Top Banner
Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM [email protected] 17 October 2005
14

Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM [email protected] 17 October 2005.

Jan 18, 2016

Download

Documents

Eustacia Oliver
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Simplicity, Reconciliation, and Security

Bob Blakley

Chief Scientist, Security and Privacy, IBM

[email protected]

17 October 2005

Page 2: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

How do you secure a box of money with a hole in it?

Page 3: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Start with the box empty.

Page 4: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Count what you put into the box.

Page 5: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Know how much should go in or out before you open the box.

Page 6: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Record everything that goes in and everything that comes out each time you

open the box.

Page 7: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Continually update a total using the record of what went in and out.

Page 8: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Count at the end…

Page 9: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Check the end total against the end count.

Page 10: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Security Properties

• Transactionality– Sale price = cash input; refund cost = cash output– Tender - price = change

• Accountability– Receipts, Drawer tape; punishment for infractions

• Reconciliation– Drawer count vs. Drawer tape

• Supervision– Drawer count verification

• Visibility– Operations performed in public

Page 11: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Non-Properties

• Authentication– visibility, supervision used instead

• Data integrity– transactionality used instead

• Authorization– accountability used instead

• Confidentiality– not required

Page 12: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Why don’t we design secure information systems like this?

• We’re computer scientists and don’t like special-purpose systems?

• We like artifacts rather than processes?• We love cryptography?• We are unafraid of complexity?• We’ve overgeneralized the security problem?• There’s not enough at stake?• Some problems aren’t amenable to this approach?

Page 13: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Could our systems look more like this?

• Of course…• In fact, our customers use the artifacts we produce to

design systems which DO look like this– often working against the properties we’ve built into the

artifacts

Page 14: Simplicity, Reconciliation, and Security Bob Blakley Chief Scientist, Security and Privacy, IBM blakley@us.ibm.com 17 October 2005.

Example: accountable, reconcilable transaction

signedoffer

viewer

viewer

ledger

signedacceptance

correlator

verif.key

verif.key