Encryption Option
|
|
RFC 2440
|
OpenPGP Message
Format
|
|
RFC 1423
|
Privacy Enhancement for Internet Electronic Mail:
Part III: Algorithms, Modes, and Identifiers
|
|
RFC 2408
|
Internet Security Association and Key Management Protocol
(ISAKMP)
|
Used for
VPNs
|
RFC 2510
|
Internet X.509 Public Key Infrastructure Certificate
Management Protocols
|
|
RFC 3268
|
Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)
|
|
RFC 2093
|
Group Key Management Protocol (GKMP) Specification
|
|
RFC 2459
|
Internet X.509 Public Key Infrastructure Certificate
and CRL Profile
|
|
RFC 2040
|
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS
Algorithms
|
|
FIPS 197
|
Federal Information Processing Standards Publication
197,
November
26, 2001, Specification for the Advanced Encryption Standard
(AES)
Available from:
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
|
Recommended
|
RSA PKCS #12
|
Personal Information Exchange Syntax Standard,
version 1.0.
|
|
RSA PKCS #8
|
Private-Key Information Syntax Standard
|
|
IEEE 802.11b
|
Web Encryption Protocol
|
|
AGA-12
|
Cryptographic Protection of SCADA Communications
General Recommendations.
|
|
WPA
|
Wi-Fi Protected Access
|
|
IEEE 802.11i
|
Security for Wireless Networks
|
|
WPA2
|
Wi-Fi Protected Access Version 2
|
|
Table 14: Digital
Certificate Related Specifications/Standards
Identification
Number
|
Name
|
Comment
|
RFC 2510
|
Internet X.509 Public Key Infrastructure Certificate
Management Protocols. C.
Adams, S. Farrell. March 1999.
|
|
RFC 2511
|
Internet X.509 Certificate Request Message Format.
M. Myers, C. Adams, D. Solo, D. Kemp. March
1999.
|
|
RFC 2527
|
Internet X.509 Public Key Infrastructure Certificate
Policy and Certification Practices Framework.
S. Chokhani, W. Ford. March 1999.
|
|
RFC 2560
|
X.509 Internet Public Key Infrastructure Online
Certificate Status Protocol - OCSP. M. Myers, R. Ankney,
A. Malpani, S. Galperin,
C. Adams. June 1999.
|
|
Communication Path Selection
There is a
mechanism of mitigating the need to encryption. This is to evaluate or
provide a communication path that inherently provides enough protection (see the Path Routing and QOS service for further
information).
The credential
conversion service provides credential conversion between one type of
credential to another type or form of credential. This may include such tasks as reconciling group membership, privileges,
attributes and assertions associated with entities (service requestors and
service providers). For example, the credential conversion service may convert
a Kerberos credential to a form which is which is required by the authorization
service. The policy driven credential conversion service facilitates the
interoperability of differing credential types, which may be consumed by
services. It is expected that the credential conversion service would use the
identity mapping service.
Key definitions:
credential:
1. In cryptography, a subset of access
permissions (developed with the use of media-independent data)
attesting to, or establishing, the identity of an entity, such as a birth certificate,
driver's license, mother's maiden name, social security number, fingerprint,
voice print, or other biometric parameter(s).
[After X9.69] 2. [In security],
information, passed from
one entity to another, used to establish the sending entity's access rights. [INFOSEC-99]
Credential
conversion is also a required service for Single-Sign on and the Identity
Mapping security services. Besides performing the actual mappings, there
is an inherent requirement that such a service provide an audit mechanism so
that it is possible to determine the original identity/credential that was
converted. This is a necessary requirement in order to provide a robust
audit mechanism in a multi-domain environment.
Technological Assessment
The prevalent work
is being sponsored by the Organization for the Advancement of Structured
Information Standards (OASIS). This is work in progress but is the first industry/standards based consortium that is
attempting to solve the problem. However, the current work involves
certificate usage and does not directly address the issue of username/password
conversion nor the audit trail issues. Except for the
general recommendations found in the Identity Establishment service, only
certificates require further recommendations in regards to credential
conversion.
Certificate
Furthermore, there
has been little thought in enhancing the SAML specification to standardize a
chain or properties that would allow the Quality of Identity service to be facilitated. It is suggested that
SAML and the OASIS work be adopted as the foundation for the Credential
Delegation service. However, further work and IntelliGrid Architecture enhancements may be
required.
Table 15:
References and Specifications regarding Credential Conversion
Identification
Number
|
Name
|
Comment
|
OASIS
Security Technical Committee
|
Security
for Grid Services
Available
from:
http://www.globus.org/Security/GSI3/GT3-Security-HPDC.pdf
|
|
OASIS
Security Technical Committee
|
Attribute
Profiles for SAML 2.0
Available
from:
http://www.oasis-open.org/committees/download.php/6344/sstc-hughes-mishra-baseline-attributes-03.pdf
|
Incomplete,
but is on the correct track.
|
OASIS
Security Technical Committee
|
SAML 2.0:
Security Assertion Markup Language Version 2.0
Available
from:
http://www.oasis-open.org/committees/download.php/2290/oasis-sstc-saml-1.0.zip
|
Recommended
|
OASIS
Security Technical Committee
|
Bindings
for OASIS Security Assertion Markup Language (SAML) V2.0
Available
from:
http://www.oasis-open.org/committees/download.php/6773/sstc-saml-bindings-2.0-draft-11-diff.pdf
|
Draft that
specifies how to bind SAML over various protocols. Highly recommended.
|
OASIS
Security Technical Committee
|
Authentication
Context
Available from:
http://www.oasis-open.org/committees/download.php/6539/sstc-saml-authn-context-2.0-draft-04a-diff.pdf
|
Draft that
is needed to establish identity within a SAML environment.
|
|
|
|
In many scenarios,
a job initiated by a user may take longer than the life span of the user’s
initially delegated credential. In those cases, the user needs the ability to be notified prior to expiration of the
credentials, or the ability to refresh those credentials such that the job can
be completed.
It is worthy to
note that the Credential Renewal service provides some of the capability of
User and Group Management service. However, it does not include how to
revoke or initially allocate the credentials. However, in general it is a
Security Domain and IntelliGrid Architecture issue in regards to the period of time required for
credential renewal.
Performing a more
in-depth analysis of the credential renewal process, the general issues are:
·
Determining when the credentials need to be renewed. This is
typically a Security Domain’s policy issue.
·
Determining a mechanism to detect a credential that needs to be renewed.
·
Provide a mechanism for credential renewal.
OASIS specifies
several different types of credentials that need to be considered for
renewal. Each has different aspects to renewal. The IntelliGrid Architecture relevant
types are:
· Internet Protocol-based credentials are
related solely to address resolution as the credential. Address spoofing
is a prevalent threat in IntelliGrid Architecture environment and therefore the use of this
credential mechanism is not suggested.
In order to renew an addressed based credential, address-to-name resolution is
required as well as appropriate security on such resolution requests.
·
InternetProtocolPassword makes use of
username/password as well as address resolution to establish credentials.
This credential methodology has the same issues with address credential renewal
as well as verifying that the password is viable or in need of renewal.
·
Password makes use of a username/password combination in the clear.
Username/Password management is a major issue that needs to be resolved.
·
PasswordProtectedTransport makes use of an
encrypted transport to transmit a username/password combination (e.g. HTTPS
conveying a username/password).
·
SmartCard renewal is strictly a policy and SMI
issue. The policy must address when a SmartCard
must be renewed and the mechanism for performing a renewal.
·
SmartCardPKI renewal adds the issue of digital
certificate renewal to the need to renew a particular Smart Card. Since
most digital certificates have an expiration date, it is the certificate date
that should take precedence in the renewal process (e.g. policy may be able to
ignore the renewal of the card itself). However, this is not the case if
the SmartCardPKI solution is being used as a Personal
Identification card that requires visual inspection for physical access.
·
SoftwarePKI uses digital certificates and
therefore certificate renewal is the major issue.
·
TimesyncToken is a hardware token that is used
to generate a unique token as a credential.
·
Visual Person Identification Card used with visual inspection to provide
physical access control.
Any credential type that can be used to obtain physical access based upon
visual inspection need to be replaced or modified in a timely manner. The
periodicity of the change is dependent upon the Security Domain’s policies.
Technological Assessment and
Relevant Specifications
There are certain
general recommendations that can be made:
· When using address resolution and TCP/IP, make use of the Domain Name Service and a authenticated Directory server.
Dynamic address assignment should be the preferred mechanism with the resulting
address being placed in the authenticated directory server.
· Visual Credentials should be replaced/modified on a time period based
upon the Security Domain’s policy. It may be less expensive to adopt a
modification, as opposed to a replace strategy (e.g. the same model as
automobile license tabs versus license plates).
· Smart Cards should include a renewal date as part of the information
that is contained on the card. This field should encrypt and digitally
signed so that tampering can be detected. As the Smart Card is used,
advanced notification of the need for renewal needs to be given to the holder.
· Certificate based technologies: X.509 certificates are the recommended
certificate type. Certificates should be accessible via PKCS#10
interfaces. The date of certificate lifetime expiration should be used as
the renewal date. As the certificate is used, advanced notification of the need
for renewal needs to be given to the holder.
· Biometric based technologies need to have renewal dates based upon the
Security Domain’s policy.
Specific Recommendations
Certificates
It is recommended
that RFC 2797 or RFC 2560 (OCSP) to determine if the certificate needs to be
renewed. If neither of these is possible, then it
becomes a local Security Domain/implementation
issue. Certificate renewal should be performed via RFC 2797 when
possible.
Table 16: Relevant
Specification regarding Credential Renewal
Identification
Number
|
Name
|
Comment
|
ISO
9735-9:2002
|
Electronic
data interchange for administration, commerce and transport
(EDIFACT) -- Application level syntax rules (Syntax version number: 4,
Syntax release number: 1) -- Part 9: Security key and certificate management message
(message type- KEYMAN)
|
|
NERC
|
Certificate Policy for the Energy Market Access and
Reliability Certificate (e‑MARC) Program Version 2.4
Available from:
ftp://www.nerc.com/pub/sys/all_updl/cip/pkitf/e-MARC-PKI_draft_version_V2-4b_March_2003-rev1.doc
|
|
OASIS
Security Technical Committee
|
Authentication
Context
Available
from:
http://www.oasis-open.org/committees/download.php/6539/sstc-saml-authn-context-2.0-draft-04a-diff.pdf
|
|
RFC 2459
|
Internet X.509 Public Key Infrastructure Certificate
and CRL Profile
|
|
RFC 2511
|
Internet X.509 Certificate Request Message Format
|
|
RFC 2560
|
X.509 Internet Public Key Infrastructure Online
Certificate Status Protocol - OCSP
|
|
RFC 2797
|
Certificate Management Messages over CMS
|
|
RFC 2875
|
Diffie-Hellman
Proof-of-Possession Algorithms
|
|
RFC 2986
|
PKCS #10: Certification Request Syntax Specification
Version 1.7
|
|
RFC 3280
|
Algorithms and Identifiers for the Internet X.509 Public
Key Infrastructure Certificate and Certificate Revocation List (CRL)
Profile
|
|
RFC 3369
|
Cryptographic Message Syntax (CMS)
|
|
RFC 3647
|
Internet X.509 Public Key Infrastructure Certificate
Policy and Certification Practices Framework
|
|
RFC 1591
|
Domain Name System Structure and
Delegation
|
|
RFC 1608
|
Representing IP Information in the X.500 Directory
|
Recommended
|
RFC 1612
|
DNS Resolver MIB
Extensions
|
Recommended
|
RFC 2230
|
Key Exchange Delegation Record for the DNS
|
|
RFC 2276
|
Architectural Principles of Uniform Resource Name
Resolution
|
|
RFC 2535
|
Domain Name System Security Extensions
|
Recommended
|
RFC 2592
|
Definitions of Managed Objects for the Delegation of
Management Script
|
|
RFC 2874
|
DNS Extensions to Support IPv6 Address Aggregation
and Renumbering
|
|
ISO
10202-1:1991
|
Financial transaction
cards -- Security architecture of financial transaction systems using
integrated circuit cards -- Part 1: Card life cycle
|
Recommended
Reading
|
ISO
10202-7:1998
|
Financial transaction
cards -- Security architecture of financial transaction systems using
integrated circuit cards -- Part 7: Key management
|
|
Provide facilities
to allow for delegation of access rights from requestors to services, as well
as to allow for delegation policies to be specified. When dealing with delegation of authority from an entity to another,
care should be taken so that the authority transferred through delegation is
scoped only to the task(s) intended to be performed and within a limited
lifetime to minimize the misuse of delegated authority.
Based upon the
aforementioned definition, delegation involves Credential Conversion and
Authorization for Access Control services. There are two primary types of
delegation that need to be addressed:
·
Delegation of Addresses: This type of delegation could occur due
to proxies, firewalls or gateways. The main requirements of such
delegation are to be able to provide an audit mechanism that allows repudiation
to the original address.
A good example of why this is needed is the email SPAM problem that we face
today. It is difficult with address and email account spoofing to
determine the actual sender of the original SPAM message.
·
Access Privilege Delegation would typically result in the transformation
of one entity’s privileges to some type of Role Based set of privileges.
Once the ability to audit the delegation is of primary importance.
Technological Assessment and
Relevant Specifications
It is recommended
that either RBAC or SAML be considered as appropriate.
Table 17: Relevant
Specifications for the Delegation Service
Identification Number
|
Name
|
Comment
|
BCP 65
|
Dynamic Delegation
Discovery System (DDDS) Part Five: URI.ARPA Assignment Procedures
|
|
RFC 1034
|
Domain names - concepts and facilities
|
|
RFC 1507
|
DASS - Distributed Authentication Security Service
|
|
RFC 1591
|
Domain Name System Structure and Delegation
|
|
RFC 1608
|
Representing IP Information in the X.500 Directory
|
|
RFC 1612
|
DNS Resolver MIB
Extensions
|
|
RFC 2230
|
Key Exchange Delegation Record for the DNS
|
|
RFC 2276
|
Architectural Principles of Uniform Resource Name
Resolution
|
|
RFC 2535
|
Domain Name System Security Extensions
|
|
RFC 2592
|
Definitions of Managed Objects for the Delegation of
Management Script
|
|
RFC 2874
|
DNS Extensions to Support IPv6 Address Aggregation
and Renumbering
|
|
RFC 3401
|
Dynamic Delegation Discovery System (DDDS) Part One:
The Comprehensive DDDS
|
|
RFC 3402
|
Dynamic Delegation Discovery System (DDDS) Part Two:
The Algorithm
|
|
RFC 3403
|
Dynamic Delegation Discovery System (DDDS) Part
Three: The Domain Name System (DNS) Database
|
|
RFC 3404
|
Dynamic Delegation Discovery System (DDDS) Part
Four: The Uniform Resource Identifiers (URI)
|
|
RFC 3405
|
Dynamic Delegation Discovery System (DDDS) Part
Five: URI.ARPA Assignment Procedures
|
|
RFC 3761
|
The E.164 to Uniform Resource Identifiers (URI)
Dynamic Delegation Discovery System (DDDS) Application (ENUM)
|
|
STD 13
|
Domain Name System
|
Recommended
|
ANSI INCITS
359-2004
|
Role Based
Access Control (RBAC)
|
Recommended
|
OASIS
Security Technical Committee
|
SAML 2.0:
Security Assertion Markup Language Version 2.0
|
Recommended
|
A major barrier to
dynamic, cross-domain Grid computing today is the existence of firewalls. As
noted above, firewalls provide limited value within a dynamic Grid
environment. However, it is also the case that firewalls
are unlikely to disappear anytime soon. Thus, the OGSA security model must take
them into account and provide mechanisms for cleanly traversing them—without
compromising local control of firewall policy.
There are several
major issues with the use of firewalls:
· Firewalls are typically invasive and perform address translation without
providing a useable audit record.
· Firewalls that have the ability to perform state-based inspection are
not capable of analyzing the complex protocols that IntelliGrid Architecture is considering.
· Firewalls are difficult to manage and must be monitored as part of the
SMI process.
However, firewalls
are deployed in order to protect critical infrastructure computational
resources and should be deployed at inter-domain connectivity points.
Within the context
of IntelliGrid Architecture environment, there are several different functions that a firewall
could provide. It is a policy/deployment issue in regards to which ones
are provided.
· Media Isolation: Provides physical isolation from the extranet to the intranet
of the security domain. This typically means that two physical media
interfaces are required. It is worthy to note that bridges and most
routers have two physical interfaces and therefore could be used to provide the
media isolation in a deployment scenario.
It is recommended that media isolation be provided for all firewalls.
· Address Translation: It is often difficult to protect an intranet if the
addresses of that intranet are the same as and accessible of the
extranet. It is worthy to note that some routers have this capability.
It is recommended that each firewall transversal include address translation if
access control is not implemented.
· Protocol/Port Restriction: One of the main purposes of a firewall
is to restrict what type of communications can occur in-bound/out-bound through
the firewall. Typically, domain firewalls should be configured to allow
only the communication traffic set by policy. This is typically done via
port restriction or some other means.
It is recommended that all firewalls deployed have the capability to restrict
incoming protocol traffic. It is a policy issue if restriction of
outgoing traffic is needed.
· Audit: Although many firewalls do not provide adequate audit
capability, this is a mandatory function. It is recommended that all
address pair (e.g. extranet/intranet pair establishment) be logged into an
audit record. Additionally, if the protocol/port identification can be
provided in the record, as well as identity, this would also be recommended.
· Identity Establishment: This function allows a firewall to
establish the identity of an external entity in order to establish trust.
· Access Control: The ability to make use of the established
identity in order to restrict access to intranet resources.
· Confidentiality: The ability for a firewall to encrypt
inter-domain information (typically done via establishment of a VPN).
·
State based inspection: The firewall has a knowledge of the protocol and
therefore makes use of the identity established and Access Control to determine
which protocol packets to forward to the intranet.
Technological Assessment and
Relevant Specifications
There are three
major types of firewalls:
· Transparent (see FIRE-01 and FIRE-02): These firewalls perform OSI layer
2 or 3 bridging and do not typically provide state
inspection. However, they do not obscure addressing information and
tend to be the fastest type of firewall when performance is measured in terms
of packet throughput. Since these are transparent, these types are the
easiest to transverse when properly configured.
This is the only firewall type that could possible meet the 4msec performance
requirement.
· Non-Transparent: These firewalls typically perform the following
functions: packet filtering and proxy service (e.g. address translation).
· Non-Transparent with Stateful Inspection: Same
capability as non-transparent but has the additional ability to examine the
contents of each packet. This is typically the lowest performance type of
firewall when performance is measured in regards to packet throughput.
Firewall
Transversal is automatically provided when Transparent Firewalls are utilized,
however the issue still remains for both versions of non-transparent firewalls.
The typical mechanism for allowing transversal (e.g. from outside a Security
Domain to inside) is via a proxy service or a set of firewall supplied cookies.
However, there are several issues about sending/receiving such information in
the clear. Therefore, encryption is desired.
Current firewall
transversal thoughts are to create a SSL/TLS tunnel (thereby verifying the
remote node has certain access rights) and then using a internal proxy to
enforce further privilege restrictions.
Figure 3: Example
of SSL/TLS Tunnel for Firewall Transversal
Figure 3 shows the
SSL tunnel being used to a DMZ where the backend application data is proxied on servers located within the DMZ. It would
also be possible to allow stateful and privilege proxy access directly
to the back-end data providers if needed. Either
architecture is viable and will be up to the Security Domain to decide
which best meets its needs.
Whatever the
choice, the functional characteristics found in RFC 2979 should be provided.
Table 18:
References regarding Firewall Transversal
FIRE-01
|
Matthew Tanase, Transparent, Bridging and In-line Firewall Devices, October 15, 2003
Available from:
http://www.securityfocus.com/infocus/1737
|
FIRE-02
|
Transparent
Cisco IOS Firewall
Available from:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123newft/123t/123t_7/
gt_trans.htm
|
Table 19: Relevant
Specifications regarding Firewall Transversal
Identification Number
|
Name
|
Comment
|
RFC 1579
|
Firewall-Friendly FTP
|
|
RFC 1919
|
Classical versus Transparent IP Proxies
|
Recommended
Reading
|
RFC 2008
|
Implications of Various Address Allocation Policies
for Internet Routing
|
Recommended
Reading
|
RFC 2401
|
Security Architecture for the Internet Protocol
|
|
RFC 2505
|
Anti-Spam Recommendations for SMTP MTAs
|
|
RFC 2543
|
SIP: Session Initiation Protocol
|
|
RFC 2547
|
BGP/MPLS VPNs
|
|
RFC 2764
|
A Framework for IP Based Virtual Private Networks
|
|
RFC 2775
|
Internet Transparency
|
Recommended
Reading
|
RFC 2888
|
Secure Remote Access with L2TP
|
|
RFC 2977
|
Mobile IP Authentication, Authorization, and
Accounting Requirements
|
|
RFC 2979
|
Behavior of and Requirements for Internet Firewalls
|
Recommended
|
RFC 2993
|
Architectural Implications of NAT
|
Recommended
Reading
|
An identity establishment
(e.g. identity authentication) service is concerned with verifying proof of an
asserted identity. The implementation of the service must allow for
multiple identity authentication mechanisms (e.g. identity tokens) to be utilized. Additionally, the service needs to
provide a mechanism to allow the information from various identity
tokens/identity authentication mechanisms to be electronically conveyed.
The requirement
that the Identity Establishment service be agnostic in regards to technology
can be easily demonstrated. One Security Domain may make use of a User
ID/password combination as a identity token. Another Security Domain may
require the use of Kerberos based identity tokens. It is the Security
Management Infrastructure (SMI) and the Security Domain’s security policies
that will determine the actual identity token(s) used and the mechanism(s)
through which they are conveyed.
Key definitions:
identity
authentication: The performance of tests to enable a data processing system
to recognize entities. Note: An example of identity authentication is the checking of a password
or identity token. [2382-pt.8]
identity
token: 1. A device, such as a metal key
or smart card, used for identity authentication.
[After 2382-pt.8] 2. [A] Smart card, metal key, or other physical object
used to authenticate identity. [INFOSEC-99]
identity
validation: Tests enabling an information system
to authenticate users or
resources. [INFOSEC-99]
Identity Establishment for Physical
Assets
Physical access control
should be based upon multi-factor Identity Establishment. The use of
multi-factor authentication, using the appropriate technologies can provide a
significant security advantage above and beyond simple identity
cards. Additionally, the selection and creation of physical access
control policies and procedures would needs to include the capability to manage
and revoke access privileges easily. This would typically indicate the
need for some type of token/id that can be managed/changed. However, if
only the picture matching the holder of the identity card determines access,
there is a high probability that such access control mechanisms can be
falsified. Thus, to improve access security there should be another
security factor used in order to authorize access.
This “other-factor”
should be “something the individual knows” (e.g. username/password) or
combination code. However, typically username/passwords or combination
codes can be compromised through observation or garbage diving.
Therefore, it would be recommended that some type of electronic mechanism, with
verification/challenge be implemented. The most widely deployed example
of this would be the use of a Smart-ID card (e.g. a card that electronically
authorizes the holder to enter a combination and that explicitly bound to the
identity of the holder) and a combination lock. Only the proper Smart-ID
badge authorization allows the combination to be entered into the lock which
then enable access. The side benefit of the use of such technology is
that an audit trail of access can be created electronically.
Additionally, management issues (especially revocation of access privileges)
are eased since the Smart-ID card can be revoked thereby disallowing access.
Should a Security
Domain decide to perform electronic auditing of physical access (recommended),
then appropriate audit trail time-stamping techniques need to be utilized (see
the audit service section).
Computational Resources
Identity
establishment, for computational resources, is directly related to the types of
credentials that are in use within a Security Domain. The definition of
the credentials that IntelliGrid Architecture may be using may be found in the Credential Renewal
section (see page 23). The credential types
used to establish identity are: addresses and address resolution,
username/passwords, smart cards, digital certificates, and biometric
identifications.
The issue with
computational resource identification establishment is that of architecting a
solution that creates a framework for authentication. Table 20 and Table 21
list relevant references and specifications that may aid in the construction of
such a framework within a security domain.
Table 20: General
References Regarding Identity Establishment and Identity Infrastructure
|
A National-Scale Authentication
Infrastructure. R. Butler, D. Engert, I.
Foster, C. Kesselman, S. Tuecke,
J. Volmer, V. Welch. IEEE Computer, 33(12):60-66, 2000.
|
|
An Online Credential Repository for the Grid: MyProxy. J.
Novotny, S. Tuecke, V. Welch. Proceedings of the Tenth International Symposium on
High Performance Distributed Computing (HPDC-10), IEEE Press,
August 2001.
|
|
A Community Authorization Service
for Group Collaboration. L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke. Proceedings of the IEEE 3rd International Workshop
on Policies for Distributed Systems and Networks, 2002.
|
|
X.509 Proxy Certificates for
Dynamic Delegation. V. Welch, I. Foster, C. Kesselman,
O. Mulmo, L. Pearlman, S. Tuecke,
J. Gawor, S. Meder, F. Siebenlist. 3rd
Annual PKI R&D Workshop, 2004.
|
|
Introduction to Public Key
Technology and the Federal PKI Infrastructure, February 26, 2001, NIST.
Available from:
http://www.cccure.org/Documents/PKI/NIST_pkidraft.pdf
|
Table 21: Relevant Specifications
regarding Identification Frameworks
Identification Number
|
Name
|
Comment
|
ISO/IEC
10181-2:1996
|
Information
technology -- Open Systems Interconnection -- Security frameworks for open
systems: Authentication framework
|
Recommended
|
ISO/IEC 10181-4:1997
|
Information
technology -- Open Systems Interconnection -- Security frameworks for open
systems: Non-repudiation framework
|
Recommended
|
ISO/IEC
10181-1:1996
|
Information
technology -- Open Systems Interconnection -- Security frameworks for open
systems: Overview
|
Recommended
|
ISO
10202-8:1998
|
Financial
transaction cards -- Security architecture of financial transaction systems
|
Recommended
Reading
|
Technological Assessment and
Relevant Specifications
The following
section discusses issues and potential general resolution to the issues
regarding the use of any particular identification mechanism. In general,
two-factor authentication is desired.
General Technologies
Address
Resolution
The most prevalent issue in using address
resolution as an identification mechanism is address spoofing. This
attack is easy to generate and is well documented. Therefore, such a identification
mechanism should not be used on its own. It must
be augmented with another factor to actually
establish the identity.
Address resolution
is a worthwhile qualifier for actions/information exchanges that are only
supposed to occur between certain peers. However, this is not a
reasonable mechanism for inter-domain exchanges since neither domain controls
the other domain’s address allocation/changes.
Username/Password
This is a typical
mechanism employed by Web based interfaces (especially for customers
interfacing for retrieval of billing information). However, the use of
cookies or password caches (e.g. the prompt to remember the username password)
represents an issue that should be addressed by the
addition of a challenge/response mechanism. The challenge
response should be user selectable/definable so that they can remember the
response when prompted.
Smart Cards
The references
given previously in this section give a large amount of guidance in the
selection of SMART-CARDS that can be used in the implementation of physical or
cyber access control. The smart card industry embraces ISO 7816 as one of
the prevalent smart card specification and this is
the recommended base specification for smart cards.
However, ISO 7816
does not specify a programmatic interface to such cards that is portable.
Therefore, it is recommended that the Java Card Platform Specification be used
in conjunction with ISO 7816 technology.
The remaining issue
is how much storage to deploy on the smart cards. The Gartner Group
published the information found in Figure 4. At this juncture there is no
recommendation in regards to the amount of storage to deploy.
Table 22: Relevant
Standards Concerning Smart Cards
Identification
Number
|
Name
|
Comment
|
ISO/IEC 7816-1:1998
|
Identification
cards -- Integrated circuit(s) cards with contacts -- Part 1: Physical
characteristics
|
|
ISO/IEC
7816-10:1999
|
Identification
cards -- Integrated circuit(s) cards with contacts
-- Part 10: Electronic signals and answer to reset for synchronous cards
|
|
ISO/IEC
7816-11:2004
|
Identification
cards -- Integrated circuit cards -- Part 11: Personal verfication
through biometric methods
|
|
ISO/IEC
7816-15:2004
|
Identification
cards -- Integrated circuit cards with contacts -- Part 15: Cryptographic
information application
|
|
ISO/IEC
7816-3:1997
|
Information
technology -- Identification cards -- Integrated circuit(s) cards with
contacts -- Part 3: Electronic signals and transmission protocols
|
|
ISO/IEC
7816-3:1997/Amd 1:2002
|
Electrical
characteristics and class indication for integrated circuit(s) cards
operating at 5 V, 3 V and 1,8 V
|
|
ISO/IEC
7816-4:1995
|
Information
technology -- Identification cards -- Integrated circuit(s) cards with
contacts -- Part 4: Interindustry commands for
interchange
|
|
ISO/IEC
7816-4:1995/Amd 1:1997
|
secure
messaging on the structures of APDU messages
|
|
ISO/IEC
7816-5:1994
|
Identification
cards -- Integrated circuit(s) cards with contacts -- Part 5: Numbering
system and registration procedure for application identifiers
|
Highly
recommended reading as part of the management (e.g. User/Group Management
service)
|
ISO/IEC
7816-7:1999
|
Identification
cards -- Integrated circuit(s) cards with contacts -- Part 7: Interindustry commands for Structured Card Query Language
(SCQL) (available in English only)
|
|
ISO/IEC
7816-8:1999
|
Identification
cards -- Integrated circuit(s) cards with contacts -- Part 8: Security
related interindustry commands
|
|
ISO/IEC
7816-9:2000
|
Identification
cards -- Integrated circuit(s) cards with contacts -- Part 9: Additional interindustry commands and security attributes
|
|
Java Card
|
Java Code Smart Card API
|
Can make
use of ISO 7816 Based smart cards. Referenced by Global Platform and
ETSI.
|
Java Card
|
Java Card Platform Specification v 2.2.1
Available from:
http://java.sun.com/products/javacard/specs.html
|
|
NIST GSC-IS
|
The NIST Interagency Report 6887 - 2003 edition
(Government Smart Card-Interoperability Specification) Version 2.1
Available from:
http://csrc.nist.gov/publications/nistir/nistir-6887.pdf
|
Recommended
Reading. Specifies the use of ISO 7816 GSM based implementations.
|
Smart Card
Alliance
|
Smart Card
Primer
Available from: http://www.smartcardalliance.org
|
Recommended
Reading
|
Smart Card
Alliance
|
Privacy and Secure Identification Systems: The Role
of Smart Cards as a Privacy-Enabling Technology
Available from: http://www.smartcardalliance.org
|
Recommended
Reading
|
Smart Card
Alliance
|
Government Smart Card Handbook
Available from: http://www.smartcardalliance.org
|
Recommended
Reading. Specifies the use of ISO 7816 based implementations.
|
Figure 4: Estimated
Smart Card Storage Costs
Digital Certificates
The industry
accepted digital certificate is an X.509 certificate. This is the
certificate format that should be used by IntelliGrid Architecture when applicable. There
are some issues in identifying a certificate:
·
There is an issue in regards to how to uniquely identify a
certificate. There are many fields that could be used, however only the certificate Thumbprint is truly unique. All other
fields could be non-unique. Therefore, it is the thumbprint that should be
used to identify and match certificates.
·
Enunciation of lifetime expiration (see Credential Renewal service).
· Policy
issues in regards to use will need to be addressed. The NERC e-Marc
certificate policy discusses many of these issues. It is recommended that the
e-Marc policy be used as a basis for certificate usage.
It is worthwhile to note that the NERC policy does not allow the same
certificate to be duplicated. Should a security domain adopt this as a
policy, the number of certificates required (e.g. in the case of redundancy)
will be higher.
·
A policy in regards to how applications should react in the case that an
in use certificate is revoked.
Revocation is basically caused when the integrity of a certificate has been compromised
(e.g. the private certificate may have been stolen). Since none of the
revocation protocols give a indication that could be used to determine if the
certificate was compromised prior to use, the safe option is to terminate use
of the certificate upon revocation. This may cause information exchange
to be terminated if fail-over procedures are not made part of the policy.
Table 23: Public
Key Infrastructure (PKI) Related Specification/Standards
Identification
Number
|
Name
|
Comment
|
RFC 2898
|
PKCS #5: Password-Based Cryptography Specification
Version 2.0. B. Kaliski.
September 2000.
|
|
RFC 2985
|
PKCS #9: Selected Object Classes and Attribute Types
Version 2.0. M. Nystrom,
B. Kaliski. November 2000.
|
|
RFC 2986
|
PKCS #10: Certification
Request Syntax Specification Version 1.7. M. Nystrom, B. Kaliski. November
2000.
|
|
RFC 3280
|
Internet X.509 Public Key Infrastructure Certificate
and Certificate Revocation List (CRL) Profile
|
|
ISO/IEC
9594-8:1998
|
Information
technology -- Open Systems Interconnection -- The Directory: Authentication
framework
|
Definition
of X.509 Certificate is found here.
|
ISO/IEC
9594-8:2001
|
Information
technology -- Open Systems Interconnection -- The Directory: Public-key and
attribute certificate frameworks
|
|
X.521
|
PKI - Digital certificates and certificate
revocation lists profiles
|
|
NERC
|
Certificate Policy for the Energy Market Access and
Reliability Certificate (e‑MARC) Program Version 2.4
Available from:
ftp://www.nerc.com/pub/sys/all_updl/cip/pkitf/e-MARC-PKI_draft_version_V2-4b_March_2003-rev1.doc
|
|
Digital Signatures
Typically
considered a subset of Digital Certificates, as certificates are required in
order to digitally sign, these have their own benefit for identification
purposes. In instances where bandwidth or packet size is a limiting
factor, a digital signature can be used in place of a certificate.
In IEC 61850, for
GOOSE, this signature, in conjunction with address
resolution would provide two-factor authentication if properly
implemented. However, this raises the issue that:
· Digital signatures should not repeat often in order to prevent spoofing. There
are several different interpretations in regards to what a digital signature
is.
It is recommended that RFC 2313 be used as the definitive definition for a
digital signature algorithm:
“For digital signatures, the content to be signed is first reduced
to a message digest with a message-digest algorithm (such as MD5), and
then an octet string containing the message digest is encrypted with the RSA
private key of the signer of the content. The content and the encrypted message
digest are represented together according to the syntax in PKCS #7 to yield a
digital signature.”
However, it is recommended that RFC 2437 be the actual Cryptography
specification used
Table 24: Relevant
Specifications for Digital Signatures
Identification
Number
|
Name
|
Comment
|
RFC 2313
|
http://www.armware.dk/RFC/rfc/rfc2313.htmlPKCS #1: RSA Encryption Version 1.5
|
|
RFC 2315
|
PKCS #7: Cryptographic Message Syntax Version 1.5
|
|
RFC 2437
|
PKCS #1: RSA Cryptography Specifications Version 2.0
|
|
There is a large
body of biometric work occurring. The standards development is largely
being performed in ISO JTC1 SC37. The total scope of work can be obtained
from www.jtc1.org.
However, some of the major work items have been included in Table 25. The major
focus of ISO JTC1 SC37 is focused on the biometric aspects of fingerprints
and facial images. However, from a practical perspective fingerprint
biometrics represents a much lower cost alternative than facial and therefore
would be recommended for IntelliGrid Architecture deployment.
It is also
suggested that the biometric data be encoded on a smart-card so that two-factor
authentication is achievable using the appropriate NISTIR 6529
specified/registered format.
The use of
biometric based authentication mechanisms is becoming acceptable due to the
cost of the technology becoming lower. There are four biometric
technologies that have been or are being used:
·
Voice: Although this is a type of biometric identification, it has
proven to be weak since recording and replay of the key identification
phrase(s) could allow such an authentication system to be spoofed.
·
Fingerprint: There are now electronic mice and locks that are relatively
low cost that can make use of fingerprints as a biometric. However, there
are multiple competing standards for the metrics that determine what
information needs to be stored (e.g. to represent a fingerprint). It is
recommended that this technology be used due to its
cost/benefit ratio.
·
Facial: Facial biometrics could prove to be the biometric technology of
the future. However, current technology yields has proven to produce
false positives (e.g. identify one individual as being another). The technology
previously needed for facial scanning was difficult, but the technology is
migrating to WebCam like cameras that will lower the
cost of such biometrics. Based upon this trend, the federal government
announced its intent to produce passports with facial biometric information.
It is recommended that facial biometrics be considered once the federal system
is proven.
·
Retinal/Iris pattern mathing: This biometric
is one of the most difficult to spoof, but also one of the most costly to
deploy. The cost/benefit ratio is questionable within IntelliGrid Architecture
environment.
·
Hand Geometry: This biometric is one of the most
difficult to spoof, but also one of the most costly to deploy. The
cost/benefit ratio is questionable within IntelliGrid Architecture environment.
Biometric exchange
formats have now been coordinated under one governing umbrella, the
International Biometric Industry Association (IBIA, www.ibia.org).
Table 25: Relevant
References regarding Biometrics
Global Analytic Information Technology Services
|
Fingerprint Recognition
Available from:
http://www.gaits.com/biometrics_fingerprint.asp
|
|
Ralph Gross, Quo Vadis Face Recognition? The current state of the art in
Face Recognition
Available from:
http://dagwood.vsam.ri.cmu.edu/FaceRecognition/
|
|
Philip E. Agre,
Your Face is Not a Bar Code: Arguments Against Automatic Face Recognition in
Public Places.
|
ISO JTC1 SC37
|
SD 2 – Harmonized Biometric
Vocabulary
|
ISO JTC1 SC37
|
1.37.19784.1 BioAPI
– Biometric Application Programming Interface
|
ISO JTC1 SC37
|
1.37.19794 – Biometric Data
Interchange Format
|
ISO JTC1 SC37
|
1.37.1974.3 Biometric Data
Interchange Format – Part 3: Finger Pattern Spectral Data
|
ISO JTC1 SC37
|
1.37.1974.4 Biometric Data
Interchange Format – Part 4: Finger Image Data
|
ISO JTC1 SC37
|
1.37.1974.5 Biometric Data
Interchange Format – Part 5: Face Image Data
|
NISTIR 6529
|
Common Biometric Exchange File
Format (CBEFF)
Available from:
http://www.nist.gov/cbeff
|
Table 26: Relevant
Specification regarding Biometrics and Smart Cards
Identification
Number
|
Name
|
Comment
|
ISO/IEC 7816-11:2004
|
Identification
cards -- Integrated circuit cards -- Part 11: Personal verification through
biometric methods
|
Recommended
Reading
|
Specific Technologies
Relational Databases
The use of
relational databases merits discussion in regards to identity
establishment. The first issue that needs to be resolved is the
definition of what is a relational database. For the purposes of this
document, relational databases shall be constrained to any database that
conforms to ANSI X3.135-1989 (SQL’89), ANSI X3.135-1992
(SQL’92), or ANSI X3-135-199x (SQL3- still under
development).
“The
basic security model of SQL consists of three entities: objects, actions, and
users. Objects are defined in the database schema. In SQL'89, the objects are
tables, views, columns of tables, and columns of views. In SQL'92, the objects
also include domains and assertions. In SQL3, objects will include user defined
constructs….
A
privilege is an authorization to a user of an action on an object. A privilege
is a 5-tuple:
(grantor,
grantee, object, action, grantable)….
….some
of these implementations, the user name and password make up the user
identification string in the SQL connect command and this string is passed in
plain text across the network. From a security point of view, that this string
is passed in plain text is not good practice.”
Obviously, the use
of plaintext being transmitted across a network IS NOT ACCEPTABLE.
Therefore, it is recommended that encryption, preferably provided via TLS, be
used.
Web Based User Interfaces
There are many
current devices (e.g. the GE UR Relay and others) that embed Web servers that
provide a monitoring and configuration setting
interface. These definitely need to be secured via some identification
mechanism. Currently username/passwords are used without
challenge/response.
It would be
recommended that these interfaces implement a
challenge/response mechanism or be converted to make use of SOAP Web
Services with the appropriate Digital Signature SOAP security (Certificate
based). It is also recommended that the digital signature be used in
conjunction with encryption provided by TLS.
Table 27: Relevant
Technologies for Web Based User Interfaces
Identification
Number
|
Name
|
Comment
|
W3C
|
SOAP
Security Extensions: Digital Signature
|
Recommended
|
The identity
mapping service provides the capability of transforming an identity which
exists in one identity domain into a identity within another identity domain.
It is worthwhile to note that there may be multiple
identity domains within a single Security Domain. There is an additional
attribute to identity mapping, the mapping may result in
either a mapping of a individual into another set of credentials that represent
the individual (but for a different resource) or in a mapping to a role/group
based identity for the resource.
As an
example, consider an identity in the form of an X.500 Distinguished Name (DN),
which is carried within a X.509v3 digital certificate. The combination of the
subject DN, issuer DN and certificate serial number may be considered to carry
the subject’s or service requestor’s identity. The scope of the identity domain
in this example is considered to be the set of certificates that are issued by
the certificate authority. Assuming that the certificate is used to convey the
service requestor’s identity the identity mapping service via policy may map
the service requestor’s identity to a identity which has meaning (for instance)
to the hosting environment’s local platform registry. The identity mapping
service is not concerned with the authentication of the service requestor;
rather it is strictly a policy driven name mapping service.
The Identity
Mapping can occur due to Credential Conversion or local/programmatic
reasons. The major issues with Identity Mapping are very similar to the
issues in Credential Conversion: There needs to be an audit mechanism inserted into the mapping process
so that the originator of the transaction can be identified if needed.
Technological Assessment and
Relevant Specifications
Relevant
specifications and references may be drawn from the Identity Establishment,
Credential Conversion, and Firewall Transversal services. In order to be
concise, they will not be repeated in this section. This section will
only contain additional recommendation above and beyond the other service
recommendations.
Address
Mapping
It is recommended that Network Address
Translation be used as part of the non-Transparent Firewall deployment.
However, in the use of NAT or most non-Transparent firewalls, there is an issue
of providing a proxy for multiple “protected addresses” into the public address
space. It is recommended that firewalls be evaluated for their capability
to proxy and map multiple addresses as it may save
deployment and management cost.
UserName/Password
Although there are
no relevant standards/specifications pertaining to this issue, the most natural
mapping service is through the use of single sign-on (SSO). However, this
does not truly represent the true Identity Mapping (although it is credential
mapping).
Digital Certificates
See the discussion
in the Credential Conversion service discussion.
Ensure that unauthorized
changes made to messages or documents may be detected by the recipient. The use
of message or document level integrity checking is determined by policy, which
is tied to the offered quality of the service (QoS).
Key definitions:
integrity: [In INFOSEC,
the] quality of an information
system (IS) reflecting the
logical correctness and reliability of
the operating
system; the logical
completeness of the hardware and software
implementing the protection
mechanisms; and the consistency of the data
structures and occurrence of the stored data. Note that, in a formal security mode,
integrity is interpreted more narrowly to mean protection against unauthorized
modification or destruction of information. [INFOSEC-99]
The first thought, when it comes to
Integrity, is that it is the same issue as Confidentiality. However, the
Confidentiality Service provides protection from information disclosure not the
detection of information modification. It is the protection from
information modification that the Integrity Service represents.
In order to provide message integrity a
algorithm that generates a result similar to a CRC needs to executed and
imbedded in the message. However, this alone will not guarantee integrity
as a man-in-the-middle attack could change the message, recalculate the CRC,
and then forward the message.
In order to prevent man-in-the-middle
attacks, a digital signature is typically used on the CRC like result and both
are embedded in the message. It is this digital signature “seal” that
actually prevents the attack. Such signatures are typically referred to
as Message Authentication Codes (MACs) and it is
recommended that the Integrity Service be implemented through the use of such
techniques.
This service represents the capability to
provide additional security services, as needed, in order to facilitate
inter-domain information exchanges. These additional security
services may not typically be required for intra-domain exchanges
The additional security services that must be
provided for Inter-Domain security are:
· Confidentiality
·
Credential Conversion
· Delegation
· Firewall Transversal
· Identity Mapping
· Security against Denial of
Service
Additionally, a much more robust audit
mechanism should be instituted at the inter-domain boundaries.
This service represents the ability of a
security domain to provide proof that a given exchange action has
occurred. This ability is used to resolve disputes with other entities
that claim that the action did not occur, thus non-repudiation. In order
to provide this service, a strong audit service must be present within the security
domain.
Key definition:
repudiation:
In cryptosystems, the denial by one of the entities involved in a communication
of having participated in all or part of the communication.
In order to provide this service, strong
audit capabilities need to be in place for Identity Establishment, Access
Control, Credential Conversion, and Identity Mapping. Without an
appropriate level of audit capability on these other services, non-repudiation
will not be able to be performed.
Non-repudiation is typically a manual process
of retrieving the relevant audit records, analyzing those records, creating a
report that summarizes those records and the conclusion. Thus, strong
policies and procedures must be put in place to accomplish non-repudiation as
well.
Technological
Assessment and Relevant Specifications
Table 28 shows the relevant specifications
regarding non-repudiation. In order to provide the non-repudiation
service, it is suggested that a non-repudiation framework similar to what is
specified in ISO/IEC 10181-4 be created. It is further recommended that
SAML be used and the non-repudiation capabilities of
SAML be integrated into the created framework.
Table 28: Relevant Specification regarding
non-repudiation
Identification Number
|
Name
|
Comment
|
ISO 9735-5:2002
|
Electronic data interchange for administration,
commerce and transport (EDIFACT) -- Application level syntax rules (Syntax
version number: 4, Syntax release number: 1) -- Part 5: Security rules for
batch EDI (authenticity, integrity and non-repudiation of origin)
|
|
ISO/IEC 10181-4:1997
|
Information technology -- Open Systems
Interconnection -- Security frameworks for open systems: Non-repudiation
framework
|
Recommended
|
ISO/IEC 13888-1:1997
|
Information technology -- Security techniques --
Non-repudiation -- Part 1: General
|
Recommended Reading
|
ISO/IEC 13888-2:1998
|
Information technology -- Security techniques --
Non-repudiation -- Part 2: Mechanisms using symmetric techniques
|
|
ISO/IEC 13888-3:1997
|
Information technology -- Security techniques --
Non-repudiation -- Part 3: Mechanisms using asymmetric techniques
|
|
ISO/IEC TR
13335-5
|
Information
technology - Guidelines for the management of IT Security - Part 5: Management
guidance on network security
|
|
WC3
|
XML Key
Management Specification (XKMS 2.0) Bindings
|
|
OASIS Security Technical Committee
|
Bindings for OASIS Security Assertion Markup
Language (SAML) V2.0
Available from:
http://www.oasis-open.org/committees/download.php/6773/sstc-saml-bindings-2.0-draft-11-diff.pdf
|
Draft that specifies how to bind SAML over various
protocols. Highly recommended.
|
This service represents the ability of a
security domain to applications with the ability to request that a set of
transactions be conveyed over a specific communication path with specific
Quality of Security (QS) being provided. Such a service may be used in
conjunction with many of the other security services.
There are two major issues
that need to be resolved:
· The ability to specify the
actual communication path that a given transaction will use.
This type of ability is a direct contradiction to the normal dynamic routing inherent
in most networks, thus normal network infrastructures may not be able to be
used.
· The ability
to request a Quality of Security to be guaranteed over that path.
Technological
Assessment and Relevant Specifications
Communication
Path Definition
Although there are several IETF RFCs
regarding the ability to perform this function (e.g. RFC 1940), few if any of
the operating system APIs allow the full path specification to occur. In
reality, the source routing bit can be set TRUE and the packet will be
delivered to the peer with the path hop information
embedded within it. Such a mechanism could
allow the receiver to determine if a packet was delivered over an
acceptable path, and this is a useful check.
However, the ability to actually pre-determine
the path that a packet will transverse falls upon manual configuration of
static routing. It is the this static routing that can actually allow
policy to dictate what route a given communication packet will take.
Typically, this is a configuration option in Firewalls or Operating
Systems. Thus it is incumbent upon the SMI function to provide the
appropriate configuration.
Quality
of Security
There are no known Quality of Security
standards/specifications available to allow packet routing based upon a
requested level of security. Development of a similar specification to
RFC 2386 (Quality of Service based Routing) is recommended.
Table 29: Relevant Specifications for the
Path Routing Service
Identification Number
|
Name
|
Comment
|
RFC 1102
|
Policy routing in Internet protocols
|
Highly Recommended
|
RFC 1322
|
A Unified
Approach to Inter-Domain Routing
|
|
RFC 1940
|
Source
Demand Routing: Packet Format and Forwarding Specification (Version 1)
|
Highly Recommended
|
RFC 2386
|
A Framework
for QoS-based Routing in the Internet
|
Highly Recommended
|
RFC 2725
|
Routing
Policy System Security
|
Highly Recommended
|
Security Policy
Service
The policy service and policy
processes/guidance can be found in Security Policy.
Allow service requestors and providers to
exchange dynamically security (among other) policy information to establish a
negotiated security context between them. Such policy information can contain
authentication requirements, supported functionality,
constraints, privacy rules etc.
Typically, there has been no defined
framework or policy exchange mechanism available
that is technology neutral and therefore such exchanges have not occurred or
have been performed manually. There are several issues that have
prevented the development of such a framework:
· Agreement in regards to what
constitutes security policy varies. Therefore, such an exchange mechanism
would need to provide basic attribute definitions and also allow for a large
amount of customization.
· There has not been a single
secure and ubiquitous technology available over which to perform such an
exchange.
Technology
Assessment and Relevant Specifications
When analyzing how to exchange policies in IntelliGrid Architecture environment, the problem of having a ubiquitous technology has not been
solved. There still does not appear to be a solution that can solve
policy exchange issues in the Transmission & Distribution environment
(especially serially connected devices), spanning to
databases, to web technology. However, there is emerging
specifications in how to perform such exchanges when web services/SOAP
infrastructures are available.
For policy exchanges via SOAP, it is
recommended that the WS-Policy, WS-PolicyAssertions,
and WS-PolicyAttachment specifications form the basis
of such exchanges. It is also recommended that customizations be kept to
a minimum in order to maximize interoperability and interworkability.
Table 30: Relevant Specification regarding Policy
Exchange
Identification Number
|
Name
|
Comment
|
OASIS
|
Web Services Policy Framework (WS-Policy)
Available from:
http://xml.coverpages.org/ws-policyV11.pdf
|
Recommended
|
OASIS
|
Web Services Policy Assertions Language (WS-PolicyAssertions)
Available from:
http://xml.coverpages.org/ws-policyassertionsV11.pdf
|
Recommended
|
OASIS
|
Web Services Policy Attachment (WS-PolicyAttachment)
Available from:
http://xml.coverpages.org/ws-policyattachmentV11.pdf
|
Recommended
|
The privacy service is primarily concerned
with the policy driven classification of personally identifiable information
(PII). Service providers and service requestors may store personally
identifiable information using the Privacy Service. Such a service can be used
to articulate and enforce a Security Domain’s privacy policy. Allow both a
service requester and a service provider to define
and enforce privacy policies, for instance taking into account things like
personally identifiable information (PII), purpose of invocation, etc. (Privacy
policies may be treated as an aspect of authorization policy addressing privacy
semantics such as information usage rather than plain information access.).
Many may consider privacy equivalent to
confidentiality/encryption, however this is not true. In reality, privacy
is an issue regarding the PII after a secure transfer of that information
occurs. The issue relevant, mostly to web technology, is how to determine
in advanced if the privacy offered by a web site is sufficient.
Technological
Assessment and Relevant Documents
A review of relevant information reveals that
there are many well know legal/legislative aspects to privacy and disclosure of
that information. However, there is little relevant work in regards to
being able to determine and enforce the level of privacy electronically.
The sole exception, that has maturity, is the P3P
specification from W3C. References PRIV-01 and PRIV-02 are
recommended reading to allow the SMI/policy services to determine if P3P can be
used/monitored within the Security Domain.
Other work in this are is highly recommended.
Table 31: References Regarding Privacy
PRIV-01
|
Web
consortium backs P3P privacy standard
Available from:
http://www.cnn.com/2002/TECH/internet/04/18/p3p.privacy.idg/
|
PRIV-02
|
Web Privacy
Standard: It's a Start
Available
from: http://www.pcworld.com/news/article/0,aid,94544,00.asp
|
Table 32: Relevant Specification regarding
Privacy
Identification Number
|
Name
|
Comment
|
W3C
|
The Platform
for Privacy Preferences 1.1 (P3P1.1) Specification
W3C Working
Draft 27 April 2004
|
Highly Recommended
|
Oblix
|
Guide to
Regulatory Compliance and Privacy
|
Recommended
|
The profile service is concerned with
managing service requestor’s preferences and data
which my not be directly consumed by the authorization service.
This may be service requestor specific personalization data, which for example
can be used to tailor or customize the service requestor’s experience (if
incorporated into an application which interfaces with
end-users.) It is expected that primarily this data will be used by
applications that interface with a person.
Technological
Assessment and Relevant Specifications
Research and experience indicates the web
user profiles are the trend. To experience this, use any of the
commercial web portals (e.g. yahoo, msn, etc…). These all offer the
ability to personalize the information displayed and the actual display
format. However, it is doubtful that any of the current portal technologies make use of the Semantic Web specification.
It is recommended, when possible, that the
Semantic Web specification be utilized when possible. If such an
implementation is not feasible or costly, it is recommended to implement based
upon some local means.
Table 33: Relevant Specifications regarding
the Profile Service
Identification Number
|
Name
|
Comment
|
Semantic Web
|
Pervasive Computing
Standard Ontology (PERVASIVE-SO) Guide -- Describing User Profile and
Preferences
Available from: http://pervasive.semanticweb.org/doc/2004-01-ont-guide/part1/
|
Highly Recommended
|
IEEE
|
IEEE
Personal and Private Information (PAPI) draft standard
|
|
This service allows an entity to determine
the trust level associate with the identity being conveyed. This is of
particular interest where the source Identity, of the original transaction, has
been mapped several times.
This service represents a specific capability
that could be viewed as a subset of the Identity Service. However, technical evaluations of existing solutions indicate
that no solutions provide this ability and therefore are worthy of being
defined independently so that the service requirement is not lost.
This is a service that is not widely
recognized, although QID-01 makes a strong case for its need. The basic
issue raised by QID-01 is that of the ability to trust an identity being
established if the identity has been mapped or its credentials converted
several times. At a minimum, without a mechanism for originator
determination, there is a relevant issue. However, originator
determination could be provided by and adequate audit mechanism, but this does
not assist the receptor of a transaction. Thus there is a need to provide
a mechanism to allow the receptor to determine a level of trust based upon the
number of mappings that have occurred along the transaction path.
Table 34: References Relating to Quality of
Identity
QID-01
|
Audun Josang, An Algebra for Assessing Trust in Certification
Chains, Telnor R&D
email: audun.josang@fou.telenor.no
|
Technological
Assessment and Relevant Specifications
There are two aspects in regards to Quality
of Identity, the ability to determine the number of times that an identity has
been transformed, which is a superset of the number
of times that credentials have been converted. There are no relevant specifications/solutions
that can be applied to the generalized identity mapping
issue, as many of these mappings are local issues. However, in the particular case of digital
certificate conversion, the SAML specification yields a possible solution.
However, the solution would require that attribute definitions and attribute
chaining be added to SAML’s use within IntelliGrid Architecture
environment. There are no such solutions for
username/password and it may be worthwhile to develop such a specification
based upon the SAML principles. For address based credentials, source routing
offers a potential solution (see Path Routing and QS service).
Table 35: Relevant Specification for the
Quality of Idenity Service
Identification Number
|
Name
|
Comment
|
OASIS Security Technical Committee
|
Attribute Profiles for SAML 2.0
Available from:
http://www.oasis-open.org/committees/download.php/6344/sstc-hughes-mishra-baseline-attributes-03.pdf
|
Incomplete, but is on the correct track.
|
OASIS Security Technical Committee
|
SAML 2.0:
Security Assertion Markup Language Version 2.0
|
Recommended
|
OASIS Security Technical Committee
|
Bindings for OASIS Security Assertion Markup
Language (SAML) V2.0
Available from:
http://www.oasis-open.org/committees/download.php/6773/sstc-saml-bindings-2.0-draft-11-diff.pdf
|
Draft that specifies how to bind SAML over various
protocols. Highly recommended.
|
OASIS Security Technical Committee
|
Authentication Context
Available from:
http://www.oasis-open.org/committees/download.php/6539/sstc-saml-authn-context-2.0-draft-04a-diff.pdf
|
Draft that is needed to establish identity within a
SAML environment.
|
This service is for assisting in preventing a
denial of service. This is not a service that can be invoked
programmatically, rather it is a service that must be designed into the
capabilities of a Security Domain or the implementations deployed within the
domain.
Key definitions:
denial of service: 1. The prevention
of authorized access to resources or the delaying of time-critical operations. [2382-pt.8] 2. The result of any
action or series of actions that prevents any part of an information system (IS) from functioning. [INFOSEC-99]
The
overall issue is to understand what can allow denial-of-service and then to
take steps to mitigate the causes. There are several general categories
of denial-of-service attacks that need to be well understood:
·
Resource exhaustion: Resource exhaustion is a denial-of-service attack
that causes required resources to be un-available for the intended use when a
valid transaction needs to be processed. The recent SYN FLOOD attacks represents
a well known denial-of-service attack.
Resources that can be exhausted are virtual connections, memory, serial ports,
TCP ports, etc. However these could be generalized into two categories:
connectivity resources and computational resources.
·
Buffer overflow: This type of attack causes a memory overrun to occur
within a computational resource. The end result is typically the
computational process terminates or becomes unstable. In reality, this
attack exploits poorly implemented programs that actually allow for the overrun
to occur without being properly trapped. Recent examples of this type of
attack are the PING OF DEATH and some attacks on SNMP.
·
Protocol oversights: In some protocols, not all state transitions may be
defined. Exploitation of such oversights could allow a denial of service
attack to cause a protocol deadlock situation.
As an example, from STD 62 (SNMP):
“Denial
of Service
A
Security Model need not attempt to address the broad range of attacks by which
service on behalf of authorized users is denied. Indeed, such
denial-of-service attacks are in many cases indistinguishable from the type of
network failures with which any viable management protocol must cope as a
matter of course.”
Basically
is a statement that no DOS countermeasures need to be taken within the
specification. This is typical of most standards.
·
Improper Coding Practice: Both the Buffer Overflow and Protocol
Oversight threats are sub-categories of the improper coding practice
category. However, this category includes improper use of semaphores,
threads, etc. that could be utilized to decrease performance/resource
available to the point that a valid transaction could not be processed in a
timely manner.
Technological Assessment and Relevant Specifications
In
order to provide a denial-of-service attack protection, inter-domain connection
points need to be well-designed and monitored.
For
connectivity resources, it is recommended that timeouts be implemented that are
based upon valid traffic being transmitted/received through the connection
point. Additionally, it is recommended that
through policy or coding practice that a peer remote be limited to the
number of connectivity resources that it is allowed to consume.
For
protocol oversights, it is recommended that prior to implementation the
protocol(s) are analyzed for vulnerabilities and that these be addressed during
the implementation phase. It is recommended that appropriate coding methodology
be employed to prevent CPU resource exhaustion as well as protocol oversight
vulnerabilities.
It is
also recommended that as part of the policy/SMI of a security domain that
implementations are tested for vulnerabilities with tools that are publicly
available.
Table
36: Relevant Specifications regarding Denial-of-Service
Identification
Number
|
Name
|
Comment
|
ISO/IEC
17799:2000
|
Information
technology -- Code of practice for information security management
|
|
ISO/IEC TR
13335-1:1996
|
Information
technology -- Guidelines for the management of IT Security -- Part 1:
Concepts and models for IT Security
|
|
ISO/IEC TR
13335-2:1997
|
Information
technology -- Guidelines for the management of IT Security -- Part 2:
Managing and planning IT Security
|
|
Explicitly
recognize the need for manageability of security functionality within IntelliGrid Architecture
security model. For example, identity management, policy management, key management,
and so forth. The need for security management also includes higher-level
requirements such as anti-virus protection, intrusion detection and protection,
which are requirements in their own rights but are
typically provided as part of security management.
Technological Assessment and Relevant
Specifications
Security
assurance is part of a Security Domain’s policy and SMI. It is
recommended that ISO/IEC 15408-3:1999
be the guideline for determine and assessing such a policy.
Table
37: Relevant Specifications regarding Security Assurance
Identification
Number
|
Name
|
Comment
|
RFC 2401
|
Security Architecture for
the Internet Protocol
|
|
RFC 2196
|
Site
Security Handbook
|
|
RFC 2350
|
Expectations for Computer Security Incident Response
|
|
ISO/IEC
15408-1:1999
|
Information
technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general mode
|
|
ISO/IEC
15408-2:1999
|
Information
technology -- Security techniques -- Evaluation criteria for IT security --
Part 2: Security functional requirements
|
|
ISO/IEC
15408-3:1999
|
Information
technology -- Security techniques -- Evaluation criteria for IT security -- Part
3: Security assurance requirements
|
Highly
Recommended
|
Security
protocol mapping services enable distributed security protocols to be
transparently mapped onto native platform security services for participation by
platform resource managers not implemented to support the distributed security
authentication and access control mechanism.
Technological Assessment
To
date there has been no definition of abstract security
services and their parameters.
The security work found in this section actually defines a set of services,
but further modeling is required in fully specify the parameters that are
conveyed within those services.
The
issue involving the ability to map to different communication technologies will be mitigated if a full abstract model
of IntelliGrid Architecture security services can be developed.
Security discovery
provides a mechanism for an entity to discover what security services are
available for its use. In particular, a
Security Domain should provide a mechanism for an entity to discover what security services are available for its use
across to other Security Domains.
Within
the IntelliGrid Architecture, such a service would be required for Inter-Domain usage
where a-priori knowledge is not available. It would also be a mandatory
service if Quality of Security routing became a reality.
Technological
Assessment and Relevant Specifications
Although
there is no immediately usable technology to accomplish this service, it is
recommended that the WS-Policy series be extended to provide this
capability. It should be fairly straightforward to model security service
availability as policy (e.g. the Policy Attachment may need to be
extended). At a minimum, the information required
to be conveyed needs to be determined in advance of attempting to adopt
WS-Policy.
Since
the discovery service is needed inter-domain, it is reasonable to attempt to
make use of Web Services at the domain interconnect points to provide this
capability.
Table
38: Potentially Relevant Specifications in regards to Security Capability
Discovery
Identification
Number
|
Name
|
Comment
|
OASIS
|
Web Services
Policy Framework (WS-Policy)
Available
from:
http://xml.coverpages.org/ws-policyV11.pdf
|
|
OASIS
|
Web
Services Policy Assertions Language (WS-PolicyAssertions)
Available
from:
http://xml.coverpages.org/ws-policyassertionsV11.pdf
|
|
OASIS
|
Web
Services Policy Attachment (WS-PolicyAttachment)
Available
from:
http://xml.coverpages.org/ws-policyattachmentV11.pdf
|
|
Relieve
an entity having successfully completed the act of authentication once from the
need to participate in re-authentications upon subsequent accesses to
OGSA-managed resources for some reasonable period of time. This must take into
account that a request may span security domains and hence should factor in
federation between identity domains and mapping of
identities. This requirement is important from two perspectives: a) It places a
secondary requirement on an OGSA-compliant implementation to be able to
delegate an entity’s rights, subject to policy (e.g., lifespan of credentials,
restrictions placed by the entity) b) If the credential material is delegated
to intermediaries, it may be augmented to indicate the identity of the
intermediaries, subject to policy.
This
service is a local combination of the Credential Conversion and Identity
Mapping services.
This
service represents the ability of one resource to determine if its peer can be
trusted. In order to establish trust, well known identities and security
policies must be used. Additionally, if inter-domain trust establishment
requires an analysis of the security policies and procedures of the peer
security domain.
Key
definitions:
trust: In cryptology and
cryptosystems, that characteristic allowing one entity to assume that a second
entity will behave exactly as the first entity expects. Note: Trust may apply
only for some specific function. The critical role of trust in the authentication
framework is to describe the relationship between an authenticating entity and
a certification
authority; an
authenticating entity must be certain that it can trust the certification
authority to create only valid and reliable certificates. [After X.509]
Trust establishment is implemented through
the Identity Establishment and Quality of Identity Services.
Table 39: Relevant Information regarding
Trust Establishment
DOD
|
DOD 5200.28-STD
Trusted Computer System Evaluation Criteria
|
DOD
|
DOD
5200.28-STD 1991 Trusted Database Management System Interpretation of the
Trusted Computer System Evaluation Criteria
|
|