Top Banner
1 MILS Research Montage MILS Research Montage LAW LAW Work-In-Progress Session Work-In-Progress Session December 6, 2011 December 6, 2011 Rance DeLong Rance DeLong Consulting Researcher Consulting Researcher
26

MILS Research Montage - SRI International

Mar 26, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MILS Research Montage - SRI International

1

MILS Research MontageMILS Research Montage

LAWLAWWork-In-Progress SessionWork-In-Progress Session

December 6, 2011December 6, 2011

Rance DeLongRance DeLongConsulting ResearcherConsulting Researcher

Page 2: MILS Research Montage - SRI International

2R. DeLong

ImplementationScience

StandardsEval & Cert

Products

Dissemination

MILS VisionConstitution

ManifestoMath

LectureNotes

RTIOIS

GHSLW WRS

SKPPMIPP

Concepts

Compos.Cert.

DCI

Galois

SIs / Programs

Example

CCAE

LAW

Evidence

MILS Efforts Overview Effort Categories

Efforts/Results to date

* Sponsored by AFRL / CMPO

Guard

MCSPP

MNSPP

*

ICCCDASC

TOG

RCI

Found’nlComps

Opera’nlComps

Tools

Assur. Case

API

Inter-op

Patterns Assemblies

Ref Impls

*

Scheme

Sysgo

NSA TOG Future

AADL

Page 3: MILS Research Montage - SRI International

3R. DeLong

Research Enabling MILS DevelopmentResearch Enabling MILS Developmentand Deployment (and Deployment (REMDaDREMDaD)*)*ll Objective:Objective:

Move to next stage of MILS deployment and developmentMove to next stage of MILS deployment and developmentll 4 Themes4 Themes

–– Components Components –– development and assurance of individual components development and assurance of individual components–– Integration Integration –– integration of MILS components and systems integration of MILS components and systems–– Deployment Deployment –– facilitate MILS deployment facilitate MILS deployment–– Certification Certification –– enable MILS evaluation and certification enable MILS evaluation and certification

ll Initial tasks (2010)Initial tasks (2010)–– Evidence and Evidence and toolchainstoolchains for MILS certification study for MILS certification study–– MILS Cross Domain Solution (CDS) operational component StudyMILS Cross Domain Solution (CDS) operational component Study–– MILS Delivery, Configuration, and Initialization (DCI) StudyMILS Delivery, Configuration, and Initialization (DCI) Study

* Performed at SRI, sponsored by AF Research Laboratory and AF Cryptographic Modernization Program Office.

Page 4: MILS Research Montage - SRI International

4R. DeLong

Research Enabling MILS DevelopmentResearch Enabling MILS Developmentand Deployment (and Deployment (REMDaDREMDaD)*)*ll Current tasks (2011-2012) -Current tasks (2011-2012) -

(John (John RushbyRushby, Dave , Dave HanzHanz, Rance DeLong), Rance DeLong)–– AADL and MILSAADL and MILS–– MIPP completion (MIPP as a document)MIPP completion (MIPP as a document)–– ““Programming the MIPPProgramming the MIPP”” (MIPP encoded in the CCAE) (MIPP encoded in the CCAE)–– MILS Delivery, Configuration, Initialization modelMILS Delivery, Configuration, Initialization model–– MILS Cross Domain Solution investigationMILS Cross Domain Solution investigation–– MILS Network Subsystem Protection ProfileMILS Network Subsystem Protection Profile

* Performed at SRI, sponsored by AF Research Laboratory and AF Cryptographic Modernization Program Office.

Page 5: MILS Research Montage - SRI International

5R. DeLong

MILS is based on composition of cooperatingMILS is based on composition of cooperatingcomponents defined by related Protection Profiles*components defined by related Protection Profiles*

ll Separation Kernel (SKPP)Separation Kernel (SKPP)ll MILS Network System (MNSPP)MILS Network System (MNSPP)ll MILS Console System (MCSPP)MILS Console System (MCSPP)ll MILS Extended Attributes PP (MEAPP)MILS Extended Attributes PP (MEAPP)ll MILS File System (MFSPP)MILS File System (MFSPP)ll . . .. . .ll MILS Integration Protection Profile (MIPP)MILS Integration Protection Profile (MIPP)

MIPP

MFSPPMEAPPMCSPPMNSPP

SKPP . . .“Conforms to”“Patterned after”“Extended by”

Page 6: MILS Research Montage - SRI International

6R. DeLong

Mils PPs are expected to achieveMils PPs are expected to achievethis:this:

CC

MEAPP

MCSPP

MNSPP

MFSPP

STMEA

STMCS

STMNS

STMFS

STMEA

STMCS

STMNS

STMFS

STMEA

STMCS

STMNS

STMFS

STMEA

STMCS

STMNS

STMFS

MEA2

Console2

Network2

File System2

MEA4

Console4

Network4

File System4

MEA1

Console1

Network1

File System1

MEA3

Console3

Network3

File System3

SKPP STSK

STSK

STSK

STSK

SK2

SK4

SK1

SK3 SK4 MEA2

Console1

File System3

Network3!

SK1 MEA3

Console4

File System4

Network1!

System A

System B!

! = It works!

Page 7: MILS Research Montage - SRI International

7R. DeLong

Illustrative Architecture of a MILS-basedIllustrative Architecture of a MILS-basedMLS workstation - a collection ofMLS workstation - a collection ofconnected connected ““thingsthings””

MILSConsole

Subsystem

SessionManager

MILS Fileand

DirectorySubsystem

MLSRVM

AuthData

MgmtAuditMgmt

I&A

HumanI’faceDevs

MILSNetwork

Subsystem

SystemManagement

ApplicationInstantiator

MILSPCS

MILSCORBA App

Mgmt

Audit

ClientPartitions/ Subjects

ClientPartitions/ Subjects

ClientPartitions/ Subjects

MLSRVM

Page 8: MILS Research Montage - SRI International

8R. DeLong

Architecture Architecture of a MILS basedof a MILS basedworkstation - itself is workstation - itself is SomethingSomething

Architecture as anIntegration FrameworkSomething that must be designed.

Something that has properties.

Page 9: MILS Research Montage - SRI International

9R. DeLong

This This SomethingSomething is what the MIPP describesis what the MIPP describes

ll The system level The system level security problem security problem (T/P/A)(T/P/A)ll The system level The system level security objectivessecurity objectivesll The system level The system level SFRsSFRs and and SARsSARsll A system concept and A system concept and reference architecturereference architecturell Identification of, and connections among, the Identification of, and connections among, the componentscomponentsll A basis for formal A basis for formal compositioncomposition of component properties of component propertiesll ConstraintsConstraints on the MILS components that fit in the on the MILS components that fit in the ““holesholes””

–– Security objectives, or modified ones, that pass to the componentSecurity objectives, or modified ones, that pass to the component

–– Relationships and obligations (rely-guarantee) among theRelationships and obligations (rely-guarantee) among thecomponentscomponents

–– Interaction schemas for interacting componentsInteraction schemas for interacting components

Page 10: MILS Research Montage - SRI International

10R. DeLong

Some architecture alternatives for MILS network systemSome architecture alternatives for MILS network system

MbufMgmt

Socket Layer

Transport Layer

Network Layer

Interface Layer

calls queues

calls queues

calls queues

Apps

Dev

Driver

calls

Socket Layer

Transport Layer

calls queues

calls queues

Apps

Dev

Driver

calls

MLSApp

calls

Dev

b

t

b

t

b

t

Dev Dev

sw intr

sw intr

sw intr sw intr

sw intr

hw intr

sw intr

Dev

LabeledSep

calls

CryptoSep

Socket Layer

Transport Layer

Network Layer

Interface Layer

calls

queues

calls

queues

calls

queues

Apps

Dev

Driver

calls

Socket Layer

Transport Layer

Network Layer

Interface Layer

calls queues

calls queues

calls queues

Apps

Dev

Driver

calls

Individual dataitems associatedwith a singlesecurity domain

Code manipulatesdata in multiplesecurity domainsSocket Layer

Transport Layer

Network Layer

Interface Layer

Driver

Mbufs / Clusters

calls queues

calls queues

calls queues

Apps

calls

MbufMgmt

NothingTrusted

EverythingTrusted

Combination ofTrusted and Untrusted

Dev Dev Dev Dev

Page 11: MILS Research Montage - SRI International

11R. DeLong

SNI

HIGH inputs

LOW outputsLOW inputs

HIGH outputs

System Inputs, Outputs, Relies andSystem Inputs, Outputs, Relies andGuaranteesGuarantees

Relies Guarantees

IIIIIIIII…

iiiiiiii…

OOOOOOO…

ooooooo…

Page 12: MILS Research Montage - SRI International

12R. DeLong

S

HIGH Inputs

LOW OutputsLOW Inputs

HIGH Outputs

MILS System fromMILS System fromComponents/SubsystemsComponents/Subsystems

Relies Guarantees

H(HI,HO)

L(LI,LO) S(HI,HO,LI,LO)

Constraints:

IIIIIIIII…

iiiiiiii…

OOOOOOO…

ooooooo…

Properties: P(HI,HO,LI,LO) st S ≤ P

Page 13: MILS Research Montage - SRI International

13R. DeLong

C

Compositional Relies / GuaranteesCompositional Relies / GuaranteesRelies Guarantees

SA

C

A

C

a)

b)

c)

Page 14: MILS Research Montage - SRI International

14R. DeLong

MILS Composite Assurance CaseMILS Composite Assurance Casell Compose assurance cases using Assume-Guarantee ReasoningCompose assurance cases using Assume-Guarantee Reasoningll Assumptions from MI assurance case become requirements on theAssumptions from MI assurance case become requirements on the

componentscomponentsll Assured Claims from component assurance cases become evidenceAssured Claims from component assurance cases become evidence

for MIfor MI

MIClaims

Evidence

Evidence

Evidence

Inference rule

Inference rule

MI AssuranceArgument

SKClaims

MNSClaims

MCSClaims

Inference rule

Inference rule

Inference rule

Inference rule

Inference rule

Inference rule

SK AssuranceArgument

MNS AssuranceArgument

MCS AssuranceArgument

Rely Guarantee

Page 15: MILS Research Montage - SRI International

15R. DeLong

CCAE

CCAE

CCAE

CollaborationEnvironment

CCAE

CCAE

CCAE

Author

Author

ReviewersReviewers

Evaluators

Evaluators

Certifiers

PP

PP

ST

ST

CCAE

Common Criteria Authoring Environment as a distributedCommon Criteria Authoring Environment as a distributedcollaboration environmentcollaboration environment

Page 16: MILS Research Montage - SRI International

16R. DeLong

Rule BaseCC Component

Operation Rules,Semantic Rules,

Relational Model,Workflow Rules

Doc CreationLibrary

Conventions,Doc comp classesDoc generators:

PP, ST, FSP

Env LibraryComponents,

CC SFRs/SARs,Interps, CIM,

Security Ontology,Resource RegistryMILS Integ FW

Author/Reviewer

Parent PP,MILS TOE Concept,or TOE Flow-downRequirements

PP, ST,stats

DocumentPublishing

ProjectTeam

Exchangeor Export

Doc Assembly, Catalog Selection,Checking, Reviewing, Inference,

Rule Execution, Queries, XML gen

XML

PDF, DOCX,XLSX, …

CurrentDocumentFactbase

DocumentCreation/Revision

Documents& Reports

Rendering & Conversion

CCAEDocumentRepository

UI Agent

CCAE User and ComponentsCCAE User and Components

Page 17: MILS Research Montage - SRI International

17R. DeLong

Functional Requirements

Assurance Requirements

Assumptions

Policies

Threats

Security Objectives

Environment Requirements

EnvironmentSecurity Objectives

FAU, FCO, FCS, FDP,FIA, FMT, FPR, FPT,

FRU, FTA, FTP

ACM, ADO, ADV,AGD, ALC,

(AMA), ATE, AVA

ΤΤ

ΠΠ

ΑΑ

ΩΩ

SFRSFR

SARSAR

““SpaceSpace”” of PPs = ( 2 of PPs = ( 2TT ×× 2 2ΠΠ ×× 2 2ΑΑ ×× ΩΩ ×× 2 2SFRSFR ×× 2 2SARSAR ) )

Relational Structure of a Protection ProfileRelational Structure of a Protection Profile

Page 18: MILS Research Montage - SRI International

18R. DeLong

PP = ( 2PP = ( 2TT ×× 2 2ΠΠ ×× 2 2ΑΑ ×× ΩΩ ×× 2 2SFRSFR ×× 2 2SARSAR ) )

E M

MMCC

MCCAE

E E ⊂⊂ PP evaluatable PPs PP evaluatable PPsM M ⊂⊂ E MILS evaluatable PPs E MILS evaluatable PPs

MMC C a candidatea candidatemember of Mmember of M

CCAE drives MC toward M by measuringconsistency and coveragewith respect to MCCAE

Approximation of a MILS PP Oracle Approximation of a MILS PP Oracle (M(MCCAECCAE))

Page 19: MILS Research Montage - SRI International

19R. DeLong

Projecting the MILS PPP to standard PPsProjecting the MILS PPP to standard PPs

PPABC

PPAC

PPAB

PPA

Projection Function

PPPABC

ƒ PPPABC { {A}, {A,B}, {A,C}, {A,B,C} } = { PPA, PPAB, PPAC, PPABC } + Evaluation Work Unit Checklists

WorkUnits

AWorkUnitsAB \{A}

WorkUnitsAC \

{A,AB}WorkUnitsABC \

{A,AB,AC}

Difference operator “ \ ” appliescomp’nt dependency, hierarchy,and other PP property closures.Differential work units assumeordered evaluation of PPs.

EvaluationWork UnitChecklists

Standard PPs

ƒ

Polymorphic PP withsub-profiles A, B, C

Page 20: MILS Research Montage - SRI International

20R. DeLong

Evaluation differential work units (1)Evaluation differential work units (1)

PPA

Entailed work units to be performed toevaluate ƒ PPPABC {A} = PPA

Note, the following Venn diagrams represent contents of projected PPs, not PPP sub-profiles.Projected PPs may have substantial intersection, while sub-profiles may be disjoint.

Page 21: MILS Research Montage - SRI International

21R. DeLong

Evaluation differential work units (2)Evaluation differential work units (2)

PPAB Differentialwork unitsAB \ {A}to be performedto completeevaluationof PPAB

PPA

Work units entailed toevaluate ƒ PPPABC {A,B} = PPAB

Work units already completedduring evaluation of PPA

PPAB common workunits completed forevaluation of PPA

PPA ∩ PPAB

Page 22: MILS Research Montage - SRI International

22R. DeLong

Evaluation differential work units (2)Evaluation differential work units (2)

PPABPPA

PPA ∩ PPAB

PPABC

(PPA ∩ PPAB) ∩ PPABC

Differentialwork unitsABC \ {A,AB}to be performedto completeevaluationof PPABC

PPABC common work units completedfor evaluation of PPA and PPAB

Work units entailed toevaluate ƒ PPPABC {A,B,C} = PPABC

Page 23: MILS Research Montage - SRI International

23R. DeLong

Generalized Delivery, Configuration, andGeneralized Delivery, Configuration, andInitialization interpretationInitialization interpretation

ll Interleaved configuration and deliveryInterleaved configuration and delivery

ll Configuration and integration is Configuration and integration is incrementalincremental due to separation of concerns due to separation of concernsand separation of dutyand separation of duty

ll OEM TOE developer is responsible for providing trusted delivery and forOEM TOE developer is responsible for providing trusted delivery and fortrusted initializationtrusted initialization

ll Trusted delivery should protect TOE to the deployment environment,Trusted delivery should protect TOE to the deployment environment,providing basis for establishment of secure initial stateproviding basis for establishment of secure initial state

ll There can be multiple intermediate integrator environments!There can be multiple intermediate integrator environments!

Developer Environment Integrator Environment(s)

Dev Delivery Config Init OperationOEM Config

User (deployment) Environment

ConfigDelivery

Page 24: MILS Research Montage - SRI International

24R. DeLong

Incremental accumulation of component / configuration dataIncremental accumulation of component / configuration databundle protected by, and updated within, Trusted DCI pipelinebundle protected by, and updated within, Trusted DCI pipeline

fs

pcsnet

con

sk

ap1

ap2

fs

pcs net

con

ap1 ap2

C

cn

c6c5c4c3c2

c1

c7

Trusted Delivery Pipelinebundle

Components

Configuration actions

ApplicationsDeploy Env

init

cm

skcd

Page 25: MILS Research Montage - SRI International

25R. DeLong

The big picture, scope of phasesThe big picture, scope of phasesTemporal overlap and location spanningTemporal overlap and location spanning

Development Env

Configuration

Delivery InitializationIntegration Env(s)

Operation

Reconfig

User Env

t

Developer Environment Integrator Environment(s)User (deployment) Environment

Page 26: MILS Research Montage - SRI International

26R. DeLong

φ1

OperationalInterval 1

φ2

OperationalInterval 2

Φ - system configuration propertyφi - interval configuration propertyτR - reconfiguration transition

Trace ofSystemStates

τR

Φ

s01 s0

2

Interval ConfigurationProperties

System Configuration PropertyGeneralized ReconfigurationGeneralized Reconfiguration