Understanding Network Security Architecture and Protocols
Vocabulary
Network Architecture
Security Perimeter: First line of protection, includes firewalls, proxies, and Intrusion Detection Systems (IDS).
Network Partitioning: Segmenting networks into isolated domains of trust.
Dual-Homed Hosts: Having two network interface cards (NICs), each on a separate network.
Bastion Host: Gateway between trusted and untrusted networks that gives limited authorized access to untrusted hosts.
Demilitarized Zone (DMZ): Isolated subnet that allows an organization to give external hosts limited access to public resources without granting them access to the internal network.
Network Taps: A simple device that connects directly to the cabling infrastructure to split or copy packets for use in analysis, security, or general network management.
Scanners: Discovery, compliance, and vulnerability scanning.
Scanning Tools: Nessus – Vulnerability, NMap – Discovery, NetFlow – Proves and collects records and activities.
Network Protocols: Fast, not secure access is the driving force behind the design of most protocols; many do not provide authentication, and security is often provided by directory services and/or servers. Security is applied after the network is accessed.
Engineering Lifecycle: Key system engineering technical processes – Requirements Definition, Requirement Analysis, Architectural Design, Implementation, Integration, Verification, Validation, Transition.
Security Architecture: High-level and detailed processes, concepts, and standards used to design and monitor systems and networks.
A security practitioner identifies the key issues and concerns that the lifecycle must address. Once these issues are agreed upon, they can design the system.
Enterprise Security Architecture: The primary purpose is to establish a strategic design of security infrastructure across the entire organization, focusing on the design and implementation of common security services and the enforcement of security zones of control.
Security Zone of Control: An area or grouping within which a defined set of security policies and measures are applied to achieve a specific level of security. Zones are used to group together those entities with similar security requirements and levels of risk, ensuring each zone is adequately segregated from another zone.
Common Security Services
- Boundary Control Services: Concerned with how and whether the information is allowed to flow from one set of systems to another or from one state to another, including firewalls, border routers, and proxies.
- Access Control Services: Focus on identification, authentication, and authorization of subject entities, including IAM, user authentication, and SSO.
- Integrity Services: Focus on the maintenance of high-integrity systems and data through automated checking and detection, including anti-virus, whitelisting, and intrusion prevention systems.
Security Architecture Concepts
Reference Monitor: Orange Book concept that refers to an abstract machine that mediates all access to objects by subjects, an auditable access control mechanism that must always be invoked.
Trusted Computer Base: The collection of all hardware, software, and firmware within a system that contains all elements responsible for supporting security policy and isolation of objects, defined by the Orange Book.
Processor States: Processors have at least two states that can be used to distinguish between more and less privileged instructions:
- Supervisor State (Kernel Mode): Processor operating at the highest privilege level, allows the process running to access all resources and execute privileged and non-privileged instructions.
- Problem State (User Mode): Processor limits access to system data and hardware granted to the process.
Access to the supervisor state is limited only to core OS functions that are abstracted from end-user interaction.
Layering: Organization of programming into separate functional components, with each layer having an interface only to the layer above and below it. This is used to control interactions between different execution demands with privilege levels and can slow down an attack.
Process Isolation: Used to prevent individual processes from interacting with each other even when they are in the same ring, done through distinct memory address spaces for each process with encapsulation of processes and objects, similar to separation of duties.
Data Hiding: Maintains activities at different security levels to separate these levels from each other, assisting in preventing data at one security level from being seen by other processes at different levels, like seeing ****** when typing in a password.
Security Models
A security model formally defines a security policy, focusing on defining allowed interactions between subjects and objects at a moment in time, conceptual and theoretical, architecture primitives.
State Machine Models: Capture the current security posture of an Automated Information System (AIS). It stores the status of an entity at a point in time; events trigger changes in the state of an entity. The AIS secure state only changes when triggered by an event or time. When stated, it checks the secure state and ensures it will stay secure every time it is accessed and that the access was in accordance with policy.
(Multilevel) Lattice Models: A mechanism for enforcing one-way information flow to ensure confidentiality. Subjects are assigned clearances, objects or data are assigned classifications, and security labels are attached to each object. Systems check the clearance of users to determine access.
Non-Interference Models: The idea that actions at one level or domain should not influence another level or domain. Ensures high-level actions do not determine what low-level users can see, maintaining activity at different levels and ensuring complete separation between levels to minimize leaks.
(One-Level) Matrix-Based Models: Organizes subjects and objects into a two-dimensional access control matrix. The matrix represents what capabilities subjects need to access objects along with their appropriate access level (read, write, execute) and does not describe the relationship between subjects, such as if one subject gave another subject access rights.
Information Flow Models
Used to determine if information is being properly protected throughout a process, generally used to identify potentially covert channels and unintended information flow between compartments, e.g., an alert pop-up when a file is copied or sent by someone without rights.
Bell-LaPadula Model (Confidentiality Model): Provides security while maintaining data sensitivity. This state machine model ensures confidentiality of automated IS, using mandatory access control. Labels objects with classifications and subjects with clearances; the reference monitor compares the levels of classification with the level of clearance and only allows access if equal to or higher than the object. A need-to-know decision must be made as specified by the system owner.
Two types:
- Simple Security (Read Property): A subject of lower clearance cannot read an object of higher classification, but a subject can read down.
- The * Property (Write Property): A high-level subject cannot send messages to a lower-level object.
Biba Integrity Model: Ensures integrity and complements the Bell-LaPadula model, assigning integrity levels to subjects and objects based on the premise that higher levels of integrity are more trusted than lower ones. Access is controlled so objects or subjects cannot have lower integrity as a result of read-write operations.
- Simple Integrity Property (Read): A subject may have read access to an object only if the security level of the subject is lower or equal.
- Integrity * Property (Write): A subject may have write access to an object only if the security level is equal to or greater than the object.
No information can be passed by a subject to an object at a higher security level. No read down and no write up.
Clark-Wilson Integrity Model: Used for change controls in transaction systems like account balance, addresses three goals of integrity: no changes by unauthorized subjects, no unauthorized changes by authorized subjects, and maintenance of internal and external consistency. Establishes a system of subject-program-object bindings such that subjects do not have direct access but must go through a certified program like SAP ERP as a reference monitor.
Security Product Evaluation Methods and Criteria
Standardized methods for ensuring that security products satisfy functional and assurance requirements of organizations, e.g., TCSEC (Orange Book), Trusted Network Interpretation (TNI), Red Book, IT Security Evaluation Criteria (ITSEC), Common Criteria (ISO 15408).
Common Criteria (ISO 15408): Evaluation performed on information security products as well as systems, providing evaluation criteria that can be used to evaluate requirements of different products with different functions.
- Target of Evaluation (TOE): System we want to evaluate.
- Protection Profile (PP): Identifies a common set of functional and assurance requirements relevant to a specific user for a specific purpose.
- Security Target (ST): Specific functional and assurance requirements.
The evaluation process attempts to establish confidence levels for a product’s security capabilities.
Security Assurance Requirements (SARs): Examines measures taken during design, development, and testing phases of a product to ensure it has the claimed security capabilities.
Evaluation Assurance Level (EAL): A numerical rating for depth/rigor of evaluation (7 Levels):
- EAL1: Functionally Tested
- EAL2: Structurally Tested
- EAL3: Methodically Tested and Checked
- EAL4: Methodically Designed, Tested, and Reviewed
- EAL5: Semi-Formally Designed and Tested
- EAL6: Semi-Formally Verified Design and Tested
- EAL7: Formally Verified Design and Tested
Physical Security
The goal is to deter and, if you cannot do that, then delay, detect, assess, and respond.
Threats include natural/environmental threats like floods and tornadoes, utility systems threats like electrical and communications, malicious threats/human-made threats/political threats like vandalism, arson, theft, riots, and accidental threats done by insiders inadvertently.
Sites include location (rural vs urban) and full or partial ownership of a building, construction, and planning using Crime Prevention through Environmental Design (CPTED), which is used by architects, city planners, and security professionals as a crime reduction technique, e.g., using a single clearly identifiable point of entry, having large thorn bushes along the fence to discourage intrusion.
Procedural controls include guard posts, escorting visitors, managing deliveries, security zones, and restricted work areas.
Infrastructure support includes fire prevention and detection systems and boundary protection like fences and vehicle gateways, needing keys, doors, access control, CCTV, physical intrusion detection systems, and portable device security.
OSI Communication Model
- Physical Layer
- Analogue and Digital Communications
- Network topologies like bus, tree, star, and mesh
- Cabling and wireless transmission
- Data Link Layer
- Ethernet hubs, repeaters, bridges, and switches
- VLAN and Wireless LAN
- Network Layer (IP)
- IP is unreliable and does not guarantee packets arrive error-free or in the correct layer; reliability is left to higher layers.
- IPv4 had problems because we ran out of addresses, routing tables have grown too large, no direct security support, and traffic priority is poor.
- IPv6 was created to solve that with more address space based on prefixes rather than address classes, support for encapsulation with built-in authentication.
- IPSec is the suite of protocols for IP, which is mandatory in IPv6.
- Firewalls: Software or hardware that filters incoming traffic and blocks it or allows it to pass through based on rules done based on address and port.
- Proxy Server: Mediates communications between untrusted endpoints and trusted endpoints.
- Secure Shell (SSH): Allows users to log in to a remote computer over an encrypted tunnel, preventing session hijacking.
- VPN: Encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network. It’s like you are on the network when connected.
- Tunneling: VPN is used to point-to-point tunneling protocol running over other protocols to create the tunnel; L2TP is layer two for dial-up connections, and RADIUS is the protocol for SSO.
- SSL/TLS: Traditional VPNs don’t work with proxy servers, so they use SSL at the presentation layer to create the tunnel. It does not require VPN software and is in the browser.
- Transport Layer
- Links the session layer to the network layer.
- Performs packetization and reassembly.
- Establishes connections with TCP, UDP, etc.
- Port numbers used.
- TCP Attacks include:
- Man-In-the-Middle attacks where an attacker sniffs or intercepts and replaces them with their own.
- DOS and DDOS.
- Session Hijacking: Unauthorized insertion of packets into the data stream.
- IP Spoofing: Inserting packets with fake sender and guessed sequence number.
- Port Scanning:
- FIN and SYN scanning.
- Session Layer
- Responsible for creating, managing, and tearing down sessions between peer hosts.
- Models include Simplex, Half Duplex, and Full Duplex.
- Directory Services such as DNS provide the location of websites and are popular targets of attack.
- By manipulating DNS, you can divert, intercept, or prevent end-user communication.
- DNS has weak authentication and does not enforce data consistency.
- DNS is recursive, so if a client doesn’t know a host, it goes up one level at a time until it finds it.
- Dynamic DNS is the protocol that defines extensions to the DNS and enables them to accept update requests dynamically.
- Other protocols include DHCP, FTP, HTTP, and SMTP.
- DNS Attacks Include:
- Spoofing is where an attacker attempts to poison a DNS server cache.
- Responsible for creating, managing, and tearing down sessions between peer hosts.
- Presentation Layer
- Character code translation, compression, encryption, and decryption.
- Transport Layer Security (TLS) is based on SSL and provides secure authentication for a host on the internet.
- Implemented between transport layer and the application layer in the TCP/IP model.
- Application Layer
- The application’s portal to network-based services.
- When an application transmits or receives data over a network, it uses the services from this layer.
Security Architecture Design Components
- Processors, Memory and Storage, Input/Output Devices, OS, Software, Middleware, Embedded Systems, Client Platforms, Server Platforms, Database, Distributed Systems, Industrial Control Systems, Cryptography, Cloud Computing.
Security Capabilities of Information Systems
- Access control mechanisms, secure memory management, cryptographic protections, intrusion prevention systems, audit and monitoring controls.
Security Frameworks
- Sherwood Applies Business Security Architecture (SABSA)
- Security Architecture Framework that considers perspectives from different stakeholders and different levels of abstraction.
- The Orange Book
- Department of Defense Trusted Computer System Evaluation Criteria, December 1985.
- ISO IEC 17799:2005
- Details individual controls for implementation.
- ISO/IEC 27002:2013
- Information technology — Security techniques — Code of practice for information security controls.
- ISO/IEC 27003:2010
- Information technology — Security techniques — Information security management system implementation guidance.
- ISO/IEC 27005:2011
- Information technology — Security techniques — Information security risk management.
- NIST SP 800-14
- Generally Accepted Principles and Practices for Securing Information Technology Systems.
Attackers Methodology
To infiltrate the system, they use the attack tree model, and the goal is:
- Target Acquisition
- Target Analysis
- Target Access
- Target Appropriation
- Sustain Control
Tactical Spectrum
Offensive, Proactive Defense: Intelligence and metrics employed to intercede or avoid attacks; Active Defense: Responding to attack with offense; Static Defense: Preparation to be attacked; Reactive Defense: Devised in response to attack; Inactive Defense: Operations continue.