home *** CD-ROM | disk | FTP | other *** search
Text File | 1997-01-24 | 800.3 KB | 17,873 lines |
-
- NCSC-TG-005
- Library No. S228,526
- Version 1
-
-
-
-
- FOREWORD
-
-
-
- This publication is issued by the National Computer
- Security Center (NCSC) as part of its program to promulgate
- technical computer security guidelines. The interpretations
- extend the evaluation classes of the Trusted Systems Evalua-
- tion Criteria (DOD 5200.28-STD) to trusted network systems
- and components.
-
- This document will be used for a period of at least one
- year after date of signature. During this period the NCSC
- will gain experience using the Trusted Network Interpreta-
- tion in several network evaluations. In addition, the NCSC
- will conduct a series of tutorials and workshops to educate
- the community on the details of the Trusted Network
- Interpretation and receive feedback. After this trial
- period, necessary changes to the document will be made and a
- revised version issued.
-
- Workshops and tutorials will be open to any member of
- the network security community interested in providing feed-
- back. Anyone wishing more information, or wishing to pro-
- vide comments on the usefulness or correctness of the
- Trusted Network Interpretation may contact: Chief, Techni-
- cal Guidelines Division, National Computer Security Center,
- Ft. George G. Meade, MD 20755-6000, ATTN: C11. The tele-
- phone number is (301) 859-4452.
-
-
-
-
- ______________________________________________
- PATRICK R. GALLAGHER, JR. 31 July 1987
- Director
- National Computer Security Center
-
-
-
-
-
-
-
-
- ACKNOWLEDGMENT
- ______________
-
-
-
-
-
- Acknowledgment is extended to the members of the Work-
- ing Group who produced this Interpretation. Members were:
- Alfred Arsenault, National Computer Security Center (Chair);
- Dr. Roger Schell, Gemini Computers; Stephen Walker, Trusted
- Information Systems; Dr. Marshall Abrams, MITRE; Dr.
- Jonathan Millen, MITRE; Leonard LaPadula, MITRE; Robert
- Morris, NCSC; and Jack Moskowitz, NCSC. Also due ack-
- nowledgement for their many inputs to this interpretation
- are Steve Padilla and William Shockley, Gemini Computers.
-
-
-
-
- Introduction
- ____________
-
-
-
-
-
-
- I.1. Scope
- _ _ _____
-
- Part I of this document provides interpretations of the
- Department of Defense Trusted Computer System Evaluation
- Criteria (TCSEC) (DOD-5200.28-STD), for trusted
- computer/communications network systems. The specific secu-
- rity feature, the assurance requirements, and the rating
- structure of the TCSEC are extended to networks of computers
- ranging from isolated local area networks to wide-area
- internetwork systems.
-
- Part II of this document describes a number of addi-
- tional security services (e.g., communications integrity,
- denial of service, transmission security) that arise in con-
- junction with networks. Those services available in
- specific network offerings, while inappropriate for the
- rigorous evaluation applied to TCSEC related feature and
- assurance requirements, may receive qualitative ratings.
-
- The TCSEC related feature and assurance requirements,
- and the additional security services described herein are
- intended for the evaluation of trusted network systems
- designed to protect a range of sensitive information. As
- such, they require that physical, administrative, pro-
- cedural, and related protection measures adequate to the
- sensitivity of the information being handled are already in
- place. It is possible, and indeed common practice, to
- operate a network in a secure manner at a single system high
- sensitivity level without meeting any trust related feature
- or assurance requirements described herein. The full range
- of physical and administrative security measures appropriate
- to the highest sensitivity level of information on the net-
- work must be in place in order to operate a trusted network
- as described in this Interpretation.
-
- It is important to note that this Interpretation does
- not describe all the security requirements that may be
- imposed on a network. Depending upon the particular
- environment, there may be communications security (COMSEC),
- emanations security, physical security, and other measures
- required.
-
- An environmental evaluation process, such as that
- described in the ``Computer Security Requirements--Guidance
- for Applying the DoD TCSEC in Specific Environments'' (CSC-
- STD-003-85), can be used to determine the level of trust
- required by specific system environments. Similar analyses
- are applicable to networks evaluated under these Interpreta-
- tions.
-
- I.2. Purpose
- _ _ _______
-
- As with the TCSEC itself, this Interpretation has been
- prepared for the following purposes:
-
-
- 1. To provide a standard to manufacturers as to what
- security features and assurance levels to build into
- their new and planned, commercial network products
- in order to provide widely available systems that
- satisfy trust requirements for sensitive applica-
- tions
-
- 2. To provide a metric by which to evaluate the degree
- of trust that can be placed in a given network sys-
- tem for processing sensitive information
-
- 3. To provide a basis for specifying security require-
- ments in acquisition specifications.
-
-
- With respect to the second purpose for development of
- the criteria, i.e., providing a security evaluation metric,
- evaluations can be delineated into two types: an evaluation
- can be performed on a network product from a perspective
- that excludes the application environment, or an evaluation
- can be done to assess whether appropriate security measures
- have been taken to permit the system to be used operation-
- ally in a specific environment. The former type of evalua-
- tion is done by the National Computer Security Center
- through the Commercial Product Evaluation Process.
-
- The latter type of evaluation, those done for the pur-
- pose of assessing a system's security attributes with
- respect to a specific operational mission, is known as a
- certification evaluation. It must be understood that the
- completion of a formal product evaluation does not consti-
- tute certification or accreditation for the system to be
- used in any specific application environment. On the con-
- trary, the evaluation report only provides a trusted network
- system's evaluation rating along with supporting data
- describing the product system's strengths and weaknesses
- from a computer security point of view. The system security
- certification and the formal approval/accreditation pro-
- cedure, done in accordance with the applicable policies of
- the issuing agencies, must still be followed before a net-
- work can be approved for use in processing or handling clas-
- sified information. Designated Approving Authorities (DAAs)
- remain ultimately responsible for specifying the security of
- systems they accredit.
-
- This Interpretation can be used directly and indirectly
- in the certification process. Along with applicable policy,
- it can be used directly as technical guidance for evaluation
- of the total system and for specifying system security and
- certification requirements for new acquisitions. Where a
- system being evaluated for certification employs a product
- that has undergone a Commercial Product Evaluation, reports
- from that process will be used as input to the certification
- evaluation. Technical data will be furnished to designers,
- evaluators, and the DAAs to support their needs for making
- decisions.
-
- The fundamental computer security requirements as
- defined in the TCSEC apply to this Interpretation.
-
- I.3. Background
- _ _ __________
-
- The term ``sponsor'' is used throughout this document
- to represent the individual or entity responsible for
- presenting a component or network system for evaluation. The
- sponsor may be a manufacturer, vendor, architect, developer,
- program manager, or related entity.
-
- A network system is the entire collection of hardware,
- firmware, and software necessary to provide a desired func-
- tionality.
-
- A component is any part of a system that, taken by
- itself, provides all or a portion of the total functionality
- required of a system. A component is recursively defined to
- be an individual unit, not useful to further subdivide, or a
- collection of components up to and including the entire sys-
- tem.
-
- Because the term integrity has been used in various
- contexts to denote specific aspects of an overall issue, it
- is important for the reader to understand the context in
- which the term is used in this document. Within Part I, as
- in the TCSEC itself, the use of this term is limited to (1)
- the correct operation of NTCB hardware/firmware and (2) pro-
- tection against unauthorized modification of labels and
- data. Specifically, all NTCBs that support sensitivity
- labels (viz., Divisions A and B) must, as detailed in the
- Label Integrity section of the TCSEC, protect the labels
- that represent the sensitivity of information (contained in
- objects) and the corresponding authorizations of users (with
- subjects as surrogates). In addition, for network systems
- with a defined data integrity policy, the NTCB must control
- the accesses of users that modify information-. As part of
- the NTCB itself, such integrity policies will be supported
- by access control mechanisms based on the identity of indi-
- viduals (for discretionary integrity) and/or sensitivity
- levels (for mandatory integrity). In contrast, within Part
- II the term integrity relates to the mechanisms for informa-
- tion transfer between distinct components. This communica-
- tions integrity includes the issues for correctness of mes-
- sage transmission, authentication of source/destination,
- data/control/protocol communication field correctness and
- related areas.
- _________________________
- - See, for example, K. J. Biba, Integrity Considera-
- _________ _________
- tions for Secure Computer Systems, MTR-3153, The MITRE
- _____ ___ ______ ________ _______
- Corporation, Bedford, MA, June 1975.
-
-
- In many network environments, encryption can play an
- essential role in protecting sensitive information. In Part
- I of this document, encryption is referenced as a basis for
- providing data and label integrity assurance. In Part II,
- encryption is described as a tool for protecting data from
- compromise or modification attacks. Encryption algorithms
- and their implementation are outside the scope of this docu-
- ment. This document was prepared from a DoD perspective and
- requires NSA approval relative to the use of encryption. In
- other contexts, alternate approval authority may exist.
-
- As with the TCSEC itself, this is a reference document
- and is not intended to be used as a tutorial. The reader is
- assumed to be familiar with the background literature on
- computer security and communications networks=. Part II
- assumes a familiarity with the terminology used within ISO
- Security Services documentation.
-
-
-
- _________________________
- = See, for example, M. D. Abrams and H. J. Podell,
- Tutorial: Computer and Network Security, IEEE Computer
- ________ ________ ___ _______ ________
- Society Press, 1987.
- * ISO 7498/Part 2 - Security Architecture, ISO / TC
- ___ ____ ____ _ ________ ____________
- 97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
- Project 97.21.18, September 1986.
-
-
-
- I.3.1. Trusted Computer System Evaluation Criteria
- _ _ _ _______ ________ ______ __________ ________
-
- The DoD TCSEC was published in December 1985 to provide
- a means of evaluating specific security features and
- assurance requirements available in ``trusted commercially
- available automatic data processing (ADP) systems,''
- referred to in this document as Automated Information System
- (AIS). The rating scale of the TCSEC extends from a rating
- which represents a minimally useful level of trust to one
- for ``state of the art'' features and assurance measures.
- These technical criteria guide system builders and evalua-
- tors in determining the level of trust required for specific
- systems. When combined with environmental guidelines,
- minimum security protection requirements, and appropriate
- accreditation decisions for specific installations can be
- determined. The philosophy of protection embodied in the
- TCSEC requires that the access of subjects (i.e., human
- users or processes acting on their behalf) to objects (i.e.,
- containers of sensitive information) be mediated in accor-
- dance with an explicit and well defined security policy.
-
- In order to ensure strict compatibility between TCSEC
- evaluated AIS and networks and their components, and to
- avoid the possible evolution of incompatible evaluation cri-
- teria, Part I of this document has been specifically
- prepared as an INTERPRETATION of the TCSEC for networks. It
- is based entirely on the principles of the TCSEC, uses all
- TCSEC basic definitions, and introduces new concepts only
- where essential to understanding the TCSEC in a network con-
- text. Unless otherwise stated, the TCSEC requirements apply
- as written. The approach of interpreting the TCSEC for net-
- works in general has already been successfully employed in a
- number of specific complex network and AIS applications.
-
- There are several security policy models that may be
- used with the reference monitor concept. The Bell-LaPadula
- model is commonly used but is not mandated. Similarly for
- integrity policy, models such as Biba have been proposed but
- are not mandated. For this network interpretation, no
- specific access control policy is required; however, it is
- necessary that either a secrecy policy, an integrity policy,
- or both be specified for enforcement by the reference moni-
- tor.
-
- In the context of network systems, there are a number
- of additional security services that do not normally arise
- in individual AIS, and are not appropriate to the detailed
- feature and assurance evaluation prescribed by the TCSEC.
- These security services, which may or may not be available
- in specific network offerings, include provisions for com-
- munications security, denial of service, transmission secu-
- rity, and supportive primitives, such as encryption mechan-
- isms and protocols. Part II of this document describes
- these services and provides a qualitative means of evaluat-
- ing their effectiveness when provided.
-
- Evaluation of Part II offered services is dependent
- upon the results of the system's Part I evaluation or
- component's Appendix A evaluation. A Part II evaluation
- rating of good in a component or system which has a low Part
- I trust rating is of limited value. The sponsor must iden-
- tify which security services are offered by a system or com-
- ponent for evaluation against Part II. The evaluators will
- normally give a none, minimum, fair or good rating for those
- services offered. In some cases, a rating of present is all
- that can be given or a quantitative measure of strength may
- be used as the basis for rating. A not applicable rating
- will be given for services not offered by the product. Part
- II services may be provided by mechanisms outside the NTCB.
-
-
- I.3.2. Two Network Views
- _ _ _ ___ _______ _____
-
- DoD Directive 5200.28 (and similar policies elsewhere
- in government) establishes the concept of a DAA, an indivi-
- dual who is responsible for approving the use of an AIS for
- processing classified information. For stand-alone AIS,
- this approval process and the technical advisory role to the
- DAA provided by the TCSEC are well understood. The same
- approval process applies to networks of AIS and plays a key
- role in determining how and when networks can be evaluated
- using this Interpretation.
-
- Depending upon the operational and technical charac-
- teristics of the environment in which a network exists,
- either of two views for accreditation and evaluation pur-
- poses applies: as a collection of two or more intercon-
- nected separately accredited AIS or as a single unified sys-
- tem the security accreditation of which is the responsibil-
- ity of a single authority.
-
- The security feature and assurance requirements of a
- specified network, and hence its suitability for evaluation
- under this Interpretation, is greatly impacted by which view
- of the network is appropriate.
-
- I.3.2.1. Interconnected Accredited AIS View
- _ _ _ _ ______________ __________ ___ ____
-
- The interconnected accredited AIS view is an opera-
- tional perspective that recognizes that parts of the network
- may be independently created, managed, and accredited.
- Where different accrediting jurisdictions are involved, the
- joint approval process is required, describing the handling
- practices and classification levels that will be exchanged
- between the components involved.
-
- Interconnected accredited AIS consist of multiple sys-
- tems (some of which may be trusted) that have been indepen-
- dently assigned operational sensitivity ranges (the highest
- and lowest sensitivity levels of information that may be
- simultaneously processed on that system). In this view, the
- individual AIS may be thought of as ``devices'' with which
- neighboring systems can send and receive information. Each
- AIS is accredited to handle sensitive information at a sin-
- gle level or over a range between a minimum and maximum
- level.
-
- The range of sensitive information that may be
- exchanged between two such AIS is a range, agreed upon by
- each system's approving authorities, which cannot exceed the
- maximum sensitivity levels in common between the two sys-
- tems.
-
- Because of the complex structure of a network consist-
- ing of interconnected accredited AIS, it may not be practi-
- cal to evaluate such a network using this Interpretation or
- to assign it a trusted system rating. In this case, the
- accreditor is forced to accept the risk of assessing the
- security of the network without the benefit of an evaluation
- against the principles of the TCSEC as interpreted in Part I
- of the document. Appendix C describes the rules for con-
- necting separately accredited AIS and the circumstances in
- which these rules apply.
-
- I.3.2.2. Single Trusted System View
- _ _ _ _ ______ _______ ______ ____
-
- The policy enforcement by trusted components in a
- ``single trusted system'' exhibits a common level of trust
- throughout. A single trusted system is accredited as a sin-
- gle entity by a single accrediting authority. (In certain
- circumstances where a system will process information from
- multiple sensitive sources, more then one accrediting
- authority may be involved, but their responsibility will be
- for accrediting the whole system as a single entity for use
- processing the information for which they have authority.)
- Networks such as these can be evaluated against this
- Interpretation and given a rating compatible with trusted
- AIS evaluated by the TCSEC itself.
-
- A ``single trusted system'' network implements a refer-
- ence monitor to enforce the access of subjects to objects in
- accordance with an explicit and well defined network secu-
- rity policy. The network has a single trusted computing
- base, referred to as the Network Trusted Computing Base
- (NTCB), which is partitioned (see section I.4.2) among the
- network components in a manner that ensures the overall net-
- work security policy is enforced by the network as a whole.
-
- Every component that is trusted must enforce a
- component-level security policy that may contain elements of
- the overall network security policy. The sum of all
- component-level security policies must be shown to enforce
- the overall network security policy.
-
- There is no requirement that every component in the
- network have an NTCB partition nor that any such partition
- comprise a complete TCB (e.g., a network component could be
- dedicated to supporting the audit function and implement
- only that portion of the NTCB). Interaction among NTCB par-
- titions shall be via communications channels, operating at
- either single or multiple levels as appropriate. The net-
- work security architect must identify how the NTCB is parti-
- tioned and how all the trusted system requirements are
- satisfied.
-
- A given component that does not enforce the full imple-
- mentation of all polices (i.e., mandatory access control,
- discretionary access control, identification/ authentication
- and audit) must be evaluated as a component as specified in
- Appendix A. For example, a network architecture that does
- not operate above Level 3 of the ISO protocol model and typ-
- ically does not enforce discretionary access control must be
- evaluated as a component under Appendix A and not as a full
- system.
-
- I.3.2.2.1. Connection-Oriented Abstraction
- _ _ _ _ _ __________ ________ ___________
-
- In many networking environments, the overall network
- security policy includes controlling the establishment of
- authorized connections across the network. The access con-
- trol mediation performed by the components of these networks
- enforces the establishment of connections between host com-
- puters on the network in accordance with some form of
- authorized connection list. While a connection-oriented
- policy may be suitable from an overall network perspective,
- specifying such a policy in terms of component level
- abstractions may be difficult but is required in order to
- evaluate the network.
-
- Individual trusted network components may employ a
- local mechanism to enforce mediation only between local sub-
- jects and objects, as described in the TCSEC. Some of these
- components may have no direct involvement with the enforce-
- ment of network connections. Others, however, will have an
- additional higher level network connection enforcement role.
- This higher level connection-oriented abstraction may be
- enforced solely within an individual component or may be
- distributed across many components (e.g., in the end-to-end
- encryption case, cryptographic front end devices enforce the
- network connection authorization decisions made by an access
- control/key management center.)
-
- With the connection-oriented abstraction, the role of
- the network as a whole in controlling information flow may
- be more easily understood, but there may be no simple way to
- extend this abstraction to the reference monitor require-
- ments of individual components in the network. The overall
- network security policy must be decomposed into policy ele-
- ments that are allocated to appropriate components and used
- as the basis for security policy models for these com-
- ponents.
-
- The reference monitor subject/object definitions as
- given in the TCSEC represent the fundamental security policy
- enforcement at the individual component level but may not
- directly describe the overall network security policy issues
- such as the network's connection policy. The connection-
- oriented abstraction may be essential to understanding the
- overall network security policy. The network architecture
- must demonstrate the linkage between the connection-oriented
- abstraction and its realization in the individual components
- of the network.
-
- I.3.2.2.2. Subjects and Objects
- _ _ _ _ _ ________ ___ _______
-
- For purposes of this trusted network interpretation,
- the terms ``subject'' and ``object'' are defined as in the
- TCSEC.
-
- The subjects of a trusted network commonly fall into
- two classes: those that serve as direct surrogates for a
- user (where ``user'' is synonymous with ``human being''),
- and ``internal'' subjects that provide services for other
- subjects--typically representing software process rather
- than being made part of each user surrogate subject.
-
- There is a set of TCSEC requirements that are directed
- at users, rather than subjects. In the network context,
- services used to facilitate communications between users and
- AIS (e.g., protocol handlers) are usually provided by inter-
- nal subjects. Some components that provide only communica-
- tions facilitating services have only internal subjects.
-
- Examples of ``single trusted system'' networks or com-
- ponents could include- packet-switched communications sub-
- networks (as found in the Defense Data Network (DDN), end-
- to-end (or host-to-host) encryption systems (such as used in
- Blacker or ANSI X9.17 implementations), application level
- networks or closed user community systems (such as the Inter
- Service/Agency Automated Message Processing Exchange [I S/A
- AMPE] and SACDIN Programs), local area networks, digital
- PABX systems, private switched networks (such as circuit-
- switched telecommunications systems), future Integrated Ser-
- vices Digital Network (ISDN) implementations, and a Virtual
- Machine Monitor (VMM) on a single computer when analyzed as
- a network.
-
- I.4. Evaluation of Networks
- _ _ __________ __ ________
-
- The TCSEC provides a means for evaluating the
- trustworthiness of a system and assigning an evaluation
- class based on its technical properties - independent of the
- particular use for or the sensitivity of information being
- processed on the system. In this Interpretation, a network
- as a whole with its various interconnected components is
- recognized as a special instance of a trusted system. The
- designer of a trusted system is unconstrained by the TCSEC
- on design and implementation choices as long as for the
- _________________________
- - Examples are employed throughout this document to
- clarify the concepts presented. The naming of an exam-
- ple implies no judgement of the product or system named
- nor on its suitability for any particular purpose.
-
-
-
- system as a whole there is a clearly distinguished TCB with
- a definitive protection domain boundary. The features and
- assurance measures provided within the TCB perimeter will
- determine the evaluation class. The network must be viewed
- as PARTITIONED into a set of interconnected components,
- where each component may have an independent ``NTCB parti-
- tion.'' All interaction between such trusted components
- must be via ``communication channels or I/O devices'' as
- defined by the TCSEC. For Division A and B networks these
- will generally be ``multilevel devices.''
-
- I.4.1. Network Security Architecture and Design
- _ _ _ _______ ________ ____________ ___ ______
-
- Any network evaluated under this Interpretation must
- possess a coherent Network Security Architecture and Design.
- (Interconnection of components that do not adhere to such a
- Network Security Architecture is addressed in the Intercon-
- nection Rules, Appendix C.) The Network Security Architec-
- ture must address the security-relevant policies, objec-
- tives, and protocols. The Network Security Design specifies
- the interfaces and services that must be incorporated into
- the network so that it can be evaluated as a trusted entity.
- There may be multiple designs that conform to the same
- architecture but which are more or less incompatible and
- non-interoperable (except through the Interconnection
- Rules). Security related mechanisms that require coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms which have no visi-
- ble interfaces are not specified in this document but are
- left as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network Security Architecture and
- Design are satisfied. That is, the components are assembl-
- able into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization which is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and unambi-
- guously define the security functionality of components as
- well as the interfaces between or among components. The
- Network Security Architecture and Design must be evaluated
- to determine that a network constructed to its specifica-
- tions will in fact be trusted, that is, it will be
- evaluatable under these Interpretations.
-
- I.4.2. The Partitioned NTCB
- _ _ _ ___ ___________ ____
-
- Like a stand-alone system, the network as a whole
- possesses a single TCB, referred to as the NTCB, consisting
- of the totality of security-relevant portions of the net-
- work. But, unlike a stand-alone system, the design and
- evaluation of the network rests on an understanding of how
- the security mechanisms are distributed and allocated to
- various components, in such a way that the security policy
- is supported reliably in spite of (1) the vulnerability of
- the communication paths and (2) the concurrent, asynchronous
- operation of the network components.
-
- Some distributed systems have reliable, protected com-
- munication paths and thus satisfy only the first charac-
- teristic of a network: the division into concurrently
- operating, communicating processing components. Although
- certain interpretations in this Interpretation will not
- apply to them, it may be beneficial to employ this Interpre-
- tation to evaluate them, and to take advantage of the
- interpretations relating to component properties and inter-
- faces.
-
- An NTCB that is distributed over a number of network
- components is referred to as partitioned, and that part of
- the NTCB residing in a given component is referred to as an
- NTCB partition. A network host may possess a TCB that has
- previously been evaluated as a stand-alone system. Such a
- TCB does not necessarily coincide with the NTCB partition in
- the host, in the sense of having the same security perime-
- ter. Whether it does or not depends on whether the security
- policy for which the host TCB was evaluated coincides with
- the network security policy, to the extent that it is allo-
- cated to that host.
-
- Even when a network host has a TCB that has been previ-
- ously evaluated at a given class, and the host's TCB coin-
- cides with the host's NTCB partition, there is still no a
- priori relationship between the evaluation class of the host
- and the evaluation class of the network. Some examples will
- be given below to illustrate this point.
-
- To evaluate a network at a given class, each require-
- ment in Part I for that class must be satisfied by the net-
- work as a whole. It is also necessary to understand how
- each requirement is allocated among the network's com-
- ponents. Some components, such as the hosts, may satisfy
- the entire security policy in isolation; others, such as
- packet switches and access control centers, may have more
- specialized functions that satisfy only a subset of the net-
- work security policy. In addition, distinct subsets of the
- network security policy may be allocated to different net-
- work components.
-
- Forcing every component to satisfy a specific Part I
- requirement is neither necessary nor sufficient to ensure
- that the network as a whole meets that requirement.
-
- To show that it is not sufficient, consider two trusted
- multilevel AIS that export and import labeled information to
- and from each other over a direct connection. Both satisfy
- the Label Integrity requirement that a sensitivity label be
- accurately and unambiguously associated with exported data.
- If they were to have different, incompatible label encodings
- for the same sensitive information, the network as a whole
- would fail to satisfy the label integrity requirement. As a
- result, these Interpretations require at the B1 level and
- above that there be uniform labeling of sensitive informa-
- tion throughout the network.
-
- To show that it is not necessary, consider the Manda-
- tory Access Control requirement that at least two sensi-
- tivity levels be supported. Suppose that the network con-
- sists of a number of untrusted hosts that are incapable of
- maintaining labels and are operating at different levels in
- a single-level mode. If they are interconnected through
- suitable multilevel interface units, the network as a whole
- can support the ``two or more levels'' requirement.
-
- The allocation of a requirement to a component does not
- simply mean that the component satisfies the requirement in
- isolation, but includes the possibility that it depends on
- other components to satisfy the requirement locally, or
- cooperates with other components to ensure that the require-
- ment is satisfied elsewhere in the network.
-
- Taken together, these examples illustrate the essential
- role of an overall network security architecture in design-
- ing and evaluating a trusted network.
-
- I.4.3. Component Evaluation
- _ _ _ _________ __________
-
- Because network components are often supplied by dif-
- ferent vendors and are designed to support standardized or
- common functions in a variety of networks, significant
- advantages can accrue from a procedure for evaluating indi-
- vidual components. The purpose of component evaluation is
- to aid both the network designer and the evaluator by per-
- forming the evaluation process once and reusing the results
- whenever that component is incorporated into a network.
-
- There are four types of security policies that may be
- supported by a network component:
-
- 1. Mandatory Access Control
-
- 2. Discretionary Access Control
-
- 3. Supportive policies (e.g., Authentication, Audit)
-
- 4. Application policies (e.g., the policy supported
- by a DBMS that is distinct from that supported by
- the underlying system)
-
- Application level policies are user dependent and will not
- be considered further in these Interpretations.
-
- For a component to support a policy such as Mandatory
- Access Controls, it must support all the required features
- for that policy with all of the required assurances of the
- given class.
-
- I.5. Structure of the Document
- _ _ _________ __ ___ ________
-
- The remainder of this document is divided into two
- parts, three appendices, a list of acronyms, a glossary, and
- a list of references. Part I presents TCSEC statements and
- detailed interpretations, which together constitute the
- requirements against which networks will be evaluated; and
- rationale for the network interpretation of the TCSEC. The
- TCSEC statement applies as modified by the Interpretation.
- Part II is a description of other Security Services not
- covered in the TCSEC interpretation which may be applicable
- to networks. Appendix A describes the evaluation of network
- components. Appendix B describes the rationale for network
- partitioning into individual components. Appendix C
- describes the interconnect rules for linking interconnected
- accredited AIS.
-
-
- Part I: Interpretations of the
- ____ _ _______________ __ ___
-
- Trusted Computer System Evaluation Criteria
- _______ ________ ______ __________ ________
-
-
- Highlighting (ALL CAPS) is used in Part I to indicate criteria
- not contained in a lower class or changes and additions to
- already defined criteria. Where there is no highlighting,
- requirements have been carried over from lower classes without
- addition or modification.
-
-
- 1.0 DIVISION D: MINIMAL PROTECTION
- _ _ ________ _ _______ __________
-
-
- This division contains only one class. It is reserved for
- those systems that have been evaluated but that fail to meet
- the requirements for a higher evaluation class.
-
-
-
-
- 2.0 DIVISION C: DISCRETIONARY PROTECTION
- _ _ ________ _ _____________ __________
-
-
- Classes in this division provide for discretionary (need-
- to-know) protection and, through the inclusion of audit
- capabilities, for accountability of subjects and the actions
- they initiate.
-
-
-
- 2.1 CLASS (C1): DISCRETIONARY SECURITY PROTECTION
- _ _ _____ __ _____________ ________ __________
-
-
- THE NETWORK TRUSTED COMPUTING BASE (NTCB) OF A
- CLASS (C1) NETWORK SYSTEM NOMINALLY SATISFIES THE
- DISCRETIONARY SECURITY REQUIREMENTS BY PROVIDING
- SEPARATION OF USERS AND DATA. IT INCORPORATES
- SOME FORM OF CREDIBLE CONTROLS CAPABLE OF ENFORC-
- ING ACCESS LIMITATIONS ON AN INDIVIDUAL BASIS,
- I.E., OSTENSIBLY SUITABLE FOR ALLOWING USERS TO BE
- ABLE TO PROTECT PRIVATE OR PROJECT INFORMATION AND
- TO KEEP OTHER USERS FROM ACCIDENTALLY READING OR
- DESTROYING THEIR DATA. THE CLASS (C1) ENVIRONMENT
- IS EXPECTED TO BE ONE OF COOPERATING USERS PRO-
- CESSING DATA AT THE SAME LEVEL(S) OF SENSITIVITY.
- THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEMS
- ASSIGNED A CLASS (C1) RATING.
-
-
- 2.1.1 Security Policy
-
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- THE NETWORK SPONSOR SHALL DESCRIBE THE OVERALL NETWORK
- SECURITY POLICY ENFORCED BY THE NTCB. AT A MINIMUM, THIS
- POLICY SHALL INCLUDE THE DISCRETIONARY REQUIREMENTS APPLICA-
- BLE TO THIS CLASS. THE POLICY MAY REQUIRE DATA SECRECY, OR
- DATA INTEGRITY, OR BOTH. THE POLICY SHALL INCLUDE A DISCRE-
- TIONARY POLICY FOR PROTECTING THE INFORMATION BEING PRO-
- CESSED BASED ON THE AUTHORIZATIONS OF USERS OR GROUPS OF
- USERS. THIS ACCESS CONTROL POLICY STATEMENT SHALL DESCRIBE
- THE REQUIREMENTS ON THE NETWORK TO PREVENT OR DETECT "READ-
- ING OR DESTROYING" SENSITIVE INFORMATION BY UNAUTHORIZED
- USERS OR ERRORS. UNAUTHORIZED USERS INCLUDE BOTH THOSE THAT
- ARE NOT AUTHORIZED TO USE THE NETWORK AT ALL (E.G., A USER
- ATTEMPTING TO USE A PASSIVE OR ACTIVE WIRE TAP) OR A LEGITI-
- MATE USER OF THE NETWORK WHO IS NOT AUTHORIZED TO ACCESS A
- SPECIFIC PIECE OF INFORMATION BEING PROTECTED.
-
- NOTE THAT "USERS" DOES NOT INCLUDE "OPERATORS," "SYSTEM
- PROGRAMMERS," "TECHNICAL CONTROL OFFICERS," "SYSTEM SECURITY
- OFFICERS," AND OTHER SYSTEM SUPPORT PERSONNEL. THEY ARE
- DISTINCT FROM USERS AND ARE SUBJECT TO THE TRUSTED FACILITY
- MANUAL AND THE SYSTEM ARCHITECTURE REQUIREMENTS. SUCH INDI-
- VIDUALS MAY CHANGE THE SYSTEM PARAMETERS OF THE NETWORK SYS-
- TEM, FOR EXAMPLE, BY DEFINING MEMBERSHIP OF A GROUP. THESE
- INDIVIDUALS MAY ALSO HAVE THE SEPARATE ROLE OF USERS.
-
-
- SECRECY POLICY: THE NETWORK SPONSOR SHALL DEFINE THE
- FORM OF THE DISCRETIONARY SECRECY POLICY THAT IS
- ENFORCED IN THE NETWORK TO PREVENT UNAUTHORIZED
- USERS FROM READING THE SENSITIVE INFORMATION
- ENTRUSTED TO THE NETWORK.
-
-
- DATA INTEGRITY POLICY: THE NETWORK SPONSOR SHALL
- DEFINE THE DISCRETIONARY INTEGRITY POLICY TO PREVENT
- UNAUTHORIZED USERS FROM MODIFYING, VIZ., WRITING,
- SENSITIVE INFORMATION. THE DEFINITION OF DATA
- INTEGRITY PRESENTED BY THE NETWORK SPONSOR REFERS TO
- THE REQUIREMENT THAT THE INFORMATION HAS NOT BEEN
- SUBJECTED TO UNAUTHORIZED MODIFICATION IN THE NET-
- WORK.
-
-
- + Rationale
-
- THE WORD "SPONSOR" IS USED IN PLACE OF ALTERNATIVES
- (SUCH AS "VENDOR," "ARCHITECT," "MANUFACTURER," AND
- "DEVELOPER") BECAUSE THE ALTERNATIVES INDICATE PEOPLE WHO
- MAY NOT BE AVAILABLE, INVOLVED, OR RELEVANT AT THE TIME THAT
- A NETWORK SYSTEM IS PROPOSED FOR EVALUATION.
-
- A TRUSTED NETWORK IS ABLE TO CONTROL BOTH THE READING
- AND WRITING OF SHARED SENSITIVE INFORMATION. CONTROL OF
- WRITING IS USED TO PROTECT AGAINST DESTRUCTION OF INFORMA-
- TION. A NETWORK NORMALLY IS EXPECTED TO HAVE POLICY REQUIRE-
- MENTS TO PROTECT BOTH THE SECRECY AND INTEGRITY OF THE
- INFORMATION ENTRUSTED TO IT. IN A NETWORK THE INTEGRITY IS
- FREQUENTLY AS IMPORTANT OR MORE IMPORTANT THAN THE SECRECY
- REQUIREMENTS. THEREFORE THE SECRECY AND/OR INTEGRITY POLICY
- TO BE ENFORCED BY THE NETWORK MUST BE STATED FOR EACH NET-
- WORK REGARDLESS OF ITS EVALUATION CLASS. THE ASSURANCE THAT
- THE POLICY IS FAITHFULLY ENFORCED IS REFLECTED IN THE
- EVALUATION CLASS OF THE NETWORK.
-
-
- THIS CONTROL OVER MODIFICATION IS TYPICALLY USED TO
- PROTECT INFORMATION SO THAT IT MAY BE RELIED UPON AND TO
- CONTROL THE POTENTIAL HARM THAT WOULD RESULT IF THE INFORMA-
- TION WERE CORRUPTED. THE OVERALL NETWORK POLICY REQUIRE-
- MENTS FOR INTEGRITY INCLUDES THE PROTECTION FOR DATA BOTH
- WHILE BEING PROCESSED IN A COMPONENT AND WHILE BEING
- TRANSMITTED IN THE NETWORK. THE ACCESS CONTROL POLICY
- ENFORCED BY THE NTCB RELATES TO THE ACCESS OF SUBJECTS TO
- OBJECTS WITHIN EACH COMPONENT. COMMUNICATIONS INTEGRITY
- ADDRESSED WITHIN PART II RELATES TO INFORMATION WHILE BEING
- TRANSMITTED.
-
-
-
- 2.1.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL DEFINE AND CONTROL ACCESS BETWEEN NAMED USERS
- AND NAMED OBJECTS (E.G., FILES AND PROGRAMS) IN THE ADP SYS-
- TEM. THE ENFORCEMENT MECHANISM (E.G., SELF/GROUP/PUBLIC
- CONTROLS, ACCESS CONTROL LISTS) SHALL ALLOW USERS TO SPECIFY
- AND CONTROL SHARING OF THOSE OBJECTS BY NAMED INDIVIDUALS OR
- DEFINED GROUPS OF INDIVIDUALS, OR BOTH.
-
-
- + Interpretation
-
- THE DISCRETIONARY ACCESS CONTROL (DAC) MECHANISM(S) MAY
- BE DISTRIBUTED OVER THE PARTITIONED NTCB IN VARIOUS WAYS.
- SOME PART, ALL, OR NONE OF THE DAC MAY BE IMPLEMENTED IN A
- GIVEN COMPONENT OF THE NETWORK SYSTEM. IN PARTICULAR, COM-
- PONENTS THAT SUPPORT ONLY INTERNAL SUBJECTS (I.E., THAT HAVE
- NO SUBJECTS ACTING AS DIRECT SURROGATES FOR USERS), SUCH AS
- A PUBLIC NETWORK PACKET SWITCH, MIGHT NOT IMPLEMENT THE DAC
- MECHANISM(S) DIRECTLY (E.G., THEY ARE UNLIKELY TO CONTAIN
- ACCESS CONTROL LISTS).
-
- IDENTIFICATION OF USERS BY GROUPS MAY BE ACHIEVED IN
- VARIOUS WAYS IN THE NETWORKING ENVIRONMENT. FOR EXAMPLE,
- THE NETWORK IDENTIFIERS (E.G., INTERNET ADDRESSES) FOR VARI-
- OUS COMPONENTS (E.G., HOSTS, GATEWAYS) CAN BE USED AS IDEN-
- TIFIERS OF GROUPS OF INDIVIDUAL USERS (E.G., "ALL USERS AT
- HOST A," "ALL USERS OF NETWORK Q") WITHOUT EXPLICIT IDENTIF-
- ICATION OF INDIVIDUAL USERS, NOR EVEN AN EXPLICIT NUMBER OF
- USERS IMPLIED), IF THIS IS CONSISTENT WITH THE NETWORK SECU-
- RITY POLICY.
-
- FOR NETWORKS, INDIVIDUAL HOSTS WILL IMPOSE NEED-TO-KNOW
- CONTROLS OVER THEIR USERS - MUCH LIKE (IN FACT, PROBABLY THE
- SAME) CONTROLS USED WHEN THERE IS NO NETWORK CONNECTION.
-
- WHEN GROUP IDENTIFIERS ARE ACCEPTABLE FOR ACCESS CON-
- TROL, THE IDENTIFIER OF SOME OTHER HOST MAY BE EMPLOYED, TO
- ELIMINATE THE MAINTENANCE THAT WOULD BE REQUIRED IF INDIVI-
- DUAL IDENTIFICATION OF REMOTE USERS WAS EMPLOYED.
-
- THE DAC MECHANISM OF A NTCB PARTITION MAY BE IMPLE-
- MENTED AT THE INTERFACE OF THE REFERENCE MONITOR OR MAY BE
- DISTRIBUTED IN SUBJECTS THAT ARE PART OF THE NTCB IN THE
- SAME OR DIFFERENT COMPONENT. THE REFERENCE MONITOR MANAGES
- ALL THE PHYSICAL RESOURCES OF THE SYSTEM AND FROM THEM
- CREATES THE ABSTRACTION OF SUBJECTS AND OBJECTS THAT IT CON-
- TROLS. SOME OF THESE SUBJECTS AND OBJECTS MAY BE USED TO
- IMPLEMENT A PART OF THE NTCB.
-
- WHEN INTEGRITY IS INCLUDED AS PART OF THE NETWORK DIS-
- CRETIONARY SECURITY POLICY, THE ABOVE INTERPRETATIONS SHALL
- BE SPECIFICALLY APPLIED TO THE CONTROLS OVER MODIFICATION,
- VIZ, THE WRITE MODE OF ACCESS, WITHIN EACH COMPONENT BASED
- ON IDENTIFIED USERS OR GROUPS OF USERS.
-
-
- + Rationale
-
- IN THIS CLASS, THE SUPPORTING ELEMENTS OF THE OVERALL
- DAC MECHANISM ARE TREATED EXACTLY AS UNTRUSTED SUBJECTS ARE
- TREATED WITH RESPECT TO DAC IN AN ADP SYSTEM, WITH THE SAME
- RESULT AS NOTED IN THE INTERPRETATION. STRENGTHENING OF THE
- DAC MECHANISM IN THE NETWORK ENVIRONMENT IS PROVIDED IN
- CLASS (C2) (SEE THE DISCRETIONARY ACCESS CONTROL SECTION).
-
- A TYPICAL SITUATION FOR DAC IS THAT A SURROGATE PROCESS
- FOR A REMOTE USER WILL BE CREATED IN SOME HOST FOR ACCESS TO
- OBJECTS UNDER THE CONTROL OF THE NTCB PARTITION WITHIN THAT
- HOST. THE INTERPRETATION REQUIRES THAT A USER IDENTIFIER BE
- ASSIGNED AND MAINTAINED FOR EACH SUCH PROCESS BY THE NTCB,
- SO THAT ACCESS BY A SURROGATE PROCESS IS SUBJECT TO ESSEN-
- TIALLY THE SAME DISCRETIONARY CONTROLS AS ACCESS BY A PRO-
- CESS ACTING ON BEHALF OF A LOCAL USER WOULD BE. HOWEVER,
- WITHIN THIS INTERPRETATION A RANGE OF POSSIBLE INTERPRETA-
- TIONS OF THE ASSIGNED USER IDENTIFICATION IS PERMITTED.
-
- THE MOST OBVIOUS SITUATION WOULD EXIST IF A GLOBAL
- DATABASE OF NETWORK USERS WERE TO BE MADE PERMANENTLY AVAIL-
- ABLE ON DEMAND TO EVERY HOST, (I.E., A NAME SERVER EXISTED)
- SO THAT ALL USER IDENTIFICATIONS WERE GLOBALLY MEANINGFUL.
-
- IT IS ALSO ACCEPTABLE, HOWEVER, FOR SOME NTCB PARTI-
- TIONS TO MAINTAIN A DATABASE OF LOCALLY-REGISTERED USERS FOR
- ITS OWN USE. IN SUCH A CASE, ONE COULD CHOOSE TO INHIBIT
- THE CREATION OF SURROGATE PROCESSES FOR LOCALLY UNREGISTERED
- USERS, OR (IF PERMITTED BY THE LOCAL POLICY) ALTERNATIVELY,
- TO PERMIT THE CREATION OF SURROGATE PROCESSES WITH
- PRESELECTED USER AND GROUP IDENTIFIERS WHICH, IN EFFECT,
- IDENTIFY THE PROCESS AS EXECUTING ON BEHALF OF A MEMBER OF A
- GROUP OF USERS ON A PARTICULAR REMOTE HOST. THE INTENT OF
- THE WORDS CONCERNING AUDIT IN THE INTERPRETATION IS TO PRO-
- VIDE A MINIMALLY ACCEPTABLE DEGREE OF AUDITABILITY FOR CASES
- SUCH AS THE LAST DESCRIBED. WHAT IS REQUIRED IS THAT THERE
- BE A CAPABILITY, USING THE AUDIT FACILITIES PROVIDED BY THE
- NETWORK NTCB PARTITIONS INVOLVED, TO DETERMINE WHO WAS
- LOGGED IN AT THE ACTUAL HOST OF THE GROUP OF REMOTE USERS AT
- THE TIME THE SURROGATE PROCESSING OCCURED.
-
- ASSOCIATING THE PROPER USER ID WITH A SURROGATE PROCESS
- IS THE JOB OF IDENTIFICATION AND AUTHENTICATION. THIS MEANS
- THAT DAC IS APPLIED LOCALLY, WITH RESPECT TO THE USER ID OF
- THE SURROGATE PROCESS. THE TRANSMISSION OF THE DATA BACK
- ACROSS THE NETWORK TO THE USER'S HOST, AND THE CREATION OF A
- COPY OF THE DATA THERE, IS NOT THE BUSINESS OF DAC.
-
- COMPONENTS THAT SUPPORT ONLY INTERNAL SUBJECTS IMPACT
- THE IMPLEMENTATION OF THE DAC BY PROVIDING SERVICES BY WHICH
- INFORMATION (E.G., A USER-ID) IS MADE AVAILABLE TO A COM-
- PONENT THAT MAKES A DAC DECISION. AN EXAMPLE OF THE LATTER
- WOULD BE THE CASE THAT A USER AT HOST A ATTEMPTS TO ACCESS A
- FILE AT HOST B. THE DAC DECISION MIGHT BE (AND USUALLY
- WOULD BE) MADE AT HOST B ON THE BASIS OF A USER-ID TRANSMIT-
- TED FROM HOST A TO HOST B.
-
- UNIQUE USER IDENTIFICATION MAY BE ACHIEVED BY A VARIETY
- OF MECHANISMS, INCLUDING (A) A REQUIREMENT FOR UNIQUE IDEN-
- TIFICATION AND AUTHENTICATION ON THE HOST WHERE ACCESS TAKES
- PLACE; (B) RECOGNITION OF FULLY QUALIFIED NETWORK
- ADDRESSES AUTHENTICATED BY ANOTHER HOST AND FORWARDED TO THE
- HOST WHERE ACCESS TAKES PLACE; OR (C) ADMINISTRATIVE SUPPORT
- OF A NETWORK-WIDE UNIQUE PERSONNEL IDENTIFIER THAT COULD BE
- AUTHENTICATED AND FORWARDED BY ANOTHER HOST AS IN (B) ABOVE,
- OR COULD BE AUTHENTICATED AND FORWARDED BY A DEDICATED NET-
- WORK IDENTIFICATION AND AUTHENTICATION SERVER. THE PROTO-
- COLS WHICH IMPLEMENT (B) OR (C) ARE SUBJECT TO THE SYSTEM
- ARCHITECTURE REQUIREMENTS.
-
- NETWORK SUPPORT FOR DAC MIGHT BE HANDLED IN OTHER WAYS
- THAN THAT DESCRIBED AS "TYPICAL" ABOVE. IN PARTICULAR, SOME
- FORM OF CENTRALIZED ACCESS CONTROL IS OFTEN PROPOSED. AN
- ACCESS CONTROL CENTER MAY MAKE ALL DECISIONS FOR DAC, OR IT
- MAY SHARE THE BURDEN WITH THE HOSTS BY CONTROLLING HOST-TO-
- HOST CONNECTIONS, AND LEAVING THE HOSTS TO DECIDE ON ACCESS
- TO THEIR OBJECTS BY USERS AT A LIMITED SET OF REMOTE HOSTS.
- IN THIS CASE THE ACCESS CONTROL CENTER PROVIDES THE LINKAGE
- BETWEEN THE CONNECTION ORIENTED ABSTRACTION (AS DISCUSSED IN
- THE INTRODUCTION) AND THE OVERALL NETWORK SECURITY POLICY
- FOR DAC. IN ALL CASES THE ENFORCEMENT OF THE DECISION MUST
- BE PROVIDED BY THE HOST WHERE THE OBJECT RESIDES.
-
-
- 2.1.2 Accountability
-
-
- 2.1.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL REQUIRE USERS TO IDENTIFY THEMSELVES TO IT
- BEFORE BEGINNING TO PERFORM ANY OTHER ACTIONS THAT THE TCB
- IS EXPECTED TO MEDIATE. FURTHERMORE, THE TCB SHALL USE A
- PROTECTED MECHANISM (E.G., PASSWORDS) TO AUTHENTICATE THE
- USER'S IDENTITY. THE TCB SHALL PROTECT AUTHENTICATION DATA
- SO THAT IT CANNOT BE ACCESSED BY ANY UNAUTHORIZED USER.
-
-
- + Interpretation
-
- THE REQUIREMENT FOR IDENTIFICATION AND AUTHENTICATION
- OF USERS IS THE SAME FOR A NETWORK SYSTEM AS FOR AN ADP SYS-
- TEM. THE IDENTIFICATION AND AUTHENTICATION MAY BE DONE BY
- THE COMPONENT TO WHICH THE USER IS DIRECTLY CONNECTED OR
- SOME OTHER COMPONENT, SUCH AS AN IDENTIFICATION AND AUTHEN-
- TICATION SERVER. AVAILABLE TECHNIQUES, SUCH AS THOSE
- DESCRIBED IN THE PASSWORD GUIDELINE=, ARE GENERALLY ALSO
- APPLICABLE IN THE NETWORK CONTEXT. HOWEVER, IN CASES WHERE
- THE NTCB IS EXPECTED TO MEDIATE ACTIONS OF A HOST (OR OTHER
- NETWORK COMPONENT) THAT IS ACTING ON BEHALF OF A USER OR
- GROUP OF USERS, THE NTCB MAY EMPLOY IDENTIFICATION AND
- AUTHENTICATION OF THE HOST (OR OTHER COMPONENT) IN LIEU OF
- IDENTIFICATION AND AUTHENTICATION OF AN INDIVIDUAL USER.
-
- AUTHENTICATION INFORMATION, INCLUDING THE IDENTITY OF A
- USER (ONCE AUTHENTICATED) MAY BE PASSED FROM ONE COMPONENT
- TO ANOTHER WITHOUT REAUTHENTICATION, SO LONG AS THE NTCB
- PROTECTS (E.G., BY ENCRYPTION) THE INFORMATION FROM UNAU-
- THORIZED DISCLOSURE AND MODIFICATION. THIS PROTECTION SHALL
- PROVIDE AT LEAST A SIMILAR LEVEL OF ASSURANCE (OR STRENGTH
- OF MECHANISM) AS PERTAINS TO THE PROTECTION OF THE AUTHENTI-
- CATION MECHANISM AND AUTHENTICATION DATA.
-
-
- + Rationale
-
- THE NEED FOR ACCOUNTABILITY IS NOT CHANGED IN THE CON-
- TEXT OF A NETWORK SYSTEM. THE FACT THAT THE NTCB IS PARTI-
- TIONED OVER A SET OF COMPONENTS NEITHER REDUCES THE NEED NOR
- IMPOSES NEW REQUIREMENTS. THAT IS, INDIVIDUAL ACCOUNTABIL-
- ITY IS STILL THE OBJECTIVE. HOWEVER, IN THE CONTEXT OF A
- NETWORK SYSTEM AT THE (C1) LEVEL (WHEREIN EXPLICIT INDIVI-
- DUAL USER ACCOUNTABILITY IS NOT REQUIRED), "INDIVIDUAL
- ACCOUNTABILITY" CAN BE SATISFIED BY IDENTIFICATION OF A HOST
- (OR OTHER COMPONENT). IN ADDITION, THERE IS NO NEED IN A
- DISTRIBUTED PROCESSING SYSTEM LIKE A NETWORK TO REAUTHENTI-
- CATE A USER AT EACH POINT IN THE NETWORK WHERE A PROJECTION
- OF A USER (VIA THE SUBJECT OPERATING ON BEHALF OF THE USER)
- INTO ANOTHER REMOTE SUBJECT TAKES PLACE.
-
- THE PASSING OF IDENTIFIERS AND/OR AUTHENTICATION INFOR-
- MATION FROM ONE COMPONENT TO ANOTHER IS USUALLY DONE IN SUP-
- PORT TO THE IMPLEMENTATION OF THE DISCRETIONARY ACCESS CON-
- TROL (DAC). THIS SUPPORT RELATES DIRECTLY TO THE DAC
- REGARDING ACCESS BY A USER TO A STORAGE OBJECT IN A DIF-
- FERENT NTCB PARTITION THAN THE ONE WHERE THE USER WAS
- AUTHENTICATED. EMPLOYING A FORWARDED IDENTIFICATION IMPLIES
- ADDITIONAL RELIANCE ON THE SOURCE AND COMPONENTS ALONG THE
- PATH.
-
-
- 2.1.3 Assurance
-
-
- 2.1.3.1 Operational Assurance
-
-
- 2.1.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION THAT
- PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING (E.G.,
- BY MODIFICATION OF ITS CODE OR DATA STRUCTURES). RESOURCES
- CONTROLLED BY THE TCB MAY BE A DEFINED SUBSET OF THE SUB-
- JECTS AND OBJECTS IN THE ADP SYSTEM.
-
- + Interpretation
-
- THE SYSTEM ARCHITECTURE CRITERION MUST BE MET INDIVIDU-
- ALLY BY ALL NTCB PARTITIONS. IMPLEMENTATION OF THE REQUIRE-
- MENT THAT THE NTCB MAINTAIN A DOMAIN FOR ITS OWN EXECUTION
- IS ACHIEVED BY HAVING EACH NTCB PARTITION MAINTAIN A DOMAIN
- FOR ITS OWN EXECUTION.
-
- THE SUBSET OF NETWORK RESOURCES OVER WHICH THE NTCB HAS
- CONTROL ARE THE UNION OF THE SETS OF RESOURCES OVER WHICH
- THE NTCB PARTITIONS HAVE CONTROL. CODE AND DATA STRUCTURES
- BELONGING TO THE NTCB, TRANSFERRED AMONG NTCB SUBJECTS
- (I.E., SUBJECTS OUTSIDE THE REFERENCE MONITOR BUT INSIDE THE
- NTCB) BELONGING TO DIFFERENT NTCB PARTITIONS, MUST BE PRO-
- TECTED AGAINST EXTERNAL INTERFERENCE OR TAMPERING. FOR
- EXAMPLE, A CRYPTOGRAPHIC CHECKSUM OR PHYSICAL MEANS MAY BE
- EMPLOYED TO PROTECT USER AUTHENTICATION DATA EXCHANGED
- BETWEEN NTCB PARTITIONS.
-
- + Rationale
-
- THE REQUIREMENT FOR THE PROTECTION OF COMMUNICATIONS
- BETWEEN NTCB PARTITIONS IS SPECIFICALLY DIRECTED TO SUBJECTS
- THAT ARE PART OF THE NTCB PARTITIONS. ANY REQUIREMENTS FOR
- SUCH PROTECTION FOR THE SUBJECTS THAT ARE OUTSIDE THE NTCB
- PARTITIONS ARE ADDRESSED IN RESPONSE TO THE INTEGRITY
- REQUIREMENTS OF THE SECURITY POLICY.
-
-
- 2.1.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- HARDWARE AND/OR SOFTWARE FEATURES SHALL BE PROVIDED THAT CAN
- BE USED TO PERIODICALLY VALIDATE THE CORRECT OPERATION OF
- THE ON-SITE HARDWARE AND FIRMWARE ELEMENTS OF THE TCB.
-
- + Interpretation
-
- IMPLEMENTATION OF THE REQUIREMENT IS PARTLY ACHIEVED BY
- HAVING HARDWARE AND/OR SOFTWARE FEATURES THAT CAN BE USED TO
- PERIODICALLY VALIDATE THE CORRECT OPERATION OF THE HARDWARE
- AND FIRMWARE ELEMENTS OF EACH COMPONENT'S NTCB PARTITION.
- FEATURES SHALL ALSO BE PROVIDED TO VALIDATE THE IDENTITY AND
- CORRECT OPERATION OF A COMPONENT PRIOR TO ITS INCORPORATION
- IN THE NETWORK SYSTEM AND THROUGHOUT SYSTEM OPERATION. FOR
- EXAMPLE, A PROTOCOL COULD BE DESIGNED THAT ENABLES THE COM-
- PONENTS OF THE PARTITIONED NTCB TO EXCHANGE MESSAGES PERIOD-
- ICALLY AND VALIDATE EACH OTHER'S CORRECT RESPONSE. THE PRO-
- TOCOL SHALL BE ABLE TO DETERMINE THE REMOTE ENTITY'S ABILITY
- TO RESPOND. NTCB PARTITIONS SHALL PROVIDE THE CAPABILITY TO
- REPORT TO NETWORK ADMINISTRATIVE PERSONNEL THE FAILURES
- DETECTED IN OTHER NTCB PARTITIONS.
-
- INTERCOMPONENT PROTOCOLS IMPLEMENTED WITHIN A NTCB
- SHALL BE DESIGNED IN SUCH A WAY AS TO PROVIDE CORRECT OPERA-
- TION IN THE CASE OF FAILURES OF NETWORK COMMUNICATIONS OR
- INDIVIDUAL COMPONENTS. THE ALLOCATION OF DISCRETIONARY
- ACCESS CONTROL POLICY IN A NETWORK MAY REQUIRE COMMUNICATION
- BETWEEN TRUSTED SUBJECTS THAT ARE PART OF THE NTCB PARTI-
- TIONS IN DIFFERENT COMPONENTS. THIS COMMUNICATION IS NOR-
- MALLY IMPLEMENTED WITH A PROTOCOL BETWEEN THE SUBJECTS AS
- PEER ENTITIES. INCORRECT ACCESS WITHIN A COMPONENT SHALL
- NOT RESULT FROM FAILURE OF AN NTCB PARTITION TO COMMUNICATE
- WITH OTHER COMPONENTS.
-
- + Rationale
-
- THE FIRST PARAGRAPH OF THE INTERPRETATION IS A
- STRAIGHTFORWARD EXTENSION OF THE REQUIREMENT INTO THE CON-
- TEXT OF A NETWORK SYSTEM AND PARTITIONED NTCB AS DEFINED FOR
- THESE NETWORK CRITERIA.
-
- NTCB PROTOCOLS SHOULD BE ROBUST ENOUGH SO THAT THEY
- PERMIT THE SYSTEM TO OPERATE CORRECTLY IN THE CASE OF LOCAL-
- IZED FAILURE. THE PURPOSE OF THIS PROTECTION IS TO PRESERVE
- THE INTEGRITY OF THE NTCB ITSELF. IT IS NOT UNUSUAL FOR ONE
- OR MORE COMPONENTS IN A NETWORK TO BE INOPERATIVE AT ANY
- TIME, SO IT IS IMPORTANT TO MINIMIZE THE EFFECTS OF SUCH
- FAILURES ON THE REST OF THE NETWORK. ADDITIONAL INTEGRITY
- AND DENIAL OF SERVICE ISSUES ARE ADDRESSED IN PART II.
-
-
- 2.1.3.2 Life-Cycle Assurance
-
-
- 2.1.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- THE SECURITY MECHANISMS OF THE ADP SYSTEM SHALL BE TESTED
- AND FOUND TO WORK AS CLAIMED IN THE SYSTEM DOCUMENTATION.
- TESTING SHALL BE DONE TO ASSURE THAT THERE ARE NO OBVIOUS
- WAYS FOR AN UNAUTHORIZED USER TO BYPASS OR OTHERWISE DEFEAT
- THE SECURITY PROTECTION MECHANISMS OF THE TCB. (SEE THE
- SECURITY TESTING GUIDELINES.)
-
-
- + Interpretation
-
- TESTING OF A COMPONENT WILL REQUIRE A TESTBED THAT
- EXERCISES THE INTERFACES AND PROTOCOLS OF THE COMPONENT.
- THE TESTING OF A SECURITY MECHANISM OF THE NETWORK SYSTEM
- FOR MEETING THIS CRITERION SHALL BE AN INTEGRATED TESTING
- PROCEDURE INVOLVING ALL COMPONENTS CONTAINING AN NTCB PARTI-
- TION THAT IMPLEMENT THE GIVEN MECHANISM. THIS INTEGRATED
- TESTING IS ADDITIONAL TO ANY INDIVIDUAL COMPONENT TESTS
- INVOLVED IN THE EVALUATION OF THE NETWORK SYSTEM. THE SPON-
- SOR SHOULD IDENTIFY THE ALLOWABLE SET OF CONFIGURATIONS
- INCLUDING THE SIZES OF THE NETWORKS. ANALYSIS OR TESTING
- PROCEDURES AND TOOLS SHALL BE AVAILABLE TO TEST THE LIMITS
- OF THESE CONFIGURATIONS. A CHANGE IN CONFIGURATION WITHIN
- THE ALLOWABLE SET OF CONFIGURATIONS DOES NOT REQUIRE RETEST-
- ING.
-
- + Rationale
-
- TESTING IS THE PRIMARY METHOD AVAILABLE IN THIS EVALUA-
- TION DIVISION TO GAIN ANY ASSURANCE THAT THE SECURITY
- MECHANISMS PERFORM THEIR INTENDED FUNCTION.
-
- 2.1.4 Documentation
-
- 2.1.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A SINGLE SUMMARY, CHAPTER, OR MANUAL IN USER DOCUMENTATION
- SHALL DESCRIBE THE PROTECTION MECHANISMS PROVIDED BY THE
- TCB, INTERPRETATIONS ON THEIR USE, AND HOW THEY INTERACT
- WITH ONE ANOTHER.
-
-
- + Interpretation
-
- THIS USER DOCUMENTATION DESCRIBES USER VISIBLE PROTEC-
- TION MECHANISMS AT THE GLOBAL (NETWORK SYSTEM) LEVEL AND AT
- THE USER INTERFACE OF EACH COMPONENT, AND THE INTERACTION
- AMONG THESE.
-
- + Rationale
-
- THE INTERPRETATION IS AN EXTENSION OF THE REQUIREMENT
- INTO THE CONTEXT OF A NETWORK SYSTEM AS DEFINED FOR THESE
- NETWORK CRITERIA. DOCUMENTATION OF PROTECTION MECHANISMS
- PROVIDED BY INDIVIDUAL COMPONENTS IS REQUIRED BY THE CRI-
- TERIA FOR TRUSTED COMPUTER SYSTEMS THAT ARE APPLIED AS
- APPROPRIATE FOR THE INDIVIDUAL COMPONENTS.
-
-
- 2.1.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A MANUAL ADDRESSED TO THE ADP SYSTEM ADMINISTRATOR SHALL
- PRESENT CAUTIONS ABOUT FUNCTIONS AND PRIVILEGES THAT SHOULD
- BE CONTROLLED WHEN RUNNING A SECURE FACILITY.
-
- + Interpretation
-
- THIS MANUAL SHALL CONTAIN SPECIFICATIONS AND PROCEDURES
- TO ASSIST THE SYSTEM ADMINISTRATOR(S) MAINTAIN COGNIZANCE OF
- THE NETWORK CONFIGURATION. THESE SPECIFICATIONS AND PRO-
- CEDURES SHALL ADDRESS THE FOLLOWING:
-
- 1.THE HARDWARE CONFIGURATION OF THE NETWORK ITSELF;
-
- 2.THE IMPLICATIONS OF ATTACHING NEW COMPONENTS TO THE
- NETWORK;
-
- 3.THE CASE WHERE CERTAIN COMPONENTS MAY PERIODICALLY
- LEAVE THE NETWORK (E.G., BY CRASHING, OR BY BEING
- DISCONNECTED) AND THEN REJOIN;
-
- 4.NETWORK CONFIGURATION ASPECTS THAT CAN IMPACT THE
- SECURITY OF THE NETWORK SYSTEM; (FOR EXAMPLE, THE
- MANUAL SHOULD DESCRIBE FOR THE NETWORK SYSTEM
- ADMINISTRATOR THE INTERCONNECTIONS AMONG COMPONENTS
- THAT ARE CONSISTENT WITH THE OVERALL NETWORK SYSTEM
- ARCHITECTURE.)
-
- 5.LOADING OR MODIFYING NTCB SOFTWARE OR FIRMWARE
- (E.G., DOWN-LINE LOADING).
-
- THE PHYSICAL AND ADMINISTRATIVE ENVIRONMENTAL CONTROLS
- SHALL BE SPECIFIED. ANY ASSUMPTIONS ABOUT SECURITY OF A
- GIVEN NETWORK SHOULD BE CLEARLY STATED (E.G., THE FACT THAT
- ALL COMMUNICATIONS LINKS MUST BE PHYSICALLY PROTECTED TO A
- CERTAIN LEVEL).
-
-
- + Rationale
-
- THERE MAY BE MULTIPLE SYSTEM ADMINISTRATORS WITH
- DIVERSE RESPONSIBILITIES. THE TECHNICAL SECURITY MEASURES
- DESCRIBED BY THESE CRITERIA MUST BE USED IN CONJUNCTION WITH
- OTHER FORMS OF SECURITY IN ORDER TO ACHIEVE SECURITY OF THE
- NETWORK. ADDITIONAL FORMS INCLUDE ADMINISTRATIVE SECURITY,
- PHYSICAL SECURITY, EMANATIONS SECURITY, ETC.
-
-
- EXTENSION OF THIS CRITERION TO COVER CONFIGURATION
- ASPECTS OF THE NETWORK IS NEEDED BECAUSE, FOR EXAMPLE,
- PROPER INTERCONNECTION OF COMPONENTS IS TYPICALLY ESSENTIAL
- TO ACHIEVE A CORRECT REALIZATION OF THE NETWORK ARCHITEC-
- TURE.
-
-
- CRYPTOGRAPHY IS ONE COMMON MECHANISM EMPLOYED TO PRO-
- TECT COMMUNICATION CIRCUITS. ENCRYPTION TRANSFORMS THE
- REPRESENTATION OF INFORMATION SO THAT IT IS UNINTELLIGIBLE
- TO UNAUTHORIZED SUBJECTS. REFLECTING THIS TRANSFORMATION,
- THE SENSITIVITY OF THE CIPHERTEXT IS GENERALLY LOWER THAN
- THE CLEARTEXT. IF ENCRYPTION METHODOLOGIES ARE EMPLOYED,
- THEY SHALL BE APPROVED BY THE NATIONAL SECURITY AGENCY
- (NSA).
-
- THE ENCRYPTION ALGORITHM AND ITS IMPLEMENTATION ARE
- OUTSIDE THE SCOPE OF THESE INTERPRETATIONS. THIS ALGORITHM
- AND IMPLEMENTATION MAY BE IMPLEMENTED IN A SEPARATE DEVICE
- OR MAY BE A FUNCTION OF A SUBJECT IN A COMPONENT NOT DEDI-
- CATED TO ENCRYPTION. WITHOUT PREJUDICE, EITHER IMPLEMENTA-
- TION PACKAGING IS REFERRED TO AS AN ENCRYPTION MECHANISM
- HEREIN.
-
-
- 2.1.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- THE SYSTEM DEVELOPER SHALL PROVIDE TO THE EVALUATORS A DOCU-
- MENT THAT DESCRIBES THE TEST PLAN, TEST PROCEDURES THAT SHOW
- HOW THE SECURITY MECHANISMS WERE TESTED, AND RESULTS OF THE
- SECURITY MECHANISMS' FUNCTIONAL TESTING.
-
-
- + Interpretation
-
- THE "SYSTEM DEVELOPER" IS INTERPRETED AS "THE NETWORK
- SYSTEM SPONSOR". THE DESCRIPTION OF THE TEST PLAN SHOULD
- ESTABLISH THE CONTEXT IN WHICH THE TESTING WAS OR SHOULD BE
- CONDUCTED. THE DESCRIPTION SHOULD IDENTIFY ANY ADDITIONAL
- TEST COMPONENTS THAT ARE NOT PART OF THE SYSTEM BEING
- EVALUATED. THIS INCLUDES A DESCRIPTION OF THE TEST-RELEVANT
- FUNCTIONS OF SUCH TEST COMPONENTS AND A DESCRIPTION OF THE
- INTERFACING OF THOSE TEST COMPONENTS TO THE SYSTEM BEING
- EVALUATED. THE DESCRIPTION OF THE TEST PLAN SHOULD ALSO
- DEMONSTRATE THAT THE TESTS ADEQUATELY COVER THE NETWORK
- SECURITY POLICY. THE TESTS SHOULD INCLUDE THE FEATURES
- DESCRIBED IN THE SYSTEM ARCHITECTURE AND THE SYSTEM
- INTEGRITY SECTIONS. THE TESTS SHOULD ALSO INCLUDE NETWORK
- CONFIGURATION AND SIZING.
-
-
- + Rationale
-
- THE ENTITY BEING EVALUATED MAY BE A NETWORKING SUBSYS-
- TEM (SEE APPENDIX A) TO WHICH OTHER COMPONENTS MUST BE ADDED
- TO MAKE A COMPLETE NETWORK SYSTEM. IN THAT CASE, THIS
- INTERPRETATION IS EXTENDED TO INCLUDE CONTEXTUAL DEFINITION
- BECAUSE, AT EVALUATION TIME, IT IS NOT POSSIBLE TO VALIDATE
- THE TEST PLANS WITHOUT THE DESCRIPTION OF THE CONTEXT FOR
- TESTING THE NETWORKING SUBSYSTEM.
-
-
-
- 2.1.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- DOCUMENTATION SHALL BE AVAILABLE THAT PROVIDES A DESCRIPTION
- OF THE MANUFACTURER'S PHILOSOPHY OF PROTECTION AND AN EXPLA-
- NATION OF HOW THIS PHILOSOPHY IS TRANSLATED INTO THE TCB. IF
- THE TCB IS COMPOSED OF DISTINCT MODULES, THE INTERFACES
- BETWEEN THESE MODULES SHALL BE DESCRIBED.
-
- + Interpretation
-
- EXPLANATION OF HOW THE SPONSOR'S PHILOSOPHY OF PROTEC-
- TION IS TRANSLATED INTO THE NTCB SHALL INCLUDE A DESCRIPTION
- OF HOW THE NTCB IS PARTITIONED. THE SECURITY POLICY ALSO
- SHALL BE STATED. THE DESCRIPTION OF THE INTERFACES BETWEEN
- THE NTCB MODULES SHALL INCLUDE THE INTERFACE(S) BETWEEN NTCB
- PARTITIONS AND MODULES WITHIN THE PARTITIONS IF THE MODULES
- EXIST. THE SPONSOR SHALL DESCRIBE THE SECURITY ARCHITECTURE
- AND DESIGN, INCLUDING THE ALLOCATION OF SECURITY REQUIRE-
- MENTS AMONG COMPONENTS. APPENDIX A ADDRESSES COMPONENT
- EVALUATION ISSUES.
-
- + Rationale
-
- THE INTERPRETATION IS A STRAIGHTFORWARD EXTENSION OF
- THE REQUIREMENT INTO THE CONTEXT OF A NETWORK SYSTEM AS
- DEFINED FOR THIS NETWORK INTERPRETATION. OTHER DOCUMENTA-
- TION, SUCH AS DESCRIPTION OF COMPONENTS AND DESCRIPTION OF
- OPERATING ENVIRONMENT(S) IN WHICH THE NETWORKING SUBSYSTEM
- OR NETWORK SYSTEM IS DESIGNED TO FUNCTION, IS REQUIRED ELSE-
- WHERE, E.G., IN THE TRUSTED FACILITY MANUAL.
-
- IN ORDER TO BE EVALUATED, A NETWORK MUST POSSESS A
- COHERENT NETWORK SECURITY ARCHITECTURE AND DESIGN. (INTER-
- CONNECTION OF COMPONENTS THAT DO NOT ADHERE TO SUCH A SINGLE
- COHERENT NETWORK SECURITY ARCHITECTURE IS ADDRESSED IN THE
- INTERCONNECTION OF ACCREDITED AIS, APPENDIX C.) THE NETWORK
- SECURITY ARCHITECTURE MUST ADDRESS THE SECURITY-RELEVANT
- POLICIES, OBJECTIVES, AND PROTOCOLS. THE NETWORK SECURITY
- DESIGN SPECIFIES THE INTERFACES AND SERVICES THAT MUST BE
- INCORPORATED INTO THE NETWORK SO THAT IT CAN BE EVALUATED AS
- A TRUSTED ENTITY. THERE MAY BE MULTIPLE DESIGNS THAT CON-
- FORM TO THE SAME ARCHITECTURE BUT ARE MORE OR LESS INCOMPA-
- TIBLE AND NON-INTEROPERABLE (EXCEPT THROUGH THE INTERCONNEC-
- TION RULES). SECURITY RELATED MECHANISMS REQUIRING COOPERA-
- TION AMONG COMPONENTS ARE SPECIFIED IN THE DESIGN IN TERMS
- OF THEIR VISIBLE INTERFACES; MECHANISMS HAVING NO VISIBLE
- INTERFACES ARE NOT SPECIFIED IN THIS DOCUMENT BUT ARE LEFT
- AS IMPLEMENTATION DECISIONS.
-
- THE NETWORK SECURITY ARCHITECTURE AND DESIGN MUST BE
- AVAILABLE FROM THE NETWORK SPONSOR BEFORE EVALUATION OF THE
- NETWORK, OR ANY COMPONENT, CAN BE UNDERTAKEN. THE NETWORK
- SECURITY ARCHITECTURE AND DESIGN MUST BE SUFFICIENTLY COM-
- PLETE, UNAMBIGUOUS, AND FREE FROM OBVIOUS FLAWS TO PERMIT
- THE CONSTRUCTION OR ASSEMBLY OF A TRUSTED NETWORK BASED ON
- THE STRUCTURE IT SPECIFIES.
-
- WHEN A COMPONENT IS BEING DESIGNED OR PRESENTED FOR
- EVALUATION, OR WHEN A NETWORK ASSEMBLED FROM COMPONENTS IS
- ASSEMBLED OR PRESENTED FOR EVALUATION, THERE MUST BE A
- PRIORI EVIDENCE THAT THE NETWORK SECURITY ARCHITECTURE AND
- DESIGN ARE SATISFIED. THAT IS, THE COMPONENTS CAN BE ASSEM-
- BLED INTO A NETWORK THAT CONFORMS IN EVERY WAY WITH THE NET-
- WORK SECURITY ARCHITECTURE AND DESIGN TO PRODUCE A PHYSICAL
- REALIZATION THAT IS TRUSTED TO THE EXTENT THAT ITS EVALUA-
- TION INDICATES.
-
- IN ORDER FOR A TRUSTED NETWORK TO BE CONSTRUCTED FROM
- COMPONENTS THAT CAN BE BUILT INDEPENDENTLY, THE NETWORK
- SECURITY ARCHITECTURE AND DESIGN MUST COMPLETELY AND UNAMBI-
- GUOUSLY DEFINE THE SECURITY FUNCTIONALITY OF COMPONENTS AS
- WELL AS THE INTERFACES BETWEEN OR AMONG COMPONENTS. THE
- NETWORK SECURITY ARCHITECTURE AND DESIGN MUST BE EVALUATED
- TO DETERMINE THAT A NETWORK CONSTRUCTED TO ITS
- SPECIFICATIONS WILL IN FACT BE TRUSTED, THAT IS, IT WILL BE
- EVALUATABLE UNDER THESE INTERPRETATIONS.
-
-
-
-
- 2.2 CLASS (C2): CONTROLLED ACCESS PROTECTION
- _ _ _____ __ __________ ______ __________
-
-
- NETWORK SYSTEMS IN THIS CLASS ENFORCE A MORE
- FINELY GRAINED DISCRETIONARY ACCESS CONTROL THAN
- (C1) NETWORK SYSTEMS, MAKING USERS INDIVIDUALLY
- ACCOUNTABLE FOR THEIR ACTIONS THROUGH LOGIN PRO-
- CEDURES, AUDITING OF SECURITY-RELEVANT EVENTS, AND
- RESOURCE ISOLATION. THE FOLLOWING ARE MINIMAL
- REQUIREMENTS FOR SYSTEMS ASSIGNED A CLASS (C2)
- RATING.
-
-
- 2.2.1 Security Policy
- _ _ _ ________ ______
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- The network sponsor shall describe the overall network
- security policy enforced by the NTCB. At a minimum, this
- policy shall include the discretionary requirements applica-
- ble to this class. The policy may require data secrecy, or
- data integrity, or both. The policy shall include a discre-
- tionary policy for protecting the information being pro-
- cessed based on the authorizations of INDIVIDUALS, users, or
- groups of users. This access control policy statement shall
- describe the requirements on the network to prevent or
- detect "reading or destroying" sensitive information by
- unauthorized users or errors. Unauthorized users include
- both those that are not authorized to use the network at all
- (e.g., a user attempting to use a passive or active wire
- tap) or a legitimate user of the network who is not author-
- ized to access a specific piece of information being pro-
- tected.
-
- Note that "users" does not include "operators," "system
- programmers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network
- system, for example, by defining membership of a group.
- These individuals may also have the separate role of users.
-
-
- SECRECY POLICY: The network sponsor shall define the
- form of the discretionary secrecy policy that is
- enforced in the network to prevent unauthorized
- users from reading the sensitive information
- entrusted to the network.
-
-
- DATA INTEGRITY POLICY: The network sponsor shall
- define the discretionary integrity policy to prevent
- unauthorized users from modifying, viz., writing,
- sensitive information. The definition of data
- integrity presented by the network sponsor refers to
- the requirement that the information has not been
- subjected to unauthorized modification in the net-
- work.
-
- + Rationale
-
- The word "sponsor" is used in place of alternatives
- (such as "vendor," "architect," "manufacturer," and
- "developer") because the alternatives indicate people who
- may not be available, involved, or relevant at the time that
- a network system is proposed for evaluation.
-
- A trusted network is able to control both the reading
- and writing of shared sensitive information. Control of
- writing is used to protect against destruction of informa-
- tion. A network normally is expected to have policy require-
- ments to protect both the secrecy and integrity of the
- information entrusted to it. In a network the integrity is
- frequently as important or more important than the secrecy
- requirements. Therefore the secrecy and/or integrity policy
- to be enforced by the network must be stated for each net-
- work regardless of its evaluation class. The assurance that
- the policy is faithfully enforced is reflected in the
- evaluation class of the network.
-
- This control over modification is typically used to
- protect information so that it may be relied upon and to
- control the potential harm that would result if the informa-
- tion were corrupted. The overall network policy require-
- ments for integrity includes the protection for data both
- while being processed in a component and while being
- transmitted in the network. The access control policy
- enforced by the NTCB relates to the access of subjects to
- objects within each component. Communications integrity
- addressed within Part II relates to information while being
- transmitted.
-
- 2.2.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall define and control access between named users
- and named objects (e.g., files and programs) in the ADP sys-
- tem. The enforcement mechanism (e.g., self/group/public
- controls, access control lists) shall allow users to specify
- and control sharing of those objects by named individuals or
- defined groups OF INDIVIDUALS, or both, AND SHALL PROVIDE
- CONTROLS TO LIMIT PROPAGATION OF ACCESS RIGHTS. THE DISCRE-
- TIONARY ACCESS CONTROL MECHANISM SHALL, EITHER BY EXPLICIT
- USER ACTION OR BY DEFAULT, PROVIDE THAT OBJECTS ARE PRO-
- TECTED FROM UNAUTHORIZED ACCESS. THESE ACCESS CONTROLS
- SHALL BE CAPABLE OF INCLUDING OR EXCLUDING ACCESS TO THE
- GRANULARITY OF A SINGLE USER. ACCESS PERMISSION TO AN
- OBJECT BY USERS NOT ALREADY POSSESSING ACCESS PERMISSION
- SHALL ONLY BE ASSIGNED BY AUTHORIZED USERS.
-
- + Interpretation
-
- The discretionary access control (DAC) mechanism(s) may
- be distributed over the partitioned NTCB in various ways.
- Some part, all, or none of the DAC may be implemented in a
- given component of the network system. In particular, com-
- ponents that support only internal subjects (i.e., that have
- no subjects acting as direct surrogates for users), such as
- a public network packet switch, might not implement the DAC
- mechanism(s) directly (e.g., they are unlikely to contain
- access control lists).
-
- Identification of users by groups may be achieved in
- various ways in the networking environment. For example,
- the network identifiers (e.g., internet addresses) for vari-
- ous components (e.g., hosts, gateways) can be used as iden-
- tifiers of groups of individual users (e.g., "all users at
- Host A," "all users of network Q") SO LONG AS THE INDIVIDU-
- ALS INVOLVED IN THE GROUP ARE IMPLIED BY THE GROUP IDENTIF-
- IER. FOR EXAMPLE, HOST A MIGHT EMPLOY A PARTICULAR GROUP-ID,
- FOR WHICH IT MAINTAINS A LIST OF EXPLICIT USERS IN THAT
- GROUP, IN ITS NETWORK EXCHANGE WITH HOST B, WHICH ACCEPTS
- THE GROUP-ID UNDER THE CONDITIONS OF THIS INTERPRETATION.
-
- For networks, individual hosts will impose need-to-know
- controls over their users ON THE BASIS OF NAMED INDIVIDUALS
- - much like (in fact, probably the same) controls used when
- there is no network connection.
-
- When group identifiers are acceptable for access con-
- trol, the identifier of some other host may be employed, to
- eliminate the maintenance that would be required if indivi-
- dual identification of remote users was employed. IN CLASS
- C2 AND HIGHER, HOWEVER, IT MUST BE POSSIBLE FROM THAT AUDIT
- RECORD TO IDENTIFY (IMMEDIATELY OR AT SOME LATER TIME)
- EXACTLY THE INDIVIDUALS REPRESENTED BY A GROUP IDENTIFIER AT
- THE TIME OF THE USE OF THAT IDENTIFIER. THERE IS ALLOWED TO
- BE AN UNCERTAINTY BECAUSE OF ELAPSED TIME BETWEEN CHANGES IN
- THE GROUP MEMBERSHIP AND THE ENFORCEMENT IN THE ACCESS CON-
- TROL MECHANISMS.
-
- The DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. The reference monitor manages
- all the physical resources of the system and from them
- creates the abstraction of subjects and objects that it con-
- trols. Some of these subjects and objects may be used to
- implement a part of the NTCB. WHEN THE DAC MECHANISM IS
- DISTRIBUTED IN SUCH NTCB SUBJECTS (I.E., WHEN OUTSIDE THE
- REFERENCE MONITOR), THE ASSURANCE REQUIREMENTS (SEE THE
- ASSURANCE SECTION) FOR THE DESIGN AND IMPLEMENTATION OF THE
- DAC SHALL BE THOSE OF CLASS C2 FOR ALL NETWORKS OF CLASS C2
- OR ABOVE.
-
- When integrity is included as part of the network dis-
- cretionary security policy, the above interpretations shall
- be specifically applied to the controls over modification,
- viz, the write mode of access, within each component based
- on identified users or groups of users.
-
- + Rationale
-
- In this class, THE SUPPORTING ELEMENTS OF THE OVERALL
- DAC MECHANISM ARE REQUIRED TO ISOLATE INFORMATION (OBJECTS)
- THAT SUPPORTS DAC SO THAT IT IS SUBJECT TO AUDITING REQUIRE-
- MENTS (SEE THE SYSTEM ARCHITECTURE SECTION). THE USE OF
- NETWORK IDENTIFIERS TO IDENTIFY GROUPS OF INDIVIDUAL USERS
- COULD BE IMPLEMENTED, FOR EXAMPLE, AS AN X.25 COMMUNITY OF
- INTEREST IN THE NETWORK PROTOCOL LAYER (LAYER 3). IN ALL
- OTHER RESPECTS, the supporting elements of the overall DAC
- mechanism are treated exactly as untrusted subjects are
- treated with respect to DAC in an ADP system, with the same
- result as noted in the interpretation.
-
- A typical situation for DAC is that a surrogate process
- for a remote user will be created in some host for access to
- objects under the control of the NTCB partition within that
- host. The interpretation requires that a user identifier be
- assigned and maintained for each such process by the NTCB,
- so that access by a surrogate process is subject to essen-
- tially the same discretionary controls as access by a pro-
- cess acting on behalf of a local user would be. However,
- within this interpretation a range of possible interpreta-
- tions of the assigned user identification is permitted.
-
- The most obvious situation would exist if a global
- database of network users were to be made permanently avail-
- able on demand to every host, (i.e., a name server existed)
- so that all user identifications were globally meaningful.
-
- It is also acceptable, however, for some NTCB parti-
- tions to maintain a database of locally-registered users for
- its own use. In such a case, one could choose to inhibit
- the creation of surrogate processes for locally unregistered
- users, or (if permitted by the local policy) alternatively,
- to permit the creation of surrogate processes with
- preselected user and group identifiers which, in effect,
- identify the process as executing on behalf of a member of a
- group of users on a particular remote host. The intent of
- the words concerning audit in the interpretation is to pro-
- vide a minimally acceptable degree of auditability for cases
- such as the last described. What is required is that there
- be a capability, using the audit facilities provided by the
- network NTCB partitions involved, to determine who was
- logged in at the actual host of the group of remote users at
- the time the surrogate processing occured.
-
- Associating the proper user id with a surrogate process
- is the job of identification and authentication. This means
- that DAC is applied locally, with respect to the user id of
- the surrogate process. The transmission of the data back
- across the network to the user's host, and the creation of a
- copy of the data there, is not the business of DAC.
-
- Components that support only internal subjects impact
- the implementation of the DAC by providing services by which
- information (e.g., a user-id) is made available to a com-
- ponent that makes a DAC decision. An example of the latter
- would be the case that a user at Host A attempts to access a
- file at Host B. The DAC decision might be (and usually
- would be) made at Host B on the basis of a user-id transmit-
- ted from Host A to Host B.
-
- Unique user identification may be achieved by a variety
- of mechanisms, including (a) a requirement for unique iden-
- tification and authentication on the host where access takes
- place; (b) recognition of fully qualified network
- addresses authenticated by another host and forwarded to the
- host where access takes place; or (c) administrative support
- of a network-wide unique personnel identifier that could be
- authenticated and forwarded by another host as in (b) above,
- or could be authenticated and forwarded by a dedicated net-
- work identification and authentication server. The proto-
- cols which implement (b) or (c) are subject to the System
- Architecture requirements.
-
- Network support for DAC might be handled in other ways
- than that described as "typical" above. In particular, some
- form of centralized access control is often proposed. An
- access control center may make all decisions for DAC, or it
- may share the burden with the hosts by controlling host-to-
- host connections, and leaving the hosts to decide on access
- to their objects by users at a limited set of remote hosts.
- In this case the access control center provides the linkage
- between the connection oriented abstraction (as discussed in
- the Introduction) and the overall network security policy
- for DAC. In all cases the enforcement of the decision must
- be provided by the host where the object resides.
-
- 2.2.1.2 Object Reuse
-
- + Statement from DoD 5200.28-STD
-
- ALL AUTHORIZATIONS TO THE INFORMATION CONTAINED WITHIN A
- STORAGE OBJECT SHALL BE REVOKED PRIOR TO INITIAL ASSIGNMENT,
- ALLOCATION OR REALLOCATION TO A SUBJECT FROM THE TCB'S POOL
- OF UNUSED STORAGE OBJECTS. NO INFORMATION, INCLUDING
- ENCRYPTED REPRESENTATIONS OF INFORMATION, PRODUCED BY A
- PRIOR SUBJECT'S ACTIONS IS TO BE AVAILABLE TO ANY SUBJECT
- THAT OBTAINS ACCESS TO AN OBJECT THAT HAS BEEN RELEASED BACK
- TO THE SYSTEM.
-
- + Interpretation
-
- THE NTCB SHALL ENSURE THAT ANY STORAGE OBJECTS THAT IT
- CONTROLS (E.G., MESSAGE BUFFERS UNDER THE CONTROL OF A NTCB
- PARTITION IN A COMPONENT) CONTAIN NO INFORMATION FOR WHICH A
- SUBJECT IN THAT COMPONENT IS NOT AUTHORIZED BEFORE GRANTING
- ACCESS. THIS REQUIREMENT MUST BE ENFORCED BY EACH OF THE
- NTCB PARTITIONS.
-
- + Rationale
-
- IN A NETWORK SYSTEM, STORAGE OBJECTS OF INTEREST ARE
- THINGS THAT THE NTCB DIRECTLY CONTROLS, SUCH AS MESSAGE
- BUFFERS IN COMPONENTS. EACH COMPONENT OF THE NETWORK SYSTEM
- MUST ENFORCE THE OBJECT REUSE REQUIREMENT WITH RESPECT TO
- THE STORAGE OBJECTS OF INTEREST AS DETERMINED BY THE NETWORK
- SECURITY POLICY. FOR EXAMPLE, THE DAC REQUIREMENT IN THIS
- DIVISION LEADS TO THE REQUIREMENT HERE THAT MESSAGE BUFFERS
- BE UNDER THE CONTROL OF THE NTCB PARTITION. A BUFFER
- ASSIGNED TO AN INTERNAL SUBJECT MAY BE REUSED AT THE DISCRE-
- TION OF THAT SUBJECT WHICH IS RESPONSIBLE FOR PRESERVING THE
- INTEGRITY OF MESSAGE STREAMS. SUCH CONTROLLED OBJECTS MAY
- BE IMPLEMENTED IN PHYSICAL RESOURCES, SUCH AS BUFFERS, DISK
- SECTORS, TAPE SPACE, AND MAIN MEMORY, IN COMPONENTS SUCH AS
- NETWORK SWITCHES.
-
-
- 2.2.2 Accountability
- _ _ _ ______________
-
-
- 2.2.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall require users to identify themselves to it
- before beginning to perform any other actions that the TCB
- is expected to mediate. Furthermore, the TCB shall use a
- protected mechanism (e.g., passwords) to authenticate the
- user's identity. The TCB shall protect authentication data
- so that it cannot be accessed by any unauthorized user. THE
- TCB SHALL BE ABLE TO ENFORCE INDIVIDUAL ACCOUNTABILITY BY
- PROVIDING THE CAPABILITY TO UNIQUELY IDENTIFY EACH INDIVI-
- DUAL ADP SYSTEM USER. THE TCB SHALL ALSO PROVIDE THE CAPA-
- BILITY OF ASSOCIATING THIS IDENTITY WITH ALL AUDITABLE
- ACTIONS TAKEN BY THAT INDIVIDUAL.
-
- + Interpretation
-
- The requirement for identification and authentication
- of users is the same for a network system as for an ADP sys-
- tem. The identification and authentication may be done by
- the component to which the user is directly connected or
- some other component, such as an identification and authen-
- tication server. Available techniques, such as those
- described in the Password Guideline=, are generally also
- applicable in the network context. However, in cases where
- the NTCB is expected to mediate actions of a host (or other
- network component) that is acting on behalf of a user or
- group of users, the NTCB may employ identification and
- authentication of the host (or other component) in lieu of
- identification and authentication of an individual user, SO
- LONG AS THE COMPONENT IDENTIFIER IMPLIES A LIST OF SPECIFIC
- USERS UNIQUELY ASSOCIATED WITH THE IDENTIFIER AT THE TIME OF
- ITS USE FOR AUTHENTICATION. THIS REQUIREMENT DOES NOT APPLY
- TO INTERNAL SUBJECTS.
-
- Authentication information, including the identity of a
- user (once authenticated) may be passed from one component
- to another without reauthentication, so long as the NTCB
- protects (e.g., by encryption) the information from unau-
- thorized disclosure and modification. This protection shall
- provide at least a similar level of assurance (or strength
- of mechanism) as pertains to the protection of the authenti-
- cation mechanism and authentication data.
-
- + Rationale
-
- The need for accountability is not changed in the con-
- text of a network system. The fact that the NTCB is parti-
- tioned over a set of components neither reduces the need nor
- imposes new requirements. That is, individual accountabil-
- ity is still the objective. ALSO, in the context of a net-
- work system at the (C2) LEVEL OR HIGHER "INDIVIDUAL ACCOUN-
- TABILITY" CAN BE SATISFIED BY IDENTIFICATION OF A HOST (OR
- OTHER COMPONENT) SO LONG AS THE REQUIREMENT FOR TRACEABILITY
- TO INDIVIDUAL USERS OR A SET OF SPECIFIC INDIVIDUAL USERS
- WITH ACTIVE SUBJECTS IS SATISFIED. THERE IS ALLOWED TO BE AN
- UNCERTAINTY IN TRACEABILITY BECAUSE OF ELAPSED TIME BETWEEN
- CHANGES IN THE GROUP MEMBERSHIP AND THE ENFORCEMENT IN THE
- ACCESS CONTROL MECHANISMS. In addition, there is no need in
- a distributed processing system like a network to reauthen-
- ticate a user at each point in the network where a projec-
- tion of a user (via the subject operating on behalf of the
- user) into another remote subject takes place.
- _________________________
- = Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, CSC-STD-002-85
- ____
-
- The passing of identifiers and/or authentication infor-
- mation from one component to another is usually done in sup-
- port to the implementation of the discretionary access con-
- trol (DAC). This support relates directly to the DAC
- regarding access by a user to a storage object in a dif-
- ferent NTCB partition than the one where the user was
- authenticated. Employing a forwarded identification implies
- additional reliance on the source and components along the
- path.
-
-
- 2.2.2.2 Audit
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL BE ABLE TO CREATE, MAINTAIN, AND PROTECT FROM
- MODIFICATION OR UNAUTHORIZED ACCESS OR DESTRUCTION AN AUDIT
- TRAIL OF ACCESSES TO THE OBJECTS IT PROTECTS. THE AUDIT
- DATA SHALL BE PROTECTED BY THE TCB SO THAT READ ACCESS TO IT
- IS LIMITED TO THOSE WHO ARE AUTHORIZED FOR AUDIT DATA. THE
- TCB SHALL BE ABLE TO RECORD THE FOLLOWING TYPES OF EVENTS:
- USE OF IDENTIFICATION AND AUTHENTICATION MECHANISMS, INTRO-
- DUCTION OF OBJECTS INTO A USER'S ADDRESS SPACE (E.G., FILE
- OPEN, PROGRAM INITIATION), DELETION OF OBJECTS, ACTIONS
- TAKEN BY COMPUTER OPERATORS AND SYSTEM ADMINISTRATORS AND/OR
- SYSTEM SECURITY OFFICERS, AND OTHER SECURITY RELEVANT
- EVENTS. FOR EACH RECORDED EVENT, THE AUDIT RECORD SHALL
- IDENTIFY: DATE AND TIME OF THE EVENT, USER, TYPE OF EVENT,
- AND SUCCESS OR FAILURE OF THE EVENT. FOR
- IDENTIFICATION/AUTHENTICATION EVENTS THE ORIGIN OF REQUEST
- (E.G., TERMINAL ID) SHALL BE INCLUDED IN THE AUDIT RECORD.
- FOR EVENTS THAT INTRODUCE AN OBJECT INTO A USER'S ADDRESS
- SPACE AND FOR OBJECT DELETION EVENTS THE AUDIT RECORD SHALL
- INCLUDE THE NAME OF THE OBJECT. THE ADP SYSTEM ADMINISTRA-
- TOR SHALL BE ABLE TO SELECTIVELY AUDIT THE ACTIONS OF ANY
- ONE OR MORE USERS BASED ON INDIVIDUAL IDENTITY.
-
- + Interpretation
-
- THIS CRITERION APPLIES AS STATED. THE SPONSOR MUST
- SELECT WHICH EVENTS ARE AUDITABLE. IF ANY SUCH EVENTS ARE
- NOT DISTINGUISHABLE BY THE NTCB ALONE (FOR EXAMPLE THOSE
- IDENTIFIED IN PART II), THE AUDIT MECHANISM SHALL PROVIDE AN
- INTERFACE, WHICH AN AUTHORIZED SUBJECT CAN INVOKE WITH
- PARAMETERS SUFFICIENT TO PRODUCE AN AUDIT RECORD. THESE
- AUDIT RECORDS SHALL BE DISTINGUISHABLE FROM THOSE PROVIDED
- BY THE NTCB. IN THE CONTEXT OF A NETWORK SYSTEM, "OTHER
- SECURITY RELEVANT EVENTS" (DEPENDING ON NETWORK SYSTEM
- ARCHITECTURE AND NETWORK SECURITY POLICY) MIGHT BE AS FOL-
- LOWS:
-
- 1. IDENTIFICATION OF EACH ACCESS EVENT (E.G., ESTAB-
- LISHING A CONNECTION OR A CONNECTIONLESS ASSOCIATION
- BETWEEN PROCESSES IN TWO HOSTS OF THE NETWORK) AND
- ITS PRINCIPAL PARAMETERS (E.G., HOST IDENTIFIERS OF
- THE TWO HOSTS INVOLVED IN THE ACCESS EVENT AND USER
- IDENTIFIER OR HOST IDENTIFIER OF THE USER OR HOST
- THAT IS REQUESTING THE ACCESS EVENT)
-
- 2. IDENTIFICATION OF THE STARTING AND ENDING TIMES OF
- EACH ACCESS EVENT USING LOCAL TIME OR GLOBAL SYN-
- CHRONIZED TIME
-
- 3. IDENTIFICATION OF SECURITY-RELEVANT EXCEPTIONAL CON-
- DITIONS (E.G., POTENTIAL VIOLATION OF DATA
- INTEGRITY, SUCH AS MISROUTED DATAGRAMS) DETECTED
- DURING THE TRANSACTIONS BETWEEN TWO HOSTS
-
- 4. UTILIZATION OF CRYPTOGRAPHIC VARIABLES
-
- 5. CHANGING THE CONFIGURATION OF THE NETWORK (E.G., A
- COMPONENT LEAVING THE NETWORK AND REJOINING)
-
- IN ADDITION, IDENTIFICATION INFORMATION SHOULD BE
- INCLUDED IN APPROPRIATE AUDIT TRAIL RECORDS, AS NECESSARY,
- TO ALLOW ASSOCIATION OF ALL RELATED (E.G., INVOLVING THE
- SAME NETWORK EVENT) AUDIT TRAIL RECORDS (E.G., AT DIFFERENT
- HOSTS) WITH EACH OTHER. FURTHERMORE, A COMPONENT OF THE
- NETWORK SYSTEM MAY PROVIDE THE REQUIRED AUDIT CAPABILITY
- (E.G., STORAGE, RETRIEVAL, REDUCTION, ANALYSIS) FOR OTHER
- COMPONENTS THAT DO NOT INTERNALLY STORE AUDIT DATA BUT
- TRANSMIT THE AUDIT DATA TO SOME DESIGNATED COLLECTION COM-
- PONENT. PROVISIONS SHALL BE MADE TO CONTROL THE LOSS OF
- AUDIT DATA DUE TO UNAVAILABILITY OF RESOURCES.
-
- IN THE CONTEXT OF A NETWORK SYSTEM, THE "USER'S ADDRESS
- SPACE" IS EXTENDED, FOR OBJECT INTRODUCTION AND DELETION
- EVENTS, TO INCLUDE ADDRESS SPACES BEING EMPLOYED ON BEHALF
- OF A REMOTE USER (OR HOST). HOWEVER, THE FOCUS REMAINS ON
- USERS IN CONTRAST TO INTERNAL SUBJECTS AS DISCUSSED IN THE
- DAC CRITERION. IN ADDITION, AUDIT INFORMATION MUST BE
- STORED IN MACHINE-READABLE FORM.
-
- + Rationale
-
- FOR REMOTE USERS, THE NETWORK IDENTIFIERS (E.G., INTER-
- NET ADDRESS) CAN BE USED AS IDENTIFIERS OF GROUPS OF INDIVI-
- DUAL USERS (E.G., "ALL USERS AT HOST A") TO ELIMINATE THE
- MAINTENANCE THAT WOULD BE REQUIRED IF INDIVIDUAL IDENTIFICA-
- TION OF REMOTE USERS WAS EMPLOYED. IN THIS CLASS (C2), HOW-
- EVER, IT MUST BE POSSIBLE TO IDENTIFY (IMMEDIATELY OR AT
- SOME LATER TIME) THE INDIVIDUALS REPRESENTED BY A GROUP
- IDENTIFIER. IN ALL OTHER RESPECTS, THE INTERPRETATION IS A
- STRAIGHTFORWARD EXTENSION OF THE CRITERION INTO THE CONTEXT
- OF A NETWORK SYSTEM.
-
-
- 2.2.3 Assurance
- _ _ _ _________
-
-
- 2.2.3.1 Operational Assurance
-
-
- 2.2.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall maintain a domain for its own execution that
- protects it from external interference or tampering (e.g.,
- by modification of its code or data structures). Resources
- controlled by the TCB may be a defined subset of the sub-
- jects and objects in the ADP system. THE TCB SHALL ISOLATE
- THE RESOURCES TO BE PROTECTED SO THAT THEY ARE SUBJECT TO
- THE ACCESS CONTROL AND AUDITING REQUIREMENTS.
-
- + Interpretation
-
- The system architecture criterion must be met individu-
- ally by all NTCB partitions. Implementation of the require-
- ment that the NTCB maintain a domain for its own execution
- is achieved by having each NTCB partition maintain a domain
- for its own execution.
-
- The subset of network resources over which the NTCB has
- control are the union of the sets of resources over which
- the NTCB partitions have control. Code and data structures
- belonging to the NTCB, transferred among NTCB subjects
- (i.e., subjects outside the reference monitor but inside the
- NTCB) belonging to different NTCB partitions, must be pro-
- tected against external interference or tampering. For
- example, a cryptographic checksum or physical means may be
- employed to protect user authentication data exchanged
- between NTCB partitions.
-
- EACH NTCB PARTITION PROVIDES ISOLATION OF RESOURCES
- (WITHIN ITS COMPONENT) TO BE PROTECTED IN ACCORD WITH THE
- NETWORK SYSTEM ARCHITECTURE AND SECURITY POLICY.
-
- + Rationale
-
-
- The requirement for the protection of communications
- between NTCB partitions is specifically directed to subjects
- that are part of the NTCB partitions. Any requirements for
- such protection for the subjects that are outside the NTCB
- partitions are addressed in response to the integrity
- requirements of the security policy.
-
- ISOLATION OF THE RESOURCES TO BE PROTECTED PROVIDES
- ADDITIONAL PROTECTION, COMPARED TO CLASS (C1), THAT MECHAN-
- ISMS THAT DEPEND ON THE RESOURCE (E.G., DAC AND USER IDEN-
- TIFICATION) WILL OPERATE CORRECTLY.
-
- 2.2.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- Hardware and/or software features shall be provided that can
- be used to periodically validate the correct operation of
- the on-site hardware and firmware elements of the TCB.
-
- + Interpretation
-
- Implementation of the requirement is partly achieved by
- having hardware and/or software features that can be used to
- periodically validate the correct operation of the hardware
- and firmware elements of each component's NTCB partition.
- Features shall also be provided to validate the identity and
- correct operation of a component prior to its incorporation
- in the network system and throughout system operation. For
- example, a protocol could be designed that enables the com-
- ponents of the partitioned NTCB to exchange messages period-
- ically and validate each other's correct response. The pro-
- tocol shall be able to determine the remote entity's ability
- to respond. NTCB partitions shall provide the capability to
- report to network administrative personnel the failures
- detected in other NTCB partitions.
-
- Intercomponent protocols implemented within a NTCB
- shall be designed in such a way as to provide correct opera-
- tion in the case of failures of network communications or
- individual components. The allocation of discretionary
- access control policy in a network may require communication
- between trusted subjects that are part of the NTCB parti-
- tions in different components. This communication is nor-
- mally implemented with a protocol between the subjects as
- peer entities. Incorrect access within a component shall
- not result from failure of an NTCB partition to communicate
- with other components.
-
- + Rationale
-
- The first paragraph of the interpretation is a
- straightforward extension of the requirement into the con-
- text of a network system and partitioned NTCB as defined for
- these network criteria.
-
- NTCB protocols should be robust enough so that they
- permit the system to operate correctly in the case of local-
- ized failure. The purpose of this protection is to preserve
- the integrity of the NTCB itself. It is not unusual for one
- or more components in a network to be inoperative at any
- time, so it is important to minimize the effects of such
- failures on the rest of the network. Additional integrity
- and denial of service issues are addressed in Part II.
-
- 2.2.3.2 Life-Cycle Assurance
-
-
- 2.2.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- The security mechanisms of the ADP system shall be tested
- and found to work as claimed in the system documentation.
- Testing shall be done to assure that there are no obvious
- ways for an unauthorized user to bypass or otherwise defeat
- the security protection mechanisms of the TCB. TESTING SHALL
- ALSO INCLUDE A SEARCH FOR OBVIOUS FLAWS THAT WOULD ALLOW
- VIOLATION OF RESOURCE ISOLATION, OR THAT WOULD PERMIT UNAU-
- THORIZED ACCESS TO THE AUDIT OR AUTHENTICATION DATA. (See
- the Security Testing Guidelines.)
-
- + Interpretation
-
- Testing of a component will require a testbed that
- exercises the interfaces and protocols of the COMPONENT
- INCLUDING TESTS UNDER EXCEPTIONAL CONDITIONS. The testing
- of a security mechanism of the network system for meeting
- this criterion shall be an integrated testing procedure
- involving all components containing an NTCB partition that
- implement the given mechanism. This integrated testing is
- additional to any individual component tests involved in the
- evaluation of the network system. The sponsor should iden-
- tify the allowable set of configurations including the sizes
- of the networks. Analysis or testing procedures and tools
- shall be available to test the limits of these configura-
- tions. A change in configuration within the allowable set
- of configurations does not require retesting.
-
- + Rationale
-
- Testing is the primary method available in this evalua-
- tion division to gain any assurance that the security
- mechanisms perform their intended function.
-
-
- 2.2.4 Documentation
- _ _ _ _____________
-
-
- 2.2.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A single summary, chapter, or manual in user documentation
- shall describe the protection mechanisms provided by the
- TCB, interpretations on their use, and how they interact
- with one another.
-
- + Interpretation
-
- This user documentation describes user visible protec-
- tion mechanisms at the global (network system) level and at
- the user interface of each component, and the interaction
- among these.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system as defined for these
- network criteria. Documentation of protection mechanisms
- provided by individual components is required by the cri-
- teria for trusted computer systems that are applied as
- appropriate for the individual components.
-
-
- 2.2.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A manual addressed to the ADP system administrator shall
- present cautions about functions and privileges that should
- be controlled when running a secure facility. THE PROCEDURES
- FOR EXAMINING AND MAINTAINING THE AUDIT FILES AS WELL AS THE
- DETAILED AUDIT RECORD STRUCTURE FOR EACH TYPE OF AUDIT EVENT
- SHALL BE GIVEN.
-
- + Interpretation
-
- This manual shall contain specifications and procedures
- to assist the system administrator(s) maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address the following:
-
- 1. The hardware configuration of the network itself;
-
- 2. The implications of attaching new components to the
- network;
-
- 3. The case where certain components may periodically
- leave the network (e.g., by crashing, or by being
- disconnected) and then rejoin;
-
- 4. Network configuration aspects that can impact the
- security of the network system; (For example, the
- manual should describe for the network system
- administrator the interconnections among components
- that are consistent with the overall network system
- architecture.)
-
- 5. Loading or modifying NTCB software or firmware
- (e.g., down-line loading).
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- + Rationale
-
- There may be multiple system administrators with
- diverse responsibilities. The technical security measures
- described by these criteria must be used in conjunction with
- other forms of security in order to achieve security of the
- network. Additional forms include administrative security,
- physical security, emanations security, etc.
-
- Extension of this criterion to cover configuration
- aspects of the network is needed because, for example,
- proper interconnection of components is typically essential
- to achieve a correct realization of the network architec-
- ture.
-
- Cryptography is one common mechanism employed to pro-
- tect communication circuits. Encryption transforms the
- representation of information so that it is unintelligible
- to unauthorized subjects. Reflecting this transformation,
- the sensitivity of the ciphertext is generally lower than
- the cleartext. If encryption methodologies are employed,
- they shall be approved by the National Security Agency
- (NSA).
-
- The encryption algorithm and its implementation are
- outside the scope of these interpretations. This algorithm
- and implementation may be implemented in a separate device
- or may be a function of a subject in a component not dedi-
- cated to encryption. Without prejudice, either implementa-
- tion packaging is referred to as an encryption mechanism
- herein.
-
-
- 2.2.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall provide to the evaluators a docu-
- ment that describes the test plan, test procedures that show
- how the security mechanisms were tested, and results of the
- security mechanisms' functional testing.
-
- + Interpretation
-
- The "system developer" is interpreted as "the network
- system sponsor". The description of the test plan should
- establish the context in which the testing was or should be
- conducted. The description should identify any additional
- test components that are not part of the system being
- evaluated. This includes a description of the test-relevant
- functions of such test components and a description of the
- interfacing of those test components to the system being
- evaluated. The description of the test plan should also
- demonstrate that the tests adequately cover the network
- security policy. The tests should include the features
- described in the System Architecture and the System
- Integrity sections. The tests should also include network
- configuration and sizing.
-
- + Rationale
-
- The entity being evaluated may be a networking subsys-
- tem (see Appendix A) to which other components must be added
- to make a complete network system. In that case, this
- interpretation is extended to include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
-
- 2.2.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- Documentation shall be available that provides a description
- of the manufacturer's philosophy of protection and an expla-
- nation of how this philosophy is translated into the TCB. If
- the TCB is composed of distinct modules, the interfaces
- between these modules shall be described.
-
- + Interpretation
-
- Explanation of how the sponsor's philosophy of protec-
- tion is translated into the NTCB shall include a description
- of how the NTCB is partitioned. The security policy also
- shall be stated. The description of the interfaces between
- the NTCB modules shall include the interface(s) between NTCB
- partitions and modules within the partitions if the modules
- exist. The sponsor shall describe the security architecture
- and design, including the allocation of security require-
- ments among components. Appendix A addresses component
- evaluation issues.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system as
- defined for this network interpretation. Other documenta-
- tion, such as description of components and description of
- operating environment(s) in which the networking subsystem
- or network system is designed to function, is required else-
- where, e.g., in the Trusted Facility Manual.
-
- In order to be evaluated, a network must possess a
- coherent Network Security Architecture and Design. (Inter-
- connection of components that do not adhere to such a single
- coherent Network Security Architecture is addressed in the
- Interconnection of Accredited AIS, Appendix C.) The Network
- Security Architecture must address the security-relevant
- policies, objectives, and protocols. The Network Security
- Design specifies the interfaces and services that must be
- incorporated into the network so that it can be evaluated as
- a trusted entity. There may be multiple designs that con-
- form to the same architecture but are more or less incompa-
- tible and non-interoperable (except through the Interconnec-
- tion Rules). Security related mechanisms requiring coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms having no visible
- interfaces are not specified in this document but are left
- as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network security Architecture and
- Design are satisfied. That is, the components can be assem-
- bled into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization that is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and unambi-
- guously define the security functionality of components as
- well as the interfaces between or among components. The
- Network Security Architecture and Design must be evaluated
- to determine that a network constructed to its specifica-
- tions will in fact be trusted, that is, it will be evaluat-
- able under these interpretations.
-
- 3.0 DIVISION B: MANDATORY PROTECTION
-
-
- The notion of an NTCB that preserves the integrity of sensi-
- tivity labels and uses them to enforce a set of mandatory
- access control rules is a major requirement in this divi-
- sion. Network systems in this division must carry the sen-
- sitivity labels with major data structures in the system.
- The network system sponsor also provides the security policy
- model on which the NTCB is based and furnishes a specifica-
- tion of the NTCB. Evidence must be provided to demonstrate
- that the reference monitor concept has been implemented.
-
-
- 3.1 CLASS (B1): LABELED SECURITY PROTECTION
- _ _ _____ __ _______ ________ __________
-
-
- CLASS (B1) NETWORK SYSTEMS REQUIRE ALL THE
- FEATURES REQUIRED FOR CLASS (C2). IN ADDITION, AN
- INFORMAL STATEMENT OF THE SECURITY POLICY MODEL,
- DATA LABELING, AND MANDATORY ACCESS CONTROL OVER
- SUBJECTS AND STORAGE OBJECTS MUST BE PRESENT. THE
- CAPABILITY MUST EXIST FOR ACCURATELY LABELING
- EXPORTED INFORMATION. ANY FLAWS IDENTIFIED BY
- TESTING MUST BE REMOVED. THE FOLLOWING ARE
- MINIMAL REQUIREMENTS FOR NETWORK SYSTEMS ASSIGNED
- A CLASS (B1) RATING:
-
-
- 3.1.1 Security Policy
- _ _ _ ________ ______
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- The network sponsor shall describe the overall network
- security policy enforced by the NTCB. At a minimum, this
- policy shall include the discretionary AND MANDATORY
- requirements applicable to this class. The policy may
- require data secrecy, or data integrity, or both. THE POL-
- ICY IS AN ACCESS CONTROL POLICY HAVING TWO PRIMARY COM-
- PONENTS: MANDATORY AND DISCRETIONARY. The policy shall
- include a discretionary policy for protecting the informa-
- tion being processed based on the authorizations of indivi-
- duals, users, or groups of users. This access control pol-
- icy statement shall describe the requirements on the network
- to prevent or detect "reading or destroying" sensitive
- information by unauthorized users or errors. THE MANDATORY
- POLICY MUST DEFINE THE SET OF DISTINCT SENSITIVITY LEVELS
- THAT IT SUPPORTS. FOR THE CLASS B1 OR ABOVE THE MANDATORY
- POLICY SHALL BE BASED ON THE LABELS ASSOCIATED WITH THE
- INFORMATION THAT REFLECTS ITS SENSITIVITY WITH RESPECT TO
- SECRECY AND/OR INTEGRITY, WHERE APPLICABLE, AND LABELS ASSO-
- CIATED WITH USERS TO REFLECT THEIR AUTHORIZATION TO ACCESS
- SUCH INFORMATION. UNAUTHORIZED USERS INCLUDE BOTH THOSE
- that are not authorized to use the network at all (e.g., a
- user attempting to use a passive or active wire tap) or a
- legitimate user of the network who is not authorized to
- access a specific piece of information being protected.
-
- Note that "users" does not include "operators," "system
- programmers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network sys-
- tem, for example, by defining membership of a group. These
- individuals may also have the separate role of users.
-
-
- SECRECY POLICY: The network sponsor shall define the
- form of the discretionary AND MANDATORY secrecy
- policy that is enforced in the network to prevent
- unauthorized users from reading the sensitive infor-
- mation entrusted to the network.
-
-
- DATA INTEGRITY POLICY: The network sponsor shall
- define the discretionary AND MANDATORY integrity
- policy to prevent unauthorized users from modifying,
- viz., writing, sensitive information. The defini-
- tion of data integrity presented by the network
- sponsor refers to the requirement that the informa-
- tion has not been subjected to unauthorized modifi-
- cation in the network. THE MANDATORY INTEGRITY POL-
- ICY ENFORCED BY THE NTCB CANNOT, IN GENERAL, PREVENT
- MODIFICATION WHILE INFORMATION IS BEING TRANSMITTED
- BETWEEN COMPONENTS. HOWEVER, AN INTEGRITY SENSI-
- TIVITY LABEL MAY REFLECT THE CONFIDENCE THAT THE
- INFORMATION HAS NOT BEEN SUBJECTED TO TRANSMISSION
- ERRORS BECAUSE OF THE PROTECTION AFFORDED DURING
- TRANSMISSION. THIS REQUIREMENT IS DISTINCT FROM THE
- REQUIREMENT FOR LABEL INTEGRITY.
-
- + Rationale
-
- The word "sponsor" is used in place of alternatives
- (such as "vendor," "architect," "manufacturer," and
- "developer") because the alternatives indicate people who
- may not be available, involved, or relevant at the time that
- a network system is proposed for evaluation.
-
- A trusted network is able to control both the reading
- and writing of shared sensitive information. Control of
- writing is used to protect against destruction of informa-
- tion. A network normally is expected to have policy require-
- ments to protect both the secrecy and integrity of the
- information entrusted to it. In a network the integrity is
- frequently as important or more important than the secrecy
- requirements. Therefore the secrecy and/or integrity policy
- to be enforced by the network must be stated for each net-
- work regardless of its evaluation class. The assurance that
- the policy is faithfully enforced is reflected in the
- evaluation class of the network.
-
- This control over modification is typically used to
- protect information so that it may be relied upon and to
- control the potential harm that would result if the informa-
- tion were corrupted. The overall network policy require-
- ments for integrity includes the protection for data both
- while being processed in a component and while being
- transmitted in the network. The access control policy
- enforced by the NTCB relates to the access of subjects to
- objects within each component. Communications integrity
- addressed within Part II relates to information while being
- transmitted.
-
- THE MANDATORY INTEGRITY POLICY (AT CLASS B1 AND ABOVE)
- IN SOME ARCHITECTURES MAY BE USEFUL IN SUPPORTING THE LINK-
- AGE BETWEEN THE CONNECTION ORIENTED ABSTRACTION INTRODUCED
- IN THE INTRODUCTION AND THE INDIVIDUAL COMPONENTS OF THE
- NETWORK. FOR EXAMPLE, IN A KEY DISTRIBUTION CENTER FOR
- END-TO-END ENCRYPTION, A DISTINCT INTEGRITY CATEGORY MAY BE
- ASSIGNED TO ISOLATE THE KEY GENERATION CODE AND DATA FROM
- POSSIBLE MODIFICATION BY OTHER SUPPORTING PROCESSES IN THE
- SAME COMPONENT, SUCH AS OPERATOR INTERFACES AND AUDIT.
-
- THE MANDATORY INTEGRITY POLICY FOR SOME ARCHITECTURE
- MAY DEFINE AN INTEGRITY SENSITIVITY LABEL THAT REFLECTS THE
- SPECIFIC REQUIREMENTS FOR ENSURING THAT INFORMATION HAS NOT
- BEEN SUBJECT TO RANDOM ERRORS IN EXCESS OF A STATED LIMIT
- NOR TO UNAUTHORIZED MESSAGE STREAM MODIFICATION (MSM) -.
- THE SPECIFIC METRIC ASSOCIATED WITH AN INTEGRITY SENSITIVITY
- LABEL WILL GENERALLY REFLECT THE INTENDED APPLICATIONS OF
- THE NETWORK.
-
-
- 3.1.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall define and control access between named users
- and named objects (e.g., files and programs) in the ADP sys-
- tem. The enforcement mechanism (e.g., self/group/public
- controls, access control lists) shall allow users to specify
- and control sharing of those objects by named individuals or
- defined groups of individuals, or both, and shall provide
- controls to limit propagation of access rights. The discre-
- tionary access control mechanism shall, either by explicit
- user action or by default, provide that objects are pro-
- tected from unauthorized access. These access controls
- shall be capable of including or excluding access to the
- granularity of a single user. Access permission to an
- object by users not already possessing access permission
- shall only be assigned by authorized users.
- _________________________
- - See Voydock, Victor L. and Stephen T. Kent, "Secu-
- rity Mechanisms in High-Level Network Protocols," Com-
- ___
- puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
- ______ _______
-
- + Interpretation
-
- The discretionary access control (DAC) mechanism(s) may
- be distributed over the partitioned NTCB in various ways.
- Some part, all, or none of the DAC may be implemented in a
- given component of the network system. In particular, com-
- ponents that support only internal subjects (i.e., that have
- no subjects acting as direct surrogates for users), such as
- a public network packet switch, might not implement the DAC
- mechanism(s) directly (e.g., they are unlikely to contain
- access control lists).
-
- Identification of users by groups may be achieved in
- various ways in the networking environment. For example,
- the network identifiers (e.g., internet addresses) for vari-
- ous components (e.g., hosts, gateways) can be used as iden-
- tifiers of groups of individual users (e.g., "all users at
- Host A," "all users of network Q") so long as the individu-
- als involved in the group are implied by the group identif-
- ier. For example, Host A might employ a particular group-id,
- for which it maintains a list of explicit users in that
- group, in its network exchange with Host B, which accepts
- the group-id under the conditions of this interpretation.
-
- For networks, individual hosts will impose need-to-know
- controls over their users on the basis of named individuals
- - much like (in fact, probably the same) controls used when
- there is no network connection.
-
- When group identifiers are acceptable for access con-
- trol, the identifier of some other host may be employed, to
- eliminate the maintenance that would be required if indivi-
- dual identification of remote users was employed. In class
- C2 and higher, however, it must be possible from that audit
- record to identify (immediately or at some later time)
- exactly the individuals represented by a group identifier at
- the time of the use of that identifier. There is allowed to
- be an uncertainty because of elapsed time between changes in
- the group membership and the enforcement in the access con-
- trol mechanisms.
-
- The DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. The reference monitor manages
- all the physical resources of the system and from them
- creates the abstraction of subjects and objects that it con-
- trols. Some of these subjects and objects may be used to
- implement a part of the NTCB. When the DAC mechanism is
- distributed in such NTCB subjects (i.e., when outside the
- reference monitor), the assurance requirements (see the
- Assurance section) for the design and implementation of the
- DAC shall be those of class C2 for all networks of class C2
- or above.
-
- When integrity is included as part of the network dis-
- cretionary security policy, the above interpretations shall
- be specifically applied to the controls over modification,
- viz, the write mode of access, within each component based
- on identified users or groups of users.
-
- + Rationale
-
- In this class, the supporting elements of the overall
- DAC mechanism are required to isolate information (objects)
- that supports DAC so that it is subject to auditing require-
- ments (see the System Architecture section). The use of
- network identifiers to identify groups of individual users
- could be implemented, for example, as an X.25 community of
- interest in the network protocol layer (layer 3). In all
- other respects, the supporting elements of the overall DAC
- mechanism are treated exactly as untrusted subjects are
- treated with respect to DAC in an ADP system, with the same
- result as noted in the interpretation.
-
- A typical situation for DAC is that a surrogate process
- for a remote user will be created in some host for access to
- objects under the control of the NTCB partition within that
- host. The interpretation requires that a user identifier be
- assigned and maintained for each such process by the NTCB,
- so that access by a surrogate process is subject to essen-
- tially the same discretionary controls as access by a pro-
- cess acting on behalf of a local user would be. However,
- within this interpretation a range of possible interpreta-
- tions of the assigned user identification is permitted.
-
- The most obvious situation would exist if a global
- database of network users were to be made permanently avail-
- able on demand to every host, (i.e., a name server existed)
- so that all user identifications were globally meaningful.
-
- It is also acceptable, however, for some NTCB parti-
- tions to maintain a database of locally-registered users for
- its own use. In such a case, one could choose to inhibit
- the creation of surrogate processes for locally unregistered
- users, or (if permitted by the local policy) alternatively,
- to permit the creation of surrogate processes with
- preselected user and group identifiers which, in effect,
- identify the process as executing on behalf of a member of a
- group of users on a particular remote host. The intent of
- the words concerning audit in the interpretation is to pro-
- vide a minimally acceptable degree of auditability for cases
- such as the last described. What is required is that there
- be a capability, using the audit facilities provided by the
- network NTCB partitions involved, to determine who was
- logged in at the actual host of the group of remote users at
- the time the surrogate processing occured.
-
- Associating the proper user id with a surrogate process
- is the job of identification and authentication. This means
- that DAC is applied locally, with respect to the user id of
- the surrogate process. The transmission of the data back
- across the network to the user's host, and the creation of a
- copy of the data there, is not the business of DAC.
-
- Components that support only internal subjects impact
- the implementation of the DAC by providing services by which
- information (e.g., a user-id) is made available to a com-
- ponent that makes a DAC decision. An example of the latter
- would be the case that a user at Host A attempts to access a
- file at Host B. The DAC decision might be (and usually
- would be) made at Host B on the basis of a user-id transmit-
- ted from Host A to Host B.
-
- Unique user identification may be achieved by a variety
- of mechanisms, including (a) a requirement for unique iden-
- tification and authentication on the host where access takes
- place; (b) recognition of fully qualified network
- addresses authenticated by another host and forwarded to the
- host where access takes place; or (c) administrative support
- of a network-wide unique personnel identifier that could be
- authenticated and forwarded by another host as in (b) above,
- or could be authenticated and forwarded by a dedicated net-
- work identification and authentication server. The proto-
- cols which implement (b) or (c) are subject to the System
- Architecture requirements.
-
- Network support for DAC might be handled in other ways
- than that described as "typical" above. In particular, some
- form of centralized access control is often proposed. An
- access control center may make all decisions for DAC, or it
- may share the burden with the hosts by controlling host-to-
- host connections, and leaving the hosts to decide on access
- to their objects by users at a limited set of remote hosts.
- In this case the access control center provides the linkage
- between the connection oriented abstraction (as discussed in
- the Introduction) and the overall network security policy
- for DAC. In all cases the enforcement of the decision must
- be provided by the host where the object resides.
-
- THERE ARE TWO FORMS OF DISTRIBUTION FOR THE DAC MECHAN-
- ISM: IMPLEMENTING PORTIONS OF THE DAC IN SEPARATE COM-
- PONENTS, AND SUPPORTING THE DAC IN SUBJECTS CONTAINED WITHIN
- THE NTCB PARTITION IN A COMPONENT. SINCE "THE ADP SYSTEM"
- IS UNDERSTOOD TO BE "THE COMPUTER NETWORK" AS A WHOLE, EACH
- NETWORK COMPONENT IS RESPONSIBLE FOR ENFORCING SECURITY IN
- THE MECHANISMS ALLOCATED TO IT TO ENSURE SECURE IMPLEMENTA-
- TION OF THE NETWORK SECURITY POLICY. FOR TRADITIONAL HOST
- SYSTEMS IT IS FREQUENTLY EASY TO ALSO ENFORCE THE DAC ALONG
- WITH THE MAC WITHIN THE REFERENCE MONITOR, PER SE, ALTHOUGH
- A FEW APPROACHES, SUCH AS VIRTUAL MACHINE MONITORS, SUPPORT
- DAC OUTSIDE THIS INTERFACE.
-
- IN CONTRAST TO THE UNIVERSALLY RIGID STRUCTURE OF MAN-
- DATORY POLICIES (SEE THE MANDATORY ACCESS CONTROL SECTION),
- DAC POLICIES TEND TO BE VERY NETWORK AND SYSTEM SPECIFIC,
- WITH FEATURES THAT REFLECT THE NATURAL USE OF THE SYSTEM.
- FOR NETWORKS IT IS COMMON THAT INDIVIDUAL HOSTS WILL IMPOSE
- CONTROLS OVER THEIR LOCAL USERS ON THE BASIS OF NAMED
- INDIVIDUALS-MUCH LIKE THE CONTROLS USED WHEN THERE IS NO
- NETWORK CONNECTION. HOWEVER, IT IS DIFFICULT TO MANAGE IN A
- CENTRALIZED MANNER ALL THE INDIVIDUALS USING A LARGE NET-
- WORK. THEREFORE, USERS ON OTHER HOSTS ARE COMMONLY GROUPED
- TOGETHER SO THAT THE CONTROLS REQUIRED BY THE NETWORK DAC
- POLICY ARE ACTUALLY BASED ON THE IDENTITY OF THE HOSTS OR
- OTHER COMPONENTS. A GATEWAY IS AN EXAMPLE OF SUCH A COM-
- PONENT.
-
- THE ASSURANCE REQUIREMENTS ARE AT THE VERY HEART OF THE
- CONCEPT OF A TRUSTED SYSTEM. IT IS THE ASSURANCE THAT
- DETERMINES IF A SYSTEM OR NETWORK IS APPROPRIATE FOR A GIVEN
- ENVIRONMENT, AS REFLECTED, FOR EXAMPLE, IN THE ENVIRONMENTS
- GUIDELINE-. IN THE CASE OF MONOLITHIC SYSTEMS THAT HAVE DAC
- INTEGRAL TO THE REFERENCE MONITOR, THE ASSURANCE REQUIRE-
- MENTS FOR DAC ARE INSEPARABLE FROM THOSE OF THE REST OF THE
- REFERENCE MONITOR. FOR NETWORKS THERE IS TYPICALLY A MUCH
- CLEARER DISTINCTION DUE TO DISTRIBUTED DAC. THE RATIONALE
- FOR MAKING THE DISTINCTION IN THIS NETWORK INTERPRETATION IS
- THAT IF MAJOR TRUSTED NETWORK COMPONENTS CAN BE MADE SIGNI-
- FICANTLY EASIER TO DESIGN AND IMPLEMENT WITHOUT REDUCING THE
- ABILITY TO MEET SECURITY POLICY, THEN TRUSTED NETWORKS WILL
- BE MORE EASILY AVAILABLE.
-
-
- 3.1.1.2 Object Reuse
-
- + Statement from DoD 5200.28-STD
-
- All authorizations to the information contained within a
- storage object shall be revoked prior to initial assignment,
- allocation or reallocation to a subject from the TCB's pool
- of unused storage objects. No information, including
- encrypted representations of information, produced by a
- prior subject's actions is to be available to any subject
- that obtains access to an object that has been released back
- to the system.
-
- + Interpretation
-
- The NTCB shall ensure that any storage objects that it
- controls (e.g., message buffers under the control of a NTCB
- partition in a component) contain no information for which a
- subject in that component is not authorized before granting
- access. This requirement must be enforced by each of the
- NTCB partitions.
-
-
-
- _________________________
- - Guidance for Applying the Department of Defense
- ________ ___ ________ ___ __________ __ _______
- Trusted Computer System Evaluation Criteria in Specific
- _______ ________ ______ __________ ________ __ ________
- Environments, CSC-STD-003-85.
- ____________
-
-
- + Rationale
-
- In a network system, storage objects of interest are
- things that the NTCB directly controls, such as message
- buffers in components. Each component of the network system
- must enforce the object reuse requirement with respect to
- the storage objects of interest as determined by the network
- security policy. For example, the DAC requirement in this
- division leads to the requirement here that message buffers
- be under the control of the NTCB partition. A buffer
- assigned to an internal subject may be reused at the discre-
- tion of that subject which is responsible for preserving the
- integrity of message streams. Such controlled objects may
- be implemented in physical resources, such as buffers, disk
- sectors, tape space, and main memory, in components such as
- network switches.
-
-
-
- 3.1.1.3 Labels
-
- + Statement from DoD 5200.28-STD
-
- SENSITIVITY LABELS ASSOCIATED WITH EACH SUBJECT AND STORAGE
- OBJECT UNDER ITS CONTROL (E.G., PROCESS, FILE, SEGMENT, DEV-
- ICE) SHALL BE MAINTAINED BY THE TCB. THESE LABELS SHALL BE
- USED AS THE BASIS FOR MANDATORY ACCESS CONTROL DECISIONS.
- IN ORDER TO IMPORT NON-LABELED DATA, THE TCB SHALL REQUEST
- AND RECEIVE FROM AN AUTHORIZED USER THE SENSITIVITY LEVEL OF
- THE DATA, AND ALL SUCH ACTIONS SHALL BE AUDITABLE BY THE
- TCB.
-
- + Interpretation
-
- NON-LABELED DATA IMPORTED UNDER THE CONTROL OF THE NTCB
- PARTITION WILL BE ASSIGNED A LABEL CONSTRAINED BY THE
- SINGLE-LEVEL DEVICE USED TO IMPORT IT. LABELS MAY INCLUDE
- SECRECY AND INTEGRITY- COMPONENTS IN ACCORDANCE WITH THE
- OVERALL NETWORK SECURITY POLICY DESCRIBED BY THE NETWORK
- SPONSOR. WHENEVER THE TERM "LABEL" IS USED THROUGHOUT THIS
- INTERPRETATION, IT IS UNDERSTOOD TO INCLUDE BOTH COMPONENTS
- AS APPLICABLE. SIMILARLY, THE TERMS "SINGLE-LEVEL" AND
- "MULTILEVEL" ARE UNDERSTOOD TO BE BASED ON BOTH THE SECRECY
- AND INTEGRITY COMPONENTS OF THE POLICY. THE MANDATORY
- INTEGRITY POLICY WILL TYPICALLY HAVE REQUIREMENTS, SUCH AS
- THE PROBABILITY OF UNDETECTED MESSAGE STREAM MODIFICATION,
- THAT WILL BE REFLECTED IN THE LABEL FOR THE DATA SO PRO-
- TECTED. FOR EXAMPLE, WHEN DATA IS IMPORTED ITS INTEGRITY
- LABEL MAY BE ASSIGNED BASED ON MECHANISMS, SUCH AS CRYPTOG-
- RAPHY, USED TO PROVIDE THE ASSURANCE REQUIRED BY THE POLICY.
- THE NTCB SHALL ASSURE THAT SUCH MECHANISM ARE PROTECTED FROM
- TAMPERING AND ARE ALWAYS INVOKED WHEN THEY ARE THE BASIS FOR
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Computer Systems," ESD-TR-76-372, MTR-
- 3153, The MITRE Corporation, Bedford, MA, April 1977.
-
-
- A LABEL.
-
- + Rationale
-
- THE INTERPRETATION IS AN EXTENSION OF THE REQUIREMENT
- INTO THE CONTEXT OF A NETWORK SYSTEM AND PARTITIONED NTCB AS
- DEFINED FOR THESE NETWORK INTERPRETATIONS. A SINGLE-LEVEL
- DEVICE MAY BE REGARDED EITHER AS A SUBJECT OR AN OBJECT. A
- MULTILEVEL DEVICE IS REGARDED AS A TRUSTED SUBJECT IN WHICH
- THE SECURITY RANGE OF THE SUBJECT IS THE MINIMUM-MAXIMUM
- RANGE OF THE DATA EXPECTED TO BE TRANSMITTED OVER THE DEV-
- ICE.
-
- THE SENSITIVITY LABELS FOR EITHER SECRECY OR INTEGRITY
- OR BOTH MAY REFLECT NON-HIERARCHICAL CATEGORIES OR HIERARCH-
- ICAL CLASSIFICATION OR BOTH.
-
-
-
- 3.1.1.3.1 Label Integrity
-
- + Statement from DoD 5200.28-STD
-
- SENSITIVITY LABELS SHALL ACCURATELY REPRESENT SENSITIVITY
- LEVELS OF THE SPECIFIC SUBJECTS OR OBJECTS WITH WHICH THEY
- ARE ASSOCIATED. WHEN EXPORTED BY THE TCB, SENSITIVITY
- LABELS SHALL ACCURATELY AND UNAMBIGUOUSLY REPRESENT THE
- INTERNAL LABELS AND SHALL BE ASSOCIATED WITH THE INFORMATION
- BEING EXPORTED.
-
- + Interpretation
-
- THE PHRASE "EXPORTED BY THE TCB" IS UNDERSTOOD TO
- INCLUDE TRANSMISSION OF INFORMATION FROM AN OBJECT IN ONE
- COMPONENT TO AN OBJECT IN ANOTHER COMPONENT. INFORMATION
- TRANSFERRED BETWEEN NTCB PARTITIONS IS ADDRESSED IN THE SYS-
- TEM INTEGRITY SECTION. THE FORM OF INTERNAL AND EXTERNAL
- (EXPORTED) SENSITIVITY LABELS MAY DIFFER, BUT THE MEANING
- SHALL BE THE SAME. THE NTCB SHALL, IN ADDITION, ENSURE THAT
- CORRECT ASSOCIATION OF SENSITIVITY LABELS WITH THE INFORMA-
- TION BEING TRANSPORTED ACROSS THE NETWORK IS PRESERVED.
-
- AS MENTIONED IN THE TRUSTED FACILITY MANUAL SECTION,
- ENCRYPTION TRANSFORMS THE REPRESENTATION OF INFORMATION SO
- THAT IT IS UNINTELLIGIBLE TO UNAUTHORIZED SUBJECTS.
- REFLECTING THIS TRANSFORMATION, THE SENSITIVITY LEVEL OF THE
- CIPHERTEXT IS GENERALLY LOWER THAN THE CLEARTEXT. IT FOL-
- LOWS THAT CLEARTEXT AND CIPHERTEXT ARE CONTAINED IN DIF-
- FERENT OBJECTS, EACH POSSESSING ITS OWN LABEL. THE LABEL OF
- THE CLEARTEXT MUST BE PRESERVED AND ASSOCIATED WITH THE
- CIPHERTEXT SO THAT IT CAN BE RESTORED WHEN THE CLEARTEXT IS
- SUBSEQUENTLY OBTAINED BY DECRYPTING THE CIPHERTEXT. IF THE
- CLEARTEXT IS ASSOCIATED WITH A SINGLE-LEVEL DEVICE, THE
- LABEL OF THAT CLEARTEXT MAY BE IMPLICIT. THE LABEL MAY ALSO
- BE IMPLICIT IN THE KEY.
-
- WHEN INFORMATION IS EXPORTED TO AN ENVIRONMENT WHERE IT
- IS SUBJECT TO DELIBERATE OR ACCIDENTAL MODIFICATION, THE TCB
- SHALL SUPPORT THE MEANS, SUCH AS CRYPTOGRAPHIC CHECKSUMS, TO
- ASSURE THE ACCURACY OF THE LABELS. WHEN THERE IS A MANDA-
- TORY INTEGRITY POLICY, THE POLICY WILL DEFINE THE MEANING OF
- INTEGRITY LABELS.
-
- + Rationale
-
- ENCRYPTION ALGORITHMS AND THEIR IMPLEMENTATION ARE OUT-
- SIDE THE SCOPE OF THESE INTERPRETATIONS. SUCH ALGORITHMS
- MAY BE IMPLEMENTED IN A SEPARATE DEVICE OR MAY BE INCOR-
- PORATED IN A SUBJECT OF A LARGER COMPONENT. WITHOUT PREJU-
- DICE, EITHER IMPLEMENTATION PACKAGING IS REFERRED TO AS AN
- ENCRYPTION MECHANISM HEREIN. IF ENCRYPTION METHODOLOGIES ARE
- EMPLOYED IN THIS REGARD, THEY SHALL BE APPROVED BY THE
- NATIONAL SECURITY AGENCY (NSA). THE ENCRYPTION PROCESS IS
- PART OF THE NETWORK TRUSTED COMPUTER BASE PARTITION IN THE
- COMPONENTS IN WHICH IT IS IMPLEMENTED.
-
- THE ENCRYPTION MECHANISM IS NOT NECESSARILY A MUL-
- TILEVEL DEVICE OR MULTILEVEL SUBJECT, AS THESE TERMS ARE
- USED IN THESE CRITERIA. THE PROCESS OF ENCRYPTION IS MUL-
- TILEVEL BY DEFINITION. THE CLEARTEXT AND CIPHERTEXT INTER-
- FACES CARRY INFORMATION OF DIFFERENT SENSITIVITY. AN
- ENCRYPTION MECHANISM DOES NOT PROCESS DATA IN THE SENSE OF
- PERFORMING LOGICAL OR ARITHMETIC OPERATIONS ON THAT DATA
- WITH THE INTENT OF PRODUCING NEW DATA. THE CLEARTEXT AND
- CIPHERTEXT INTERFACES ON THE ENCRYPTION MECHANISM MUST BE
- SEPARATELY IDENTIFIED AS BEING SINGLE-LEVEL OR MULTILEVEL.
- IF THE INTERFACE IS SINGLE-LEVEL, THEN THE SENSITIVITY OF
- THE DATA IS ESTABLISHED BY A TRUSTED INDIVIDUAL AND IMPLI-
- CITLY ASSOCIATED WITH THE INTERFACE; THE EXPORTATION TO
- SINGLE-LEVEL DEVICES CRITERION APPLIES.
-
- IF THE INTERFACE IS MULTILEVEL, THEN THE DATA MUST BE
- LABELED; THE EXPORTATION TO MULTILEVEL DEVICES CRITERION
- APPLIES. THE NETWORK ARCHITECT IS FREE TO SELECT AN ACCEPT-
- TABLE MECHANISM FOR ASSOCIATING A LABEL WITH AN OBJECT. WITH
- REFERENCE TO ENCRYPTED OBJECTS, THE FOLLOWING EXAMPLES ARE
- POSSIBLE:
-
- 1. INCLUDE A LABEL FIELD IN THE PROTOCOL DEFINITION OF
- THE OBJECT.
-
- 2. IMPLICITLY ASSOCIATE THE LABEL WITH THE OBJECT
- THROUGH THE ENCRYPTION KEY. THAT IS, THE ENCRYPTION
- KEY UNIQUELY IDENTIFIES A SENSITIVITY LEVEL. A SIN-
- GLE OR PRIVATE KEY MUST BE PROTECTED AT THE LEVEL OF
- THE DATA THAT IT ENCRYPTS.
-
-
- 3.1.1.3.2 Exportation of Labeled Information
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL DESIGNATE EACH COMMUNICATION CHANNEL AND I/O
- DEVICE AS EITHER SINGLE-LEVEL OR MULTILEVEL. ANY CHANGE IN
- THIS DESIGNATION SHALL BE DONE MANUALLY AND SHALL BE AUDIT-
- ABLE BY THE TCB. THE TCB SHALL MAINTAIN AND BE ABLE TO
- AUDIT ANY CHANGE IN THE SENSITIVITY LEVEL OR LEVELS ASSOCI-
- ATED WITH A COMMUNICATIONS CHANNEL OR I/O DEVICE.
-
- + Interpretation
-
- EACH COMMUNICATION CHANNEL AND NETWORK COMPONENT SHALL
- BE DESIGNATED AS EITHER SINGLE-LEVEL OR MULTILEVEL. ANY
- CHANGE IN THIS DESIGNATION SHALL BE DONE WITH THE COGNIZANCE
- AND APPROVAL OF THE ADMINISTRATOR OR SECURITY OFFICER IN
- CHARGE OF THE AFFECTED COMPONENTS AND THE ADMINISTRATOR OR
- SECURITY OFFICER IN CHARGE OF THE NTCB. THIS CHANGE SHALL
- BE AUDITABLE BY THE NETWORK. THE NTCB SHALL MAINTAIN AND BE
- ABLE TO AUDIT ANY CHANGE IN THE CURRENT SENSITIVITY LEVEL
- ASSOCIATED WITH THE DEVICE CONNECTED TO A SINGLE-LEVEL COM-
- MUNICATION CHANNEL OR THE RANGE ASSOCIATED WITH A MULTILEVEL
- COMMUNICATION CHANNEL OR COMPONENT. THE NTCB SHALL ALSO BE
- ABLE TO AUDIT ANY CHANGE IN THE SET OF SENSITIVITY LEVELS
- ASSOCIATED WITH THE INFORMATION WHICH CAN BE TRANSMITTED
- OVER A MULTILEVEL COMMUNICATION CHANNEL OR COMPONENT.
-
- + Rationale
-
- COMMUNICATION CHANNELS AND COMPONENTS IN A NETWORK ARE
- ANALOGOUS TO COMMUNICATION CHANNELS AND I/O DEVICES IN
- STAND-ALONE SYSTEMS. THEY MUST BE DESIGNATED AS EITHER MUL-
- TILEVEL (I.E., ABLE TO DISTINGUISH AND MAINTAIN SEPARATION
- AMONG INFORMATION OF VARIOUS SENSITIVITY LEVELS) OR SINGLE-
- LEVEL. AS IN THE TCSEC, SINGLE-LEVEL DEVICES MAY ONLY BE
- ATTACHED TO SINGLE-LEVEL CHANNELS.
-
- THE LEVEL OR SET OF LEVELS OF INFORMATION THAT CAN BE
- SENT TO A COMPONENT OR OVER A COMMUNICATION CHANNEL SHALL
- ONLY CHANGE WITH THE KNOWLEDGE AND APPROVAL OF THE SECURITY
- OFFICERS (OR SYSTEM ADMINISTRATOR, IF THERE IS NO SECURITY
- OFFICER) OF THE NETWORK, AND OF THE AFFECTED COMPONENTS.
- THIS REQUIREMENT ENSURES THAT NO SIGNIFICANT SECURITY-
- RELEVANT CHANGES ARE MADE WITHOUT THE APPROVAL OF ALL
- AFFECTED PARTIES.
-
-
- 3.1.1.3.2.1 Exportation to Multilevel Devices
-
- + Statement from DoD 5200.28-STD
-
- WHEN THE TCB EXPORTS AN OBJECT TO A MULTILEVEL I/O DEVICE,
- THE SENSITIVITY LABEL ASSOCIATED WITH THAT OBJECT SHALL ALSO
- BE EXPORTED AND SHALL RESIDE ON THE SAME PHYSICAL MEDIUM AS
- THE EXPORTED INFORMATION AND SHALL BE IN THE SAME FORM
- (I.E., MACHINE-READABLE OR HUMAN-READABLE FORM). WHEN THE
- TCB EXPORTS OR IMPORTS AN OBJECT OVER A MULTILEVEL COMMUNI-
- CATIONS CHANNEL, THE PROTOCOL USED ON THAT CHANNEL SHALL
- PROVIDE FOR THE UNAMBIGUOUS PAIRING BETWEEN THE SENSITIVITY
- LABELS AND THE ASSOCIATED INFORMATION THAT IS SENT OR
- RECEIVED.
-
- + Interpretation
-
- THE COMPONENTS, INCLUDING HOSTS, OF A NETWORK SHALL BE
- INTERCONNECTED OVER "MULTILEVEL COMMUNICATION CHANNELS,"
- MULTIPLE SINGLE-LEVEL COMMUNICATION CHANNELS, OR BOTH, WHEN-
- EVER THE INFORMATION IS TO BE PROTECTED AT MORE THAN A SIN-
- GLE SENSITIVITY LEVEL. THE PROTOCOL FOR ASSOCIATING THE
- SENSITIVITY LABEL AND THE EXPORTED INFORMATION SHALL PROVIDE
- THE ONLY INFORMATION NEEDED TO CORRECTLY ASSOCIATE A SENSI-
- TIVITY LEVEL WITH THE EXPORTED INFORMATION TRANSFERRED OVER
- THE MULTILEVEL CHANNEL BETWEEN THE NTCB PARTITIONS IN INDI-
- VIDUAL COMPONENTS. THIS PROTOCOL DEFINITION MUST SPECIFY THE
- REPRESENTATION AND SEMANTICS OF THE SENSITIVITY LABELS
- (I.E., THE MACHINE-READABLE LABEL MUST UNIQUELY REPRESENT
- THE SENSITIVITY LEVEL).
-
- THE "UNAMBIGUOUS" ASSOCIATION OF THE SENSITIVITY LEVEL
- WITH THE COMMUNICATED INFORMATION SHALL MEET THE SAME LEVEL
- OF ACCURACY AS THAT REQUIRED FOR ANY OTHER LABEL WITHIN THE
- NTCB, AS SPECIFIED IN THE CRITERION FOR LABEL INTEGRITY.
- THIS MAY BE PROVIDED BY PROTECTED AND HIGHLY RELIABLE DIRECT
- PHYSICAL LAYER CONNECTIONS, OR BY TRADITIONAL CRYPTOGRAPHIC
- LINK PROTECTION IN WHICH ANY ERRORS DURING TRANSMISSION CAN
- BE READILY DETECTED, OR BY USE OF A SEPARATE CHANNEL.
-
- + Rationale
-
- THIS PROTOCOL MUST SPECIFY THE REPRESENTATION AND
- SEMANTICS OF THE SENSITIVITY LABELS. SEE THE MANDATORY
- ACCESS CONTROL POLICIES SECTION IN APPENDIX B. THE MUL-
- TILEVEL DEVICE INTERFACE TO (UNTRUSTED) SUBJECTS MAY BE
- IMPLEMENTED EITHER BY THE INTERFACE OF THE REFERENCE MONI-
- TOR, PER SE, OR BY A MULTILEVEL SUBJECT (E.G., A "TRUSTED
- SUBJECT" AS DEFINED IN THE BELL-LAPADULA MODEL) THAT PRO-
- VIDES THE LABELS BASED ON THE INTERNAL LABELS OF THE NTCB
- PARTITION.
-
- THE CURRENT STATE OF THE ART LIMITS THE SUPPORT FOR
- MANDATORY POLICY THAT IS PRACTICAL FOR SECURE NETWORKS.
- REFERENCE MONITOR SUPPORT TO ENSURE THE CONTROL OVER ALL THE
- OPERATIONS OF EACH SUBJECT IN THE NETWORK MUST BE COMPLETELY
- PROVIDED WITHIN THE SINGLE NTCB PARTITION ON WHICH THAT SUB-
- JECT INTERFACES TO THE NTCB. THIS MEANS THAT THE ENTIRE
- PORTION OF THE "SECURE STATE" REPRESENTED IN THE SECURITY
- POLICY MODEL THAT MAY BE CHANGED BY TRANSITIONS INVOKED BY
- THIS SUBJECT MUST BE CONTAINED IN THE SAME COMPONENT.
-
- THE SECURE STATE OF AN NTCB PARTITION MAY BE AFFECTED
- BY EVENTS EXTERNAL TO THE COMPONENT IN WHICH THE NTCB PARTI-
- TION RESIDES (E.G., ARRIVAL OF A MESSAGE). THE EFFECT
- OCCURS ASYNCHRONUSLY AFTER BEING INITIATED BY AN EVENT IN
- ANOTHER COMPONENT OR PARTITION. FOR EXAMPLE, INDETERMINATE
- DELAYS MAY OCCUR BETWEEN THE INITIATION OF A MESSAGE IN ONE
- COMPONENT, THE ARRIVAL OF THE MESSAGE IN THE NTCB PARTITION
- IN ANOTHER COMPONENT, AND THE CORRESPONDING CHANGE TO THE
- SECURE STATE OF THE SECOND COMPONENT. SINCE EACH COMPONENT
- IS EXECUTING CONCURRENTLY, TO DO OTHERWISE WOULD REQUIRE
- SOME SORT OF NETWORK-WIDE CONTROL TO SYNCHRONIZE STATE TRAN-
- SITIONS, SUCH AS A GLOBAL NETWORK-WIDE CLOCK FOR ALL PROCES-
- SORS; IN GENERAL, SUCH DESIGNS ARE NOT PRACTICAL AND PROB-
- ABLY NOT EVEN DESIRABLE. THEREFORE, THE INTERACTION BETWEEN
- NTCB PARTITIONS IS RESTRICTED TO JUST COMMUNICATIONS BETWEEN
- PAIRS (AT LEAST LOGICALLY) OF DEVICES-MULTILEVEL DEVICES IF
- THE DEVICE(S) CAN SEND/RECEIVE DATA OF MORE THAN A SINGLE
- LEVEL. FOR BROADCAST CHANNELS THE PAIRS ARE THE SENDER AND
- INTENDED RECEIVER(S). HOWEVER, IF THE BROADCAST CHANNEL
- CARRIES MULTIPLE LEVELS OF INFORMATION, ADDITIONAL MECHANISM
- (E.G., CRYPTOCHECKSUM MAINTAINED BY THE TCB) MAY BE REQUIRED
- TO ENFORCE SEPARATION AND PROPER DELIVERY.
-
- A COMMON REPRESENTATION FOR SENSITIVITY LABELS IS
- NEEDED IN THE PROTOCOL USED ON THAT CHANNEL AND UNDERSTOOD
- BY BOTH THE SENDER AND RECEIVER WHEN TWO MULTILEVEL DEVICES
- (IN THIS CASE, IN TWO DIFFERENT COMPONENTS) ARE INTERCON-
- NECTED. EACH DISTINCT SENSITIVITY LEVEL OF THE OVERALL NET-
- WORK POLICY MUST BE REPRESENTED UNIQUELY IN THESE LABELS.
-
- WITHIN A MONOLITHIC TCB, THE ACCURACY OF THE SENSI-
- TIVITY LABELS IS GENERALLY ASSURED BY SIMPLE TECHNIQUES,
- E.G., VERY RELIABLE CONNECTIONS OVER VERY SHORT PHYSICAL
- CONNECTIONS, SUCH AS ON A SINGLE PRINTED CIRCUIT BOARD OR
- OVER AN INTERNAL BUS. IN MANY NETWORK ENVIRONMENTS THERE IS
- A MUCH HIGHER PROBABILITY OF ACCIDENTALLY OR MALICIOUSLY
- INTRODUCED ERRORS, AND THESE MUST BE PROTECTED AGAINST.
-
-
- 3.1.1.3.2.2 Exportation to Single-Level Devices
-
- + Statement from DoD 5200.28-STD
-
- SINGLE-LEVEL I/O DEVICES AND SINGLE-LEVEL COMMUNICATION
- CHANNELS ARE NOT REQUIRED TO MAINTAIN THE SENSITIVITY LABELS
- OF THE INFORMATION THEY PROCESS. HOWEVER, THE TCB SHALL
- INCLUDE A MECHANISM BY WHICH THE TCB AND AN AUTHORIZED USER
- RELIABLY COMMUNICATE TO DESIGNATE THE SINGLE SENSITIVITY
- LEVEL OF INFORMATION IMPORTED OR EXPORTED VIA SINGLE-LEVEL
- COMMUNICATION CHANNELS OR I/O DEVICES.
-
- + Interpretation
-
- WHENEVER ONE OR BOTH OF TWO DIRECTLY CONNECTED COM-
- PONENTS IS NOT TRUSTED TO MAINTAIN THE SEPARATION OF INFOR-
- MATION OF DIFFERENT SENSITIVITY LEVELS, OR WHENEVER THE TWO
- DIRECTLY CONNECTED COMPONENTS HAVE ONLY A SINGLE SENSITIVITY
- LEVEL IN COMMON, THE TWO COMPONENTS OF THE NETWORK SHALL
- COMMUNICATE OVER A SINGLE-LEVEL CHANNEL. SINGLE-LEVEL COM-
- PONENTS AND SINGLE-LEVEL COMMUNICATION CHANNELS ARE NOT
- REQUIRED TO MAINTAIN THE SENSITIVITY LABELS OF THE
- INFORMATION THEY PROCESS. HOWEVER, THE NTCB SHALL INCLUDE A
- RELIABLE COMMUNICATION MECHANISM BY WHICH THE NTCB AND AN
- AUTHORIZED USER OR A SUBJECT WITHIN AN NTCB PARTITION CAN
- DESIGNATE THE SINGLE SENSITIVITY LEVEL OF INFORMATION
- IMPORTED OR EXPORTED VIA SINGLE-LEVEL COMMUNICATION CHANNELS
- OR NETWORK COMPONENTS.
-
- + Rationale
-
- SINGLE-LEVEL COMMUNICATIONS CHANNELS AND SINGLE-LEVEL
- COMPONENTS IN NETWORKS ARE ANALOGOUS TO SINGLE LEVEL CHAN-
- NELS AND I/O DEVICES IN STAND-ALONE SYSTEMS IN THAT THEY ARE
- NOT TRUSTED TO MAINTAIN THE SEPARATION OF INFORMATION OF
- DIFFERENT SENSITIVITY LEVELS. THE LABELS ASSOCIATED WITH
- DATA TRANSMITTED OVER THOSE CHANNELS AND BY THOSE COMPONENTS
- ARE THEREFORE IMPLICIT; THE NTCB ASSOCIATES LABELS WITH THE
- DATA BECAUSE OF THE CHANNEL OR COMPONENT, NOT BECAUSE OF AN
- EXPLICIT PART OF THE BIT STREAM. NOTE THAT THE SENSITIVITY
- LEVEL OF ENCRYPTED INFORMATION IS THE LEVEL OF THE CIPHER-
- TEXT RATHER THAN THE ORIGINAL LEVEL(S) OF THE PLAINTEXT.
-
-
- 3.1.1.3.2.3 Labeling Human-Readable Output
-
- + Statement from DoD 5200.28-STD
-
- THE ADP SYSTEM ADMINISTRATOR SHALL BE ABLE TO SPECIFY THE
- PRINTABLE LABEL NAMES ASSOCIATED WITH EXPORTED SENSITIVITY
- LABELS. THE TCB SHALL MARK THE BEGINNING AND END OF ALL
- HUMAN-READABLE, PAGED, HARDCOPY OUTPUT (E.G., LINE PRINTER
- OUTPUT) WITH HUMAN-READABLE SENSITIVITY LABELS THAT PROP-
- ERLY1 REPRESENT THE SENSITIVITY OF THE OUTPUT. THE TCB
- SHALL, BY DEFAULT, MARK THE TOP AND BOTTOM OF EACH PAGE OF
- HUMAN-READABLE, PAGED, HARDCOPY OUTPUT (E.G., LINE PRINTER
- OUTPUT) WITH HUMAN-READABLE SENSITIVITY LABELS THAT PROP-
- ERLY1 REPRESENT THE SENSITIVITY OF THE PAGE. THE TCB SHALL,
- BY DEFAULT AND IN AN APPROPRIATE MANNER, MARK OTHER FORMS OF
- HUMAN READABLE OUTPUT (E.G., MAPS, GRAPHICS) WITH HUMAN-
- READABLE SENSITIVITY LABELS THAT PROPERLY1 REPRESENT THE
- SENSITIVITY OF THE OUTPUT. ANY OVERRIDE OF THESE MARKINGS
- DEFAULTS SHALL BE AUDITABLE BY THE TCB.
-
- + Interpretation
-
- THIS CRITERION IMPOSES NO REQUIREMENT TO A COMPONENT
- THAT PRODUCES NO HUMAN-READABLE OUTPUT. FOR THOSE THAT DO
- PRODUCE HUMAN-READABLE OUTPUT, EACH SENSITIVITY LEVEL THAT
- _________________________
- 1 THE HIERARCHICAL CLASSIFICATION COMPONENT IN HUMAN-
- READABLE SENSITIVITY LABELS SHALL BE EQUAL TO THE
- GREATEST HIERARCHICAL CLASSIFICATION OF ANY OF THE IN-
- FORMATION IN THE OUTPUT THAT THE LABELS REFER TO; THE
- NON-HIERARCHICAL CATEGORY COMPONENT SHALL INCLUDE ALL
- OF THE NON-HIERARCHICAL CATEGORIES OF THE INFORMATION
- IN THE OUTPUT THE LABELS REFER TO, BUT NO OTHER NON-
- HIERARCHICAL CATEGORIES.
-
-
-
-
- IS DEFINED TO THE NETWORK SHALL HAVE A UNIFORM MEANING
- ACROSS ALL COMPONENTS. THE NETWORK ADMINISTRATOR, IN CON-
- JUNCTION WITH ANY AFFECTED COMPONENT ADMINISTRATOR, SHALL BE
- ABLE TO SPECIFY THE HUMAN-READABLE LABEL THAT IS ASSOCIATED
- WITH EACH DEFINED SENSITIVITY LEVEL.
-
- + Rationale
-
- THE INTERPRETATION IS A STRAIGHTFORWARD EXTENSION OF
- THE REQUIREMENT INTO THE CONTEXT OF A NETWORK SYSTEM AND
- PARTITIONED NTCB AS DEFINED FOR THESE NETWORK INTERPRETA-
- TIONS.
-
-
-
- 3.1.1.4 Mandatory Access Control
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL ENFORCE A MANDATORY ACCESS CONTROL POLICY OVER
- ALL SUBJECTS AND STORAGE OBJECTS UNDER ITS CONTROL (E.G.,
- PROCESSES, FILES, SEGMENTS, DEVICES). THESE SUBJECTS AND
- OBJECTS SHALL BE ASSIGNED SENSITIVITY LABELS THAT ARE A COM-
- BINATION OF HIERARCHICAL CLASSIFICATION LEVELS AND NON-
- HIERARCHICAL CATEGORIES, AND THE LABELS SHALL BE USED AS THE
- BASIS FOR MANDATORY ACCESS CONTROL DECISIONS. THE TCB SHALL
- BE ABLE TO SUPPORT TWO OR MORE SUCH SENSITIVITY LEVELS.
- (SEE THE MANDATORY ACCESS CONTROL INTERPRETATIONS.) THE
- FOLLOWING REQUIREMENTS SHALL HOLD FOR ALL ACCESSES BETWEEN
- SUBJECTS AND OBJECTS CONTROLLED BY THE TCB: A SUBJECT CAN
- READ AN OBJECT ONLY IF THE HIERARCHICAL CLASSIFICATION IN
- THE SUBJECT'S SENSITIVITY LEVEL IS GREATER THAN OR EQUAL TO
- THE HIERARCHICAL CLASSIFICATION OF THE OBJECT'S SENSITIVITY
- LEVEL AND THE NON-HIERARCHICAL CATEGORIES IN THE SUBJECT'S
- SENSITIVITY LEVEL INCLUDE ALL THE NON-HIERARCHICAL
- CATEGORIES IN THE OBJECT'S SENSITIVITY LEVEL. A SUBJECT CAN
- WRITE AN OBJECT ONLY IF THE HIERARCHICAL CLASSIFICATION IN
- THE SUBJECT'S SENSITIVITY LEVEL IS LESS THAN OR EQUAL TO THE
- HIERARCHICAL CLASSIFICATION OF THE OBJECT'S SENSITIVITY
- LEVEL AND THE NON-HIERARCHICAL CATEGORIES IN THE SUBJECT'S
- SENSITIVITY LEVEL ARE INCLUDED IN THE NON-HIERARCHICAL
- CATEGORIES IN THE OBJECT'S SENSITIVITY LEVEL. IDENTIFICATION
- AND AUTHENTICATION DATA SHALL BE USED BY THE TCB TO AUTHEN-
- TICATE THE USER'S IDENTITY AND TO ENSURE THAT THE SENSI-
- TIVITY LEVEL AND AUTHORIZATION OF SUBJECTS EXTERNAL TO THE
- TCB THAT MAY BE CREATED TO ACT ON BEHALF OF THE INDIVIDUAL
- USER ARE DOMINATED BY THE CLEARANCE AND AUTHORIZATION OF
- THAT USER.
-
- + Interpretation
-
- EACH PARTITION OF THE NTCB EXERCISES MANDATORY ACCESS
- CONTROL POLICY OVER ALL SUBJECTS AND OBJECTS IN ITS COM-
- PONENT THAT ARE UNDER ITS CONTROL. IN A NETWORK, THE
- RESPONSIBILITY OF AN NTCB PARTITION ENCOMPASSES ALL MANDA-
- TORY ACCESS CONTROL FUNCTIONS IN ITS COMPONENT THAT WOULD BE
- REQUIRED OF A TCB IN A STAND-ALONE SYSTEM. IN PARTICULAR,
- SUBJECTS AND OBJECTS USED FOR COMMUNICATION WITH OTHER COM-
- PONENTS ARE UNDER THE CONTROL OF THE NTCB PARTITION. MANDA-
- TORY ACCESS CONTROL INCLUDES SECRECY AND INTEGRITY CONTROL
- TO THE EXTENT THAT THE NETWORK SPONSOR HAS DESCRIBED IN THE
- OVERALL NETWORK SECURITY POLICY.
-
- CONCEPTUAL ENTITIES ASSOCIATED WITH COMMUNICATION
- BETWEEN TWO COMPONENTS, SUCH AS SESSIONS, CONNECTIONS AND
- VIRTUAL CIRCUITS, MAY BE THOUGHT OF AS HAVING TWO ENDS, ONE
- IN EACH COMPONENT, WHERE EACH END IS REPRESENTED BY A LOCAL
- OBJECT. COMMUNICATION IS VIEWED AS AN OPERATION THAT COPIES
- INFORMATION FROM AN OBJECT AT ONE END OF A COMMUNICATION
- PATH TO AN OBJECT AT THE OTHER END. TRANSIENT DATA-CARRYING
- ENTITIES, SUCH AS DATAGRAMS AND PACKETS, EXIST EITHER AS
- INFORMATION WITHIN OTHER OBJECTS, OR AS A PAIR OF OBJECTS,
- ONE AT EACH END OF THE COMMUNICATION PATH.
-
- THE REQUIREMENT FOR "TWO OR MORE" SENSITIVITY LEVELS
- CAN BE MET BY EITHER SECRECY OR INTEGRITY LEVELS. WHEN
- THERE IS A MANDATORY INTEGRITY POLICY, THE STATED REQUIRE-
- MENTS FOR READING AND WRITING ARE GENERALIZED TO: A SUBJECT
- CAN READ AN OBJECT ONLY IF THE SUBJECT'S SENSITIVITY LEVEL
- DOMINATES THE OBJECT'S SENSITIVITY LEVEL, AND A SUBJECT CAN
- WRITE AN OBJECT ONLY IF THE OBJECT'S SENSITIVITY LEVEL DOM-
- INATES THE SUBJECT'S SENSITIVITY LEVEL. BASED ON THE
- INTEGRITY POLICY, THE NETWORK SPONSOR SHALL DEFINE THE DOMI-
- NANCE RELATION FOR THE TOTAL LABEL, FOR EXAMPLE, BY COMBIN-
- ING SECRECY AND INTEGRITY LATTICES. -
-
- + Rationale
-
- AN NTCB PARTITION CAN MAINTAIN ACCESS CONTROL ONLY OVER
- SUBJECTS AND OBJECTS IN ITS COMPONENT. ACCESS BY A SUBJECT
- IN ONE COMPONENT TO INFORMATION CONTAINED IN AN OBJECT IN
- ANOTHER COMPONENT REQUIRES THE CREATION OF A SUBJECT IN THE
- REMOTE COMPONENT WHICH ACTS AS A SURROGATE FOR THE FIRST
- SUBJECT.
-
- THE MANDATORY ACCESS CONTROLS MUST BE ENFORCED AT THE
- INTERFACE OF THE REFERENCE MONITOR (VIZ. THE MECHANISM THAT
- CONTROLS PHYSICAL PROCESSING RESOURCES) FOR EACH NTCB PARTI-
- TION. THIS MECHANISM CREATES THE ABSTRACTION OF SUBJECTS
- AND OBJECTS WHICH IT CONTROLS. SOME OF THESE SUBJECTS OUT-
- SIDE THE REFERENCE MONITOR, PER SE, MAY BE DESIGNATED TO
- IMPLEMENT PART OF AN NTCB PARTITION'S MANDATORY POLICY,
- E.G., BY USING THE ``TRUSTED SUBJECTS" DEFINED IN THE BELL-
- _________________________
- - See, for example, Grohn, M. J., A Model of a Pro-
- _ _____ __ _ ___
- tected Data Management System, ESD-TR-76-289, I. P.
- ______ ____ __________ ______
- Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
- Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
- and Shockley, W., Secure Distributed Data Views, Secu-
- ______ ___________ ____ _____ ____
- rity Policy and Interpretation for a Class A1 Multilev-
- ____ ______ ___ ______________ ___ _ _____ __ ________
- el Secure Relational Database System,SRI International,
- __ ______ __________ ________ ______
- November 1986.
-
-
- LAPADULA MODEL.
-
- THE PRIOR REQUIREMENTS ON EXPORTATION OF LABELED INFOR-
- MATION TO AND FROM I/O DEVICES ENSURE THE CONSISTENCY
- BETWEEN THE SENSITIVITY LABELS OF OBJECTS CONNECTED BY A
- COMMUNICATION PATH. AS NOTED IN THE INTRODUCTION, THE NET-
- WORK ARCHITECTURE MUST RECOGNIZE THE LINKAGE BETWEEN THE
- OVERALL MANDATORY NETWORK SECURITY POLICY AND THE CONNECTION
- ORIENTED ABSTRACTION. FOR EXAMPLE, INDIVIDUAL DATA-CARRYING
- ENTITIES SUCH AS DATAGRAMS CAN HAVE INDIVIDUAL SENSITIVITY
- LABELS THAT SUBJECT THEM TO MANDATORY ACCESS CONTROL IN EACH
- COMPONENT. THE ABSTRACTION OF A SINGLE-LEVEL CONNECTION IS
- REALIZED AND ENFORCED IMPLICITLY BY AN ARCHITECTURE WHILE A
- CONNECTION IS REALIZED BY SINGLE-LEVEL SUBJECTS THAT NECES-
- SARILY EMPLOY ONLY DATAGRAMS OF THE SAME LEVEL.
-
- THE FUNDAMENTAL TRUSTED SYSTEMS TECHNOLOGY PERMITS THE
- DAC MECHANISM TO BE DISTRIBUTED, IN CONTRAST TO THE REQUIRE-
- MENTS FOR MANDATORY ACCESS CONTROL. FOR NETWORKS THIS
- SEPARATION OF MAC AND DAC MECHANISMS IS THE RULE RATHER THAN
- THE EXCEPTION.
-
- THE SET OF TOTAL SENSITIVITY LABELS USED TO REPRESENT
- ALL THE SENSITIVITY LEVELS FOR THE MANDATORY ACCESS CONTROL
- (COMBINED DATA SECRECY AND DATA INTEGRITY) POLICY ALWAYS
- FORMS A PARTIALLY ORDERED SET. WITHOUT LOSS OF GENERALITY,
- THIS SET OF LABELS CAN ALWAYS BE EXTENDED TO FORM A LATTICE,
- BY INCLUDING ALL THE COMBINATIONS OF NON-HIERARCHICAL
- CATEGORIES. AS FOR ANY LATTICE, A DOMINANCE RELATION IS
- ALWAYS DEFINED FOR THE TOTAL SENSITIVITY LABELS. FOR ADMIN-
- ISTRATIVE REASONS IT MAY BE HELPFUL TO HAVE A MAXIMUM LEVEL
- WHICH DOMINATES ALL OTHERS.
-
-
- 3.1.2 Accountability
- _ _ _ ______________
-
-
- 3.1.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall require users to identify themselves to it
- before beginning to perform any other actions that the TCB
- is expected to mediate. Furthermore, the TCB shall MAINTAIN
- AUTHENTICATION DATA THAT INCLUDES INFORMATION FOR VERIFYING
- THE IDENTIFY OF INDIVIDUAL USERS (E.G., PASSWORDS) AS WELL
- AS INFORMATION FOR DETERMINING THE CLEARANCE AND AUTHORIZA-
- TIONS OF INDIVIDUAL USERS. THIS DATA SHALL BE USED BY THE
- TCB TO AUTHENTICATE THE USER'S IDENTITY AND TO ENSURE THAT
- THE SENSITIVITY LEVEL AND AUTHORIZATION OF SUBJECTS EXTERNAL
- TO THE TCB THAT MAY BE CREATED TO ACT ON BEHALF OF THE INDI-
- VIDUAL USER ARE DOMINATED BY THE CLEARANCE AND AUTHORIZATION
- OF THAT USER. The TCB shall protect authentication data so
- that it cannot be accessed by any unauthorized user. The
- TCB shall be able to enforce individual accountability by
- providing the capability to uniquely identify each indivi-
- dual ADP system user. The TCB shall also provide the
- capability of associating this identity with all auditable
- actions taken by that individual.
-
- + Interpretation
-
- The requirement for identification and authentication
- of users is the same for a network system as for an ADP sys-
- tem. The identification and authentication may be done by
- the component to which the user is directly connected or
- some other component, such as an identification and authen-
- tication server. Available techniques, such as those
- described in the Password Guideline=, are generally also
- applicable in the network context. However, in cases where
- the NTCB is expected to mediate actions of a host (or other
- network component) that is acting on behalf of a user or
- group of users, the NTCB may employ identification and
- authentication of the host (or other component) in lieu of
- identification and authentication of an individual user, so
- long as the component identifier implies a list of specific
- users uniquely associated with the identifier at the time of
- its use for authentication. This requirement does not apply
- to internal subjects.
-
- Authentication information, including the identity of a
- user (once authenticated) may be passed from one component
- to another without reauthentication, so long as the NTCB
- protects (e.g., by encryption) the information from unau-
- thorized disclosure and modification. This protection shall
- provide at least a similar level of assurance (or strength
- of mechanism) as pertains to the protection of the authenti-
- cation mechanism and authentication data.
-
- + Rationale
-
- The need for accountability is not changed in the con-
- text of a network system. The fact that the NTCB is parti-
- tioned over a set of components neither reduces the need nor
- imposes new requirements. That is, individual accountabil-
- ity is still the objective. Also, in the context of a net-
- work system at the (C2) level or higher "individual accoun-
- tability" can be satisfied by identification of a host (or
- other component) so long as the requirement for traceability
- to individual users or a set of specific individual users
- with active subjects is satisfied. There is allowed to be an
- uncertainty in traceability because of elapsed time between
- changes in the group membership and the enforcement in the
- access control mechanisms. In addition, there is no need in
- a distributed processing system like a network to reauthen-
- ticate a user at each point in the network where a projec-
- tion of a user (via the subject operating on behalf of the
- user) into another remote subject takes place.
-
-
- _________________________
- = Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, CSC-STD-002-85
- ____
-
-
- The passing of identifiers and/or authentication infor-
- mation from one component to another is usually done in sup-
- port to the implementation of the discretionary access con-
- trol (DAC). This support relates directly to the DAC
- regarding access by a user to a storage object in a dif-
- ferent NTCB partition than the one where the user was
- authenticated. Employing a forwarded identification implies
- additional reliance on the source and components along the
- path. IF THE AUTHENTICATED IDENTIFICATION IS USED AS THE
- BASIS OF DETERMINING A SENSITIVITY LABEL FOR A SUBJECT, IT
- MUST SATISFY THE LABEL INTEGRITY CRITERION.
-
- AN AUTHENTICATED IDENTIFICATION MAY BE FORWARDED
- BETWEEN COMPONENTS AND EMPLOYED IN SOME COMPONENT TO IDEN-
- TIFY THE SENSITIVITY LEVEL ASSOCIATED WITH A SUBJECT CREATED
- TO ACT ON BEHALF OF THE USER SO IDENTIFIED.
-
-
- 3.1.2.2 Audit
- _ _ _ _ _____
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall be able to create, maintain, and protect from
- modification or unauthorized access or destruction an audit
- trail of accesses to the objects it protects. The audit
- data shall be protected by the TCB so that read access to it
- is limited to those who are authorized for audit data. The
- TCB shall be able to record the following types of events:
- use of identification and authentication mechanisms, intro-
- duction of objects into a user's address space (e.g., file
- open, program initiation), deletion of objects, actions
- taken by computer operators and system administrators and/or
- system security officers, and other security relevant
- events. THE TCB SHALL ALSO BE ABLE TO AUDIT ANY OVERRIDE OF
- HUMAN-READABLE OUTPUT MARKINGS. For each recorded event,
- the audit record shall identify: date and time of the event,
- user, type of event, and success or failure of the event.
- For identification/authentication events the origin of
- request (e.g., terminal ID) shall be included in the audit
- record. For events that introduce an object into a user's
- address space and for object deletion events the audit
- record shall include the name of the object AND THE OBJECT'S
- SENSITIVITY LEVEL. The ADP system administrator shall be
- able to selectively audit the actions of any one or more
- users based on individual identify AND/OR OBJECT SENSITIVITY
- LEVEL.
-
- + Interpretation
-
- This criterion applies as stated. The sponsor must
- select which events are auditable. If any such events are
- not distinguishable by the NTCB alone (for example those
- identified in Part II), the audit mechanism shall provide an
- interface, which an authorized subject can invoke with
- parameters sufficient to produce an audit record. These
- audit records shall be distinguishable from those provided
- by the NTCB. In the context of a network system, "other
- security relevant events" (depending on network system
- architecture and network security policy) might be as fol-
- lows:
-
-
- 1. Identification of each access event (e.g., estab-
- lishing a connection or a connectionless association
- between processes in two hosts of the network) and
- its principal parameters (e.g., host identifiers of
- the two hosts involved in the access event and user
- identifier or host identifier of the user or host
- that is requesting the access event)
-
- 2. Identification of the starting and ending times of
- each access event using local time or global syn-
- chronized time
-
- 3. Identification of security-relevant exceptional con-
- ditions (e.g., potential violation of data
- integrity, such as misrouted datagrams) detected
- during the transactions between two hosts
-
- 4. Utilization of cryptographic variables
-
- 5. Changing the configuration of the network (e.g., a
- component leaving the network and rejoining)
-
- In addition, identification information should be
- included in appropriate audit trail records, as necessary,
- to allow association of all related (e.g., involving the
- same network event) audit trail records (e.g., at different
- hosts) with each other. Furthermore, a component of the
- network system may provide the required audit capability
- (e.g., storage, retrieval, reduction, analysis) for other
- components that do not internally store audit data but
- transmit the audit data to some designated collection com-
- ponent. Provisions shall be made to control the loss of
- audit data due to unavailability of resources.
-
- In the context of a network system, the "user's address
- space" is extended, for object introduction and deletion
- events, to include address spaces being employed on behalf
- of a remote user (or host). However, the focus remains on
- users in contrast to internal subjects as discussed in the
- DAC criterion. In addition, audit information must be
- stored in machine-readable form.
-
- + Rationale
-
- For remote users, the network identifiers (e.g., inter-
- net address) can be used as identifiers of groups of indivi-
- dual users (e.g., "all users at Host A") to eliminate the
- maintenance that would be required if individual identifica-
- tion of remote users was employed. In this class (C2), how-
- ever, it must be possible to identify (immediately or at
- some later time) the individuals represented by a group
- identifier. In all other respects, the interpretation is a
- straightforward extension of the criterion into the context
- of a network system.
-
-
- 3.1.3 Assurance
- _ _ _ _________
-
-
- 3.1.3.1 Operational Assurance
-
-
- 3.1.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall maintain a domain for its own execution that
- protects it from external interference or tampering (e.g.,
- by modification of its code or data structures). Resources
- controlled by the TCB may be a defined subset of the sub-
- jects and objects in the ADP system. THE TCB SHALL MAINTAIN
- PROCESS ISOLATION THROUGH THE PROVISION OF DISTINCT ADDRESS
- SPACES UNDER ITS CONTROL. The TCB shall isolate the
- resources to be protected so that they are subject to the
- access control and auditing requirements.
-
- + Interpretation
-
- The system architecture criterion must be met individu-
- ally by all NTCB partitions. Implementation of the require-
- ment that the NTCB maintain a domain for its own execution
- is achieved by having each NTCB partition maintain a domain
- for its own execution. SINCE EACH COMPONENT IS ITSELF A DIS-
- TINCT DOMAIN IN THE OVERALL NETWORK SYSTEM, THIS ALSO SATIS-
- FIES THE REQUIREMENT FOR PROCESS ISOLATION THROUGH DISTINCT
- ADDRESS SPACES IN THE SPECIAL CASE WHERE A COMPONENT HAS
- ONLY A SINGLE SUBJECT.
-
- The subset of network resources over which the NTCB has
- control are the union of the sets of resources over which
- the NTCB partitions have control. Code and data structures
- belonging to the NTCB, transferred among NTCB subjects
- (i.e., subjects outside the reference monitor but inside the
- NTCB) belonging to different NTCB partitions, must be pro-
- tected against external interference or tampering. For
- example, a cryptographic checksum or physical means may be
- employed to protect user authentication data exchanged
- between NTCB partitions.
-
- Each NTCB partition provides isolation of RESOURCES
- (WITHIN ITS COMPONENT) TO BE PROTECTED IN accord with the
- network system architecture and security policy SO THAT
- "SUPPORTING ELEMENTS" (E.G., DAC AND USER IDENTIFICATION)
- FOR THE SECURITY MECHANISMS OF THE NETWORK SYSTEM ARE
- STRENGTHENED COMPARED TO C2, FROM AN ASSURANCE POINT OF
- VIEW, THROUGH THE PROVISION OF DISTINCT ADDRESS SPACES UNDER
- CONTROL OF THE NTCB.
-
- AS DISCUSSED IN THE DISCRETIONARY ACCESS CONTROL SEC-
- TION, THE DAC MECHANISM OF A NTCB PARTITION MAY BE IMPLE-
- MENTED AT THE INTERFACE OF THE REFERENCE MONITOR OR MAY BE
- DISTRIBUTED IN SUBJECTS THAT ARE PART OF THE NTCB IN THE
- SAME OR DIFFERENT COMPONENT. WHEN DISTRIBUTED IN NTCB SUB-
- JECTS (I.E., WHEN OUTSIDE THE REFERENCE MONITOR), THE
- ASSURANCE REQUIREMENTS FOR THE DESIGN AND IMPLEMENTATION OF
- THE DAC SHALL BE THOSE OF CLASS C2 FOR ALL NETWORKS OF CLASS
- C2 OR ABOVE.
-
- + Rationale
-
-
- The requirement for the protection of communications
- between NTCB partitions is specifically directed to subjects
- that are part of the NTCB partitions. Any requirements for
- such protection for the subjects that are outside the NTCB
- partitions are addressed in response to the integrity
- requirements of the security policy.
-
- THE PROVISION OF DISTINCT ADDRESS SPACES UNDER THE CON-
- TROL OF THE NTCB PROVIDES THE ABILITY TO SEPARATE SUBJECTS
- ACCORDING TO SENSITIVITY LEVEL. THIS REQUIREMENT IS INTRO-
- DUCED AT B1 SINCE IT IS AN ABSOLUTE NECESSITY IN ORDER TO
- IMPLEMENT MANDATORY ACCESS CONTROLS.
-
-
- 3.1.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- Hardware and/or software features shall be provided that can
- be used to periodically validate the correct operation of
- the on-site hardware and firmware elements of the TCB.
-
- + Interpretation
-
- Implementation of the requirement is partly achieved by
- having hardware and/or software features that can be used to
- periodically validate the correct operation of the hardware
- and firmware elements of each component's NTCB partition.
- Features shall also be provided to validate the identity and
- correct operation of a component prior to its incorporation
- in the network system and throughout system operation. For
- example, a protocol could be designed that enables the com-
- ponents of the partitioned NTCB to exchange messages period-
- ically and validate each other's correct response. The pro-
- tocol shall be able to determine the remote entity's ability
- to respond. NTCB partitions shall provide the capability to
- report to network administrative personnel the failures
- detected in other NTCB partitions.
-
- Intercomponent protocols implemented within a NTCB
- shall be designed in such a way as to provide correct opera-
- tion in the case of failures of network communications or
- individual components. The allocation of MANDATORY AND dis-
- cretionary access control policy in a network may require
- communication between trusted subjects that are part of the
- NTCB partitions in different components. This communication
- is normally implemented with a protocol between the subjects
- as peer entities. Incorrect access within a component shall
- not result from failure of an NTCB partition to communicate
- with other components.
-
- + Rationale
-
- The first paragraph of the interpretation is a
- straightforward extension of the requirement into the con-
- text of a network system and partitioned NTCB as defined for
- these network criteria.
-
- NTCB protocols should be robust enough so that they
- permit the system to operate correctly in the case of local-
- ized failure. The purpose of this protection is to preserve
- the integrity of the NTCB itself. It is not unusual for one
- or more components in a network to be inoperative at any
- time, so it is important to minimize the effects of such
- failures on the rest of the network. Additional integrity
- and denial of service issues are addressed in Part II.
-
-
- 3.1.3.2 Life-Cycle Assurance
-
-
- 3.1.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- The security mechanisms of the ADP system shall be tested
- and found to work as claimed in the system documentation. A
- TEAM OF INDIVIDUALS WHO THOROUGHLY UNDERSTAND THE SPECIFIC
- IMPLEMENTATION OF THE TCB SHALL SUBJECT ITS DESIGN DOCUMEN-
- TATION, SOURCE CODE, AND OBJECT CODE TO THROUGH ANALYSIS AND
- TESTING. THEIR OBJECTIVES SHALL BE: TO UNCOVER ALL DESIGN
- AND IMPLEMENTATION FLAWS THAT WOULD PERMIT A SUBJECT EXTER-
- NAL TO THE TCB TO READ, CHANGE, OR DELETE DATA NORMALLY
- DENIED UNDER THE MANDATORY OR DISCRETIONARY SECURITY POLICY
- ENFORCED BY THE TCB; AS WELL AS TO ASSURE THAT NO SUBJECT
- (WITHOUT AUTHORIZATION TO DO SO) IS ABLE TO CAUSE THE TCB TO
- ENTER A STATE SUCH THAT IT IS UNABLE TO RESPOND TO COMMUNI-
- CATIONS INITIATED BY OTHER USERS. ALL DISCOVERED FLAWS SHALL
- BE REMOVED OR NEUTRALIZED AND THE TCB RETESTED TO DEMON-
- STRATE THAT THEY HAVE BEEN ELIMINATED AND THAT NEW FLAWS
- HAVE NOT BEEN INTRODUCED. (See the Security Testing Guide-
- lines.)
-
- + Interpretation
-
- Testing of a component will require a testbed that
- exercises the interfaces and protocols of the component
- including tests under exceptional conditions. The testing
- of a security mechanism of the network system for meeting
- this criterion shall be an integrated testing procedure
- involving all components containing an NTCB partition that
- implement the given mechanism. This integrated testing is
- additional to any individual component tests involved in the
- evaluation of the network system. The sponsor should iden-
- tify the allowable set of configurations including the sizes
- of the networks. Analysis or testing procedures and tools
- shall be available to test the limits of these configura-
- tions. A change in configuration within the allowable set
- of configurations does not require retesting.
-
- THE TESTING OF EACH COMPONENT WILL INCLUDE THE INTRO-
- DUCTION OF SUBJECTS EXTERNAL TO THE NTCB PARTITION FOR THE
- COMPONENT THAT WILL ATTEMPT TO READ, CHANGE, OR DELETE DATA
- NORMALLY DENIED. IF THE NORMAL INTERFACE TO THE COMPONENT
- DOES NOT PROVIDE A MEANS TO CREATE THE SUBJECTS NEEDED TO
- CONDUCT SUCH A TEST, THEN THIS PORTION OF THE TESTING SHALL
- USE A SPECIAL VERSION OF THE UNTRUSTED SOFTWARE FOR THE COM-
- PONENT THAT RESULTS IN SUBJECTS THAT MAKE SUCH ATTEMPTS.
- THE RESULTS SHALL BE SAVED FOR TEST ANALYSIS. SUCH SPECIAL
- VERSIONS SHALL HAVE AN NTCB PARTITION THAT IS IDENTICAL TO
- THAT FOR THE NORMAL CONFIGURATION OF THE COMPONENT UNDER
- EVALUATION.
-
- THE TESTING OF THE MANDATORY CONTROLS SHALL INCLUDE
- TESTS TO DEMONSTRATE THAT THE LABELS FOR INFORMATION
- IMPORTED AND/OR EXPORTED TO/FROM THE COMPONENT ACCURATELY
- REPRESENT THE LABELS MAINTAINED BY THE NTCB PARTITION FOR
- THE COMPONENT FOR USE AS THE BASIS FOR ITS MANDATORY ACCESS
- CONTROL DECISIONS. THE TESTS SHALL INCLUDE EACH TYPE OF
- DEVICE, WHETHER SINGLE-LEVEL OR MULTILEVEL, SUPPORTED BY THE
- COMPONENT.
-
- + Rationale
-
- THE PHRASE "NO SUBJECT (WITHOUT AUTHORIZATION TO DO SO)
- IS ABLE TO CAUSE THE TCB TO ENTER A STATE SUCH THAT IT IS
- UNABLE TO RESPOND TO COMMUNICATIONS INITIATED BY OTHER
- USERS" RELATES TO THE SECURITY SERVICES (PART II OF THIS
- TNI) FOR THE DENIAL OF SERVICE PROBLEM, AND TO CORRECTNESS
- OF THE PROTOCOL IMPLEMENTATIONS.
-
- Testing is AN IMPORTANT method available in this
- evaluation division to gain any assurance that the security
- mechanisms perform their intended function. A MAJOR PURPOSE
- OF TESTING IS TO DEMONSTRATE THE SYSTEM'S RESPONSE TO INPUTS
- TO THE NTCB PARTITION FROM UNTRUSTED (AND POSSIBLY MALI-
- CIOUS) SUBJECTS.
-
- IN CONTRAST TO GENERAL PURPOSE SYSTEMS THAT ALLOW FOR
- THE DYNAMIC CREATION OF NEW PROGRAMS AND THE INTRODUCTIONS
- OF NEW PROCESSES (AND HENCE NEW SUBJECTS) WITH USER SPECI-
- FIED SECURITY PROPERITIES, MANY NETWORK COMPONENTS HAVE NO
- METHOD FOR INTRODUCING NEW PROGRAMS AND/OR PROCESSES DURING
- THEIR NORMAL OPERATION. THEREFORE, THE PROGRAMS NECESSARY
- FOR THE TESTING MUST BE INTRODUCED AS SPECIAL VERSIONS OF
- THE SOFTWARE RATHER THAN AS THE RESULT OF NORMAL INPUTS BY
- THE TEST TEAM. HOWEVER, IT MUST BE INSURED THAT THE NTCB
- PARTITION USED FOR SUCH TESTS IS IDENTICAL TO THE ONE UNDER
- EVALUATION.
-
- SENSITIVITY LABELS SERVE A CRITICAL ROLE IN MAINTAINING
- THE SECURITY OF THE MANDATORY ACCESS CONTROLS IN THE NET-
- WORK. ESPECIALLY IMPORTANT TO NETWORK SECURITY IS THE ROLE
- OF THE LABELS FOR INFORMATION COMMUNICATED BETWEEN COM-
- PONENTS - EXPLICIT LABELS FOR MULTILEVEL DEVICES AND IMPLI-
- CIT LABELS FOR SINGLE-LEVEL DEVICES. THEREFORE THE TESTING
- FOR CORRECT LABELS IS HIGHLIGHTED.
-
-
-
- 3.1.3.2.2 Design Specification and Verification
-
- + Statement from DoD 5200.28-STD
-
- AN INFORMAL OR FORMAL MODEL OF THE SECURITY POLICY SUPPORTED
- BY THE TCB SHALL BE MAINTAINED OVER THE LIFE CYCLE OF THE
- ADP SYSTEM AND DEMONSTRATED TO BE CONSISTENT WITH ITS
- AXIOMS.
-
- + Interpretation
-
- THE OVERALL NETWORK SECURITY POLICY EXPRESSED IN THIS
- MODEL WILL PROVIDE THE BASIS FOR THE MANDATORY ACCESS CON-
- TROL POLICY EXERCISED BY THE NTCB OVER SUBJECTS AND STORAGE
- OBJECTS IN THE ENTIRE NETWORK. THE POLICY WILL ALSO BE THE
- BASIS FOR THE DISCRETIONARY ACCESS CONTROL POLICY EXERCISED
- BY THE NTCB TO CONTROL ACCESS OF NAMED USERS TO NAMED
- OBJECTS. DATA INTEGRITY REQUIREMENTS ADDRESSING THE EFFECTS
- OF UNAUTHORIZED MSM NEED NOT BE INCLUDED IN THIS MODEL. THE
- OVERALL NETWORK POLICY MUST BE DECOMPOSED INTO POLICY ELE-
- MENTS THAT ARE ALLOCATED TO APPROPRIATE COMPONENTS AND USED
- AS THE BASIS FOR THE SECURITY POLICY MODEL FOR THOSE COM-
- PONENTS.
-
- THE LEVEL OF ABSTRACTION OF THE MODEL, AND THE SET OF
- SUBJECTS AND OBJECTS THAT ARE EXPLICITLY REPRESENTED IN THE
- MODEL, WILL BE AFFECTED BY THE NTCB PARTITIONING. SUBJECTS
- AND OBJECTS MUST BE REPRESENTED EXPLICITLY IN THE MODEL FOR
- THE PARTITION IF THERE IS SOME NETWORK COMPONENT WHOSE NTCB
- PARTITION EXERCISES ACCESS CONTROL OVER THEM. THE MODEL
- SHALL BE STRUCTURED SO THAT THE AXIOMS AND ENTITIES APPLICA-
- BLE TO INDIVIDUAL NETWORK COMPONENTS ARE MANIFEST. GLOBAL
- NETWORK POLICY ELEMENTS THAT ARE ALLOCATED TO COMPONENTS
- SHALL BE REPRESENTED BY THE MODEL FOR THAT COMPONENT.
-
- + Rationale
-
- THE TREATMENT OF THE MODEL DEPENDS TO A GREAT EXTENT ON
- THE DEGREE OF INTEGRATION OF THE COMMUNICATIONS SERVICE INTO
- A DISTRIBUTED SYSTEM. IN A CLOSELY COUPLED DISTRIBUTED SYS-
- TEM, ONE MIGHT USE A MODEL THAT CLOSELY RESEMBLES ONE
- APPROPRIATE FOR A STAND-ALONE COMPUTER SYSTEM.
-
- IN OTHER CASES, THE MODEL OF EACH PARTITION WILL BE
- EXPECTED TO SHOW THE ROLE OF THE NTCB PARTITION IN EACH KIND
- OF COMPONENT. IT WILL MOST LIKELY CLARIFY THE MODEL,
- ALTHOUGH NOT PART OF THE MODEL, TO SHOW ACCESS RESTRICTIONS
- IMPLIED BY THE SYSTEM DESIGN; FOR EXAMPLE, SUBJECTS
- REPRESENTING PROTOCOL ENTITIES MIGHT HAVE ACCESS ONLY TO
- OBJECTS CONTAINING DATA UNITS AT THE SAME LAYER OF PROTOCOL.
- THE ALLOCATION OF SUBJECTS AND OBJECTS TO DIFFERENT PROTO-
- COL LAYERS IS A PROTOCOL DESIGN CHOICE WHICH NEED NOT BE
- REFLECTED IN THE SECURITY POLICY MODEL.
-
-
- 3.1.4 Documentation.
- _ _ _ _____________
-
-
- 3.1.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A single summary, chapter, or manual in user documentation
- shall describe the protection mechanisms provided by the
- TCB, interpretations on their use, and how they interact
- with one another.
-
- + Interpretation
-
- This user documentation describes user visible protec-
- tion mechanisms at the global (network system) level and at
- the user interface of each component, and the interaction
- among these.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system as defined for these
- network criteria. Documentation of protection mechanisms
- provided by individual components is required by the cri-
- teria for trusted computer systems that are applied as
- appropriate for the individual components.
-
-
- 3.1.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A manual addressed to the ADP system administrator shall
- present cautions about functions and privileges that should
- be controlled when running a secure facility. The procedures
- for examining and maintaining the audit files as well as the
- detailed audit record structure for each type of audit event
- shall be given. THE MANUAL SHALL DESCRIBE THE OPERATOR AND
- ADMINISTRATOR FUNCTIONS RELATED TO SECURITY, TO INCLUDE
- CHANGING THE SECURITY CHARACTERISTICS OF A USER. IT SHALL
- PROVIDE INTERPRETATIONS ON THE CONSISTENT AND EFFECTIVE USE
- OF THE PROTECTION FEATURES OF THE SYSTEM, HOW THEY INTERACT,
- HOW TO SECURELY GENERATE A NEW TCB, AND FACILITY PROCEDURES,
- WARNINGS, AND PRIVILEGES THAT NEED TO BE CONTROLLED IN ORDER
- TO OPERATE THE FACILITY IN A SECURE MANNER.
-
-
- + Interpretation
-
- This manual shall contain specifications and procedures
- to assist the system administrator(s) maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address the following:
-
- 1. The hardware configuration of the network itself;
-
- 2. The implications of attaching new components to the
- network;
-
- 3. The case where certain components may periodically
- leave the network (e.g., by crashing, or by being
- disconnected) and then rejoin;
-
- 4. Network configuration aspects that can impact the
- security of the network system; (For example, the
- manual should describe for the network system
- administrator the interconnections among components
- that are consistent with the overall network system
- architecture.)
-
- 5. Loading or modifying NTCB software or firmware
- (e.g., down-line loading).
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- + Rationale
-
- There may be multiple system administrators with
- diverse responsibilities. The technical security measures
- described by these criteria must be used in conjunction with
- other forms of security in order to achieve security of the
- network. Additional forms include administrative security,
- physical security, emanations security, etc.
-
- Extension of this criterion to cover configuration
- aspects of the network is needed because, for example,
- proper interconnection of components is typically essential
- to achieve a correct realization of the network architec-
- ture.
-
- AS MENTIONED IN THE SECTION ON LABEL INTEGRITY, cryp-
- tography is one common mechanism employed to protect commun-
- ication circuits. Encryption transforms the representation
- of information so that it is unintelligible to unauthorized
- subjects. Reflecting this transformation, the sensitivity
- of the ciphertext is generally lower than the cleartext. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency (NSA).
-
- The encryption algorithm and its implementation are
- outside the scope of these interpretations. This algorithm
- and implementation may be implemented in a separate device
- or may be a function of a subject in a component not dedi-
- cated to encryption. Without prejudice, either implementa-
- tion packaging is referred to as an encryption mechanism
- herein.
-
-
- 3.1.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall provide to the evaluators a docu-
- ment that describes the test plan, test procedures that show
- how the security mechanisms were tested, and results of the
- security mechanisms' functional testing.
-
- + Interpretation
-
- The "system developer" is interpreted as "the network
- system sponsor". The description of the test plan should
- establish the context in which the testing was or should be
- conducted. The description should identify any additional
- test components that are not part of the system being
- evaluated. This includes a description of the test-relevant
- functions of such test components and a description of the
- interfacing of those test components to the system being
- evaluated. The description of the test plan should also
- demonstrate that the tests adequately cover the network
- security policy. The tests should include the features
- described in the System Architecture and the System
- Integrity sections. The tests should also include network
- configuration and sizing.
-
- + Rationale
-
- The entity being evaluated may be a networking subsys-
- tem (see Appendix A) to which other components must be added
- to make a complete network system. In that case, this
- interpretation is extended to include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
-
- 3.1.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- Documentation shall be available that provides a description
- of the manufacturer's philosophy of protection and an expla-
- nation of how this philosophy is translated into the TCB. If
- the TCB is composed of distinct modules, the interfaces
- between these modules shall be described. AN INFORMAL OR
- FORMAL DESCRIPTION OF THE SECURITY POLICY MODEL ENFORCED BY
- THE TCB SHALL BE AVAILABLE AND AN EXPLANATION PROVIDED TO
- SHOW THAT IT IS SUFFICIENT TO ENFORCE THE SECURITY POLICY.
- THE SPECIFIC TCB PROTECTION MECHANISMS SHALL BE IDENTIFIED
- AND AN EXPLANATION GIVEN TO SHOW THAT THEY SATISFY THE
- MODEL.
-
- + Interpretation
-
- Explanation of how the sponsor's philosophy of protec-
- tion is translated into the NTCB shall include a description
- of how the NTCB is partitioned. The security policy also
- shall be stated. The description of the interfaces between
- the NTCB modules shall include the interface(s) between NTCB
- partitions and modules within the partitions if the modules
- exist. The sponsor shall describe the security architecture
- and design, including the allocation of security require-
- ments among components. Appendix A addresses component
- evaluation issues.
-
- AS STATED IN THE INTRODUCTION TO DIVISION B, THE SPON-
- SOR MUST DEMONSTRATE THAT THE NTCB EMPLOYS THE REFERENCE
- MONITOR CONCEPT. THE SECURITY POLICY MODEL MUST BE A MODEL
- FOR A REFERENCE MONITOR.
-
- THE SECURITY POLICY MODEL FOR EACH PARTITION IMPLEMENT-
- ING A REFERENCE MONITOR SHALL FULLY REPRESENT THE ACCESS
- CONTROL POLICY SUPPORTED BY THE PARTITION, INCLUDING THE
- DISCRETIONARY AND MANDATORY SECURITY POLICY FOR SECRECY
- AND/OR INTEGRITY. FOR THE MANDATORY POLICY THE SINGLE DOMI-
- NANCE RELATION FOR SENSITIVITY LABELS, INCLUDING SECRECY
- AND/OR INTEGRITY COMPONENTS, SHALL BE PRECISELY DEFINED.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system as
- defined for this network interpretation. Other documenta-
- tion, such as description of components and description of
- operating environment(s) in which the networking subsystem
- or network system is designed to function, is required else-
- where, e.g., in the Trusted Facility Manual.
-
- In order to be evaluated, a network must possess a
- coherent Network Security Architecture and Design. (Inter-
- connection of components that do not adhere to such a single
- coherent Network Security Architecture is addressed in the
- Interconnection of Accredited AIS, Appendix C.) The Network
- Security Architecture must address the security-relevant
- policies, objectives, and protocols. The Network Security
- Design specifies the interfaces and services that must be
- incorporated into the network so that it can be evaluated as
- a trusted entity. There may be multiple designs that con-
- form to the same architecture but are more or less incompa-
- tible and non-interoperable (except through the Interconnec-
- tion Rules). Security related mechanisms requiring coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms having no visible
- interfaces are not specified in this document but are left
- as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network security Architecture and
- Design are satisfied. That is, the components can be assem-
- bled into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization that is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and unambi-
- guously define the security functionality of components as
- well as the interfaces between or among components. The
- Network Security Architecture and Design must be evaluated
- to determine that a network constructed to its specifica-
- tions will in fact be trusted, that is, it will be evaluat-
- able under these interpretations.
-
-
- THE TERM "MODEL" IS USED IN SEVERAL DIFFERENT WAYS IN A
- NETWORK CONTEXT, E.G., A "PROTOCOL REFERENCE MODEL," A "FOR-
- MAL NETWORK MODEL," ETC. ONLY THE "SECURITY POLICY MODEL" IS
- ADDRESSED BY THIS REQUIREMENT AND IS SPECIFICALLY INTENDED
- TO MODEL THE INTERFACE, VIZ., "SECURITY PERIMETER," OF THE
- REFERENCE MONITOR AND MUST MEET ALL THE REQUIREMENTS DEFINED
- IN THE TCSEC. IT MUST BE SHOWN THAT ALL PARTS OF THE TCB
- ARE A VALID INTERPRETATION OF THE SECURITY POLICY MODEL,
- I.E., THAT THERE IS NO CHANGE TO THE SECURE STATE EXCEPT AS
- REPRESENTED BY THE MODEL.
-
- 3.2 CLASS (B2): STRUCTURED PROTECTION
- _ _ _____ __ __________ __________
-
-
- IN CLASS (B2) NETWORK SYSTEMS, THE NTCB IS BASED
- ON A CLEARLY DEFINED AND DOCUMENTED FORMAL SECU-
- RITY POLICY MODEL THAT REQUIRES THE DISCRETIONARY
- AND MANDATORY ACCESS CONTROL ENFORCEMENT FOUND IN
- CLASS (B1) NETWORK SYSTEMS TO BE EXTENDED TO ALL
- SUBJECTS AND OBJECTS IN THE NETWORK SYSTEM. IN
- ADDITION, COVERT CHANNELS ARE ADDRESSED. THE NTCB
- MUST BE CAREFULLY STRUCTURED INTO PROTECTION-
- CRITICAL AND NON-PROTECTION-CRITICAL ELEMENTS.
- THE NTCB INTERFACE IS WELL-DEFINED, AND THE NTCB
- DESIGN AND IMPLEMENTATION ENABLE IT TO BE SUB-
- JECTED TO MORE THOROUGH TESTING AND MORE COMPLETE
- REVIEW. AUTHENTICATION MECHANISMS ARE
- STRENGTHENED, TRUSTED FACILITY MANAGEMENT IS PRO-
- VIDED IN THE FORM OF SUPPORT FOR SYSTEM ADMINIS-
- TRATOR AND OPERATOR FUNCTIONS, AND STRINGENT CON-
- FIGURATION MANAGEMENT CONTROLS ARE IMPOSED. THE
- SYSTEM IS RELATIVELY RESISTANT TO PENETRATION.
- THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEM
- ASSIGNED A CLASS (B2) RATING.
-
-
- 3.2.1 Security Policy
- _ _ _ ________ ______
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- The network sponsor shall describe the overall network
- security policy enforced by the NTCB. At a minimum, this
- policy shall include the discretionary and mandatory
- requirements applicable to this class. The policy may
- require data secrecy, or data integrity, or both. The pol-
- icy is an access control policy having two primary com-
- ponents: mandatory and discretionary. The policy shall
- include a discretionary policy for protecting the informa-
- tion being processed based on the authorizations of indivi-
- duals, users, or groups of users. This access control pol-
- icy statement shall describe the requirements on the network
- to prevent or detect "reading or destroying" sensitive
- information by unauthorized users or errors. The mandatory
- policy must define the set of distinct sensitivity levels
- that it supports. For the Class B1 or above the mandatory
- policy shall be based on the labels associated with the
- information that reflects its sensitivity with respect to
- secrecy and/or integrity, where applicable, and labels asso-
- ciated with users to reflect their authorization to access
- such information. Unauthorized users include both those
- that are not authorized to use the network at all (e.g., a
- user attempting to use a passive or active wire tap) or a
- legitimate user of the network who is not authorized to
- access a specific piece of information being protected.
-
- Note that "users" does not include "operators," "system
- programmers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network sys-
- tem, for example, by defining membership of a group. These
- individuals may also have the separate role of users.
-
-
- SECRECY POLICY: The network sponsor shall define the
- form of the discretionary and mandatory secrecy
- policy that is enforced in the network to prevent
- unauthorized users from reading the sensitive infor-
- mation entrusted to the network.
-
-
- DATA INTEGRITY POLICY: The network sponsor shall
- define the discretionary and mandatory integrity
- policy to prevent unauthorized users from modifying,
- viz., writing, sensitive information. The defini-
- tion of data integrity presented by the network
- sponsor refers to the requirement that the informa-
- tion has not been subjected to unauthorized modifi-
- cation in the network. The mandatory integrity pol-
- icy enforced by the NTCB cannot, in general, prevent
- modification while information is being transmitted
- between components. However, an integrity sensi-
- tivity label may reflect the confidence that the
- information has not been subjected to transmission
- errors because of the protection afforded during
- transmission. This requirement is distinct from the
- requirement for label integrity.
-
- + Rationale
-
- The word "sponsor" is used in place of alternatives
- (such as "vendor," "architect," "manufacturer," and
- "developer") because the alternatives indicate people who
- may not be available, involved, or relevant at the time that
- a network system is proposed for evaluation.
-
- A trusted network is able to control both the reading
- and writing of shared sensitive information. Control of
- writing is used to protect against destruction of informa-
- tion. A network normally is expected to have policy require-
- ments to protect both the secrecy and integrity of the
- information entrusted to it. In a network the integrity is
- frequently as important or more important than the secrecy
- requirements. Therefore the secrecy and/or integrity policy
- to be enforced by the network must be stated for each net-
- work regardless of its evaluation class. The assurance that
- the policy is faithfully enforced is reflected in the
- evaluation class of the network.
-
- This control over modification is typically used to
- protect information so that it may be relied upon and to
- control the potential harm that would result if the informa-
- tion were corrupted. The overall network policy require-
- ments for integrity includes the protection for data both
- while being processed in a component and while being
- transmitted in the network. The access control policy
- enforced by the NTCB relates to the access of subjects to
- objects within each component. Communications integrity
- addressed within Part II relates to information while being
- transmitted.
-
- The mandatory integrity policy (at class B1 and above)
- in some architectures may be useful in supporting the link-
- age between the connection oriented abstraction introduced
- in the Introduction and the individual components of the
- network. For example, in a key distribution center for
- end-to-end encryption, a distinct integrity category may be
- assigned to isolate the key generation code and data from
- possible modification by other supporting processes in the
- same component, such as operator interfaces and audit.
-
- The mandatory integrity policy for some architecture
- may define an integrity sensitivity label that reflects the
- specific requirements for ensuring that information has not
- been subject to random errors in excess of a stated limit
- nor to unauthorized message stream modification (MSM) -.
- The specific metric associated with an integrity sensitivity
- label will generally reflect the intended applications of
- the network.
-
-
- 3.2.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall define and control access between named users
- and named objects (e.g., files and programs) in the ADP sys-
- tem. The enforcement mechanism (e.g., self/group/public
- _________________________
- - See Voydock, Victor L. and Stephen T. Kent, "Secu-
- rity Mechanisms in High-Level Network Protocols," Com-
- ___
- puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
- ______ _______
-
-
- controls, access control lists) shall allow users to specify
- and control sharing of those objects by named individuals or
- defined groups of individuals, or both, and shall provide
- controls to limit propagation of access rights. The discre-
- tionary access control mechanism shall, either by explicit
- user action or by default, provide that objects are pro-
- tected from unauthorized access. These access controls
- shall be capable of including or excluding access to the
- granularity of a single user. Access permission to an
- object by users not already possessing access permission
- shall only be assigned by authorized users.
-
- + Interpretation
-
- The discretionary access control (DAC) mechanism(s) may
- be distributed over the partitioned NTCB in various ways.
- Some part, all, or none of the DAC may be implemented in a
- given component of the network system. In particular, com-
- ponents that support only internal subjects (i.e., that have
- no subjects acting as direct surrogates for users), such as
- a public network packet switch, might not implement the DAC
- mechanism(s) directly (e.g., they are unlikely to contain
- access control lists).
-
- Identification of users by groups may be achieved in
- various ways in the networking environment. For example,
- the network identifiers (e.g., internet addresses) for vari-
- ous components (e.g., hosts, gateways) can be used as iden-
- tifiers of groups of individual users (e.g., "all users at
- Host A," "all users of network Q") so long as the individu-
- als involved in the group are implied by the group identif-
- ier. For example, Host A might employ a particular group-id,
- for which it maintains a list of explicit users in that
- group, in its network exchange with Host B, which accepts
- the group-id under the conditions of this interpretation.
-
- For networks, individual hosts will impose need-to-know
- controls over their users on the basis of named individuals
- - much like (in fact, probably the same) controls used when
- there is no network connection.
-
- When group identifiers are acceptable for access con-
- trol, the identifier of some other host may be employed, to
- eliminate the maintenance that would be required if indivi-
- dual identification of remote users was employed. In class
- C2 and higher, however, it must be possible from that audit
- record to identify (immediately or at some later time)
- exactly the individuals represented by a group identifier at
- the time of the use of that identifier. There is allowed to
- be an uncertainty because of elapsed time between changes in
- the group membership and the enforcement in the access con-
- trol mechanisms.
-
- The DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. The reference monitor manages
- all the physical resources of the system and from them
- creates the abstraction of subjects and objects that it con-
- trols. Some of these subjects and objects may be used to
- implement a part of the NTCB. When the DAC mechanism is
- distributed in such NTCB subjects (i.e., when outside the
- reference monitor), the assurance requirements (see the
- Assurance section) for the design and implementation of the
- DAC shall be those of class C2 for all networks of class C2
- or above.
-
- When integrity is included as part of the network dis-
- cretionary security policy, the above interpretations shall
- be specifically applied to the controls over modification,
- viz, the write mode of access, within each component based
- on identified users or groups of users.
-
- + Rationale
-
- In this class, the supporting elements of the overall
- DAC mechanism are required to isolate information (objects)
- that supports DAC so that it is subject to auditing require-
- ments (see the System Architecture section). The use of
- network identifiers to identify groups of individual users
- could be implemented, for example, as an X.25 community of
- interest in the network protocol layer (layer 3). In all
- other respects, the supporting elements of the overall DAC
- mechanism are treated exactly as untrusted subjects are
- treated with respect to DAC in an ADP system, with the same
- result as noted in the interpretation.
-
- A typical situation for DAC is that a surrogate process
- for a remote user will be created in some host for access to
- objects under the control of the NTCB partition within that
- host. The interpretation requires that a user identifier be
- assigned and maintained for each such process by the NTCB,
- so that access by a surrogate process is subject to essen-
- tially the same discretionary controls as access by a pro-
- cess acting on behalf of a local user would be. However,
- within this interpretation a range of possible interpreta-
- tions of the assigned user identification is permitted.
-
- The most obvious situation would exist if a global
- database of network users were to be made permanently avail-
- able on demand to every host, (i.e., a name server existed)
- so that all user identifications were globally meaningful.
-
- It is also acceptable, however, for some NTCB parti-
- tions to maintain a database of locally-registered users for
- its own use. In such a case, one could choose to inhibit
- the creation of surrogate processes for locally unregistered
- users, or (if permitted by the local policy) alternatively,
- to permit the creation of surrogate processes with
- preselected user and group identifiers which, in effect,
- identify the process as executing on behalf of a member of a
- group of users on a particular remote host. The intent of
- the words concerning audit in the interpretation is to pro-
- vide a minimally acceptable degree of auditability for cases
- such as the last described. What is required is that there
- be a capability, using the audit facilities provided by the
- network NTCB partitions involved, to determine who was
- logged in at the actual host of the group of remote users at
- the time the surrogate processing occured.
-
- Associating the proper user id with a surrogate process
- is the job of identification and authentication. This means
- that DAC is applied locally, with respect to the user id of
- the surrogate process. The transmission of the data back
- across the network to the user's host, and the creation of a
- copy of the data there, is not the business of DAC.
-
- Components that support only internal subjects impact
- the implementation of the DAC by providing services by which
- information (e.g., a user-id) is made available to a com-
- ponent that makes a DAC decision. An example of the latter
- would be the case that a user at Host A attempts to access a
- file at Host B. The DAC decision might be (and usually
- would be) made at Host B on the basis of a user-id transmit-
- ted from Host A to Host B.
-
- Unique user identification may be achieved by a variety
- of mechanisms, including (a) a requirement for unique iden-
- tification and authentication on the host where access takes
- place; (b) recognition of fully qualified network
- addresses authenticated by another host and forwarded to the
- host where access takes place; or (c) administrative support
- of a network-wide unique personnel identifier that could be
- authenticated and forwarded by another host as in (b) above,
- or could be authenticated and forwarded by a dedicated net-
- work identification and authentication server. The proto-
- cols which implement (b) or (c) are subject to the System
- Architecture requirements.
-
- Network support for DAC might be handled in other ways
- than that described as "typical" above. In particular, some
- form of centralized access control is often proposed. An
- access control center may make all decisions for DAC, or it
- may share the burden with the hosts by controlling host-to-
- host connections, and leaving the hosts to decide on access
- to their objects by users at a limited set of remote hosts.
- In this case the access control center provides the linkage
- between the connection oriented abstraction (as discussed in
- the Introduction) and the overall network security policy
- for DAC. In all cases the enforcement of the decision must
- be provided by the host where the object resides.
-
- There are two forms of distribution for the DAC mechan-
- ism: implementing portions of the DAC in separate com-
- ponents, and supporting the DAC in subjects contained within
- the NTCB partition in a component. Since "the ADP system"
- is understood to be "the computer network" as a whole, each
- network component is responsible for enforcing security in
- the mechanisms allocated to it to ensure secure implementa-
- tion of the network security policy. For traditional host
- systems it is frequently easy to also enforce the DAC along
- with the MAC within the reference monitor, per se, although
- a few approaches, such as virtual machine monitors, support
- DAC outside this interface.
-
- In contrast to the universally rigid structure of man-
- datory policies (see the Mandatory Access Control section),
- DAC policies tend to be very network and system specific,
- with features that reflect the natural use of the system.
- For networks it is common that individual hosts will impose
- controls over their local users on the basis of named
- individuals-much like the controls used when there is no
- network connection. However, it is difficult to manage in a
- centralized manner all the individuals using a large net-
- work. Therefore, users on other hosts are commonly grouped
- together so that the controls required by the network DAC
- policy are actually based on the identity of the hosts or
- other components. A gateway is an example of such a com-
- ponent.
-
- The assurance requirements are at the very heart of the
- concept of a trusted system. It is the assurance that
- determines if a system or network is appropriate for a given
- environment, as reflected, for example, in the Environments
- Guideline-. In the case of monolithic systems that have DAC
- integral to the reference monitor, the assurance require-
- ments for DAC are inseparable from those of the rest of the
- reference monitor. For networks there is typically a much
- clearer distinction due to distributed DAC. The rationale
- for making the distinction in this network interpretation is
- that if major trusted network components can be made signi-
- ficantly easier to design and implement without reducing the
- ability to meet security policy, then trusted networks will
- be more easily available.
-
- 3.2.1.2 Object Reuse
-
- + Statement from DoD 5200.28-STD
-
- All authorizations to the information contained within a
- storage object shall be revoked prior to initial assignment,
- allocation or reallocation to a subject from the TCB's pool
- of unused storage objects. No information, including
- encrypted representations of information, produced by a
- prior subject's actions is to be available to any subject
- that obtains access to an object that has been released back
- to the system.
-
-
- _________________________
- - Guidance for Applying the Department of Defense
- ________ ___ ________ ___ __________ __ _______
- Trusted Computer System Evaluation Criteria in Specific
- _______ ________ ______ __________ ________ __ ________
- Environments, CSC-STD-003-85.
- ____________
-
-
- + Interpretation
-
- The NTCB shall ensure that any storage objects that it
- controls (e.g., message buffers under the control of a NTCB
- partition in a component) contain no information for which a
- subject in that component is not authorized before granting
- access. This requirement must be enforced by each of the
- NTCB partitions.
-
- + Rationale
-
- In a network system, storage objects of interest are
- things that the NTCB directly controls, such as message
- buffers in components. Each component of the network system
- must enforce the object reuse requirement with respect to
- the storage objects of interest as determined by the network
- security policy. For example, the DAC requirement in this
- division leads to the requirement here that message buffers
- be under the control of the NTCB partition. A buffer
- assigned to an internal subject may be reused at the discre-
- tion of that subject which is responsible for preserving the
- integrity of message streams. Such controlled objects may
- be implemented in physical resources, such as buffers, disk
- sectors, tape space, and main memory, in components such as
- network switches.
-
-
- 3.2.1.3 Labels
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels associated with each ADP SYSTEM RESOURCE
- (E.G., SUBJECT, STORAGE OBJECT, ROM) THAT IS DIRECTLY OR
- INDIRECTLY ACCESSIBLE BY SUBJECTS EXTERNAL TO THE TCB shall
- be maintained by the TCB. These labels shall be used as the
- basis for mandatory access control decisions. In order to
- import non-labeled data, the TCB shall request and receive
- from an authorized user the sensitivity level of the data,
- and all such actions shall be auditable by the TCB.
-
- + Interpretation
-
- Non-labeled data imported under the control of the NTCB
- partition will be assigned a label constrained by THE DEVICE
- LABELS OF the single-level device used to import it. Labels
- may include secrecy and integrity- components in accordance
- with the overall network security policy described by the
- network sponsor. Whenever the term "label" is used
- throughout this interpretation, it is understood to include
- both components as applicable. Similarly, the terms
- "single-level" and "multilevel" are understood to be based
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Computer Systems," ESD-TR-76-372, MTR-
- 3153, The MITRE Corporation, Bedford, MA, April 1977.
-
-
- on both the secrecy and integrity components of the policy.
- The mandatory integrity policy will typically have require-
- ments, such as the probability of undetected message stream
- modification, that will be reflected in the label for the
- data so protected. For example, when data is imported its
- integrity label may be assigned based on mechanisms, such as
- cryptography, used to provide the assurance required by the
- policy. The NTCB shall assure that such mechanism are pro-
- tected from tampering and are always invoked when they are
- the basis for a label.
-
-
- IF THE SECURITY POLICY INCLUDES AN INTEGRITY POLICY,
- ALL ACTIVITIES THAT RESULT IN MESSAGE-STREAM MODIFICATION
- DURING TRANSMISSION ARE REGARDED AS UNAUTHORIZED ACCESSES IN
- VIOLATION OF THE INTEGRITY POLICY. THE NTCB SHALL HAVE AN
- AUTOMATED CAPABILITY FOR TESTING, DETECTING, AND REPORTING
- THOSE ERRORS/CORRUPTIONS THAT EXCEED SPECIFIED NETWORK
- INTEGRITY POLICY REQUIREMENTS. MESSAGE-STREAM MODIFICATION
- (MSM) COUNTERMEASURES SHALL BE IDENTIFIED. A TECHNOLOGY OF
- ADEQUATE STRENGTH SHALL BE SELECTED TO RESIST MSM. IF
- ENCRYPTION METHODOLOGIES ARE EMPLOYED, THEY SHALL BE
- APPROVED BY THE NATIONAL SECURITY AGENCY.
-
- ALL OBJECTS MUST BE LABELED WITHIN EACH COMPONENT OF
- THE NETWORK THAT IS TRUSTED TO MAINTAIN SEPARATION OF MULTI-
- PLE LEVELS OF INFORMATION. THE LABEL ASSOCIATED WITH ANY
- OBJECTS ASSOCIATED WITH SINGLE-LEVEL COMPONENTS WILL BE
- IDENTICAL TO THE LEVEL OF THAT COMPONENT. OBJECTS USED TO
- STORE NETWORK CONTROL INFORMATION, AND OTHER NETWORK STRUC-
- TURES, SUCH AS ROUTING TABLES, MUST BE LABELED TO PREVENT
- UNAUTHORIZED ACCESS AND/OR MODIFICATION.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system and partitioned NTCB as
- defined for these network interpretations. A single-level
- device may be regarded either as a subject or an object. A
- multilevel device is regarded as a trusted subject in which
- the security range of the subject is the minimum-maximum
- range of the data expected to be transmitted over the dev-
- ice.
-
- The sensitivity labels for either secrecy or integrity
- or both may reflect non-hierarchical categories or hierarch-
- ical classification or both.
-
- FOR A NETWORK IT IS NECESSARY THAT THIS REQUIREMENT BE
- APPLIED TO ALL NETWORK SYSTEM RESOURCES AT THE (B2) LEVEL
- AND ABOVE.
-
- THE NTCB IS RESPONSIBLE FOR IMPLEMENTING THE NETWORK
- INTEGRITY POLICY, WHEN ONE EXISTS. THE NTCB MUST ENFORCE
- THAT POLICY BY ENSURING THAT INFORMATION IS ACCURATELY
- TRANSMITTED FROM SOURCE TO DESTINATION (REGARDLESS OF THE
- NUMBER OF INTERVENING CONNECTING POINTS). THE NTCB MUST BE
- ABLE TO COUNTER EQUIPMENT FAILURE, ENVIRONMENTAL DISRUP-
- TIONS, AND ACTIONS BY PERSONS AND PROCESSES NOT AUTHORIZED
- TO ALTER THE DATA. PROTOCOLS THAT PERFORM CODE OR FORMAT
- CONVERSION SHALL PRESERVE THE INTEGRITY OF DATA AND CONTROL
- INFORMATION.
-
- THE PROBABILITY OF AN UNDETECTED TRANSMISSION ERROR MAY
- BE SPECIFIED AS PART OF THE NETWORK SECURITY POLICY SO THAT
- THE ACCEPTABILITY OF THE NETWORK FOR ITS INTENDED APPLICA-
- TION MAY BE DETERMINED. THE SPECIFIC METRICS (E.G., PROBA-
- BILITY OF UNDETECTED MODIFICATION) SATISFIED BY THE DATA CAN
- BE REFLECTED IN THE INTEGRITY SENSITIVITY LABEL ASSOCIATED
- WITH THE DATA WHILE IT IS PROCESSED WITHIN A COMPONENT. IT
- IS RECOGNIZED THAT DIFFERENT APPLICATIONS AND OPERATIONAL
- ENVIRONMENTS (E.G., CRISIS AS COMPARED TO LOGISTIC) WILL
- HAVE DIFFERENT INTEGRITY REQUIREMENTS.
-
- THE NETWORK SHALL ALSO HAVE AN AUTOMATED CAPABILITY OF
- TESTING FOR, DETECTING, AND REPORTING ERRORS THAT EXCEED A
- THRESHOLD CONSISTENT WITH THE OPERATIONAL MODE REQUIREMENTS.
- THE EFFECTIVENESS OF INTEGRITY COUNTERMEASURES MUST BE ESTA-
- BLISHED WITH THE SAME RIGOR AS THE OTHER SECURITY-RELEVANT
- PROPERTIES SUCH AS SECRECY.
-
- CRYPTOGRAPHY IS OFTEN UTILIZED AS A BASIS TO PROVIDE
- DATA INTEGRITY ASSURANCE. MECHANISMS, SUCH AS MANIPULATION
- DETECTION CODES (MDC)-, MAY BE USED. THE ADEQUACY OF THE
- ENCRYPTION OR MDC ALGORITHM, THE CORRECTNESS OF THE PROTOCOL
- LOGIC, AND THE ADEQUACY OF IMPLEMENTATION MUST BE ESTA-
- BLISHED IN MSM COUNTERMEASURES DESIGN.
-
-
-
- 3.2.1.3.1 Label Integrity
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels shall accurately represent sensitivity
- levels of the specific subjects or objects with which they
- are associated. When exported by the TCB, sensitivity
- labels shall accurately and unambiguously represent the
- internal labels and shall be associated with the information
- being exported.
-
- + Interpretation
-
- The phrase "exported by the TCB" is understood to
- include transmission of information from an object in one
- component to an object in another component. Information
- transferred between NTCB partitions is addressed in the Sys-
- tem Integrity Section. The form of internal and external
- (exported) sensitivity labels may differ, but the meaning
- shall be the same. The NTCB shall, in addition, ensure that
- _________________________
- - See Jueneman, R. R., "Electronic Document Authenti-
- cation," IEEE Network Magazine, April 1987, pp 17-23.
- ____ _______ ________
-
- correct association of sensitivity labels with the informa-
- tion being transported across the network is preserved.
-
- As mentioned in the Trusted Facility Manual Section,
- encryption transforms the representation of information so
- that it is unintelligible to unauthorized subjects.
- Reflecting this transformation, the sensitivity level of the
- ciphertext is generally lower than the cleartext. It fol-
- lows that cleartext and ciphertext are contained in dif-
- ferent objects, each possessing its own label. The label of
- the cleartext must be preserved and associated with the
- ciphertext so that it can be restored when the cleartext is
- subsequently obtained by decrypting the ciphertext. If the
- cleartext is associated with a single-level device, the
- label of that cleartext may be implicit. The label may also
- be implicit in the key.
-
- When information is exported to an environment where it
- is subject to deliberate or accidental modification, the TCB
- shall support the means, such as cryptographic checksums, to
- assure the accuracy of the labels. When there is a manda-
- tory integrity policy, the policy will define the meaning of
- integrity labels.
-
- + Rationale
-
- Encryption algorithms and their implementation are out-
- side the scope of these interpretations. Such algorithms
- may be implemented in a separate device or may be incor-
- porated in a subject of a larger component. Without preju-
- dice, either implementation packaging is referred to as an
- encryption mechanism herein. If encryption methodologies are
- employed in this regard, they shall be approved by the
- National Security Agency (NSA). The encryption process is
- part of the Network Trusted Computer Base partition in the
- components in which it is implemented.
-
- The encryption mechanism is not necessarily a mul-
- tilevel device or multilevel subject, as these terms are
- used in these criteria. The process of encryption is mul-
- tilevel by definition. The cleartext and ciphertext inter-
- faces carry information of different sensitivity. An
- encryption mechanism does not process data in the sense of
- performing logical or arithmetic operations on that data
- with the intent of producing new data. The cleartext and
- ciphertext interfaces on the encryption mechanism must be
- separately identified as being single-level or multilevel.
- If the interface is single-level, then the sensitivity of
- the data is established by a trusted individual and impli-
- citly associated with the interface; the Exportation to
- Single-Level Devices criterion applies.
-
- If the interface is multilevel, then the data must be
- labeled; the Exportation to Multilevel Devices criterion
- applies. The network architect is free to select an accept-
- able mechanism for associating a label with an object. With
- reference to encrypted objects, the following examples are
- possible:
-
- 1. Include a label field in the protocol definition of
- the object.
-
- 2. Implicitly associate the label with the object
- through the encryption key. That is, the encryption
- key uniquely identifies a sensitivity level. A sin-
- gle or private key must be protected at the level of
- the data that it encrypts.
-
-
- 3.2.1.3.2 Exportation of Labeled Information
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall designate each communication channel and I/O
- device as either single-level or multilevel. Any change in
- this designation shall be done manually and shall be audit-
- able by the TCB. The TCB shall maintain and be able to
- audit any change in the sensitivity level or levels associ-
- ated with a communications channel or I/O device.
-
- + Interpretation
-
- Each communication channel and network component shall
- be designated as either single-level or multilevel. Any
- change in this designation shall be done with the cognizance
- and approval of the administrator or security officer in
- charge of the affected components and the administrator or
- security officer in charge of the NTCB. This change shall
- be auditable by the network. The NTCB shall maintain and be
- able to audit any change in the DEVICE LABELS associated
- with a single-level communication channel or the range asso-
- ciated with a multilevel communication channel or component.
- The NTCB shall also be able to audit any change in the set
- of sensitivity levels associated with the information which
- can be transmitted over a multilevel communication channel
- or component.
-
- + Rationale
-
- Communication channels and components in a network are
- analogous to communication channels and I/O devices in
- stand-alone systems. They must be designated as either mul-
- tilevel (i.e., able to distinguish and maintain separation
- among information of various sensitivity levels) or single-
- level. As in the TCSEC, single-level devices may only be
- attached to single-level channels.
-
- The level or set of levels of information that can be
- sent to a component or over a communication channel shall
- only change with the knowledge and approval of the security
- officers (or system administrator, if there is no security
- officer) of the network, and of the affected components.
- This requirement ensures that no significant security-
- relevant changes are made without the approval of all
- affected parties.
-
-
- 3.2.1.3.2.1 Exportation to Multilevel Devices
-
- + Statement from DoD 5200.28-STD
-
- When the TCB exports an object to a multilevel I/O device,
- the sensitivity label associated with that object shall also
- be exported and shall reside on the same physical medium as
- the exported information and shall be in the same form
- (i.e., machine-readable or human-readable form). When the
- TCB exports or imports an object over a multilevel communi-
- cations channel, the protocol used on that channel shall
- provide for the unambiguous pairing between the sensitivity
- labels and the associated information that is sent or
- received.
-
- + Interpretation
-
- The components, including hosts, of a network shall be
- interconnected over "multilevel communication channels,"
- multiple single-level communication channels, or both, when-
- ever the information is to be protected at more than a sin-
- gle sensitivity level. The protocol for associating the
- sensitivity label and the exported information shall provide
- the only information needed to correctly associate a sensi-
- tivity level with the exported information transferred over
- the multilevel channel between the NTCB partitions in indi-
- vidual components. This protocol definition must specify the
- representation and semantics of the sensitivity labels
- (i.e., the machine-readable label must uniquely represent
- the sensitivity level).
-
- The "unambiguous" association of the sensitivity level
- with the communicated information shall meet the same level
- of accuracy as that required for any other label within the
- NTCB, as specified in the criterion for Label Integrity.
- This may be provided by protected and highly reliable direct
- physical layer connections, or by traditional cryptographic
- link protection in which any errors during transmission can
- be readily detected, or by use of a separate channel. THE
- RANGE OF INFORMATION IMPORTED OR EXPORTED MUST BE CON-
- STRAINED BY THE ASSOCIATED DEVICE LABELS.
-
- + Rationale
-
- This protocol must specify the representation and
- semantics of the sensitivity labels. See the Mandatory
- Access Control Policies section in Appendix B. The mul-
- tilevel device interface to (untrusted) subjects may be
- implemented either by the interface of the reference moni-
- tor, per se, or by a multilevel subject (e.g., a "trusted
- subject" as defined in the Bell-LaPadula Model) that pro-
- vides the labels based on the internal labels of the NTCB
- partition.
-
- The current state of the art limits the support for
- mandatory policy that is practical for secure networks.
- Reference monitor support to ensure the control over all the
- operations of each subject in the network must be completely
- provided within the single NTCB partition on which that sub-
- ject interfaces to the NTCB. This means that the entire
- portion of the "secure state" represented in the FORMAL
- security policy model that may be changed by transitions
- invoked by this subject must be contained in the same com-
- ponent.
-
- The secure state of an NTCB partition may be affected
- by events external to the component in which the NTCB parti-
- tion resides (e.g., arrival of a message). The effect
- occurs asynchronusly after being initiated by an event in
- another component or partition. For example, indeterminate
- delays may occur between the initiation of a message in one
- component, the arrival of the message in the NTCB partition
- in another component, and the corresponding change to the
- secure state of the second component. Since each component
- is executing concurrently, to do otherwise would require
- some sort of network-wide control to synchronize state tran-
- sitions, such as a global network-wide clock for all proces-
- sors; in general, such designs are not practical and prob-
- ably not even desirable. Therefore, the interaction between
- NTCB partitions is restricted to just communications between
- pairs (at least logically) of devices-multilevel devices if
- the device(s) can send/receive data of more than a single
- level. For broadcast channels the pairs are the sender and
- intended receiver(s). However, if the broadcast channel
- carries multiple levels of information, additional mechanism
- (e.g., cryptochecksum maintained by the TCB) may be required
- to enforce separation and proper delivery.
-
- A common representation for sensitivity labels is
- needed in the protocol used on that channel and understood
- by both the sender and receiver when two multilevel devices
- (in this case, in two different components) are intercon-
- nected. Each distinct sensitivity level of the overall net-
- work policy must be represented uniquely in these labels.
-
- Within a monolithic TCB, the accuracy of the sensi-
- tivity labels is generally assured by simple techniques,
- e.g., very reliable connections over very short physical
- connections, such as on a single printed circuit board or
- over an internal bus. In many network environments there is
- a much higher probability of accidentally or maliciously
- introduced errors, and these must be protected against.
-
-
- 3.2.1.3.2.2 Exportation to Single-Level Devices
-
- + Statement from DoD 5200.28-STD
-
- Single-level I/O devices and single-level communication
- channels are not required to maintain the sensitivity labels
- of the information they process. However, the TCB shall
- include a mechanism by which the TCB and an authorized user
- reliably communicate to designate the single sensitivity
- level of information imported or exported via single-level
- communication channels or I/O devices.
-
- + Interpretation
-
- Whenever one or both of two directly connected com-
- ponents is not trusted to maintain the separation of infor-
- mation of different sensitivity levels, or whenever the two
- directly connected components have only a single sensitivity
- level in common, the two components of the network shall
- communicate over a single-level channel. Single-level com-
- ponents and single-level communication channels are not
- required to maintain the sensitivity labels of the informa-
- tion they process. However, the NTCB shall include a reli-
- able communication mechanism by which the NTCB and an
- authorized user (VIA A TRUSTED PATH) or a subject within an
- NTCB partition can designate the single sensitivity level of
- information imported or exported via single-level communica-
- tion channels or network components. THE LEVEL OF INFORMA-
- TION COMMUNICATED MUST EQUAL THE DEVICE LEVEL.
-
- + Rationale
-
- Single-level communications channels and single-level
- components in networks are analogous to single level chan-
- nels and I/O devices in stand-alone systems in that they are
- not trusted to maintain the separation of information of
- different sensitivity levels. The labels associated with
- data transmitted over those channels and by those components
- are therefore implicit; the NTCB associates labels with the
- data because of the channel or component, not because of an
- explicit part of the bit stream. Note that the sensitivity
- level of encrypted information is the level of the cipher-
- text rather than the original level(s) of the plaintext.
-
-
- 3.2.1.3.2.3 Labeling Human-Readable Output
-
- + Statement from DoD 5200.28-STD
-
- The ADP system administrator shall be able to specify the
- printable label names associated with exported sensitivity
- labels. The TCB shall mark the beginning and end of all
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the output. The TCB
- shall, by default, mark the top and bottom of each page of
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the page. The TCB shall,
- by default and in an appropriate manner, mark other forms of
- human readable output (e.g., maps, graphics) with human-
- readable sensitivity labels that properly1 represent the
- sensitivity of the output. Any override of these markings
- defaults shall be auditable by the TCB.
- _________________________
- 1 The hierarchical classification component in human-readable
- sensitivity labels shall be equal to the greatest hierarchical
- classification of any of the information in the output that the
- labels refer to; the non-hierarchical category component shall
- include all of the non-hierarchical categories of the information
- in the output the labels refer to, but to no other non-
- hierarchical categories.
-
-
- + Interpretation
-
- This criterion imposes no requirement to a component
- that produces no human-readable output. For those that do
- produce human-readable output, each sensitivity level that
- is defined to the network shall have a uniform meaning
- across all components. The network administrator, in con-
- junction with any affected component administrator, shall be
- able to specify the human-readable label that is associated
- with each defined sensitivity level.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system and
- partitioned NTCB as defined for these network interpreta-
- tions.
-
-
- 3.2.1.3.3 Subject Sensitivity Labels
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL IMMEDIATELY NOTIFY A TERMINAL USER OF EACH
- CHANGE IN THE SENSITIVITY LEVEL ASSOCIATED WITH THAT USER
- DURING AN INTERACTIVE SESSION. A TERMINAL USER SHALL BE
- ABLE TO QUERY THE TCB AS DESIRED FOR A DISPLAY OF THE
- SUBJECT'S COMPLETE SENSITIVITY LABEL.
-
- + Interpretation
-
- AN NTCB PARTITION SHALL IMMEDIATELY NOTIFY A TERMINAL
- USER ATTACHED TO ITS COMPONENT OF EACH CHANGE IN THE SENSI-
- TIVITY LEVEL ASSOCIATED WITH THAT USER.
-
- + Rationale
-
- THE LOCAL NTCB PARTITION MUST ENSURE THAT THE USER
- UNDERSTANDS THE SENSITIVITY LEVEL OF INFORMATION SENT TO AND
- FROM A TERMINAL. WHEN A USER HAS A SURROGATE PROCESS IN
- ANOTHER COMPONENT, ADJUSTMENTS TO ITS LEVEL MAY OCCUR TO
- MAINTAIN COMMUNICATION WITH THE USER. THESE CHANGES MAY
- OCCUR ASYNCHRONOUSLY. SUCH ADJUSTMENTS ARE NECESSITATED BY
- MANDATORY ACCESS CONTROL AS APPLIED TO THE OBJECTS INVOLVED
- IN THE COMMUNICATION PATH.
-
-
- 3.2.1.3.4 Device Labels
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL SUPPORT THE ASSIGNMENT OF MINIMUM AND MAXIMUM
- SENSITIVITY LEVELS TO ALL ATTACHED PHYSICAL DEVICES. THESE
- SENSITIVITY LEVELS SHALL BE USED BY THE TCB TO ENFORCE CON-
- STRAINTS IMPOSED BY THE PHYSICAL ENVIRONMENTS IN WHICH THE
- DEVICES ARE LOCATED.
-
-
- + Interpretation
-
- THIS REQUIREMENT APPLIES AS WRITTEN TO EACH NTCB PARTI-
- TION THAT IS TRUSTED TO SEPARATE INFORMATION BASED ON SENSI-
- TIVITY LEVEL. EACH I/O DEVICE IN A COMPONENT, USED FOR COM-
- MUNICATION WITH OTHER NETWORK COMPONENTS, IS ASSIGNED A DEV-
- ICE RANGE, CONSISTING OF A SET OF LABELS WITH A MAXIMUM AND
- MINIMUM. (A DEVICE RANGE USUALLY CONTAINS, BUT DOES NOT
- NECESSARILY CONTAIN, ALL POSSIBLE LABELS "BETWEEN" THE MAX-
- IMUM AND MINIMUM, IN THE SENSE OF DOMINATING THE MINIMUM AND
- BEING DOMINATED BY THE MAXIMUM.)
-
- THE NTCB ALWAYS PROVIDES AN ACCURATE LABEL FOR INFORMA-
- TION EXPORTED THROUGH DEVICES. INFORMATION EXPORTED OR
- IMPORTED USING A SINGLE-LEVEL DEVICE IS LABELLED IMPLICITLY
- BY THE SENSITIVITY LEVEL OF THE DEVICE. INFORMATION
- EXPORTED FROM ONE MULTILEVEL DEVICE AND IMPORTED AT ANOTHER
- MUST BE LABELLED THROUGH AN AGREED-UPON PROTOCOL, UNLESS IT
- IS LABELLED IMPLICITLY BY USING A COMMUNICATION LINK THAT
- ALWAYS CARRIES A SINGLE LEVEL.
-
- INFORMATION EXPORTED AT A GIVEN SENSITIVITY LEVEL CAN
- BE SENT ONLY TO AN IMPORTING DEVICE WHOSE DEVICE RANGE CON-
- TAINS THAT LEVEL OR A HIGHER LEVEL. IF THE IMPORTING DEVICE
- RANGE DOES NOT CONTAIN THE GIVEN LEVEL, THE INFORMATION IS
- RELABELLED UPON RECEPTION AT A HIGHER LEVEL WITHIN THE
- IMPORTING DEVICE RANGE. RELABELLING SHOULD NOT OCCUR OTHER-
- WISE.
-
- + Rationale
-
- THE PURPOSE OF DEVICE LABELS IS TO REFLECT AND CON-
- STRAIN THE SENSITIVITY LEVELS OF INFORMATION AUTHORIZED FOR
- THE PHYSICAL ENVIRONMENT IN WHICH THE DEVICES ARE LOCATED.
-
- THE INFORMATION TRANSFER RESTRICTIONS PERMIT ONE-WAY
- COMMUNICATION (I.E., NO ACKNOWLEDGEMENTS) FROM ONE DEVICE TO
- ANOTHER WHOSE RANGES HAVE NO LEVEL IN COMMON, AS LONG AS
- EACH LEVEL IN THE SENDING DEVICE RANGE IS DOMINATED BY SOME
- LEVEL IN THE RECEIVING DEVICE RANGE. IT IS NEVER PERMITTED
- TO SEND INFORMATION AT A GIVEN LEVEL TO A DEVICE WHOSE RANGE
- DOES NOT CONTAIN A DOMINATING LEVEL. (SEE APPENDIX C FOR
- SIMILAR INTERCONNECTION RULES FOR THE INTERCONNECTED AIS
- VIEW.)
-
- 3.2.1.4 Mandatory Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall enforce a mandatory access control policy over
- all RESOURCES (I.E., SUBJECTS, STORAGE OBJECTS, AND I/O DEV-
- ICES) THAT ARE DIRECTLY OR INDIRECTLY ACCESSIBLE BY SUBJECTS
- EXTERNAL TO THE TCB. These subjects and objects shall be
- assigned sensitivity labels that are a combination of
- hierarchical classification levels and non-hierarchical
- categories, and the labels shall be used as the basis for
- mandatory access control decisions. The TCB shall be able
- to support two or more such sensitivity levels. (See the
- Mandatory Access Control interpretations.) The following
- requirements shall hold for all accesses between ALL SUB-
- JECTS EXTERNAL TO THE TCB AND ALL OBJECTS DIRECTLY OR
- INDIRECTLY ACCESSIBLE BY THESE SUBJECTS. A subject can
- read an object only if the hierarchical classification in
- the subject's sensitivity level is greater than or equal to
- the hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level include all the non-hierarchical
- categories in the object's sensitivity level. A subject can
- write an object only if the hierarchical classification in
- the subject's sensitivity level is less than or equal to the
- hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level are included in the non-hierarchical
- categories in the object's sensitivity level. Identification
- and authentication data shall be used by the TCB to authen-
- ticate the user's identity and to ensure that the sensi-
- tivity level and authorization of subjects external to the
- TCB that may be created to act on behalf of the individual
- user are dominated by the clearance and authorization of
- that user.
-
- + Interpretation
-
- Each partition of the NTCB exercises mandatory access
- control policy over all subjects and objects in its COM-
- PONENT. In a network, the responsibility of an NTCB parti-
- tion encompasses all mandatory access control functions in
- its component that would be required of a TCB in a stand-
- alone system. In particular, subjects and objects used for
- communication with other components are under the control of
- the NTCB partition. Mandatory access control includes
- secrecy and integrity control to the extent that the network
- sponsor has described in the overall network security pol-
- icy.
-
- Conceptual entities associated with communication
- between two components, such as sessions, connections and
- virtual circuits, may be thought of as having two ends, one
- in each component, where each end is represented by a local
- object. Communication is viewed as an operation that copies
- information from an object at one end of a communication
- path to an object at the other end. Transient data-carrying
- entities, such as datagrams and packets, exist either as
- information within other objects, or as a pair of objects,
- one at each end of the communication path.
-
- The requirement for "two or more" sensitivity levels
- can be met by either secrecy or integrity levels. When
- there is a mandatory integrity policy, the stated require-
- ments for reading and writing are generalized to: A subject
- can read an object only if the subject's sensitivity level
- dominates the object's sensitivity level, and a subject can
- write an object only if the object's sensitivity level dom-
- inates the subject's sensitivity level. Based on the
- integrity policy, the network sponsor shall define the domi-
- nance relation for the total label, for example, by combin-
- ing secrecy and integrity lattices. -
-
- + Rationale
-
- An NTCB partition can maintain access control only over
- subjects and objects in its component. AT LEVELS B2 AND
- ABOVE, THE NTCB PARTITION MUST MAINTAIN ACCESS CONTROL OVER
- ALL SUBJECTS AND OBJECTS IN ITS COMPONENT. Access by a sub-
- ject in one component to information contained in an object
- in another component requires the creation of a subject in
- the remote component which acts as a surrogate for the first
- subject.
-
- The mandatory access controls must be enforced at the
- interface of the reference monitor (viz. the mechanism that
- controls physical processing resources) for each NTCB parti-
- tion. This mechanism creates the abstraction of subjects
- and objects which it controls. Some of these subjects out-
- side the reference monitor, per se, may be designated to
- implement part of an NTCB partition's mandatory policy,
- e.g., by using the ``trusted subjects" defined in the Bell-
- LaPadula model.
-
- The prior requirements on exportation of labeled infor-
- mation to and from I/O devices ensure the consistency
- between the sensitivity labels of objects connected by a
- communication path. As noted in the introduction, the net-
- work architecture must recognize the linkage between the
- overall mandatory network security policy and the connection
- oriented abstraction. For example, individual data-carrying
- entities such as datagrams can have individual sensitivity
- labels that subject them to mandatory access control in each
- component. The abstraction of a single-level connection is
- realized and enforced implicitly by an architecture while a
- connection is realized by single-level subjects that neces-
- sarily employ only datagrams of the same level.
-
- The fundamental trusted systems technology permits the
- DAC mechanism to be distributed, in contrast to the require-
- ments for mandatory access control. For networks this
- separation of MAC and DAC mechanisms is the rule rather than
- _________________________
- - See, for example, Grohn, M. J., A Model of a Pro-
- _ _____ __ _ ___
- tected Data Management System, ESD-TR-76-289, I. P.
- ______ ____ __________ ______
- Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
- Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
- and Shockley, W., Secure Distributed Data Views, Secu-
- ______ ___________ ____ _____ ____
- rity Policy and Interpretation for a Class A1 Multilev-
- ____ ______ ___ ______________ ___ _ _____ __ ________
- el Secure Relational Database System,SRI International,
- __ ______ __________ ________ ______
- November 1986.
-
- the exception.
-
- The set of total sensitivity labels used to represent
- all the sensitivity levels for the mandatory access control
- (combined data secrecy and data integrity) policy always
- forms a partially ordered set. Without loss of generality,
- this set of labels can always be extended to form a lattice,
- by including all the combinations of non-hierarchical
- categories. As for any lattice, a dominance relation is
- always defined for the total sensitivity labels. For admin-
- istrative reasons it may be helpful to have a maximum level
- which dominates all others.
-
-
- 3.2.2 Accountability
- _ _ _ ______________
-
-
- 3.2.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall require users to identify themselves to it
- before beginning to perform any other actions that the TCB
- is expected to mediate. Furthermore, the TCB shall maintain
- authentication data that includes information for verifying
- the identify of individual users (e.g., passwords) as well
- as information for determining the clearance and authoriza-
- tions of individual users. This data shall be used by the
- TCB to authenticate the user's identity and to ensure that
- the sensitivity level and authorization of subjects external
- to the TCB that may be created to act on behalf of the indi-
- vidual user are dominated by the clearance and authorization
- of that user. The TCB shall protect authentication data so
- that it cannot be accessed by any unauthorized user. The
- TCB shall be able to enforce individual accountability by
- providing the capability to uniquely identify each indivi-
- dual ADP system user. The TCB shall also provide the capa-
- bility of associating this identity with all auditable
- actions taken by that individual.
-
- + Interpretation
-
- The requirement for identification and authentication
- of users is the same for a network system as for an ADP sys-
- tem. The identification and authentication may be done by
- the component to which the user is directly connected or
- some other component, such as an identification and authen-
- tication server. Available techniques, such as those
- described in the Password Guideline=, are generally also
- applicable in the network context. However, in cases where
- the NTCB is expected to mediate actions of a host (or other
- network component) that is acting on behalf of a user or
- group of users, the NTCB may employ identification and
- _________________________
- = Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, CSC-STD-002-85
- ____
-
-
- authentication of the host (or other component) in lieu of
- identification and authentication of an individual user, so
- long as the component identifier implies a list of specific
- users uniquely associated with the identifier at the time of
- its use for authentication. This requirement does not apply
- to internal subjects.
-
- Authentication information, including the identity of a
- user (once authenticated) may be passed from one component
- to another without reauthentication, so long as the NTCB
- protects (e.g., by encryption) the information from unau-
- thorized disclosure and modification. This protection shall
- provide at least a similar level of assurance (or strength
- of mechanism) as pertains to the protection of the authenti-
- cation mechanism and authentication data.
-
- + Rationale
-
- The need for accountability is not changed in the con-
- text of a network system. The fact that the NTCB is parti-
- tioned over a set of components neither reduces the need nor
- imposes new requirements. That is, individual accountabil-
- ity is still the objective. Also, in the context of a net-
- work system at the (C2) level or higher "individual accoun-
- tability" can be satisfied by identification of a host (or
- other component) so long as the requirement for traceability
- to individual users or a set of specific individual users
- with active subjects is satisfied. There is allowed to be an
- uncertainty in traceability because of elapsed time between
- changes in the group membership and the enforcement in the
- access control mechanisms. In addition, there is no need in
- a distributed processing system like a network to reauthen-
- ticate a user at each point in the network where a projec-
- tion of a user (via the subject operating on behalf of the
- user) into another remote subject takes place.
-
- The passing of identifiers and/or authentication infor-
- mation from one component to another is usually done in sup-
- port to the implementation of the discretionary access con-
- trol (DAC). This support relates directly to the DAC
- regarding access by a user to a storage object in a dif-
- ferent NTCB partition than the one where the user was
- authenticated. Employing a forwarded identification implies
- additional reliance on the source and components along the
- path. If the authenticated identification is used as the
- basis of determining a sensitivity label for a subject, it
- must satisfy the Label Integrity criterion.
-
- An authenticated identification may be forwarded
- between components and employed in some component to iden-
- tify the sensitivity level associated with a subject created
- to act on behalf of the user so identified.
-
-
- 3.2.2.1.1 Trusted Path
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL SUPPORT A TRUSTED COMMUNICATION PATH BETWEEN
- ITSELF AND USER FOR INITIAL LOGIN AND AUTHENTICATION. COM-
- MUNICATIONS VIA THIS PATH SHALL BE INITIATED EXCLUSIVELY BY
- A USER.
-
- + Interpretation
-
- A TRUSTED PATH IS SUPPORTED BETWEEN A USER (I.E.,
- HUMAN) AND THE NTCB PARTITION IN THE COMPONENT TO WHICH THE
- USER IS DIRECTLY CONNECTED.
-
- + Rationale
-
- WHEN A USER LOGS INTO A REMOTE COMPONENT, THE USER ID
- IS TRANSMITTED SECURELY BETWEEN THE LOCAL AND REMOTE NTCB
- PARTITIONS IN ACCORDANCE WITH THE REQUIREMENTS IN IDENTIFI-
- CATION AND AUTHENTICATION.
-
- TRUSTED PATH IS NECESSARY IN ORDER TO ASSURE THAT THE
- USER IS COMMUNICATING WITH THE NTCB AND ONLY THE NTCB WHEN
- SECURITY RELEVANT ACTIVITIES ARE TAKING PLACE (E.G., AUTHEN-
- TICATE USER, SET CURRENT SESSION SENSITIVITY LEVEL). HOW-
- EVER, TRUSTED PATH DOES NOT ADDRESS COMMUNICATIONS WITHIN
- THE NTCB, ONLY COMMUNICATIONS BETWEEN THE USER AND THE NTCB.
- IF, THEREFORE, A COMPONENT DOES NOT SUPPORT ANY DIRECT USER
- COMMUNICATION THEN THE COMPONENT NEED NOT CONTAIN MECHANISMS
- FOR ASSURING DIRECT NTCB TO USER COMMUNICATIONS.
-
- THE REQUIREMENT FOR TRUSTED COMMUNICATION BETWEEN ONE
- NTCB PARTITION AND ANOTHER NCTB PARTITION IS ADDRESSED IN
- THE SYSTEM ARCHITECTURE SECTION. THESE REQUIREMENTS ARE
- SEPARATE AND DISTINCT FROM THE USER TO NTCB COMMUNICATION
- REQUIREMENT OF A TRUSTED PATH. HOWEVER, IT IS EXPECTED THAT
- THIS TRUSTED COMMUNICATION BETWEEN ONE NTCB PARTITION AND
- ANOTHER NTCB PARTITION WILL BE USED IN CONJUNCTION WITH THE
- TRUSTED PATH TO IMPLEMENT TRUSTED COMMUNICATION BETWEEN THE
- USER AND THE REMOTE NTCB PARTITION.
-
-
- 3.2.2.2 Audit
- _ _ _ _ _____
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall be able to create, maintain, and protect from
- modification or unauthorized access or destruction an audit
- trail of accesses to the objects it protects. The audit
- data shall be protected by the TCB so that read access to it
- is limited to those who are authorized for audit data. The
- TCB shall be able to record the following types of events:
- use of identification and authentication mechanisms, intro-
- duction of objects into a user's address space (e.g., file
- open, program initiation), deletion of objects, actions
- taken by computer operators and system administrators and/or
- system security officers, and other security relevant
- events. The TCB shall also be able to audit any override of
- human-readable output markings. For each recorded event,
- the audit record shall identify: date and time of the event,
- user, type of event, and success or failure of the event.
- For identification/authentication events the origin of
- request (e.g., terminal ID) shall be included in the audit
- record. For events that introduce an object into a user's
- address space and for object deletion events the audit
- record shall include the name of the object and the object's
- sensitivity level. The ADP system administrator shall be
- able to selectively audit the actions of any one or more
- users based on individual identify and/or object sensitivity
- level. THE TCB SHALL BE ABLE TO AUDIT THE IDENTIFIED
- EVENTS THAT MAY BE USED IN THE EXPLOITATION OF COVERT
- STORAGE CHANNELS.
-
- + Interpretation
-
- This criterion applies as stated. The sponsor must
- select which events are auditable. If any such events are
- not distinguishable by the NTCB alone (for example those
- identified in Part II), the audit mechanism shall provide an
- interface, which an authorized subject can invoke with
- parameters sufficient to produce an audit record. These
- audit records shall be distinguishable from those provided
- by the NTCB. In the context of a network system, "other
- security relevant events" (depending on network system
- architecture and network security policy) might be as fol-
- lows:
-
-
- 1. Identification of each access event (e.g., estab-
- lishing a connection or a connectionless association
- between processes in two hosts of the network) and
- its principal parameters (e.g., host identifiers of
- the two hosts involved in the access event and user
- identifier or host identifier of the user or host
- that is requesting the access event)
-
- 2. Identification of the starting and ending times of
- each access event using local time or global syn-
- chronized time
-
- 3. Identification of security-relevant exceptional con-
- ditions (e.g., potential violation of data
- integrity, such as misrouted datagrams) detected
- during the transactions between two hosts
-
- 4. Utilization of cryptographic variables
-
- 5. Changing the configuration of the network (e.g., a
- component leaving the network and rejoining)
-
- In addition, identification information should be
- included in appropriate audit trail records, as necessary,
- to allow association of all related (e.g., involving the
- same network event) audit trail records (e.g., at different
- hosts) with each other. Furthermore, a component of the
- network system may provide the required audit capability
- (e.g., storage, retrieval, reduction, analysis) for other
- components that do not internally store audit data but
- transmit the audit data to some designated collection com-
- ponent. Provisions shall be made to control the loss of
- audit data due to unavailability of resources.
-
- In the context of a network system, the "user's address
- space" is extended, for object introduction and deletion
- events, to include address spaces being employed on behalf
- of a remote user (or host). However, the focus remains on
- users in contrast to internal subjects as discussed in the
- DAC criterion. In addition, audit information must be
- stored in machine-readable form.
-
- THE CAPABILITY MUST EXIST TO AUDIT THE IDENTIFIED
- EVENTS THAT MAY BE USED IN THE EXPLOITATION OF COVERT
- STORAGE CHANNELS. TO ACCOMPLISH THIS, EACH NTCB PARTITION
- MUST BE ABLE TO AUDIT THOSE EVENTS LOCALLY THAT MAY LEAD TO
- THE EXPLOITATION OF A COVERT STORAGE CHANNEL WHICH EXIST
- BECAUSE OF THE NETWORK.
-
- + Rationale
-
- For remote users, the network identifiers (e.g., inter-
- net address) can be used as identifiers of groups of indivi-
- dual users (e.g., "all users at Host A") to eliminate the
- maintenance that would be required if individual identifica-
- tion of remote users was employed. In this class (C2), how-
- ever, it must be possible to identify (immediately or at
- some later time) the individuals represented by a group
- identifier. In all other respects, the interpretation is a
- straightforward extension of the criterion into the context
- of a network system. IDENTIFICATION OF COVERT CHANNEL
- EVENTS IS ADDRESSED IN THE COVERT CHANNEL ANALYSIS SECTION.
-
-
-
- 3.2.3 Assurance
- _ _ _ _________
-
-
- 3.2.3.1 Operational Assurance
-
-
- 3.2.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL MAINTAIN A DOMAIN FOR ITS OWN EXECUTION THAT
- PROTECTS IT FROM EXTERNAL INTERFERENCE OR TAMPERING (E.G.,
- BY MODIFICATION OF ITS CODE OR DATA STRUCTURES). THE TCB
- SHALL MAINTAIN PROCESS ISOLATION THROUGH THE PROVISION OF
- DISTINCT ADDRESS SPACES UNDER ITS CONTROL. THE TCB SHALL BE
- INTERNALLY STRUCTURED INTO WELL-DEFINED LARGELY INDEPENDENT
- MODULES. IT SHALL MAKE EFFECTIVE USE OF AVAILABLE HARDWARE
- TO SEPARATE THOSE ELEMENTS THAT ARE PROTECTION-CRITICAL FROM
- THOSE THAT ARE NOT. THE TCB MODULES SHALL BE DESIGNED SUCH
- THAT THE PRINCIPLE OF LEAST PRIVILEGE IS ENFORCED. FEATURES
- IN HARDWARE, SUCH AS SEGMENTATION, SHALL BE USED TO SUPPORT
- LOGICALLY DISTINCT STORAGE OBJECTS WITH SEPARATE ATTRIBUTES
- (NAMELY: READABLE, WRITABLE). THE USER INTERFACE TO THE TCB
- SHALL BE COMPLETELY DEFINED AND ALL ELEMENTS OF THE TCB
- IDENTIFIED.
-
- + Interpretation
-
- The system architecture criterion must be met individu-
- ally by all NTCB partitions. Implementation of the require-
- ment that the NTCB maintain a domain for its own execution
- is achieved by having each NTCB partition maintain a domain
- for its own execution. Since each component is itself a dis-
- tinct domain in the overall network system, this also satis-
- fies the requirement for process isolation through distinct
- address spaces in the special case where a component has
- only a single subject.
-
- THE NTCB MUST BE INTERNALLY STRUCTURED INTO WELL-
- DEFINED LARGELY INDEPENDENT MODULES AND MEET THE HARDWARE
- REQUIREMENTS. THIS IS SATISFIED BY HAVING EACH NTCB PARTI-
- TION SO STRUCTURED. THE NTCB CONTROLS ALL NETWORK RESOURCES.
- THESE RESOURCES are the union of the sets of resources over
- which the NTCB partitions have control. Code and data
- structures belonging to the NTCB, transferred among NTCB
- subjects (i.e., subjects outside the reference monitor but
- inside the NTCB) belonging to different NTCB partitions,
- must be protected against external interference or tamper-
- ing. For example, a cryptographic checksum or physical
- means may be employed to protect user authentication data
- exchanged between NTCB partitions.
-
- EACH NTCB PARTITION MUST ENFORCE THE PRINCIPLE OF LEAST
- PRIVILEGE WITHIN ITS COMPONENT. ADDITIONALLY, THE NTCB MUST
- BE STRUCTURED SO THAT THE PRINCIPLE OF LEAST PRIVILEGE IS
- ENFORCED IN THE SYSTEM AS A WHOLE.
-
- Each NTCB partition provides isolation of resources
- (within its component) in accord with the network system
- architecture and security policy so that "supporting ele-
- ments" (e.g., DAC and user identification) for the security
- mechanisms of the network system are strengthened compared
- to C2, from an assurance point of view, through the provi-
- sion of distinct address spaces under control of the NTCB.
-
- As discussed in the Discretionary Access Control sec-
- tion, the DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. When distributed in NTCB sub-
- jects (i.e., when outside the reference monitor), the
- assurance requirements for the design and implementation of
- the DAC shall be those of class C2 for all networks of class
- C2 or above.
-
- + Rationale
-
-
- THE REQUIREMENT THAT THE NTCB BE STRUCTURED INTO
- MODULES AND MEET THE HARDWARE REQUIREMENTS APPLIES WITHIN
- THE NTCB PARTITIONS IN THE VARIOUS COMPONENTS.
-
- THE PRINCIPLE OF LEAST PRIVILEGE REQUIRES THAT EACH
- USER OR OTHER INDIVIDUAL WITH ACCESS TO THE SYSTEM BE GIVEN
- ONLY THOSE RESOURCES AND AUTHORIZATIONS REQUIRED FOR THE
- PERFORMANCE OF THIS JOB. IN ORDER TO ENFORE THIS PRINCIPLE
- IN THE SYSTEM IT MUST BE ENFORCED IN EVERY NTCB PARTITION
- THAT SUPPORTS USERS OR OTHER INDIVIDUALS. FOR EXAMPLE,
- PROHIBITING ACCESS BY ADMINISTRATORS TO OBJECTS OUTSIDE THE
- NTCB PARTITION (E.G., GAMES) LESSENS THE OPPORTUNITY OF DAM-
- AGE BY A TROJAN HORSE.
-
- The requirement for the protection of communications
- between NTCB partitions is specifically directed to subjects
- that are part of the NTCB partitions. Any requirements for
- such protection for the subjects that are outside the NTCB
- partitions are addressed in response to the integrity
- requirements of the security policy.
-
- The provision of distinct address spaces under the con-
- trol of the NTCB provides the ability to separate subjects
- according to sensitivity level. This requirement is intro-
- duced at B1 since it is an absolute necessity in order to
- implement mandatory access controls.
-
-
- 3.2.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- Hardware and/or software features shall be provided that can
- be used to periodically validate the correct operation of
- the on-site hardware and firmware elements of the TCB.
-
- + Interpretation
-
- Implementation of the requirement is partly achieved by
- having hardware and/or software features that can be used to
- periodically validate the correct operation of the hardware
- and firmware elements of each component's NTCB partition.
- Features shall also be provided to validate the identity and
- correct operation of a component prior to its incorporation
- in the network system and throughout system operation. For
- example, a protocol could be designed that enables the com-
- ponents of the partitioned NTCB to exchange messages period-
- ically and validate each other's correct response. The pro-
- tocol shall be able to determine the remote entity's ability
- to respond. NTCB partitions shall provide the capability to
- report to network administrative personnel the failures
- detected in other NTCB partitions.
-
- Intercomponent protocols implemented within a NTCB
- shall be designed in such a way as to provide correct opera-
- tion in the case of failures of network communications or
- individual components. The allocation of mandatory and dis-
- cretionary access control policy in a network may require
- communication between trusted subjects that are part of the
- NTCB partitions in different components. This communication
- is normally implemented with a protocol between the subjects
- as peer entities. Incorrect access within a component shall
- not result from failure of an NTCB partition to communicate
- with other components.
-
- + Rationale
-
- The first paragraph of the interpretation is a
- straightforward extension of the requirement into the con-
- text of a network system and partitioned NTCB as defined for
- these network criteria.
-
- NTCB protocols should be robust enough so that they
- permit the system to operate correctly in the case of local-
- ized failure. The purpose of this protection is to preserve
- the integrity of the NTCB itself. It is not unusual for one
- or more components in a network to be inoperative at any
- time, so it is important to minimize the effects of such
- failures on the rest of the network. Additional integrity
- and denial of service issues are addressed in Part II.
-
-
-
- 3.2.3.1.3 Covert Channel Analysis
-
- + Statement from DoD 5200.28-STD
-
- THE SYSTEM DEVELOPER SHALL CONDUCT A THOROUGH SEARCH FOR
- COVERT STORAGE CHANNELS AND MAKE A DETERMINATION (EITHER BY
- ACTUAL MEASUREMENT OR BY ENGINEERING ESTIMATION) OF THE MAX-
- IMUM BANDWIDTH OF EACH IDENTIFIED CHANNEL. (SEE THE COVERT
- CHANNELS GUIDELINE SECTION.)
-
- + Interpretation
-
- THE REQUIREMENT, INCLUDING THE TCSEC COVERT CHANNEL
- GUIDELINE, APPLIES AS WRITTEN. IN A NETWORK, THERE ARE
- ADDITIONAL INSTANCES OF COVERT CHANNELS ASSOCIATED WITH COM-
- MUNICATION BETWEEN COMPONENTS.
-
- + Rationale
-
- THE EXPLOITATION OF NETWORK PROTOCOL INFORMATION (E.G.,
- HEADERS) CAN RESULT IN COVERT STORAGE CHANNELS. THE TOPIC
- HAS BEEN ADDRESSED IN THE LITERATURE.-
- _________________________
- - See, for example, Girling, C. G., "Covert Channels
- in LAN's," IEEE Transactions on Software Engineering,
- ____ ____________ __ ________ ___________
- Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
- Snow, D. P., and Karger, P. A., Limitations of End-to-
- ___________ __ ___ __
- End Encryption in Secure Computer Networks, MITRE
- ___ __________ __ ______ ________ ________
- Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
-
-
-
- 3.2.3.1.4 Trusted Facility Management
-
- + Statement from DoD 5200.28-STD
-
- THE TCB SHALL SUPPORT SEPARATE OPERATOR AND ADMINISTRATOR
- FUNCTIONS.
-
- + Interpretation
-
- THIS REQUIREMENT APPLIES AS WRITTEN TO BOTH THE NETWORK
- AS A WHOLE AND TO INDIVIDUAL COMPONENTS WHICH SUPPORT SUCH
- PERSONNEL.
-
- + Rationale
-
- IT IS RECOGNIZED THAT BASED ON THE ALLOCATED POLICY
- ELEMENTS SOME COMPONENTS MAY OPERATE WITH NO HUMAN INTER-
- FACE.
-
-
- 3.2.3.2 Life-Cycle Assurance
-
-
- 3.2.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- The security mechanisms of the ADP system shall be tested
- and found to work as claimed in the system documentation. A
- team of individuals who thoroughly understand the specific
- implementation of the TCB shall subject its design documen-
- tation, source code, and object code to through analysis and
- testing. Their objectives shall be: to uncover all design
- and implementation flaws that would permit a subject exter-
- nal to the TCB to read, change, or delete data normally
- denied under the mandatory or discretionary security policy
- enforced by the TCB; as well as to assure that no subject
- (without authorization to do so) is able to cause the TCB to
- enter a state such that it is unable to respond to communi-
- cations initiated by other users. THE TCB SHALL BE FOUND
- RELATIVELY RESISTANT TO PENETRATION. All discovered flaws
- shall be removed or neutralized and the TCB retested to
- demonstrate that they have been eliminated and that new
- flaws have not been introduced. TESTING SHALL DEMONSTRATE
- THAT THE TCB IMPLEMENTATION IS CONSISTENT WITH THE DESCRIP-
- TIVE TOP-LEVEL SPECIFICATION. (See the Security Testing
- Guidelines.)
-
- + Interpretation
-
- Testing of a component will require a testbed that
- exercises the interfaces and protocols of the component
- including tests under exceptional conditions. The testing
- of a security mechanism of the network system for meeting
- this criterion shall be an integrated testing procedure
- involving all components containing an NTCB partition that
- implement the given mechanism. This integrated testing is
- additional to any individual component tests involved in the
- evaluation of the network system. The sponsor should iden-
- tify the allowable set of configurations including the sizes
- of the networks. Analysis or testing procedures and tools
- shall be available to test the limits of these configura-
- tions. A change in configuration within the allowable set
- of configurations does not require retesting.
-
- The testing of each component will include the intro-
- duction of subjects external to the NTCB partition for the
- component that will attempt to read, change, or delete data
- normally denied. If the normal interface to the component
- does not provide a means to create the subjects needed to
- conduct such a test, then this portion of the testing shall
- use a special version of the untrusted software for the com-
- ponent that results in subjects that make such attempts.
- The results shall be saved for test analysis. Such special
- versions shall have an NTCB partition that is identical to
- that for the normal configuration of the component under
- evaluation.
-
- The testing of the mandatory controls shall include
- tests to demonstrate that the labels for information
- imported and/or exported to/from the component accurately
- represent the labels maintained by the NTCB partition for
- the component for use as the basis for its mandatory access
- control decisions. The tests shall include each type of
- device, whether single-level or multilevel, supported by the
- component.
-
- THE NTCB MUST BE FOUND RELATIVELY RESISTANT TO PENETRA-
- TION. THIS APPLIES TO THE NTCB AS A WHOLE, AND TO EACH NTCB
- PARTITION IN A COMPONENT OF THIS CLASS.
-
- + Rationale
-
- The phrase "no subject (without authorization to do so)
- is able to cause the TCB to enter a state such that it is
- unable to respond to communications initiated by other
- users" relates to the security services (Part II of this
- TNI) for the Denial of Service problem, and to correctness
- of the protocol implementations.
-
- Testing is an important method available in this
- evaluation division to gain any assurance that the security
- mechanisms perform their intended function. A major purpose
- of testing is to demonstrate the system's response to inputs
- to the NTCB partition from untrusted (and possibly mali-
- cious) subjects.
-
- In contrast to general purpose systems that allow for
- the dynamic creation of new programs and the introductions
- of new processes (and hence new subjects) with user speci-
- fied security properities, many network components have no
- method for introducing new programs and/or processes during
- their normal operation. Therefore, the programs necessary
- for the testing must be introduced as special versions of
- the software rather than as the result of normal inputs by
- the test team. However, it must be insured that the NTCB
- partition used for such tests is identical to the one under
- evaluation.
-
- Sensitivity labels serve a critical role in maintaining
- the security of the mandatory access controls in the net-
- work. Especially important to network security is the role
- of the labels for information communicated between com-
- ponents - explicit labels for multilevel devices and impli-
- cit labels for single-level devices. Therefore the testing
- for correct labels is highlighted.
-
- THE REQUIREMENT FOR TESTING TO DEMONSTRATE CONSISTENCY
- BETWEEN THE NTCB IMPLEMENTATION AND THE DTLS IS A STRAIGHT-
- FORWARD EXTENSION OF THE TCSEC REQUIREMENT INTO THE CONTEXT
- OF A NETWORK SYSTEM.
-
-
-
- 3.2.3.2.2 Design Specification and Verification
-
- + Statement from DoD 5200.28-STD
-
- A FORMAL model of the security policy supported by the TCB
- shall be maintained over the life cycle of the ADP system
- THAT IS PROVEN and demonstrated to be consistent with its
- axioms. A DESCRIPTIVE TOP-LEVEL SPECIFICATION (DTLS) OF THE
- TCB SHALL BE MAINTAINED THAT COMPLETELY AND ACCURATELY
- DESCRIBES THE TCB IN TERMS OF EXCEPTIONS, ERROR MESSAGES,
- AND EFFECTS. IT SHALL BE SHOWN TO BE AN ACCURATE DESCRIP-
- TION OF THE TCB INTERFACE.
-
- + Interpretation
-
- The overall network security policy expressed in this
- model will provide the basis for the mandatory access con-
- trol policy exercised by the NTCB over subjects and storage
- objects in the entire network. The policy will also be the
- basis for the discretionary access control policy exercised
- by the NTCB to control access of named users to named
- objects. Data integrity requirements addressing the effects
- of unauthorized MSM need not be included in this model. The
- overall network policy must be decomposed into policy ele-
- ments that are allocated to appropriate components and used
- as the basis for the security policy model for those com-
- ponents.
-
- The level of abstraction of the model, and the set of
- subjects and objects that are explicitly represented in the
- model, will be affected by the NTCB partitioning. Subjects
- and objects must be represented explicitly in the model for
- the partition if there is some network component whose NTCB
- partition exercises access control over them. The model
- shall be structured so that the axioms and entities
- applicable to individual network components are manifest.
- Global network policy elements that are allocated to com-
- ponents shall be represented by the model for that com-
- ponent.
-
- THE REQUIREMENTS FOR A NETWORK DTLS ARE GIVEN IN THE
- DESIGN DOCUMENTATION SECTION.
-
- + Rationale
-
- The treatment of the model depends to a great extent on
- the degree of integration of the communications service into
- a distributed system. In a closely coupled distributed sys-
- tem, one might use a model that closely resembles one
- appropriate for a stand-alone computer system.
-
- In other cases, the model of each partition will be
- expected to show the role of the NTCB partition in each kind
- of component. It will most likely clarify the model,
- although not part of the model, to show access restrictions
- implied by the system design; for example, subjects
- representing protocol entities might have access only to
- objects containing data units at the same layer of protocol.
- The allocation of subjects and objects to different proto-
- col layers is a protocol design choice which need not be
- reflected in the security policy model.
-
-
-
- 3.2.3.2.3 Configuration Management
-
- + Statement from DoD 5200.28-STD
-
- DURING DEVELOPMENT AND MAINTENANCE OF THE TCB, A CONFIGURA-
- TION MANAGEMENT SYSTEM SHALL BE IN PLACE THAT MAINTAINS CON-
- TROL OF CHANGES TO THE DESCRIPTIVE TOP-LEVEL SPECIFICATION,
- OTHER DESIGN DATA, IMPLEMENTATION DOCUMENTATION, SOURCE
- CODE, THE RUNNING VERSION OF THE OBJECT CODE, AND TEST FIX-
- TURES AND DOCUMENTATION. THE CONFIGURATION MANAGEMENT SYS-
- TEM SHALL ASSURE A CONSISTENT MAPPING AMONG ALL DOCUMENTA-
- TION AND CODE ASSOCIATED WITH THE CURRENT VERSION OF THE
- TCB. TOOLS SHALL BE PROVIDED FOR GENERATION OF A NEW VER-
- SION OF THE TCB FROM SOURCE CODE. ALSO AVAILABLE SHALL BE
- TOOLS FOR COMPARING A NEWLY GENERATED VERSION WITH THE PRE-
- VIOUS TCB VERSION IN ORDER TO ASCERTAIN THAT ONLY THE
- INTENDED CHANGES HAVE BEEN MADE IN THE CODE THAT WILL ACTU-
- ALLY BE USED AS THE NEW VERSION OF THE TCB.
-
- + Interpretation
-
- THE REQUIREMENT APPLIES AS WRITTEN, WITH THE FOLLOWING
- EXTENSIONS:
-
- 1. A CONFIGURATION MANAGEMENT SYSTEM MUST BE IN PLACE
- FOR EACH NTCB PARTITION.
-
-
- 2. A CONFIGURATION MANAGEMENT PLAN MUST EXIST FOR THE
- ENTIRE SYSTEM. IF THE CONFIGURATION MANAGEMENT SYS-
- TEM IS MADE UP OF THE CONGLOMERATION OF THE CONFI-
- GURATION MANAGEMENT SYSTEMS OF THE VARIOUS NTCB PAR-
- TITIONS, THEN THE CONFIGURATION MANAGEMENT PLAN MUST
- ADDRESS THE ISSUE OF HOW CONFIGURATION CONTROL IS
- APPLIED TO THE SYSTEM AS A WHOLE.
-
- + Rationale
-
- EACH NTCB PARTITION MUST HAVE A CONFIGURATION MANAGE-
- MENT SYSTEM IN PLACE, OR ELSE THERE WILL BE NO WAY FOR THE
- NTCB AS A WHOLE TO HAVE AN EFFECTIVE CONFIGURATION MANAGE-
- MENT SYSTEM. THE OTHER EXTENSIONS ARE MERELY REFLECTIONS OF
- THE WAY THAT NETWORKS OPERATE IN PRACTICE.
-
-
-
- 3.2.4 Documentation.
- _ _ _ _____________
-
-
- 3.2.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A single summary, chapter, or manual in user documentation
- shall describe the protection mechanisms provided by the
- TCB, interpretations on their use, and how they interact
- with one another.
-
- + Interpretation
-
- This user documentation describes user visible protec-
- tion mechanisms at the global (network system) level and at
- the user interface of each component, and the interaction
- among these.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system as defined for these
- network criteria. Documentation of protection mechanisms
- provided by individual components is required by the cri-
- teria for trusted computer systems that are applied as
- appropriate for the individual components.
-
-
- 3.2.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A manual addressed to the ADP system administrator shall
- present cautions about functions and privileges that should
- be controlled when running a secure facility. The procedures
- for examining and maintaining the audit files as well as the
- detailed audit record structure for each type of audit event
- shall be given. The manual shall describe the operator and
- administrator functions related to security, to include
- changing the security characteristics of a user. It shall
- provide interpretations on the consistent and effective use
- of the protection features of the system, how they interact,
- how to securely generate a new TCB, and facility procedures,
- warnings, and privileges that need to be controlled in order
- to operate the facility in a secure manner. THE TCB MODULES
- THAT CONTAIN THE REFERENCE VALIDATION MECHANISM SHALL BE
- IDENTIFIED. THE PROCEDURES FOR SECURE GENERATION OF A NEW
- TCB FROM SOURCE AFTER MODIFICATION OF ANY MODULES IN THE TCB
- SHALL BE DESCRIBED.
-
- + Interpretation
-
- This manual shall contain specifications and procedures
- to assist the system administrator(s) maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address the following:
-
- 1. The hardware configuration of the network itself;
-
- 2. The implications of attaching new components to the
- network;
-
- 3. The case where certain components may periodically
- leave the network (e.g., by crashing, or by being
- disconnected) and then rejoin;
-
- 4. Network configuration aspects that can impact the
- security of the network system; (For example, the
- manual should describe for the network system
- administrator the interconnections among components
- that are consistent with the overall network system
- architecture.)
-
- 5. Loading or modifying NTCB software or firmware
- (e.g., down-line loading).
-
- 6. INCREMENTAL UPDATES; THAT IS, IT MUST EXPLICITLY
- INDICATE WHICH COMPONENTS OF THE NETWORK MAY CHANGE
- WITHOUT OTHERS ALSO CHANGING.
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- THE COMPONENTS OF THE NETWORK THAT FORM THE NTCB MUST
- BE IDENTIFIED. FURTHERMORE, THE MODULES WITHIN AN NTCB PAR-
- TITION THAT CONTAIN THE REFERENCE VALIDATION MECHANISM (IF
- ANY) WITHIN THAT PARTITION MUST BE IDENTIFIED.
-
- THE PROCEDURES FOR THE SECURE GENERATION OF A NEW VER-
- SION (OR COPY) OF EACH NTCB PARTITION FROM SOURCE MUST BE
- DESCRIBED. THE PROCEDURES AND REQUIREMENTS FOR THE SECURE
- GENERATION OF THE NTCB NECESSITATED BY CHANGES IN THE NET-
- WORK CONFIGURATION SHALL BE DESCRIBED.
-
- + Rationale
-
- There may be multiple system administrators with
- diverse responsibilities. The technical security measures
- described by these criteria must be used in conjunction with
- other forms of security in order to achieve security of the
- network. Additional forms include administrative security,
- physical security, emanations security, etc.
-
- Extension of this criterion to cover configuration
- aspects of the network is needed because, for example,
- proper interconnection of components is typically essential
- to achieve a correct realization of the network architec-
- ture.
-
- As mentioned in the section on Label Integrity, cryp-
- tography is one common mechanism employed to protect commun-
- ication circuits. Encryption transforms the representation
- of information so that it is unintelligible to unauthorized
- subjects. Reflecting this transformation, the sensitivity
- of the ciphertext is generally lower than the cleartext. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency (NSA).
-
- The encryption algorithm and its implementation are
- outside the scope of these interpretations. This algorithm
- and implementation may be implemented in a separate device
- or may be a function of a subject in a component not dedi-
- cated to encryption. Without prejudice, either implementa-
- tion packaging is referred to as an encryption mechanism
- herein.
-
- THE REQUIREMENTS FOR DESCRIPTIONS OF NTCB GENERATION
- AND IDENTIFICATION OF MODULES AND COMPONENTS THAT FORM THE
- NTCB ARE STRAIGHTFORWARD EXTENSIONS OF THE TCSEC REQUIRE-
- MENTS INTO THE NETWORK CONTEXT. IN THOSE CASES WHERE THE
- VENDOR DOES NOT PROVIDE SOURCE CODE, AN ACCEPTABLE PROCEDURE
- SHALL BE TO REQUEST THE VENDOR TO PERFORM THE SECURE GENERA-
- TION.
-
-
- 3.2.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall provide to the evaluators a docu-
- ment that describes the test plan, test procedures that show
- how the security mechanisms were tested, and results of the
- security mechanisms' functional testing. IT SHALL INCLUDE
- RESULTS OF TESTING THE EFFECTIVENESS OF THE METHODS USED TO
- REDUCE COVERT CHANNEL BANDWIDTHS.
-
-
- + Interpretation
-
- The "system developer" is interpreted as "the network
- system sponsor". The description of the test plan should
- establish the context in which the testing was or should be
- conducted. The description should identify any additional
- test components that are not part of the system being
- evaluated. This includes a description of the test-relevant
- functions of such test components and a description of the
- interfacing of those test components to the system being
- evaluated. The description of the test plan should also
- demonstrate that the tests adequately cover the network
- security policy. The tests should include the features
- described in the System Architecture and the System
- Integrity sections. The tests should also include network
- configuration and sizing.
-
- + Rationale
-
- The entity being evaluated may be a networking subsys-
- tem (see Appendix A) to which other components must be added
- to make a complete network system. In that case, this
- interpretation is extended to include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
- THE BANDWIDTHS OF COVERT CHANNELS ARE USED TO DETERMINE
- THE SUITABILITY OF A NETWORK SYSTEM FOR A GIVEN ENVIRONMENT.
- THE EFFECTIVENESS OF THE METHODS USED TO REDUCE THESE
- BANDWIDTHS MUST THEREFORE BE ACCURATELY DETERMINED.
-
-
- 3.2.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- Documentation shall be available that provides a description
- of the manufacturer's philosophy of protection and an expla-
- nation of how this philosophy is translated into the TCB.
- THE interfaces between THE TCB modules shall be described.
- A FORMAL description of the security policy model enforced
- by the TCB shall be available and an explanation provided to
- show that it is sufficient to enforce the security policy.
- The specific TCB protection mechanisms shall be identified
- and an explanation given to show that they satisfy the
- model. THE DESCRIPTIVE TOP-LEVEL SPECIFICATION (DTLS) SHALL
- BE SHOWN TO BE AN ACCURATE DESCRIPTION OF THE TCB INTERFACE.
- DOCUMENTATION SHALL DESCRIBE HOW THE TCB IMPLEMENTS THE
- REFERENCE MONITOR CONCEPT AND GIVE AN EXPLANATION WHY IT IS
- TAMPER RESISTANT, CANNOT BE BYPASSED, AND IS CORRECTLY
- IMPLEMENTED. DOCUMENTATION SHALL DESCRIBE HOW THE TCB IS
- STRUCTURED TO FACILITATE TESTING AND TO ENFORCE LEAST
- PRIVILEGE. THIS DOCUMENTATION SHALL ALSO PRESENT THE
- RESULTS OF THE COVERT CHANNEL ANALYSIS AND THE TRADEOFFS
- INVOLVED IN RESTRICTING THE CHANNELS. ALL AUDITABLE EVENTS
- THAT MAY BE USED IN THE EXPLOITATION OF KNOWN COVERT STORAGE
- CHANNELS SHALL BE IDENTIFIED. THE BANDWIDTHS OF KNOWN
- COVERT STORAGE CHANNELS, THE USE OF WHICH IS NOT DETECTABLE
- BY THE AUDITING MECHANISMS, SHALL BE PROVIDED. (SEE THE
- COVERT CHANNEL GUIDELINE SECTION.)
-
- + Interpretation
-
- Explanation of how the sponsor's philosophy of protec-
- tion is translated into the NTCB shall include a description
- of how the NTCB is partitioned. The security policy also
- shall be stated. The description of the interfaces between
- the NTCB modules shall include the interface(s) between NTCB
- partitions and modules within the partitions if the modules
- exist. The sponsor shall describe the security architecture
- and design, including the allocation of security require-
- ments among components.
-
- THE DOCUMENTATION INCLUDES BOTH A SYSTEM DESCRIPTION
- AND A SET OF COMPONENT DTLS'S. THE SYSTEM DESCRIPTION
- ADDRESSES THE NETWORK SECURITY ARCHITECTURE AND DESIGN BY
- SPECIFYING THE TYPES OF COMPONENTS IN THE NETWORK, WHICH
- ONES ARE TRUSTED, AND IN WHAT WAY THEY MUST COOPERATE TO
- SUPPORT NETWORK SECURITY OBJECTIVES. A COMPONENT DTLS SHALL
- BE PROVIDED FOR EACH TRUSTED NETWORK COMPONENT, I.E., EACH
- COMPONENT CONTAINING AN NTCB PARTITION. EACH COMPONENT DTLS
- SHALL DESCRIBE THE INTERFACE TO THE NTCB PARTITION OF ITS
- COMPONENT. APPENDIX A ADDRESSES COMPONENT EVALUATION ISSUES.
-
- As stated in the introduction to Division B, the spon-
- sor must demonstrate that the NTCB employs the reference
- monitor concept. The security policy model must be a model
- for a reference monitor.
-
- The security policy model for each partition implement-
- ing a reference monitor shall fully represent the access
- control policy supported by the partition, including the
- discretionary and mandatory security policy for secrecy
- and/or integrity. For the mandatory policy the single domi-
- nance relation for sensitivity labels, including secrecy
- and/or integrity components, shall be precisely defined.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system as
- defined for this network interpretation. Other documenta-
- tion, such as description of components and description of
- operating environment(s) in which the networking subsystem
- or network system is designed to function, is required else-
- where, e.g., in the Trusted Facility Manual.
-
- In order to be evaluated, a network must possess a
- coherent Network Security Architecture and Design. (Inter-
- connection of components that do not adhere to such a single
- coherent Network Security Architecture is addressed in the
- Interconnection of Accredited AIS, Appendix C.) The Network
- Security Architecture must address the security-relevant
- policies, objectives, and protocols. The Network Security
- Design specifies the interfaces and services that must be
- incorporated into the network so that it can be evaluated as
- a trusted entity. There may be multiple designs that con-
- form to the same architecture but are more or less incompa-
- tible and non-interoperable (except through the Interconnec-
- tion Rules). Security related mechanisms requiring coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms having no visible
- interfaces are not specified in this document but are left
- as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network security Architecture and
- Design are satisfied. That is, the components can be assem-
- bled into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization that is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and unambi-
- guously define the security functionality of components as
- well as the interfaces between or among components. The
- Network Security Architecture and Design must be evaluated
- to determine that a network constructed to its specifica-
- tions will in fact be trusted, that is, it will be evaluat-
- able under these interpretations.
-
-
- The term "model" is used in several different ways in a
- network context, e.g., a "protocol reference model," a "for-
- mal network model," etc. Only the "security policy model" is
- addressed by this requirement and is specifically intended
- to model the interface, viz., "security perimeter," of the
- reference monitor and must meet all the requirements defined
- in the TCSEC. It must be shown that all parts of the TCB
- are a valid interpretation of the security policy model,
- i.e., that there is no change to the secure state except as
- represented by the model.
-
- 3.3 CLASS (B3): SECURITY DOMAINS
- _ _ _____ __ ________ _______
-
-
- THE CLASS (B3) NTCB MUST SATISFY THE REFERENCE
- MONITOR REQUIREMENTS THAT IT MEDIATE ALL ACCESSES
- OF SUBJECTS TO OBJECTS, BE TAMPERPROOF, AND BE
- SMALL ENOUGH TO BE SUBJECTED TO ANALYSIS AND
- TESTS. TO THIS END, THE NTCB IS STRUCTURED TO
- EXCLUDE CODE NOT ESSENTIAL TO SECURITY POLICY
- ENFORCEMENT, WITH SIGNIFICANT SYSTEM ENGINEERING
- DURING NTCB DESIGN AND IMPLEMENTATION DIRECTED
- TOWARD MINIMIZING ITS COMPLEXITY. A SECURITY
- ADMINISTRATOR IS SUPPORTED, AUDIT MECHANISMS ARE
- EXPANDED TO SIGNAL SECURITY-RELEVANT EVENTS, AND
- SYSTEM RECOVERY PROCEDURES ARE REQUIRED. THE SYS-
- TEM IS HIGHLY RESISTANT TO PENETRATION. THE FOL-
- LOWING ARE MINIMAL REQUIREMENTS FOR SYSTEMS
- ASSIGNED A CLASS (B3) RATING:
-
-
- 3.3.1 Security Policy
- _ _ _ ________ ______
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- The network sponsor shall describe the overall network
- security policy enforced by the NTCB. At a minimum, this
- policy shall include the discretionary and mandatory
- requirements applicable to this class. The policy may
- require data secrecy, or data integrity, or both. The pol-
- icy is an access control policy having two primary com-
- ponents: mandatory and discretionary. The policy shall
- include a discretionary policy for protecting the informa-
- tion being processed based on the authorizations of indivi-
- duals, users, or groups of users. This access control pol-
- icy statement shall describe the requirements on the network
- to prevent or detect "reading or destroying" sensitive
- information by unauthorized users or errors. The mandatory
- policy must define the set of distinct sensitivity levels
- that it supports. For the Class B1 or above the mandatory
- policy shall be based on the labels associated with the
- information that reflects its sensitivity with respect to
- secrecy and/or integrity, where applicable, and labels asso-
- ciated with users to reflect their authorization to access
- such information. Unauthorized users include both those
- that are not authorized to use the network at all (e.g., a
- user attempting to use a passive or active wire tap) or a
- legitimate user of the network who is not authorized to
- access a specific piece of information being protected.
-
- Note that "users" does not include "operators," "system
- programmers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network sys-
- tem, for example, by defining membership of a group. These
- individuals may also have the separate role of users.
-
-
- SECRECY POLICY: The network sponsor shall define the
- form of the discretionary and mandatory secrecy
- policy that is enforced in the network to prevent
- unauthorized users from reading the sensitive infor-
- mation entrusted to the network.
-
-
- DATA INTEGRITY POLICY: The network sponsor shall
- define the discretionary and mandatory integrity
- policy to prevent unauthorized users from modifying,
- viz., writing, sensitive information. The defini-
- tion of data integrity presented by the network
- sponsor refers to the requirement that the informa-
- tion has not been subjected to unauthorized modifi-
- cation in the network. The mandatory integrity pol-
- icy enforced by the NTCB cannot, in general, prevent
- modification while information is being transmitted
- between components. However, an integrity sensi-
- tivity label may reflect the confidence that the
- information has not been subjected to transmission
- errors because of the protection afforded during
- transmission. This requirement is distinct from the
- requirement for label integrity.
-
- + Rationale
-
- The word "sponsor" is used in place of alternatives
- (such as "vendor," "architect," "manufacturer," and
- "developer") because the alternatives indicate people who
- may not be available, involved, or relevant at the time that
- a network system is proposed for evaluation.
-
- A trusted network is able to control both the reading
- and writing of shared sensitive information. Control of
- writing is used to protect against destruction of informa-
- tion. A network normally is expected to have policy require-
- ments to protect both the secrecy and integrity of the
- information entrusted to it. In a network the integrity is
- frequently as important or more important than the secrecy
- requirements. Therefore the secrecy and/or integrity policy
- to be enforced by the network must be stated for each net-
- work regardless of its evaluation class. The assurance that
- the policy is faithfully enforced is reflected in the
- evaluation class of the network.
-
- This control over modification is typically used to
- protect information so that it may be relied upon and to
- control the potential harm that would result if the informa-
- tion were corrupted. The overall network policy require-
- ments for integrity includes the protection for data both
- while being processed in a component and while being
- transmitted in the network. The access control policy
- enforced by the NTCB relates to the access of subjects to
- objects within each component. Communications integrity
- addressed within Part II relates to information while being
- transmitted.
-
- The mandatory integrity policy (at class B1 and above)
- in some architectures may be useful in supporting the link-
- age between the connection oriented abstraction introduced
- in the Introduction and the individual components of the
- network. For example, in a key distribution center for
- end-to-end encryption, a distinct integrity category may be
- assigned to isolate the key generation code and data from
- possible modification by other supporting processes in the
- same component, such as operator interfaces and audit.
-
- The mandatory integrity policy for some architecture
- may define an integrity sensitivity label that reflects the
- specific requirements for ensuring that information has not
- been subject to random errors in excess of a stated limit
- nor to unauthorized message stream modification (MSM) -.
- The specific metric associated with an integrity sensitivity
- label will generally reflect the intended applications of
- the network.
-
-
- 3.3.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall define and control access between named users
- and named objects (e.g., files and programs) in the ADP sys-
- tem. The enforcement mechanism (e.g., ACCESS CONTROL LISTS)
- shall allow users to specify and control sharing of those
- OBJECTS and shall provide controls to limit propagation of
- access rights. The discretionary access control mechanism
- shall, either by explicit user action or by default, provide
- that objects are protected from unauthorized access. These
- access controls shall be capable of SPECIFYING, FOR EACH
- _________________________
- - See Voydock, Victor L. and Stephen T. Kent, "Secu-
- rity Mechanisms in High-Level Network Protocols," Com-
- ___
- puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
- ______ _______
-
-
-
- NAMED OBJECT, A LIST OF NAMED INDIVIDUALS AND A LIST OF
- GROUPS OF NAMED INDIVIDUALS WITH THEIR RESPECTIVE MODES OF
- ACCESS TO THAT OBJECT. FURTHERMORE, FOR EACH SUCH NAMED
- OBJECT, IT SHALL BE POSSIBLE TO SPECIFY A LIST OF NAMED
- INDIVIDUALS AND A LIST OF GROUPS OF NAMED INDIVIDUALS FOR
- WHICH NO ACCESS TO THE OBJECT IS GIVEN. Access permission
- to an object by users not already possessing access permis-
- sion shall only be assigned by authorized users.
-
- + Interpretation
-
- The discretionary access control (DAC) mechanism(s) may
- be distributed over the partitioned NTCB in various ways.
- Some part, all, or none of the DAC may be implemented in a
- given component of the network system. In particular, com-
- ponents that support only internal subjects (i.e., that have
- no subjects acting as direct surrogates for users), such as
- a public network packet switch, might not implement the DAC
- mechanism(s) directly (e.g., they are unlikely to contain
- access control lists).
-
- Identification of users by groups may be achieved in
- various ways in the networking environment. For example,
- the network identifiers (e.g., internet addresses) for vari-
- ous components (e.g., hosts, gateways) can be used as iden-
- tifiers of groups of individual users (e.g., "all users at
- Host A," "all users of network Q") so long as the individu-
- als involved in the group are implied by the group identif-
- ier. For example, Host A might employ a particular group-id,
- for which it maintains a list of explicit users in that
- group, in its network exchange with Host B, which accepts
- the group-id under the conditions of this interpretation.
-
- For networks, individual hosts will impose need-to-know
- controls over their users on the basis of named individuals
- - much like (in fact, probably the same) controls used when
- there is no network connection.
-
- When group identifiers are acceptable for access con-
- trol, the identifier of some other host may be employed, to
- eliminate the maintenance that would be required if indivi-
- dual identification of remote users was employed. In class
- C2 and higher, however, it must be possible from that audit
- record to identify (immediately or at some later time)
- exactly the individuals represented by a group identifier at
- the time of the use of that identifier. There is allowed to
- be an uncertainty because of elapsed time between changes in
- the group membership and the enforcement in the access con-
- trol mechanisms.
-
- The DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. The reference monitor manages
- all the physical resources of the system and from them
- creates the abstraction of subjects and objects that it con-
- trols. Some of these subjects and objects may be used to
- implement a part of the NTCB. When the DAC mechanism is
- distributed in such NTCB subjects (i.e., when outside the
- reference monitor), the assurance requirements (see the
- Assurance section) for the design and implementation of the
- DAC shall be those of class C2 for all networks of class C2
- or above.
-
- When integrity is included as part of the network dis-
- cretionary security policy, the above interpretations shall
- be specifically applied to the controls over modification,
- viz, the write mode of access, within each component based
- on identified users or groups of users.
-
- + Rationale
-
- In this class, the supporting elements of the overall
- DAC mechanism are required to isolate information (objects)
- that supports DAC so that it is subject to auditing require-
- ments (see the System Architecture section). The use of
- network identifiers to identify groups of individual users
- could be implemented, for example, as an X.25 community of
- interest in the network protocol layer (layer 3). In all
- other respects, the supporting elements of the overall DAC
- mechanism are treated exactly as untrusted subjects are
- treated with respect to DAC in an ADP system, with the same
- result as noted in the interpretation.
-
- A typical situation for DAC is that a surrogate process
- for a remote user will be created in some host for access to
- objects under the control of the NTCB partition within that
- host. The interpretation requires that a user identifier be
- assigned and maintained for each such process by the NTCB,
- so that access by a surrogate process is subject to essen-
- tially the same discretionary controls as access by a pro-
- cess acting on behalf of a local user would be. However,
- within this interpretation a range of possible interpreta-
- tions of the assigned user identification is permitted.
-
- The most obvious situation would exist if a global
- database of network users were to be made permanently avail-
- able on demand to every host, (i.e., a name server existed)
- so that all user identifications were globally meaningful.
-
- It is also acceptable, however, for some NTCB parti-
- tions to maintain a database of locally-registered users for
- its own use. In such a case, one could choose to inhibit
- the creation of surrogate processes for locally unregistered
- users, or (if permitted by the local policy) alternatively,
- to permit the creation of surrogate processes with
- preselected user and group identifiers which, in effect,
- identify the process as executing on behalf of a member of a
- group of users on a particular remote host. The intent of
- the words concerning audit in the interpretation is to pro-
- vide a minimally acceptable degree of auditability for cases
- such as the last described. What is required is that there
- be a capability, using the audit facilities provided by the
- network NTCB partitions involved, to determine who was
- logged in at the actual host of the group of remote users at
- the time the surrogate processing occured.
-
- Associating the proper user id with a surrogate process
- is the job of identification and authentication. This means
- that DAC is applied locally, with respect to the user id of
- the surrogate process. The transmission of the data back
- across the network to the user's host, and the creation of a
- copy of the data there, is not the business of DAC.
-
- Components that support only internal subjects impact
- the implementation of the DAC by providing services by which
- information (e.g., a user-id) is made available to a com-
- ponent that makes a DAC decision. An example of the latter
- would be the case that a user at Host A attempts to access a
- file at Host B. The DAC decision might be (and usually
- would be) made at Host B on the basis of a user-id transmit-
- ted from Host A to Host B.
-
- Unique user identification may be achieved by a variety
- of mechanisms, including (a) a requirement for unique iden-
- tification and authentication on the host where access takes
- place; (b) recognition of fully qualified network
- addresses authenticated by another host and forwarded to the
- host where access takes place; or (c) administrative support
- of a network-wide unique personnel identifier that could be
- authenticated and forwarded by another host as in (b) above,
- or could be authenticated and forwarded by a dedicated net-
- work identification and authentication server. The proto-
- cols which implement (b) or (c) are subject to the System
- Architecture requirements.
-
- Network support for DAC might be handled in other ways
- than that described as "typical" above. In particular, some
- form of centralized access control is often proposed. An
- access control center may make all decisions for DAC, or it
- may share the burden with the hosts by controlling host-to-
- host connections, and leaving the hosts to decide on access
- to their objects by users at a limited set of remote hosts.
- In this case the access control center provides the linkage
- between the connection oriented abstraction (as discussed in
- the Introduction) and the overall network security policy
- for DAC. In all cases the enforcement of the decision must
- be provided by the host where the object resides.
-
- There are two forms of distribution for the DAC mechan-
- ism: implementing portions of the DAC in separate com-
- ponents, and supporting the DAC in subjects contained within
- the NTCB partition in a component. Since "the ADP system"
- is understood to be "the computer network" as a whole, each
- network component is responsible for enforcing security in
- the mechanisms allocated to it to ensure secure implementa-
- tion of the network security policy. For traditional host
- systems it is frequently easy to also enforce the DAC along
- with the MAC within the reference monitor, per se, although
- a few approaches, such as virtual machine monitors, support
- DAC outside this interface.
-
- In contrast to the universally rigid structure of man-
- datory policies (see the Mandatory Access Control section),
- DAC policies tend to be very network and system specific,
- with features that reflect the natural use of the system.
- For networks it is common that individual hosts will impose
- controls over their local users on the basis of named
- individuals-much like the controls used when there is no
- network connection. However, it is difficult to manage in a
- centralized manner all the individuals using a large net-
- work. Therefore, users on other hosts are commonly grouped
- together so that the controls required by the network DAC
- policy are actually based on the identity of the hosts or
- other components. A gateway is an example of such a com-
- ponent.
-
- The assurance requirements are at the very heart of the
- concept of a trusted system. It is the assurance that
- determines if a system or network is appropriate for a given
- environment, as reflected, for example, in the Environments
- Guideline-. In the case of monolithic systems that have DAC
- integral to the reference monitor, the assurance require-
- ments for DAC are inseparable from those of the rest of the
- reference monitor. For networks there is typically a much
- clearer distinction due to distributed DAC. The rationale
- for making the distinction in this network interpretation is
- that if major trusted network components can be made signi-
- ficantly easier to design and implement without reducing the
- ability to meet security policy, then trusted networks will
- be more easily available.
-
-
- 3.3.1.2 Object Reuse
-
- + Statement from DoD 5200.28-STD
-
- All authorizations to the information contained within a
- storage object shall be revoked prior to initial assignment,
- allocation or reallocation to a subject from the TCB's pool
- of unused storage objects. No information, including
- encrypted representations of information, produced by a
- prior subject's actions is to be available to any subject
- that obtains access to an object that has been released back
- to the system.
-
- + Interpretation
-
- The NTCB shall ensure that any storage objects that it
- controls (e.g., message buffers under the control of a NTCB
- _________________________
- - Guidance for Applying the Department of Defense
- ________ ___ ________ ___ __________ __ _______
- Trusted Computer System Evaluation Criteria in Specific
- _______ ________ ______ __________ ________ __ ________
- Environments, CSC-STD-003-85.
- ____________
-
-
- partition in a component) contain no information for which a
- subject in that component is not authorized before granting
- access. This requirement must be enforced by each of the
- NTCB partitions.
-
- + Rationale
-
- In a network system, storage objects of interest are
- things that the NTCB directly controls, such as message
- buffers in components. Each component of the network system
- must enforce the object reuse requirement with respect to
- the storage objects of interest as determined by the network
- security policy. For example, the DAC requirement in this
- division leads to the requirement here that message buffers
- be under the control of the NTCB partition. A buffer
- assigned to an internal subject may be reused at the discre-
- tion of that subject which is responsible for preserving the
- integrity of message streams. Such controlled objects may
- be implemented in physical resources, such as buffers, disk
- sectors, tape space, and main memory, in components such as
- network switches.
-
-
-
- 3.3.1.3 Labels
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels associated with each ADP system resource
- (e.g., subject, storage object, ROM) that is directly or
- indirectly accessible by subjects external to the TCB shall
- be maintained by the TCB. These labels shall be used as the
- basis for mandatory access control decisions. In order to
- import non-labeled data, the TCB shall request and receive
- from an authorized user the sensitivity level of the data,
- and all such actions shall be auditable by the TCB.
-
- + Interpretation
-
- Non-labeled data imported under the control of the NTCB
- partition will be assigned a label constrained by the device
- labels of the single-level device used to import it. Labels
- may include secrecy and integrity- components in accordance
- with the overall network security policy described by the
- network sponsor. Whenever the term "label" is used
- throughout this interpretation, it is understood to include
- both components as applicable. Similarly, the terms
- "single-level" and "multilevel" are understood to be based
- on both the secrecy and integrity components of the policy.
- The mandatory integrity policy will typically have require-
- ments, such as the probability of undetected message stream
- modification, that will be reflected in the label for the
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Computer Systems," ESD-TR-76-372, MTR-
- 3153, The MITRE Corporation, Bedford, MA, April 1977.
-
- data so protected. For example, when data is imported its
- integrity label may be assigned based on mechanisms, such as
- cryptography, used to provide the assurance required by the
- policy. The NTCB shall assure that such mechanism are pro-
- tected from tampering and are always invoked when they are
- the basis for a label.
-
-
- If the security policy includes an integrity policy,
- all activities that result in message-stream modification
- during transmission are regarded as unauthorized accesses in
- violation of the integrity policy. The NTCB shall have an
- automated capability for testing, detecting, and reporting
- those errors/corruptions that exceed specified network
- integrity policy requirements. Message-stream modification
- (MSM) countermeasures shall be identified. A technology of
- adequate strength shall be selected to resist MSM. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency.
-
- All objects must be labeled within each component of
- the network that is trusted to maintain separation of multi-
- ple levels of information. The label associated with any
- objects associated with single-level components will be
- identical to the level of that component. Objects used to
- store network control information, and other network struc-
- tures, such as routing tables, must be labeled to prevent
- unauthorized access and/or modification.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system and partitioned NTCB as
- defined for these network interpretations. A single-level
- device may be regarded either as a subject or an object. A
- multilevel device is regarded as a trusted subject in which
- the security range of the subject is the minimum-maximum
- range of the data expected to be transmitted over the dev-
- ice.
-
- The sensitivity labels for either secrecy or integrity
- or both may reflect non-hierarchical categories or hierarch-
- ical classification or both.
-
- For a network it is necessary that this requirement be
- applied to all network system resources at the (B2) level
- and above.
-
- The NTCB is responsible for implementing the network
- integrity policy, when one exists. The NTCB must enforce
- that policy by ensuring that information is accurately
- transmitted from source to destination (regardless of the
- number of intervening connecting points). The NTCB must be
- able to counter equipment failure, environmental disrup-
- tions, and actions by persons and processes not authorized
- to alter the data. Protocols that perform code or format
- conversion shall preserve the integrity of data and control
- information.
-
- The probability of an undetected transmission error may
- be specified as part of the network security policy so that
- the acceptability of the network for its intended applica-
- tion may be determined. The specific metrics (e.g., proba-
- bility of undetected modification) satisfied by the data can
- be reflected in the integrity sensitivity label associated
- with the data while it is processed within a component. It
- is recognized that different applications and operational
- environments (e.g., crisis as compared to logistic) will
- have different integrity requirements.
-
- The network shall also have an automated capability of
- testing for, detecting, and reporting errors that exceed a
- threshold consistent with the operational mode requirements.
- The effectiveness of integrity countermeasures must be esta-
- blished with the same rigor as the other security-relevant
- properties such as secrecy.
-
- Cryptography is often utilized as a basis to provide
- data integrity assurance. Mechanisms, such as Manipulation
- Detection Codes (MDC)-, may be used. The adequacy of the
- encryption or MDC algorithm, the correctness of the protocol
- logic, and the adequacy of implementation must be esta-
- blished in MSM countermeasures design.
-
-
-
- 3.3.1.3.1 Label Integrity
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels shall accurately represent sensitivity
- levels of the specific subjects or objects with which they
- are associated. When exported by the TCB, sensitivity
- labels shall accurately and unambiguously represent the
- internal labels and shall be associated with the information
- being exported.
-
- + Interpretation
-
- The phrase "exported by the TCB" is understood to
- include transmission of information from an object in one
- component to an object in another component. Information
- transferred between NTCB partitions is addressed in the Sys-
- tem Integrity Section. The form of internal and external
- (exported) sensitivity labels may differ, but the meaning
- shall be the same. The NTCB shall, in addition, ensure that
- correct association of sensitivity labels with the informa-
- tion being transported across the network is preserved.
-
-
- _________________________
- - See Jueneman, R. R., "Electronic Document Authenti-
- cation," IEEE Network Magazine, April 1987, pp 17-23.
- ____ _______ ________
-
-
- As mentioned in the Trusted Facility Manual Section,
- encryption transforms the representation of information so
- that it is unintelligible to unauthorized subjects.
- Reflecting this transformation, the sensitivity level of the
- ciphertext is generally lower than the cleartext. It fol-
- lows that cleartext and ciphertext are contained in dif-
- ferent objects, each possessing its own label. The label of
- the cleartext must be preserved and associated with the
- ciphertext so that it can be restored when the cleartext is
- subsequently obtained by decrypting the ciphertext. If the
- cleartext is associated with a single-level device, the
- label of that cleartext may be implicit. The label may also
- be implicit in the key.
-
- When information is exported to an environment where it
- is subject to deliberate or accidental modification, the TCB
- shall support the means, such as cryptographic checksums, to
- assure the accuracy of the labels. When there is a manda-
- tory integrity policy, the policy will define the meaning of
- integrity labels.
-
- + Rationale
-
- Encryption algorithms and their implementation are out-
- side the scope of these interpretations. Such algorithms
- may be implemented in a separate device or may be incor-
- porated in a subject of a larger component. Without preju-
- dice, either implementation packaging is referred to as an
- encryption mechanism herein. If encryption methodologies are
- employed in this regard, they shall be approved by the
- National Security Agency (NSA). The encryption process is
- part of the Network Trusted Computer Base partition in the
- components in which it is implemented.
-
- The encryption mechanism is not necessarily a mul-
- tilevel device or multilevel subject, as these terms are
- used in these criteria. The process of encryption is mul-
- tilevel by definition. The cleartext and ciphertext inter-
- faces carry information of different sensitivity. An
- encryption mechanism does not process data in the sense of
- performing logical or arithmetic operations on that data
- with the intent of producing new data. The cleartext and
- ciphertext interfaces on the encryption mechanism must be
- separately identified as being single-level or multilevel.
- If the interface is single-level, then the sensitivity of
- the data is established by a trusted individual and impli-
- citly associated with the interface; the Exportation to
- Single-Level Devices criterion applies.
-
- If the interface is multilevel, then the data must be
- labeled; the Exportation to Multilevel Devices criterion
- applies. The network architect is free to select an accept-
- able mechanism for associating a label with an object. With
- reference to encrypted objects, the following examples are
- possible:
-
-
- 1. Include a label field in the protocol definition of
- the object.
-
- 2. Implicitly associate the label with the object
- through the encryption key. That is, the encryption
- key uniquely identifies a sensitivity level. A sin-
- gle or private key must be protected at the level of
- the data that it encrypts.
-
-
- 3.3.1.3.2 Exportation of Labeled Information
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall designate each communication channel and I/O
- device as either single-level or multilevel. Any change in
- this designation shall be done manually and shall be audit-
- able by the TCB. The TCB shall maintain and be able to
- audit any change in the sensitivity level or levels associ-
- ated with a communications channel or I/O device.
-
- + Interpretation
-
- Each communication channel and network component shall
- be designated as either single-level or multilevel. Any
- change in this designation shall be done with the cognizance
- and approval of the administrator or security officer in
- charge of the affected components and the administrator or
- security officer in charge of the NTCB. This change shall
- be auditable by the network. The NTCB shall maintain and be
- able to audit any change in the device labels associated
- with a single-level communication channel or the range asso-
- ciated with a multilevel communication channel or component.
- The NTCB shall also be able to audit any change in the set
- of sensitivity levels associated with the information which
- can be transmitted over a multilevel communication channel
- or component.
-
- + Rationale
-
- Communication channels and components in a network are
- analogous to communication channels and I/O devices in
- stand-alone systems. They must be designated as either mul-
- tilevel (i.e., able to distinguish and maintain separation
- among information of various sensitivity levels) or single-
- level. As in the TCSEC, single-level devices may only be
- attached to single-level channels.
-
- The level or set of levels of information that can be
- sent to a component or over a communication channel shall
- only change with the knowledge and approval of the security
- officers (or system administrator, if there is no security
- officer) of the network, and of the affected components.
- This requirement ensures that no significant security-
- relevant changes are made without the approval of all
- affected parties.
-
- 3.3.1.3.2.1 Exportation to Multilevel Devices
-
- + Statement from DoD 5200.28-STD
-
- When the TCB exports an object to a multilevel I/O device,
- the sensitivity label associated with that object shall also
- be exported and shall reside on the same physical medium as
- the exported information and shall be in the same form
- (i.e., machine-readable or human-readable form). When the
- TCB exports or imports an object over a multilevel communi-
- cations channel, the protocol used on that channel shall
- provide for the unambiguous pairing between the sensitivity
- labels and the associated information that is sent or
- received.
-
- + Interpretation
-
- The components, including hosts, of a network shall be
- interconnected over "multilevel communication channels,"
- multiple single-level communication channels, or both, when-
- ever the information is to be protected at more than a sin-
- gle sensitivity level. The protocol for associating the
- sensitivity label and the exported information shall provide
- the only information needed to correctly associate a sensi-
- tivity level with the exported information transferred over
- the multilevel channel between the NTCB partitions in indi-
- vidual components. This protocol definition must specify the
- representation and semantics of the sensitivity labels
- (i.e., the machine-readable label must uniquely represent
- the sensitivity level).
-
- The "unambiguous" association of the sensitivity level
- with the communicated information shall meet the same level
- of accuracy as that required for any other label within the
- NTCB, as specified in the criterion for Label Integrity.
- This may be provided by protected and highly reliable direct
- physical layer connections, or by traditional cryptographic
- link protection in which any errors during transmission can
- be readily detected, or by use of a separate channel. The
- range of information imported or exported must be con-
- strained by the associated device labels.
-
- + Rationale
-
- This protocol must specify the representation and
- semantics of the sensitivity labels. See the Mandatory
- Access Control Policies section in Appendix B. The mul-
- tilevel device interface to (untrusted) subjects may be
- implemented either by the interface of the reference moni-
- tor, per se, or by a multilevel subject (e.g., a "trusted
- subject" as defined in the Bell-LaPadula Model) that pro-
- vides the labels based on the internal labels of the NTCB
- partition.
-
- The current state of the art limits the support for
- mandatory policy that is practical for secure networks.
- Reference monitor support to ensure the control over all the
- operations of each subject in the network must be completely
- provided within the single NTCB partition on which that sub-
- ject interfaces to the NTCB. This means that the entire
- portion of the "secure state" represented in the formal
- security policy model that may be changed by transitions
- invoked by this subject must be contained in the same com-
- ponent.
-
- The secure state of an NTCB partition may be affected
- by events external to the component in which the NTCB parti-
- tion resides (e.g., arrival of a message). The effect
- occurs asynchronusly after being initiated by an event in
- another component or partition. For example, indeterminate
- delays may occur between the initiation of a message in one
- component, the arrival of the message in the NTCB partition
- in another component, and the corresponding change to the
- secure state of the second component. Since each component
- is executing concurrently, to do otherwise would require
- some sort of network-wide control to synchronize state tran-
- sitions, such as a global network-wide clock for all proces-
- sors; in general, such designs are not practical and prob-
- ably not even desirable. Therefore, the interaction between
- NTCB partitions is restricted to just communications between
- pairs (at least logically) of devices-multilevel devices if
- the device(s) can send/receive data of more than a single
- level. For broadcast channels the pairs are the sender and
- intended receiver(s). However, if the broadcast channel
- carries multiple levels of information, additional mechanism
- (e.g., cryptochecksum maintained by the TCB) may be required
- to enforce separation and proper delivery.
-
- A common representation for sensitivity labels is
- needed in the protocol used on that channel and understood
- by both the sender and receiver when two multilevel devices
- (in this case, in two different components) are intercon-
- nected. Each distinct sensitivity level of the overall net-
- work policy must be represented uniquely in these labels.
-
- Within a monolithic TCB, the accuracy of the sensi-
- tivity labels is generally assured by simple techniques,
- e.g., very reliable connections over very short physical
- connections, such as on a single printed circuit board or
- over an internal bus. In many network environments there is
- a much higher probability of accidentally or maliciously
- introduced errors, and these must be protected against.
-
-
- 3.3.1.3.2.2 Exportation to Single-Level Devices
-
- + Statement from DoD 5200.28-STD
-
- Single-level I/O devices and single-level communication
- channels are not required to maintain the sensitivity labels
- of the information they process. However, the TCB shall
- include a mechanism by which the TCB and an authorized user
- reliably communicate to designate the single sensitivity
- level of information imported or exported via single-level
- communication channels or I/O devices.
-
- + Interpretation
-
- Whenever one or both of two directly connected com-
- ponents is not trusted to maintain the separation of infor-
- mation of different sensitivity levels, or whenever the two
- directly connected components have only a single sensitivity
- level in common, the two components of the network shall
- communicate over a single-level channel. Single-level com-
- ponents and single-level communication channels are not
- required to maintain the sensitivity labels of the informa-
- tion they process. However, the NTCB shall include a reli-
- able communication mechanism by which the NTCB and an
- authorized user (via a trusted path) or a subject within an
- NTCB partition can designate the single sensitivity level of
- information imported or exported via single-level communica-
- tion channels or network components. The level of informa-
- tion communicated must equal the device level.
-
- + Rationale
-
- Single-level communications channels and single-level
- components in networks are analogous to single level chan-
- nels and I/O devices in stand-alone systems in that they are
- not trusted to maintain the separation of information of
- different sensitivity levels. The labels associated with
- data transmitted over those channels and by those components
- are therefore implicit; the NTCB associates labels with the
- data because of the channel or component, not because of an
- explicit part of the bit stream. Note that the sensitivity
- level of encrypted information is the level of the cipher-
- text rather than the original level(s) of the plaintext.
-
-
- 3.3.1.3.2.3 Labeling Human-Readable Output
-
- + Statement from DoD 5200.28-STD
-
- The ADP system administrator shall be able to specify the
- printable label names associated with exported sensitivity
- labels. The TCB shall mark the beginning and end of all
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the output. The TCB
- shall, by default, mark the top and bottom of each page of
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the page. The TCB shall,
- by default and in an appropriate manner, mark other forms of
- human readable output (e.g., maps, graphics) with human-
- readable sensitivity labels that properly1 represent the
- sensitivity of the output. Any override of these markings
- defaults shall be auditable by the TCB.
- _________________________
- 1 The hierarchical classification component in human-
- readable sensitivity labels shall be equal to the greatest
- hierarchical classification of any of the information in the
- output that the labels refer to; the non-hierarchical category
- component shall include all of the non-hierarchical categories of
- the information in the output the labels refer to, but no other
- non-hierarchical categories.
-
- + Interpretation
-
- This criterion imposes no requirement to a component
- that produces no human-readable output. For those that do
- produce human-readable output, each sensitivity level that
- is defined to the network shall have a uniform meaning
- across all components. The network administrator, in con-
- junction with any affected component administrator, shall be
- able to specify the human-readable label that is associated
- with each defined sensitivity level.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system and
- partitioned NTCB as defined for these network interpreta-
- tions.
-
-
- 3.3.1.3.3 Subject Sensitivity Labels
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall immediately notify a terminal user of each
- change in the sensitivity level associated with that user
- during an interactive session. A terminal user shall be
- able to query the TCB as desired for a display of the
- subject's complete sensitivity label.
-
- + Interpretation
-
- An NTCB partition shall immediately notify a terminal
- user attached to its component of each change in the sensi-
- tivity level associated with that user.
-
- + Rationale
-
- The local NTCB partition must ensure that the user
- understands the sensitivity level of information sent to and
- from a terminal. When a user has a surrogate process in
- another component, adjustments to its level may occur to
- maintain communication with the user. These changes may
- occur asynchronously. Such adjustments are necessitated by
- mandatory access control as applied to the objects involved
- in the communication path.
-
-
- 3.3.1.3.4 Device Labels
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support the assignment of minimum and maximum
- sensitivity levels to all attached physical devices. These
- sensitivity levels shall be used by the TCB to enforce con-
- straints imposed by the physical environments in which the
- devices are located.
-
- + Interpretation
-
- This requirement applies as written to each NTCB parti-
- tion that is trusted to separate information based on sensi-
- tivity level. Each I/O device in a component, used for com-
- munication with other network components, is assigned a dev-
- ice range, consisting of a set of labels with a maximum and
- minimum. (A device range usually contains, but does not
- necessarily contain, all possible labels "between" the max-
- imum and minimum, in the sense of dominating the minimum and
- being dominated by the maximum.)
-
- The NTCB always provides an accurate label for informa-
- tion exported through devices. Information exported or
- imported using a single-level device is labelled implicitly
- by the sensitivity level of the device. Information
- exported from one multilevel device and imported at another
- must be labelled through an agreed-upon protocol, unless it
- is labelled implicitly by using a communication link that
- always carries a single level.
-
- Information exported at a given sensitivity level can
- be sent only to an importing device whose device range con-
- tains that level or a higher level. If the importing device
- range does not contain the given level, the information is
- relabelled upon reception at a higher level within the
- importing device range. Relabelling should not occur other-
- wise.
-
- + Rationale
-
- The purpose of device labels is to reflect and con-
- strain the sensitivity levels of information authorized for
- the physical environment in which the devices are located.
-
- The information transfer restrictions permit one-way
- communication (i.e., no acknowledgements) from one device to
- another whose ranges have no level in common, as long as
- each level in the sending device range is dominated by some
- level in the receiving device range. It is never permitted
- to send information at a given level to a device whose range
- does not contain a dominating level. (See Appendix C for
- similar interconnection rules for the interconnected AIS
- view.)
-
-
- 3.3.1.4 Mandatory Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall enforce a mandatory access control policy over
- all resources (i.e., subjects, storage objects, and I/O dev-
- ices) that are directly or indirectly accessible by subjects
- external to the TCB. These subjects and objects shall be
- assigned sensitivity labels that are a combination of
- hierarchical classification levels and non-hierarchical
- categories, and the labels shall be used as the basis for
- mandatory access control decisions. The TCB shall be able
- to support two or more such sensitivity levels. (See the
- Mandatory Access Control interpretations.) The following
- requirements shall hold for all accesses between all sub-
- jects external to the TCB and all objects directly or
- indirectly accessible by these subjects. A subject can
- read an object only if the hierarchical classification in
- the subject's sensitivity level is greater than or equal to
- the hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level include all the non-hierarchical
- categories in the object's sensitivity level. A subject can
- write an object only if the hierarchical classification in
- the subject's sensitivity level is less than or equal to the
- hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level are included in the non-hierarchical
- categories in the object's sensitivity level. Identification
- and authentication data shall be used by the TCB to authen-
- ticate the user's identity and to ensure that the sensi-
- tivity level and authorization of subjects external to the
- TCB that may be created to act on behalf of the individual
- user are dominated by the clearance and authorization of
- that user.
-
- + Interpretation
-
- Each partition of the NTCB exercises mandatory access
- control policy over all subjects and objects in its com-
- ponent. In a network, the responsibility of an NTCB parti-
- tion encompasses all mandatory access control functions in
- its component that would be required of a TCB in a stand-
- alone system. In particular, subjects and objects used for
- communication with other components are under the control of
- the NTCB partition. Mandatory access control includes
- secrecy and integrity control to the extent that the network
- sponsor has described in the overall network security pol-
- icy.
-
- Conceptual entities associated with communication
- between two components, such as sessions, connections and
- virtual circuits, may be thought of as having two ends, one
- in each component, where each end is represented by a local
- object. Communication is viewed as an operation that copies
- information from an object at one end of a communication
- path to an object at the other end. Transient data-carrying
- entities, such as datagrams and packets, exist either as
- information within other objects, or as a pair of objects,
- one at each end of the communication path.
-
- The requirement for "two or more" sensitivity levels
- can be met by either secrecy or integrity levels. When
- there is a mandatory integrity policy, the stated require-
- ments for reading and writing are generalized to: A subject
- can read an object only if the subject's sensitivity level
- dominates the object's sensitivity level, and a subject can
- write an object only if the object's sensitivity level dom-
- inates the subject's sensitivity level. Based on the
- integrity policy, the network sponsor shall define the domi-
- nance relation for the total label, for example, by combin-
- ing secrecy and integrity lattices. -
-
- + Rationale
-
- An NTCB partition can maintain access control only over
- subjects and objects in its component. At levels B2 and
- above, the NTCB partition must maintain access control over
- all subjects and objects in its component. Access by a sub-
- ject in one component to information contained in an object
- in another component requires the creation of a subject in
- the remote component which acts as a surrogate for the first
- subject.
-
- The mandatory access controls must be enforced at the
- interface of the reference monitor (viz. the mechanism that
- controls physical processing resources) for each NTCB parti-
- tion. This mechanism creates the abstraction of subjects
- and objects which it controls. Some of these subjects out-
- side the reference monitor, per se, may be designated to
- implement part of an NTCB partition's mandatory policy,
- e.g., by using the ``trusted subjects" defined in the Bell-
- LaPadula model.
-
- The prior requirements on exportation of labeled infor-
- mation to and from I/O devices ensure the consistency
- between the sensitivity labels of objects connected by a
- communication path. As noted in the introduction, the net-
- work architecture must recognize the linkage between the
- overall mandatory network security policy and the connection
- oriented abstraction. For example, individual data-carrying
- entities such as datagrams can have individual sensitivity
- labels that subject them to mandatory access control in each
- component. The abstraction of a single-level connection is
- realized and enforced implicitly by an architecture while a
- connection is realized by single-level subjects that neces-
- sarily employ only datagrams of the same level.
-
- The fundamental trusted systems technology permits the
- DAC mechanism to be distributed, in contrast to the require-
- ments for mandatory access control. For networks this
- separation of MAC and DAC mechanisms is the rule rather than
- _________________________
- - See, for example, Grohn, M. J., A Model of a Pro-
- _ _____ __ _ ___
- tected Data Management System, ESD-TR-76-289, I. P.
- ______ ____ __________ ______
- Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
- Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
- and Shockley, W., Secure Distributed Data Views, Secu-
- ______ ___________ ____ _____ ____
- rity Policy and Interpretation for a Class A1 Multilev-
- ____ ______ ___ ______________ ___ _ _____ __ ________
- el Secure Relational Database System,SRI International,
- __ ______ __________ ________ ______
- November 1986.
-
- the exception.
-
- The set of total sensitivity labels used to represent
- all the sensitivity levels for the mandatory access control
- (combined data secrecy and data integrity) policy always
- forms a partially ordered set. Without loss of generality,
- this set of labels can always be extended to form a lattice,
- by including all the combinations of non-hierarchical
- categories. As for any lattice, a dominance relation is
- always defined for the total sensitivity labels. For admin-
- istrative reasons it may be helpful to have a maximum level
- which dominates all others.
-
-
- 3.3.2 Accountability
- _ _ _ ______________
-
-
- 3.3.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall require users to identify themselves to it
- before beginning to perform any other actions that the TCB
- is expected to mediate. Furthermore, the TCB shall maintain
- authentication data that includes information for verifying
- the identify of individual users (e.g., passwords) as well
- as information for determining the clearance and authoriza-
- tions of individual users. This data shall be used by the
- TCB to authenticate the user's identity and to ensure that
- the sensitivity level and authorization of subjects external
- to the TCB that may be created to act on behalf of the indi-
- vidual user are dominated by the clearance and authorization
- of that user. The TCB shall protect authentication data so
- that it cannot be accessed by any unauthorized user. The
- TCB shall be able to enforce individual accountability by
- providing the capability to uniquely identify each indivi-
- dual ADP system user. The TCB shall also provide the capa-
- bility of associating this identity with all auditable
- actions taken by that individual.
-
- + Interpretation
-
- The requirement for identification and authentication
- of users is the same for a network system as for an ADP sys-
- tem. The identification and authentication may be done by
- the component to which the user is directly connected or
- some other component, such as an identification and authen-
- tication server. Available techniques, such as those
- described in the Password Guideline=, are generally also
- applicable in the network context. However, in cases where
- the NTCB is expected to mediate actions of a host (or other
- network component) that is acting on behalf of a user or
- group of users, the NTCB may employ identification and
- _________________________
- = Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, CSC-STD-002-85
- ____
-
- authentication of the host (or other component) in lieu of
- identification and authentication of an individual user, so
- long as the component identifier implies a list of specific
- users uniquely associated with the identifier at the time of
- its use for authentication. This requirement does not apply
- to internal subjects.
-
- Authentication information, including the identity of a
- user (once authenticated) may be passed from one component
- to another without reauthentication, so long as the NTCB
- protects (e.g., by encryption) the information from unau-
- thorized disclosure and modification. This protection shall
- provide at least a similar level of assurance (or strength
- of mechanism) as pertains to the protection of the authenti-
- cation mechanism and authentication data.
-
- + Rationale
-
- The need for accountability is not changed in the con-
- text of a network system. The fact that the NTCB is parti-
- tioned over a set of components neither reduces the need nor
- imposes new requirements. That is, individual accountabil-
- ity is still the objective. Also, in the context of a net-
- work system at the (C2) level or higher "individual accoun-
- tability" can be satisfied by identification of a host (or
- other component) so long as the requirement for traceability
- to individual users or a set of specific individual users
- with active subjects is satisfied. There is allowed to be an
- uncertainty in traceability because of elapsed time between
- changes in the group membership and the enforcement in the
- access control mechanisms. In addition, there is no need in
- a distributed processing system like a network to reauthen-
- ticate a user at each point in the network where a projec-
- tion of a user (via the subject operating on behalf of the
- user) into another remote subject takes place.
-
- The passing of identifiers and/or authentication infor-
- mation from one component to another is usually done in sup-
- port to the implementation of the discretionary access con-
- trol (DAC). This support relates directly to the DAC
- regarding access by a user to a storage object in a dif-
- ferent NTCB partition than the one where the user was
- authenticated. Employing a forwarded identification implies
- additional reliance on the source and components along the
- path. If the authenticated identification is used as the
- basis of determining a sensitivity label for a subject, it
- must satisfy the Label Integrity criterion.
-
- An authenticated identification may be forwarded
- between components and employed in some component to iden-
- tify the sensitivity level associated with a subject created
- to act on behalf of the user so identified.
-
-
- 3.3.2.1.1 Trusted Path
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support a trusted communication path between
- itself and USERS FOR USE WHEN A POSITIVE TCB-TO-USER CONNEC-
- TION IS REQUIRED (E.G., LOGIN, CHANGE SUBJECT SENSITIVITY
- LEVEL). Communications via this TRUSTED path shall be
- ACTIVATED exclusively by a USER OR THE TCB AND SHALL BE
- LOGICALLY AND UNMISTAKABLY DISTINGUISHABLE FROM OTHER PATHS.
-
-
- + Interpretation
-
- A trusted path is supported between a user (i.e.,
- human) and the NTCB partition in the component to which the
- user is directly connected.
-
- + Rationale
-
- When a user logs into a remote component, the user id
- is transmitted securely between the local and remote NTCB
- partitions in accordance with the requirements in Identifi-
- cation and Authentication.
-
- Trusted Path is necessary in order to assure that the
- user is communicating with the NTCB and only the NTCB when
- security relevant activities are taking place (e.g., authen-
- ticate user, set current session sensitivity level). How-
- ever, Trusted Path does not address communications within
- the NTCB, only communications between the user and the NTCB.
- If, therefore, a component does not support any direct user
- communication then the component need not contain mechanisms
- for assuring direct NTCB to user communications.
-
- The requirement for trusted communication between one
- NTCB partition and another NCTB partition is addressed in
- the System Architecture section. These requirements are
- separate and distinct from the user to NTCB communication
- requirement of a trusted path. However, it is expected that
- this trusted communication between one NTCB partition and
- another NTCB partition will be used in conjunction with the
- trusted path to implement trusted communication between the
- user and the remote NTCB partition.
-
-
- 3.3.2.2 Audit
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall be able to create, maintain, and protect from
- modification or unauthorized access or destruction an audit
- trail of accesses to the objects it protects. The audit
- data shall be protected by the TCB so that read access to it
- is limited to those who are authorized for audit data. The
- TCB shall be able to record the following types of events:
- use of identification and authentication mechanisms,
- introduction of objects into a user's address space (e.g.,
- file open, program initiation), deletion of objects, actions
- taken by computer operators and system administrators and/or
- system security officers, and other security relevant
- events. The TCB shall also be able to audit any override of
- human-readable output markings. For each recorded event,
- the audit record shall identify: date and time of the event,
- user, type of event, and success or failure of the event.
- For identification/authentication events the origin of
- request (e.g., terminal ID) shall be included in the audit
- record. For events that introduce an object into a user's
- address space and for object deletion events the audit
- record shall include the name of the object and the object's
- sensitivity level. The ADP system administrator shall be
- able to selectively audit the actions of any one or more
- users based on individual identify and/or object sensitivity
- level. The TCB shall be able to audit the identified
- events that may be used in the exploitation of covert
- storage channels. THE TCB SHALL CONTAIN A MECHANISM THAT
- IS ABLE TO MONITOR THE OCCURRENCE OR ACCUMULATION OF SECU-
- RITY AUDITABLE EVENTS THAT MAY INDICATE AN IMMINENT VIOLA-
- TION OF SECURITY POLICY. THIS MECHANISM SHALL BE ABLE TO
- IMMEDIATELY NOTIFY THE SECURITY ADMINISTRATOR WHEN THRES-
- HOLDS ARE EXCEEDED AND, IF THE OCCURRENCE OR ACCUMULATION OF
- THESE SECURITY RELEVANT EVENTS CONTINUES, THE SYSTEM SHALL
- TAKE THE LEAST DISRUPTIVE ACTION TO TERMINATE THE EVENT.
-
- + Interpretation
-
- This criterion applies as stated. The sponsor must
- select which events are auditable. If any such events are
- not distinguishable by the NTCB alone (for example those
- identified in Part II), the audit mechanism shall provide an
- interface, which an authorized subject can invoke with
- parameters sufficient to produce an audit record. These
- audit records shall be distinguishable from those provided
- by the NTCB. In the context of a network system, "other
- security relevant events" (depending on network system
- architecture and network security policy) might be as fol-
- lows:
-
-
- 1. Identification of each access event (e.g., estab-
- lishing a connection or a connectionless association
- between processes in two hosts of the network) and
- its principal parameters (e.g., host identifiers of
- the two hosts involved in the access event and user
- identifier or host identifier of the user or host
- that is requesting the access event)
-
- 2. Identification of the starting and ending times of
- each access event using local time or global syn-
- chronized time
-
- 3. Identification of security-relevant exceptional con-
- ditions (e.g., potential violation of data
- integrity, such as misrouted datagrams) detected
- during the transactions between two hosts
-
- 4. Utilization of cryptographic variables
-
- 5. Changing the configuration of the network (e.g., a
- component leaving the network and rejoining)
-
- In addition, identification information should be
- included in appropriate audit trail records, as necessary,
- to allow association of all related (e.g., involving the
- same network event) audit trail records (e.g., at different
- hosts) with each other. Furthermore, a component of the
- network system may provide the required audit capability
- (e.g., storage, retrieval, reduction, analysis) for other
- components that do not internally store audit data but
- transmit the audit data to some designated collection com-
- ponent. Provisions shall be made to control the loss of
- audit data due to unavailability of resources.
-
- In the context of a network system, the "user's address
- space" is extended, for object introduction and deletion
- events, to include address spaces being employed on behalf
- of a remote user (or host). However, the focus remains on
- users in contrast to internal subjects as discussed in the
- DAC criterion. In addition, audit information must be
- stored in machine-readable form.
-
- The capability must exist to audit the identified
- events that may be used in the exploitation of covert
- storage channels. To accomplish this, each NTCB partition
- must be able to audit those events locally that may lead to
- the exploitation of a covert storage channel which exist
- because of the network.
-
- THE SPONSOR SHALL IDENTIFY THE SPECIFIC AUDITABLE
- EVENTS THAT MAY INDICATE AN IMMINENT VIOLATION OF SECURITY
- POLICY. THE COMPONENT WHICH DETECTS THE OCCURRENCE OR ACCU-
- MULATION OF SUCH EVENTS MUST BE ABLE TO NOTIFY AN APPROPRI-
- ATE ADMINISTRATOR WHEN THRESHOLDS ARE EXCEEDED, AND TO INI-
- TIATE ACTIONS WHICH WILL RESULT IN TERMINATION OF THE EVENT
- IF THE ACCUMULATION CONTINUES. FOR EXAMPLE, WHEN THE THRES-
- HOLD OF UNSUCCESSFUL LOGIN ATTEMPTS WITHIN A PERIOD OF TIME
- IS EXCEEDED, LOGIN SHALL BE INHIBITED FOR A SPECIFIC TIME
- PERIOD.
-
- + Rationale
-
- For remote users, the network identifiers (e.g., inter-
- net address) can be used as identifiers of groups of indivi-
- dual users (e.g., "all users at Host A") to eliminate the
- maintenance that would be required if individual identifica-
- tion of remote users was employed. In this class (C2), how-
- ever, it must be possible to identify (immediately or at
- some later time) the individuals represented by a group
- identifier. In all other respects, the interpretation is a
- straightforward extension of the criterion into the context
- of a network system. Identification of covert channel
- events is addressed in the Covert Channel Analysis section.
-
- BECAUSE OF CONCURRENCY AND SYNCHRONIZATION PROBLEMS, IT
- MAY NOT BE POSSIBLE TO DETECT IN REAL TIME THE ACCUMULATION
- OF SECURITY AUDITABLE EVENTS THAT ARE OCCURRING IN DIFFERENT
- NTCB PARTITIONS. HOWEVER, EACH NTCB PARTITION THAT HAS BEEN
- ALLOCATED AUDIT RESPONSIBILITY MUST HAVE THE CAPABILITY TO
- DETECT THE LOCAL ACCUMULATION OF EVENTS, TO NOTIFY THE PAR-
- TITION SECURITY ADMINISTRATOR AND/OR THE NETWORK SECURITY
- ADMINISTRATOR, AND TO INITIATE ACTIONS WHICH WILL RESULT IN
- TERMINATION OF THE EVENT LOCALLY.
-
-
- 3.3.3 Assurance
- _ _ _ _________
-
-
- 3.3.3.1 Operational Assurance
-
-
- 3.3.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall maintain a domain for its own execution that
- protects it from external interference or tampering (e.g.,
- by modification of its code or data structures). The TCB
- shall maintain process isolation through the provision of
- distinct address spaces under its control. The TCB shall be
- internally structured into well-defined largely independent
- modules. It shall make effective use of available hardware
- to separate those elements that are protection-critical from
- those that are not. The TCB modules shall be designed such
- that the principle of least privilege is enforced. Features
- in hardware, such as segmentation, shall be used to support
- logically distinct storage objects with separate attributes
- (namely: readable, writable). The user interface to the TCB
- shall be completely defined and all elements of the TCB
- identified. THE TCB SHALL BE DESIGNED AND STRUCTURED TO
- USE A COMPLETE, CONCEPTUALLY SIMPLE PROTECTION MECHANISM
- WITH PRECISELY DEFINED SEMANTICS. THIS MECHANISM SHALL PLAY
- A CENTRAL ROLE IN ENFORCING THE INTERNAL STRUCTURING OF THE
- TCB AND THE SYSTEM. THE TCB SHALL INCORPORATE SIGNIFICANT
- USE OF LAYERING, ABSTRACTION AND DATA HIDING. SIGNIFICANT
- SYSTEM ENGINEERING SHALL BE DIRECTED TOWARD MINIMIZING THE
- COMPLEXITY OF THE TCB AND EXCLUDING FROM THE TCB MODULES
- THAT ARE NOT PROTECTION-CRITICAL.
-
- + Interpretation
-
- The system architecture criterion must be met individu-
- ally by all NTCB partitions. Implementation of the require-
- ment that the NTCB maintain a domain for its own execution
- is achieved by having each NTCB partition maintain a domain
- for its own execution. Since each component is itself a dis-
- tinct domain in the overall network system, this also satis-
- fies the requirement for process isolation through distinct
- address spaces in the special case where a component has
- only a single subject.
-
- The NTCB must be internally structured into well-
- defined largely independent modules and meet the hardware
- requirements. This is satisfied by having each NTCB parti-
- tion so structured. The NTCB controls all network resources.
- These resources are the union of the sets of resources over
- which the NTCB partitions have control. Code and data
- structures belonging to the NTCB, transferred among NTCB
- subjects (i.e., subjects outside the reference monitor but
- inside the NTCB) belonging to different NTCB partitions,
- must be protected against external interference or tamper-
- ing. For example, a cryptographic checksum or physical
- means may be employed to protect user authentication data
- exchanged between NTCB partitions.
-
- Each NTCB partition must enforce the principle of least
- privilege within its component. Additionally, the NTCB must
- be structured so that the principle of least privilege is
- enforced in the system as a whole.
-
- THE NTCB MUST BE DESIGNED AND STRUCTURED ACCORDING TO
- THE NETWORK SECURITY ARCHITECTURE TO USE A COMPLETE, CONCEP-
- TUALLY SIMPLE PROTECTION MECHANISM. FURTHERMORE, EACH NTCB
- PARTITION MUST ALSO BE SO DESIGNED AND STRUCTURED.
-
- SIGNIFICANT SYSTEM ENGINEERING SHOULD BE DIRECTED
- TOWARD MINIMIZING THE COMPLEXITY OF EACH NTCB PARTITION, AND
- OF THE NTCB. CARE SHALL BE TAKEN TO EXCLUDE MODULES (AND
- COMPONENTS) THAT ARE NOT PROTECTION-CRITICAL FROM THE NTCB.
-
- IT IS RECOGNIZED THAT SOME MODULES AND/OR COMPONENTS
- MAY NEED TO BE INCLUDED IN THE NTCB AND MUST MEET THE NTCB
- REQUIREMENTS EVEN THOUGH THEY MAY NOT APPEAR TO BE DIRECTLY
- PROTECTION-CRITICAL. THE CORRECT OPERATION OF THESE
- MODULES/COMPONENTS IS NECESSARY FOR THE CORRECT OPERATION OF
- THE PROTECTION-CRITICAL MODULES AND COMPONENTS. HOWEVER,
- THE NUMBER AND SIZE OF THESE MODULES/COMPONENTS SHOULD BE
- KEPT TO A MINIMUM.
-
- Each NTCB partition provides isolation of resources
- (within its component) in accord with the network system
- architecture and security policy so that "supporting ele-
- ments" (e.g., DAC and user identification) for the security
- mechanisms of the network system are strengthened compared
- to C2, from an assurance point of view, through the provi-
- sion of distinct address spaces under control of the NTCB.
-
- As discussed in the Discretionary Access Control sec-
- tion, the DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. When distributed in NTCB sub-
- jects (i.e., when outside the reference monitor), the
- assurance requirements for the design and implementation of
- the DAC shall be those of class C2 for all networks of class
- C2 or above.
-
- + Rationale
-
-
- The requirement that the NTCB be structured into
- modules and meet the hardware requirements applies within
- the NTCB partitions in the various components.
-
- The principle of least privilege requires that each
- user or other individual with access to the system be given
- only those resources and authorizations required for the
- performance of this job. In order to enfore this principle
- in the system it must be enforced in every NTCB partition
- that supports users or other individuals. For example,
- prohibiting access by administrators to objects outside the
- NTCB partition (e.g., games) lessens the opportunity of dam-
- age by a Trojan Horse.
-
- The requirement for the protection of communications
- between NTCB partitions is specifically directed to subjects
- that are part of the NTCB partitions. Any requirements for
- such protection for the subjects that are outside the NTCB
- partitions are addressed in response to the integrity
- requirements of the security policy.
-
- THERE ARE CERTAIN PARTS OF A NETWORK (MODULES AND/OR
- COMPONENTS) THAT MAY NOT APPEAR TO BE DIRECTLY PROTECTION-
- CRITICAL IN THAT THEY ARE NOT INVOLVED IN ACCESS CONTROL
- DECISIONS, DO NOT DIRECTLY AUDIT, AND ARE NOT INVOLVED IN
- THE IDENTIFICATION/AUTHENTICATION PROCESS. HOWEVER, THE
- SECURITY OF THE NETWORK MUST DEPEND ON THE CORRECT OPERATION
- OF THESE MODULES AND/OR COMPONENTS. AN EXAMPLE OF THIS IS A
- SINGLE LEVEL PACKET SWITCH. ALTHOUGH IT MAY NOT NORMALLY BE
- INVOLVED DIRECTLY IN ENFORCING THE DISCRETIONARY SECURITY
- POLICY, THIS SWITCH MAY BE TRUSTED NOT TO MIX DATA FROM DIF-
- FERENT MESSAGE STREAMS. IF THE SWITCH DOES NOT OPERATE
- CORRECTLY, DATA COULD GET MIXED, AND UNAUTHORIZED ACCESS
- COULD RESULT. THEREFORE, THESE MODULES/COMPONENTS MUST BE
- INCLUDED IN THE NTCB AND MUST MEET THE NTCB REQUIREMENTS
- APPLICABLE TO THE POLICY ELEMENT(S) FOR WHICH THEY ARE
- RESPONSIBLE.
-
-
- 3.3.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- Hardware and/or software features shall be provided that can
- be used to periodically validate the correct operation of
- the on-site hardware and firmware elements of the TCB.
-
- + Interpretation
-
- Implementation of the requirement is partly achieved by
- having hardware and/or software features that can be used to
- periodically validate the correct operation of the hardware
- and firmware elements of each component's NTCB partition.
- Features shall also be provided to validate the identity and
- correct operation of a component prior to its incorporation
- in the network system and throughout system operation. For
- example, a protocol could be designed that enables the com-
- ponents of the partitioned NTCB to exchange messages period-
- ically and validate each other's correct response. The pro-
- tocol shall be able to determine the remote entity's ability
- to respond. NTCB partitions shall provide the capability to
- report to network administrative personnel the failures
- detected in other NTCB partitions.
-
- Intercomponent protocols implemented within a NTCB
- shall be designed in such a way as to provide correct opera-
- tion in the case of failures of network communications or
- individual components. The allocation of mandatory and dis-
- cretionary access control policy in a network may require
- communication between trusted subjects that are part of the
- NTCB partitions in different components. This communication
- is normally implemented with a protocol between the subjects
- as peer entities. Incorrect access within a component shall
- not result from failure of an NTCB partition to communicate
- with other components.
-
- + Rationale
-
- The first paragraph of the interpretation is a
- straightforward extension of the requirement into the con-
- text of a network system and partitioned NTCB as defined for
- these network criteria.
-
- NTCB protocols should be robust enough so that they
- permit the system to operate correctly in the case of local-
- ized failure. The purpose of this protection is to preserve
- the integrity of the NTCB itself. It is not unusual for one
- or more components in a network to be inoperative at any
- time, so it is important to minimize the effects of such
- failures on the rest of the network. Additional integrity
- and denial of service issues are addressed in Part II.
-
- IT SHOULD BE CLEAR THAT SOME INTEGRITY AND DENIAL OF
- SERVICE FEATURES CAN RESIDE OUTSIDE THE NTCB. OTHERWISE ALL
- SOFTWARE IN A NETWORK WOULD BE IN THE NTCB. EVERY PIECE OF
- SOFTWARE THAT HAS AN OPPORTUNITY TO WRITE TO SOME DATA OR
- PROTOCOL FIELD IS "TRUSTED" TO PRESERVE INTEGRITY OR NOT
- CAUSE DENIAL OF SERVICE TO SOME EXTENT. FOR EXAMPLE, IT IS
- NECESSARY TO "TRUST" TELNET TO CORRECTLY TRANSLATE USER
- DATA, AND TO EVENTUALLY TRANSMIT PACKETS. FTP ALSO HAS TO
- BE "TRUSTED" TO NOT INAPPROPRIATELY MODIFY FILES, AND TO
- ATTEMPT TO COMPLETE THE FILE TRANSFER. THESE PROTOCOLS CAN
- BE DESIGNED, HOWEVER TO EXIST OUTSIDE THE NTCB (FROM A PRO-
- TECTION PERSPECTIVE). IT IS BENEFICIAL TO DO THIS TYPE OF
- SECURITY ENGINEERING SO THAT THE AMOUNT OF CODE THAT MUST BE
- TRUSTED TO NOT DISCLOSE DATA IS MINIMIZED. PUTTING EVERY-
- THING INSIDE THE NTCB CONTRADICTS THE REQUIREMENT TO PERFORM
- "SIGNIFICANT SYSTEM ENGINEERING ... DIRECTED TOWARD ...
- EXCLUDING FROM THE TCB MODULES THAT ARE NOT PROTECTION CRIT-
- ICAL," WHICH REMOVES THE PRIMARY DIFFERENCE BETWEEN B2 AND
- B3. IF EVERYTHING HAS TO BE IN THE TCB TO ENSURE DATA
- INTEGRITY AND PROTECTION AGAINST DENIAL OF SERVICE, THERE
- WILL BE CONSIDERABLY LESS ASSURANCE THAT DISCLOSURE PROTEC-
- TION IS MAXIMIZED.
-
-
-
- 3.3.3.1.3 Covert Channel Analysis
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall conduct a thorough search for
- COVERT CHANNELS and make a determination (either by actual
- measurement or by engineering estimation) of the maximum
- bandwidth of each identified channel. (See the Covert Chan-
- nels Guideline section.)
-
- + Interpretation
-
- The requirement, including the TCSEC Covert Channel
- Guideline, applies as written. In a network, there are
- additional instances of covert channels associated with com-
- munication between components.
-
- + Rationale
-
- The exploitation of network protocol information (e.g.,
- headers) can result in covert storage channels. EXPLOITATION
- OF FREQUENCY OF TRANSMISSION CAN RESULT IN COVERT TIMING
- CHANNELS. The topic has been addressed in the literature.-
-
-
-
- 3.3.3.1.4 Trusted Facility Management
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support separate operator and administrator
- functions. THE FUNCTIONS PERFORMED IN THE ROLE OF A SECU-
- RITY ADMINISTRATOR SHALL BE IDENTIFIED. THE ADP SYSTEM
- ADMINISTRATIVE PERSONNEL SHALL ONLY BE ABLE TO PERFORM SECU-
- RITY ADMINISTRATOR FUNCTIONS AFTER TAKING A DISTINCT AUDIT-
- ABLE ACTION TO ASSUME THE SECURITY ADMINISTRATOR ROLE ON THE
- ADP SYSTEM. NON-SECURITY FUNCTIONS THAT CAN BE PERFORMED IN
- THE SECURITY ADMINISTRATION ROLE SHALL BE LIMITED STRICTLY
- TO THOSE ESSENTIAL TO PERFORMING THE SECURITY ROLE EFFEC-
- TIVELY.
-
- _________________________
- - See, for example, Girling, C. G., "Covert Channels
- in LAN's," IEEE Transactions on Software Engineering,
- ____ ____________ __ ________ ___________
- Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
- Snow, D. P., and Karger, P. A., Limitations of End-to-
- ___________ __ ___ __
- End Encryption in Secure Computer Networks, MITRE
- ___ __________ __ ______ ________ ________
- Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
- 78-158, DTIC AD A059221).
-
-
-
- + Interpretation
-
- This requirement applies as written to both the network
- as a whole and to individual components which support such
- personnel.
-
- + Rationale
-
- It is recognized that based on the allocated policy
- elements some components may operate with no human inter-
- face.
-
-
-
- 3.3.3.1.5 Trusted Recovery
-
- + Statement from DoD 5200.28-STD
-
- PROCEDURES AND/OR MECHANISMS SHALL BE PROVIDED TO ASSURE
- THAT, AFTER AN ADP SYSTEM FAILURE OR OTHER DISCONTINUITY,
- RECOVERY WITHOUT A PROTECTION COMPROMISE IS OBTAINED.
-
- + Interpretation
-
- THE RECOVERY PROCESS MUST BE ACCOMPLISHED WITHOUT A
- PROTECTION COMPROMISE AFTER THE FAILURE OR OTHER DISCON-
- TINUITY OF ANY NTCB PARTITION. IT MUST ALSO BE ACCOMPLISHED
- AFTER A FAILURE OF THE ENTIRE NTCB.
-
- + Rationale
-
- THIS IS A STRAIGHT-FORWARD EXTENSION OF THE REQUIREMENT
- INTO THE NETWORK CONTEXT, AND TAKES INTO ACCOUNT THAT IT IS
- POSSIBLE FOR PARTS OF THE SYSTEM TO FAIL WHILE OTHER PARTS
- CONTINUE TO OPERATE NORMALLY. THIS MAY BE A SECURITY-
- RELEVANT EVENT; IF SO IT MUST BE AUDITED.
-
-
- 3.3.3.2 Life-Cycle Assurance
-
-
- 3.3.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- The security mechanisms of the ADP system shall be tested
- and found to work as claimed in the system documentation. A
- team of individuals who thoroughly understand the specific
- implementation of the TCB shall subject its design documen-
- tation, source code, and object code to through analysis and
- testing. Their objectives shall be: to uncover all design
- and implementation flaws that would permit a subject exter-
- nal to the TCB to read, change, or delete data normally
- denied under the mandatory or discretionary security policy
- enforced by the TCB; as well as to assure that no subject
- (without authorization to do so) is able to cause the TCB to
- enter a state such that it is unable to respond to
- communications initiated by other users. The TCB shall be
- FOUND RESISTANT to penetration. All discovered flaws shall
- be removed or neutralized and the TCB retested to demon-
- strate that they have been eliminated and that new flaws
- have not been introduced. Testing shall demonstrate that the
- TCB implementation is consistent with the descriptive top-
- level specification. NO DESIGN FLAWS AND NO MORE THAN A FEW
- CORRECTABLE IMPLEMENTATION FLAWS MAY BE FOUND DURING TESTING
- AND THERE SHALL BE REASONABLE CONFIDENCE THAT FEW REMAIN.
- (See the Security Testing Guidelines.)
-
- + Interpretation
-
- Testing of a component will require a testbed that
- exercises the interfaces and protocols of the component
- including tests under exceptional conditions. The testing
- of a security mechanism of the network system for meeting
- this criterion shall be an integrated testing procedure
- involving all components containing an NTCB partition that
- implement the given mechanism. This integrated testing is
- additional to any individual component tests involved in the
- evaluation of the network system. The sponsor should iden-
- tify the allowable set of configurations including the sizes
- of the networks. Analysis or testing procedures and tools
- shall be available to test the limits of these configura-
- tions. A change in configuration within the allowable set
- of configurations does not require retesting.
-
- The testing of each component will include the intro-
- duction of subjects external to the NTCB partition for the
- component that will attempt to read, change, or delete data
- normally denied. If the normal interface to the component
- does not provide a means to create the subjects needed to
- conduct such a test, then this portion of the testing shall
- use a special version of the untrusted software for the com-
- ponent that results in subjects that make such attempts.
- The results shall be saved for test analysis. Such special
- versions shall have an NTCB partition that is identical to
- that for the normal configuration of the component under
- evaluation.
-
- The testing of the mandatory controls shall include
- tests to demonstrate that the labels for information
- imported and/or exported to/from the component accurately
- represent the labels maintained by the NTCB partition for
- the component for use as the basis for its mandatory access
- control decisions. The tests shall include each type of
- device, whether single-level or multilevel, supported by the
- component.
-
- The NTCB must be FOUND RESISTANT to penetration. This
- applies to the NTCB as a whole, and to each NTCB partition
- in a component of this class.
-
-
- + Rationale
-
- The phrase "no subject (without authorization to do so)
- is able to cause the TCB to enter a state such that it is
- unable to respond to communications initiated by other
- users" relates to the security services (Part II of this
- TNI) for the Denial of Service problem, and to correctness
- of the protocol implementations.
-
- Testing is an important method available in this
- evaluation division to gain any assurance that the security
- mechanisms perform their intended function. A major purpose
- of testing is to demonstrate the system's response to inputs
- to the NTCB partition from untrusted (and possibly mali-
- cious) subjects.
-
- In contrast to general purpose systems that allow for
- the dynamic creation of new programs and the introductions
- of new processes (and hence new subjects) with user speci-
- fied security properities, many network components have no
- method for introducing new programs and/or processes during
- their normal operation. Therefore, the programs necessary
- for the testing must be introduced as special versions of
- the software rather than as the result of normal inputs by
- the test team. However, it must be insured that the NTCB
- partition used for such tests is identical to the one under
- evaluation.
-
- Sensitivity labels serve a critical role in maintaining
- the security of the mandatory access controls in the net-
- work. Especially important to network security is the role
- of the labels for information communicated between com-
- ponents - explicit labels for multilevel devices and impli-
- cit labels for single-level devices. Therefore the testing
- for correct labels is highlighted.
-
- The requirement for testing to demonstrate consistency
- between the NTCB implementation and the DTLS is a straight-
- forward extension of the TCSEC requirement into the context
- of a network system.
-
-
-
- 3.3.3.2.2 Design Specification and Verification
-
- + Statement from DoD 5200.28-STD
-
- A formal model of the security policy supported by the TCB
- shall be maintained over the life cycle of the ADP system
- that is proven and demonstrated to be consistent with its
- axioms. A descriptive top-level specification (DTLS) of the
- TCB shall be maintained that completely and accurately
- describes the TCB in terms of exceptions, error messages,
- and effects. It shall be shown to be an accurate descrip-
- tion of the TCB interface. A CONVINCING ARGUMENT SHALL BE
- GIVEN THAT THE DTLS IS CONSISTENT WITH THE MODEL.
-
-
- + Interpretation
-
- The overall network security policy expressed in this
- model will provide the basis for the mandatory access con-
- trol policy exercised by the NTCB over subjects and storage
- objects in the entire network. The policy will also be the
- basis for the discretionary access control policy exercised
- by the NTCB to control access of named users to named
- objects. Data integrity requirements addressing the effects
- of unauthorized MSM need not be included in this model. The
- overall network policy must be decomposed into policy ele-
- ments that are allocated to appropriate components and used
- as the basis for the security policy model for those com-
- ponents.
-
- The level of abstraction of the model, and the set of
- subjects and objects that are explicitly represented in the
- model, will be affected by the NTCB partitioning. Subjects
- and objects must be represented explicitly in the model for
- the partition if there is some network component whose NTCB
- partition exercises access control over them. The model
- shall be structured so that the axioms and entities applica-
- ble to individual network components are manifest. Global
- network policy elements that are allocated to components
- shall be represented by the model for that component.
-
- The requirements for a network DTLS are given in the
- Design Documentation section.
-
- + Rationale
-
- The treatment of the model depends to a great extent on
- the degree of integration of the communications service into
- a distributed system. In a closely coupled distributed sys-
- tem, one might use a model that closely resembles one
- appropriate for a stand-alone computer system.
-
- In ALL cases, the model of each partition will be
- expected to show the role of the NTCB partition in each kind
- of component. It will most likely clarify the model,
- although not part of the model, to show access restrictions
- implied by the system design; for example, subjects
- representing protocol entities might have access only to
- objects containing data units at the same layer of protocol.
- The allocation of subjects and objects to different proto-
- col layers is a protocol design choice which need not be
- reflected in the security policy model.
-
-
-
- 3.3.3.2.3 Configuration Management
-
- + Statement from DoD 5200.28-STD
-
- During development and maintenance of the TCB, a configura-
- tion management system shall be in place that maintains con-
- trol of changes to the descriptive top-level specification,
- other design data, implementation documentation, source
- code, the running version of the object code, and test fix-
- tures and documentation. The configuration management sys-
- tem shall assure a consistent mapping among all documenta-
- tion and code associated with the current version of the
- TCB. Tools shall be provided for generation of a new ver-
- sion of the TCB from source code. Also available shall be
- tools for comparing a newly generated version with the pre-
- vious TCB version in order to ascertain that only the
- intended changes have been made in the code that will actu-
- ally be used as the new version of the TCB.
-
- + Interpretation
-
- The requirement applies as written, with the following
- extensions:
-
- 1. A configuration management system must be in place
- for each NTCB partition.
-
- 2. A configuration management plan must exist for the
- entire system. If the configuration management sys-
- tem is made up of the conglomeration of the confi-
- guration management systems of the various NTCB par-
- titions, then the configuration management plan must
- address the issue of how configuration control is
- applied to the system as a whole.
-
- + Rationale
-
- Each NTCB partition must have a configuration manage-
- ment system in place, or else there will be no way for the
- NTCB as a whole to have an effective configuration manage-
- ment system. The other extensions are merely reflections of
- the way that networks operate in practice.
-
-
-
-
- 3.3.4 Documentation.
- _ _ _ _____________
-
-
- 3.3.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A single summary, chapter, or manual in user documentation
- shall describe the protection mechanisms provided by the
- TCB, interpretations on their use, and how they interact
- with one another.
-
- + Interpretation
-
- This user documentation describes user visible protec-
- tion mechanisms at the global (network system) level and at
- the user interface of each component, and the interaction
- among these.
-
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system as defined for these
- network criteria. Documentation of protection mechanisms
- provided by individual components is required by the cri-
- teria for trusted computer systems that are applied as
- appropriate for the individual components.
-
-
- 3.3.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A manual addressed to the ADP system administrator shall
- present cautions about functions and privileges that should
- be controlled when running a secure facility. The procedures
- for examining and maintaining the audit files as well as the
- detailed audit record structure for each type of audit event
- shall be given. The manual shall describe the operator and
- administrator functions related to security, to include
- changing the security characteristics of a user. It shall
- provide interpretations on the consistent and effective use
- of the protection features of the system, how they interact,
- how to securely generate a new TCB, and facility procedures,
- warnings, and privileges that need to be controlled in order
- to operate the facility in a secure manner. The TCB modules
- that contain the reference validation mechanism shall be
- identified. The procedures for secure generation of a new
- TCB from source after modification of any modules in the TCB
- shall be described. IT SHALL INCLUDE THE PROCEDURES TO
- ENSURE THAT THE SYSTEM IS INITIALLY STARTED IN A SECURE
- MANNER. PROCEDURES SHALL ALSO BE INCLUDED TO RESUME SECURE
- SYSTEM OPERATION AFTER ANY LAPSE IN SYSTEM OPERATION.
-
- + Interpretation
-
- This manual shall contain specifications and procedures
- to assist the system administrator(s) maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address the following:
-
- 1. The hardware configuration of the network itself;
-
- 2. The implications of attaching new components to the
- network;
-
- 3. The case where certain components may periodically
- leave the network (e.g., by crashing, or by being
- disconnected) and then rejoin;
-
- 4. Network configuration aspects that can impact the
- security of the network system; (For example, the
- manual should describe for the network system
- administrator the interconnections among components
- that are consistent with the overall network system
- architecture.)
-
- 5. Loading or modifying NTCB software or firmware
- (e.g., down-line loading).
-
- 6. Incremental updates; that is, it must explicitly
- indicate which components of the network may change
- without others also changing.
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- The components of the network that form the NTCB must
- be identified. Furthermore, the modules within an NTCB par-
- tition that contain the reference validation mechanism (if
- any) within that partition must be identified.
-
- The procedures for the secure generation of a new ver-
- sion (or copy) of each NTCB partition from source must be
- described. The procedures and requirements for the secure
- generation of the NTCB necessitated by changes in the net-
- work configuration shall be described.
-
- PROCEDURES FOR STARTING EACH NTCB PARTITION IN A SECURE
- STATE SHALL BE SPECIFIED. PROCEDURES MUST ALSO BE INCLUDED
- TO RESUME SECURE OPERATION OF EACH NTCB PARTITION AND/OR THE
- NTCB AFTER ANY LAPSE IN SYSTEM OR SUBSYSTEM OPERATION.
-
- + Rationale
-
- There may be multiple system administrators with
- diverse responsibilities. The technical security measures
- described by these criteria must be used in conjunction with
- other forms of security in order to achieve security of the
- network. Additional forms include administrative security,
- physical security, emanations security, etc.
-
- Extension of this criterion to cover configuration
- aspects of the network is needed because, for example,
- proper interconnection of components is typically essential
- to achieve a correct realization of the network architec-
- ture.
-
- As mentioned in the section on Label Integrity, cryp-
- tography is one common mechanism employed to protect commun-
- ication circuits. Encryption transforms the representation
- of information so that it is unintelligible to unauthorized
- subjects. Reflecting this transformation, the sensitivity
- of the ciphertext is generally lower than the cleartext. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency (NSA).
-
- The encryption algorithm and its implementation are
- outside the scope of these interpretations. This algorithm
- and implementation may be implemented in a separate device
- or may be a function of a subject in a component not dedi-
- cated to encryption. Without prejudice, either implementa-
- tion packaging is referred to as an encryption mechanism
- herein.
-
- The requirements for descriptions of NTCB generation
- and identification of modules and components that form the
- NTCB are straightforward extensions of the TCSEC require-
- ments into the network context. In those cases where the
- vendor does not provide source code, an acceptable procedure
- shall be to request the vendor to perform the secure genera-
- tion.
-
- GIVEN THE NATURE OF NETWORK SYSTEMS (E.G., VARIOUS COM-
- PONENTS TEND TO BE DOWN AT DIFFERENT TIMES, AND THE NETWORK
- SYSTEM MUST CONTINUE OPERATION WITHOUT THAT COMPONENT), IT
- IS IMPERATIVE TO KNOW BOTH HOW TO SECURELY START UP AN NTCB
- PARTITION, AND HOW TO RESUME OPERATION SECURELY. IT IS ALSO
- NECESSARY TO KNOW HOW TO RESUME SECURE OPERATION OF THE NTCB
- AFTER ANY PARTITION HAS BEEN DOWN.
-
-
- 3.3.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall provide to the evaluators a docu-
- ment that describes the test plan, test procedures that show
- how the security mechanisms were tested, and results of the
- security mechanisms' functional testing. It shall include
- results of testing the effectiveness of the methods used to
- reduce covert channel bandwidths.
-
- + Interpretation
-
- The "system developer" is interpreted as "the network
- system sponsor". The description of the test plan should
- establish the context in which the testing was or should be
- conducted. The description should identify any additional
- test components that are not part of the system being
- evaluated. This includes a description of the test-relevant
- functions of such test components and a description of the
- interfacing of those test components to the system being
- evaluated. The description of the test plan should also
- demonstrate that the tests adequately cover the network
- security policy. The tests should include the features
- described in the System Architecture and the System
- Integrity sections. The tests should also include network
- configuration and sizing.
-
- + Rationale
-
- The entity being evaluated may be a networking subsys-
- tem (see Appendix A) to which other components must be added
- to make a complete network system. In that case, this
- interpretation is extended to include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
- The bandwidths of covert channels are used to determine
- the suitability of a network system for a given environment.
- The effectiveness of the methods used to reduce these
- bandwidths must therefore be accurately determined.
-
-
- 3.3.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- Documentation shall be available that provides a description
- of the manufacturer's philosophy of protection and an expla-
- nation of how this philosophy is translated into the TCB.
- The interfaces between the TCB modules shall be described.
- A formal description of the security policy model enforced
- by the TCB shall be available and an explanation provided to
- show that it is sufficient to enforce the security policy.
- The specific TCB protection mechanisms shall be identified
- and an explanation given to show that they satisfy the
- model. The descriptive top-level specification (DTLS) shall
- be shown to be an accurate description of the TCB interface.
- Documentation shall describe how the TCB implements the
- reference monitor concept and give an explanation why it is
- tamper resistant, cannot be bypassed, and is correctly
- implemented. THE TCB IMPLEMENTATION (I.E., IN HARDWARE,
- FIRMWARE, AND SOFTWARE) SHALL BE INFORMALLY SHOWN TO BE CON-
- SISTENT WITH THE DTLS. THE ELEMENTS OF THE DTLS SHALL BE
- SHOWN, USING INFORMAL TECHNIQUES, TO CORRESPOND TO THE ELE-
- MENTS OF THE TCB. Documentation shall describe how the TCB
- is structured to facilitate testing and to enforce least
- privilege. This documentation shall also present the
- results of the covert channel analysis and the tradeoffs
- involved in restricting the channels. All auditable events
- that may be used in the exploitation of known covert storage
- channels shall be identified. The bandwidths of known
- covert storage channels, the use of which is not detectable
- by the auditing mechanisms, shall be provided. (See the
- Covert Channel Guideline section.)
-
- + Interpretation
-
- Explanation of how the sponsor's philosophy of protec-
- tion is translated into the NTCB shall include a description
- of how the NTCB is partitioned. The security policy also
- shall be stated. The description of the interfaces between
- the NTCB modules shall include the interface(s) between NTCB
- partitions and modules within the partitions if the modules
- exist. The sponsor shall describe the security architecture
- and design, including the allocation of security require-
- ments among components.
-
- The documentation includes both a system description
- and a set of component DTLS's. The system description
- addresses the network security architecture and design by
- specifying the types of components in the network, which
- ones are trusted, and in what way they must cooperate to
- support network security objectives. A component DTLS shall
- be provided for each trusted network component, i.e., each
- component containing an NTCB partition. Each component DTLS
- shall describe the interface to the NTCB partition of its
- component. BOTH THE SYSTEM DESCRIPTION AND EACH COMPONENT
- DTLS SHALL BE SHOWN CONSISTENT WITH THOSE ASSERTIONS IN THE
- MODEL THAT APPLY TO IT. Appendix A addresses component
- evaluation issues.
-
- TO SHOW THE CORRESPONDENCE BETWEEN THE DTLS AND THE
- NTCB IMPLEMENTATION, IT SUFFICES TO SHOW CORRESPONDENCE
- BETWEEN EACH COMPONENT DTLS AND THE NTCB PARTITION IN THAT
- COMPONENT.
-
- As stated in the introduction to Division B, the spon-
- sor must demonstrate that the NTCB employs the reference
- monitor concept. The security policy model must be a model
- for a reference monitor.
-
- The security policy model for each partition implement-
- ing a reference monitor shall fully represent the access
- control policy supported by the partition, including the
- discretionary and mandatory security policy for secrecy
- and/or integrity. For the mandatory policy the single domi-
- nance relation for sensitivity labels, including secrecy
- and/or integrity components, shall be precisely defined.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system as
- defined for this network interpretation. Other documenta-
- tion, such as description of components and description of
- operating environment(s) in which the networking subsystem
- or network system is designed to function, is required else-
- where, e.g., in the Trusted Facility Manual.
-
- In order to be evaluated, a network must possess a
- coherent Network Security Architecture and Design. (Inter-
- connection of components that do not adhere to such a single
- coherent Network Security Architecture is addressed in the
- Interconnection of Accredited AIS, Appendix C.) The Network
- Security Architecture must address the security-relevant
- policies, objectives, and protocols. The Network Security
- Design specifies the interfaces and services that must be
- incorporated into the network so that it can be evaluated as
- a trusted entity. There may be multiple designs that con-
- form to the same architecture but are more or less incompa-
- tible and non-interoperable (except through the Interconnec-
- tion Rules). Security related mechanisms requiring coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms having no visible
- interfaces are not specified in this document but are left
- as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network security Architecture and
- Design are satisfied. That is, the components can be assem-
- bled into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization that is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and unambi-
- guously define the security functionality of components as
- well as the interfaces between or among components. The
- Network Security Architecture and Design must be evaluated
- to determine that a network constructed to its specifica-
- tions will in fact be trusted, that is, it will be evaluat-
- able under these interpretations.
-
-
- The term "model" is used in several different ways in a
- network context, e.g., a "protocol reference model," a "for-
- mal network model," etc. Only the "security policy model" is
- addressed by this requirement and is specifically intended
- to model the interface, viz., "security perimeter," of the
- reference monitor and must meet all the requirements defined
- in the TCSEC. It must be shown that all parts of the TCB
- are a valid interpretation of the security policy model,
- i.e., that there is no change to the secure state except as
- represented by the model.
-
-
- 4.0 DIVISION A: VERIFIED PROTECTION
- _ _ ________ _ ________ __________
-
-
- This division is characterized by the use of formal security
- methods to assure that the mandatory and discretionary secu-
- rity controls employed in the network system can effectively
- protect classified or other sensitive information stored or
- processed by the system. Extensive documentation is re-
- quired to demonstrate that the NTCB meets the security re-
- quirements in all aspects of design, development and imple-
- mentation.
-
- 4.1 CLASS (A1): VERIFIED DESIGN
- _ _ _____ __ ________ ______
-
-
- SYSTEMS IN CLASS (A1) ARE FUNCTIONALLY EQUIVALENT
- TO THOSE IN CLASS (B3) IN THAT NO ADDITIONAL
- ARCHITECTURAL FEATURES OR POLICY REQUIREMENTS ARE
- ADDED. THE DISTINGUISHING FEATURE OF SYSTEMS IN
- THIS CLASS IS THE ANALYSIS DERIVED FROM FORMAL
- DESIGN SPECIFICATION AND VERIFICATION TECHNIQUES
- AND THE RESULTING HIGH DEGREE OF ASSURANCE THAT
- THE NTCB IS CORRECTLY IMPLEMENTED. THIS ASSURANCE
- IS DEVELOPMENTAL IN NATURE, STARTING WITH A FORMAL
- MODEL OF THE SECURITY POLICY AND A FORMAL TOP-
- LEVEL SPECIFICATION (FTLS) OF THE DESIGN.
- INDEPENDENT OF THE PARTICULAR SPECIFICATION
- LANGUAGE OR VERIFICATION SYSTEM USED, THERE ARE
- FIVE IMPORTANT CRITERIA FOR CLASS (A1) DESIGN
- VERIFICATION:
-
- + A FORMAL MODEL OF THE SECURITY POLICY MUST BE
- CLEARLY IDENTIFIED AND DOCUMENTED, INCLUDING A
- MATHEMATICAL PROOF THAT THE MODEL IS CONSISTENT
- WITH ITS AXIOMS AND IS SUFFICIENT TO SUPPORT THE
- SECURITY POLICY.
-
- + AN FTLS MUST BE PRODUCED THAT INCLUDES ABSTRACT
- DEFINITIONS OF THE FUNCTIONS THE NTCB PERFORMS
- AND OF THE HARDWARE AND/OR FIRMWARE MECHANISMS
- THAT ARE USED TO SUPPORT SEPARATE EXECUTION
- DOMAINS.
-
- + THE FTLS OF THE NTCB MUST BE SHOWN TO BE CON-
- SISTENT WITH THE MODEL BY FORMAL TECHNIQUES WHERE
- POSSIBLE (I.E., WHERE VERIFICATION TOOLS EXIST)
- AND INFORMAL ONES OTHERWISE.
-
- + THE NTCB IMPLEMENTATION (I.E., IN HARDWARE,
- FIRMWARE, AND SOFTWARE) MUST BE INFORMALLY SHOWN
- TO BE CONSISTENT WITH THE FTLS. THE ELEMENTS OF
- THE FTLS MUST BE SHOWN, USING INFORMAL TECH-
- NIQUES, TO CORRESPOND TO THE ELEMENTS OF THE
- NTCB. THE FTLS MUST EXPRESS THE UNIFIED PROTEC-
- TION MECHANISM REQUIRED TO SATISFY THE SECURITY
- POLICY, AND IT IS THE ELEMENTS OF THIS PROTECTION
- MECHANISM THAT ARE MAPPED TO THE ELEMENTS OF THE
- NTCB.
-
- + FORMAL ANALYSIS TECHNIQUES MUST BE USED TO IDEN-
- TIFY AND ANALYZE COVERT CHANNELS. INFORMAL TECH-
- NIQUES MAY BE USED TO IDENTIFY COVERT TIMING
- CHANNELS. THE CONTINUED EXISTENCE OF IDENTIFIED
- COVERT CHANNELS IN THE SYSTEM MUST BE JUSTIFIED.
-
- IN KEEPING WITH THE EXTENSIVE DESIGN AND DEVELOP-
- MENT ANALYSIS OF THE NTCB REQUIRED OF SYSTEMS IN
- CLASS (A1), MORE STRINGENT CONFIGURATION MANAGE-
- MENT IS REQUIRED AND PROCEDURES ARE ESTABLISHED
- FOR SECURELY DISTRIBUTING THE SYSTEM TO SITES. A
- SYSTEM SECURITY ADMINISTRATOR IS SUPPORTED.
-
- THE FOLLOWING ARE MINIMAL REQUIREMENTS FOR SYSTEM
- ASSIGNED A CLASS (A1) RATING:
-
-
- 4.1.1 Security Policy
- _ _ _ ________ ______
-
- + Statement from DoD 5200.28-STD
-
- Implied from the Introduction to the TCSEC.
-
-
- + Interpretation
-
- The network sponsor shall describe the overall network
- security policy enforced by the NTCB. At a minimum, this
- policy shall include the discretionary and mandatory
- requirements applicable to this class. The policy may
- require data secrecy, or data integrity, or both. The pol-
- icy is an access control policy having two primary com-
- ponents: mandatory and discretionary. The policy shall
- include a discretionary policy for protecting the informa-
- tion being processed based on the authorizations of indivi-
- duals, users, or groups of users. This access control pol-
- icy statement shall describe the requirements on the network
- to prevent or detect "reading or destroying" sensitive
- information by unauthorized users or errors. The mandatory
- policy must define the set of distinct sensitivity levels
- that it supports. For the Class B1 or above the mandatory
- policy shall be based on the labels associated with the
- information that reflects its sensitivity with respect to
- secrecy and/or integrity, where applicable, and labels asso-
- ciated with users to reflect their authorization to access
- such information. Unauthorized users include both those
- that are not authorized to use the network at all (e.g., a
- user attempting to use a passive or active wire tap) or a
- legitimate user of the network who is not authorized to
- access a specific piece of information being protected.
-
- Note that "users" does not include "operators," "system
- programmers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network sys-
- tem, for example, by defining membership of a group. These
- individuals may also have the separate role of users.
-
-
- SECRECY POLICY: The network sponsor shall define the
- form of the discretionary and mandatory secrecy
- policy that is enforced in the network to prevent
- unauthorized users from reading the sensitive infor-
- mation entrusted to the network.
-
-
- DATA INTEGRITY POLICY: The network sponsor shall
- define the discretionary and mandatory integrity
- policy to prevent unauthorized users from modifying,
- viz., writing, sensitive information. The defini-
- tion of data integrity presented by the network
- sponsor refers to the requirement that the informa-
- tion has not been subjected to unauthorized modifi-
- cation in the network. The mandatory integrity pol-
- icy enforced by the NTCB cannot, in general, prevent
- modification while information is being transmitted
- between components. However, an integrity sensi-
- tivity label may reflect the confidence that the
- information has not been subjected to transmission
- errors because of the protection afforded during
- transmission. This requirement is distinct from the
- requirement for label integrity.
-
- + Rationale
-
- The word "sponsor" is used in place of alternatives
- (such as "vendor," "architect," "manufacturer," and
- "developer") because the alternatives indicate people who
- may not be available, involved, or relevant at the time that
- a network system is proposed for evaluation.
-
- A trusted network is able to control both the reading
- and writing of shared sensitive information. Control of
- writing is used to protect against destruction of informa-
- tion. A network normally is expected to have policy require-
- ments to protect both the secrecy and integrity of the
- information entrusted to it. In a network the integrity is
- frequently as important or more important than the secrecy
- requirements. Therefore the secrecy and/or integrity policy
- to be enforced by the network must be stated for each net-
- work regardless of its evaluation class. The assurance that
- the policy is faithfully enforced is reflected in the
- evaluation class of the network.
-
- This control over modification is typically used to
- protect information so that it may be relied upon and to
- control the potential harm that would result if the informa-
- tion were corrupted. The overall network policy require-
- ments for integrity includes the protection for data both
- while being processed in a component and while being
- transmitted in the network. The access control policy
- enforced by the NTCB relates to the access of subjects to
- objects within each component. Communications integrity
- addressed within Part II relates to information while being
- transmitted.
-
- The mandatory integrity policy (at class B1 and above)
- in some architectures may be useful in supporting the link-
- age between the connection oriented abstraction introduced
- in the Introduction and the individual components of the
- network. For example, in a key distribution center for
- end-to-end encryption, a distinct integrity category may be
- assigned to isolate the key generation code and data from
- possible modification by other supporting processes in the
- same component, such as operator interfaces and audit.
-
- The mandatory integrity policy for some architecture
- may define an integrity sensitivity label that reflects the
- specific requirements for ensuring that information has not
- been subject to random errors in excess of a stated limit
- nor to unauthorized message stream modification (MSM) -.
- The specific metric associated with an integrity sensitivity
- label will generally reflect the intended applications of
- the network.
-
-
- 4.1.1.1 Discretionary Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall define and control access between named users
- and named objects (e.g., files and programs) in the ADP sys-
- tem. The enforcement mechanism (e.g., access control lists)
- shall allow users to specify and control sharing of those
- objects and shall provide controls to limit propagation of
- access rights. The discretionary access control mechanism
- shall, either by explicit user action or by default, provide
- that objects are protected from unauthorized access. These
- access controls shall be capable of specifying, for each
- named object, a list of named individuals and a list of
- groups of named individuals with their respective modes of
- access to that object. Furthermore, for each such named
- object, it shall be possible to specify a list of named
- individuals and a list of groups of named individuals for
- which no access to the object is given. Access permission
- to an object by users not already possessing access
- _________________________
- - See Voydock, Victor L. and Stephen T. Kent, "Secu-
- rity Mechanisms in High-Level Network Protocols," Com-
- ___
- puting Surveys, Vol. 15, No. 2, June 1983, pp 135-171.
- ______ _______
-
-
- permission shall only be assigned by authorized users.
-
- + Interpretation
-
- The discretionary access control (DAC) mechanism(s) may
- be distributed over the partitioned NTCB in various ways.
- Some part, all, or none of the DAC may be implemented in a
- given component of the network system. In particular, com-
- ponents that support only internal subjects (i.e., that have
- no subjects acting as direct surrogates for users), such as
- a public network packet switch, might not implement the DAC
- mechanism(s) directly (e.g., they are unlikely to contain
- access control lists).
-
- Identification of users by groups may be achieved in
- various ways in the networking environment. For example,
- the network identifiers (e.g., internet addresses) for vari-
- ous components (e.g., hosts, gateways) can be used as iden-
- tifiers of groups of individual users (e.g., "all users at
- Host A," "all users of network Q") so long as the individu-
- als involved in the group are implied by the group identif-
- ier. For example, Host A might employ a particular group-id,
- for which it maintains a list of explicit users in that
- group, in its network exchange with Host B, which accepts
- the group-id under the conditions of this interpretation.
-
- For networks, individual hosts will impose need-to-know
- controls over their users on the basis of named individuals
- - much like (in fact, probably the same) controls used when
- there is no network connection.
-
- When group identifiers are acceptable for access con-
- trol, the identifier of some other host may be employed, to
- eliminate the maintenance that would be required if indivi-
- dual identification of remote users was employed. In class
- C2 and higher, however, it must be possible from that audit
- record to identify (immediately or at some later time)
- exactly the individuals represented by a group identifier at
- the time of the use of that identifier. There is allowed to
- be an uncertainty because of elapsed time between changes in
- the group membership and the enforcement in the access con-
- trol mechanisms.
-
- The DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. The reference monitor manages
- all the physical resources of the system and from them
- creates the abstraction of subjects and objects that it con-
- trols. Some of these subjects and objects may be used to
- implement a part of the NTCB. When the DAC mechanism is
- distributed in such NTCB subjects (i.e., when outside the
- reference monitor), the assurance requirements (see the
- Assurance section) for the design and implementation of the
- DAC shall be those of class C2 for all networks of class C2
- or above.
-
- When integrity is included as part of the network dis-
- cretionary security policy, the above interpretations shall
- be specifically applied to the controls over modification,
- viz, the write mode of access, within each component based
- on identified users or groups of users.
-
- + Rationale
-
- In this class, the supporting elements of the overall
- DAC mechanism are required to isolate information (objects)
- that supports DAC so that it is subject to auditing require-
- ments (see the System Architecture section). The use of
- network identifiers to identify groups of individual users
- could be implemented, for example, as an X.25 community of
- interest in the network protocol layer (layer 3). In all
- other respects, the supporting elements of the overall DAC
- mechanism are treated exactly as untrusted subjects are
- treated with respect to DAC in an ADP system, with the same
- result as noted in the interpretation.
-
- A typical situation for DAC is that a surrogate process
- for a remote user will be created in some host for access to
- objects under the control of the NTCB partition within that
- host. The interpretation requires that a user identifier be
- assigned and maintained for each such process by the NTCB,
- so that access by a surrogate process is subject to essen-
- tially the same discretionary controls as access by a pro-
- cess acting on behalf of a local user would be. However,
- within this interpretation a range of possible interpreta-
- tions of the assigned user identification is permitted.
-
- The most obvious situation would exist if a global
- database of network users were to be made permanently avail-
- able on demand to every host, (i.e., a name server existed)
- so that all user identifications were globally meaningful.
-
- It is also acceptable, however, for some NTCB parti-
- tions to maintain a database of locally-registered users for
- its own use. In such a case, one could choose to inhibit
- the creation of surrogate processes for locally unregistered
- users, or (if permitted by the local policy) alternatively,
- to permit the creation of surrogate processes with
- preselected user and group identifiers which, in effect,
- identify the process as executing on behalf of a member of a
- group of users on a particular remote host. The intent of
- the words concerning audit in the interpretation is to pro-
- vide a minimally acceptable degree of auditability for cases
- such as the last described. What is required is that there
- be a capability, using the audit facilities provided by the
- network NTCB partitions involved, to determine who was
- logged in at the actual host of the group of remote users at
- the time the surrogate processing occured.
-
- Associating the proper user id with a surrogate process
- is the job of identification and authentication. This means
- that DAC is applied locally, with respect to the user id of
- the surrogate process. The transmission of the data back
- across the network to the user's host, and the creation of a
- copy of the data there, is not the business of DAC.
-
- Components that support only internal subjects impact
- the implementation of the DAC by providing services by which
- information (e.g., a user-id) is made available to a com-
- ponent that makes a DAC decision. An example of the latter
- would be the case that a user at Host A attempts to access a
- file at Host B. The DAC decision might be (and usually
- would be) made at Host B on the basis of a user-id transmit-
- ted from Host A to Host B.
-
- Unique user identification may be achieved by a variety
- of mechanisms, including (a) a requirement for unique iden-
- tification and authentication on the host where access takes
- place; (b) recognition of fully qualified network
- addresses authenticated by another host and forwarded to the
- host where access takes place; or (c) administrative support
- of a network-wide unique personnel identifier that could be
- authenticated and forwarded by another host as in (b) above,
- or could be authenticated and forwarded by a dedicated net-
- work identification and authentication server. The proto-
- cols which implement (b) or (c) are subject to the System
- Architecture requirements.
-
- Network support for DAC might be handled in other ways
- than that described as "typical" above. In particular, some
- form of centralized access control is often proposed. An
- access control center may make all decisions for DAC, or it
- may share the burden with the hosts by controlling host-to-
- host connections, and leaving the hosts to decide on access
- to their objects by users at a limited set of remote hosts.
- In this case the access control center provides the linkage
- between the connection oriented abstraction (as discussed in
- the Introduction) and the overall network security policy
- for DAC. In all cases the enforcement of the decision must
- be provided by the host where the object resides.
-
- There are two forms of distribution for the DAC mechan-
- ism: implementing portions of the DAC in separate com-
- ponents, and supporting the DAC in subjects contained within
- the NTCB partition in a component. Since "the ADP system"
- is understood to be "the computer network" as a whole, each
- network component is responsible for enforcing security in
- the mechanisms allocated to it to ensure secure implementa-
- tion of the network security policy. For traditional host
- systems it is frequently easy to also enforce the DAC along
- with the MAC within the reference monitor, per se, although
- a few approaches, such as virtual machine monitors, support
- DAC outside this interface.
-
- In contrast to the universally rigid structure of man-
- datory policies (see the Mandatory Access Control section),
- DAC policies tend to be very network and system specific,
- with features that reflect the natural use of the system.
- For networks it is common that individual hosts will impose
- controls over their local users on the basis of named
- individuals-much like the controls used when there is no
- network connection. However, it is difficult to manage in a
- centralized manner all the individuals using a large net-
- work. Therefore, users on other hosts are commonly grouped
- together so that the controls required by the network DAC
- policy are actually based on the identity of the hosts or
- other components. A gateway is an example of such a com-
- ponent.
-
- The assurance requirements are at the very heart of the
- concept of a trusted system. It is the assurance that
- determines if a system or network is appropriate for a given
- environment, as reflected, for example, in the Environments
- Guideline-. In the case of monolithic systems that have DAC
- integral to the reference monitor, the assurance require-
- ments for DAC are inseparable from those of the rest of the
- reference monitor. For networks there is typically a much
- clearer distinction due to distributed DAC. The rationale
- for making the distinction in this network interpretation is
- that if major trusted network components can be made signi-
- ficantly easier to design and implement without reducing the
- ability to meet security policy, then trusted networks will
- be more easily available.
-
-
- 4.1.1.2 Object Reuse
-
- + Statement from DoD 5200.28-STD
-
- All authorizations to the information contained within a
- storage object shall be revoked prior to initial assignment,
- allocation or reallocation to a subject from the TCB's pool
- of unused storage objects. No information, including
- encrypted representations of information, produced by a
- prior subject's actions is to be available to any subject
- that obtains access to an object that has been released back
- to the system.
-
- + Interpretation
-
- The NTCB shall ensure that any storage objects that it
- controls (e.g., message buffers under the control of a NTCB
- partition in a component) contain no information for which a
- subject in that component is not authorized before granting
- access. This requirement must be enforced by each of the
- NTCB partitions.
-
-
-
- _________________________
- - Guidance for Applying the Department of Defense
- ________ ___ ________ ___ __________ __ _______
- Trusted Computer System Evaluation Criteria in Specific
- _______ ________ ______ __________ ________ __ ________
- Environments, CSC-STD-003-85.
- ____________
-
-
- + Rationale
-
- In a network system, storage objects of interest are
- things that the NTCB directly controls, such as message
- buffers in components. Each component of the network system
- must enforce the object reuse requirement with respect to
- the storage objects of interest as determined by the network
- security policy. For example, the DAC requirement in this
- division leads to the requirement here that message buffers
- be under the control of the NTCB partition. A buffer
- assigned to an internal subject may be reused at the discre-
- tion of that subject which is responsible for preserving the
- integrity of message streams. Such controlled objects may
- be implemented in physical resources, such as buffers, disk
- sectors, tape space, and main memory, in components such as
- network switches.
-
-
-
- 4.1.1.3 Labels
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels associated with each ADP system resource
- (e.g., subject, storage object, ROM) that is directly or
- indirectly accessible by subjects external to the TCB shall
- be maintained by the TCB. These labels shall be used as the
- basis for mandatory access control decisions. In order to
- import non-labeled data, the TCB shall request and receive
- from an authorized user the sensitivity level of the data,
- and all such actions shall be auditable by the TCB.
-
- + Interpretation
-
- Non-labeled data imported under the control of the NTCB
- partition will be assigned a label constrained by the device
- labels of the single-level device used to import it. Labels
- may include secrecy and integrity- components in accordance
- with the overall network security policy described by the
- network sponsor. Whenever the term "label" is used
- throughout this interpretation, it is understood to include
- both components as applicable. Similarly, the terms
- "single-level" and "multilevel" are understood to be based
- on both the secrecy and integrity components of the policy.
- The mandatory integrity policy will typically have require-
- ments, such as the probability of undetected message stream
- modification, that will be reflected in the label for the
- data so protected. For example, when data is imported its
- integrity label may be assigned based on mechanisms, such as
- cryptography, used to provide the assurance required by the
- policy. The NTCB shall assure that such mechanism are pro-
- tected from tampering and are always invoked when they are
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Computer Systems," ESD-TR-76-372, MTR-
- 3153, The MITRE Corporation, Bedford, MA, April 1977.
-
-
- the basis for a label.
-
-
- If the security policy includes an integrity policy,
- all activities that result in message-stream modification
- during transmission are regarded as unauthorized accesses in
- violation of the integrity policy. The NTCB shall have an
- automated capability for testing, detecting, and reporting
- those errors/corruptions that exceed specified network
- integrity policy requirements. Message-stream modification
- (MSM) countermeasures shall be identified. A technology of
- adequate strength shall be selected to resist MSM. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency.
-
- All objects must be labeled within each component of
- the network that is trusted to maintain separation of multi-
- ple levels of information. The label associated with any
- objects associated with single-level components will be
- identical to the level of that component. Objects used to
- store network control information, and other network struc-
- tures, such as routing tables, must be labeled to prevent
- unauthorized access and/or modification.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system and partitioned NTCB as
- defined for these network interpretations. A single-level
- device may be regarded either as a subject or an object. A
- multilevel device is regarded as a trusted subject in which
- the security range of the subject is the minimum-maximum
- range of the data expected to be transmitted over the dev-
- ice.
-
- The sensitivity labels for either secrecy or integrity
- or both may reflect non-hierarchical categories or hierarch-
- ical classification or both.
-
- For a network it is necessary that this requirement be
- applied to all network system resources at the (B2) level
- and above.
-
- The NTCB is responsible for implementing the network
- integrity policy, when one exists. The NTCB must enforce
- that policy by ensuring that information is accurately
- transmitted from source to destination (regardless of the
- number of intervening connecting points). The NTCB must be
- able to counter equipment failure, environmental disrup-
- tions, and actions by persons and processes not authorized
- to alter the data. Protocols that perform code or format
- conversion shall preserve the integrity of data and control
- information.
-
- The probability of an undetected transmission error may
- be specified as part of the network security policy so that
- the acceptability of the network for its intended
- application may be determined. The specific metrics (e.g.,
- probability of undetected modification) satisfied by the
- data can be reflected in the integrity sensitivity label
- associated with the data while it is processed within a com-
- ponent. It is recognized that different applications and
- operational environments (e.g., crisis as compared to logis-
- tic) will have different integrity requirements.
-
- The network shall also have an automated capability of
- testing for, detecting, and reporting errors that exceed a
- threshold consistent with the operational mode requirements.
- The effectiveness of integrity countermeasures must be esta-
- blished with the same rigor as the other security-relevant
- properties such as secrecy.
-
- Cryptography is often utilized as a basis to provide
- data integrity assurance. Mechanisms, such as Manipulation
- Detection Codes (MDC)-, may be used. The adequacy of the
- encryption or MDC algorithm, the correctness of the protocol
- logic, and the adequacy of implementation must be esta-
- blished in MSM countermeasures design.
-
-
-
- 4.1.1.3.1 Label Integrity
-
- + Statement from DoD 5200.28-STD
-
- Sensitivity labels shall accurately represent sensitivity
- levels of the specific subjects or objects with which they
- are associated. When exported by the TCB, sensitivity
- labels shall accurately and unambiguously represent the
- internal labels and shall be associated with the information
- being exported.
-
- + Interpretation
-
- The phrase "exported by the TCB" is understood to
- include transmission of information from an object in one
- component to an object in another component. Information
- transferred between NTCB partitions is addressed in the Sys-
- tem Integrity Section. The form of internal and external
- (exported) sensitivity labels may differ, but the meaning
- shall be the same. The NTCB shall, in addition, ensure that
- correct association of sensitivity labels with the informa-
- tion being transported across the network is preserved.
-
- As mentioned in the Trusted Facility Manual Section,
- encryption transforms the representation of information so
- that it is unintelligible to unauthorized subjects.
- Reflecting this transformation, the sensitivity level of the
- ciphertext is generally lower than the cleartext. It fol-
- lows that cleartext and ciphertext are contained in
- _________________________
- - See Jueneman, R. R., "Electronic Document Authenti-
- cation," IEEE Network Magazine, April 1987, pp 17-23.
- ____ _______ ________
-
-
- different objects, each possessing its own label. The label
- of the cleartext must be preserved and associated with the
- ciphertext so that it can be restored when the cleartext is
- subsequently obtained by decrypting the ciphertext. If the
- cleartext is associated with a single-level device, the
- label of that cleartext may be implicit. The label may also
- be implicit in the key.
-
- When information is exported to an environment where it
- is subject to deliberate or accidental modification, the TCB
- shall support the means, such as cryptographic checksums, to
- assure the accuracy of the labels. When there is a manda-
- tory integrity policy, the policy will define the meaning of
- integrity labels.
-
- + Rationale
-
- Encryption algorithms and their implementation are out-
- side the scope of these interpretations. Such algorithms
- may be implemented in a separate device or may be incor-
- porated in a subject of a larger component. Without preju-
- dice, either implementation packaging is referred to as an
- encryption mechanism herein. If encryption methodologies are
- employed in this regard, they shall be approved by the
- National Security Agency (NSA). The encryption process is
- part of the Network Trusted Computer Base partition in the
- components in which it is implemented.
-
- The encryption mechanism is not necessarily a mul-
- tilevel device or multilevel subject, as these terms are
- used in these criteria. The process of encryption is mul-
- tilevel by definition. The cleartext and ciphertext inter-
- faces carry information of different sensitivity. An
- encryption mechanism does not process data in the sense of
- performing logical or arithmetic operations on that data
- with the intent of producing new data. The cleartext and
- ciphertext interfaces on the encryption mechanism must be
- separately identified as being single-level or multilevel.
- If the interface is single-level, then the sensitivity of
- the data is established by a trusted individual and impli-
- citly associated with the interface; the Exportation to
- Single-Level Devices criterion applies.
-
- If the interface is multilevel, then the data must be
- labeled; the Exportation to Multilevel Devices criterion
- applies. The network architect is free to select an accept-
- able mechanism for associating a label with an object. With
- reference to encrypted objects, the following examples are
- possible:
-
- 1. Include a label field in the protocol definition of
- the object.
-
- 2. Implicitly associate the label with the object
- through the encryption key. That is, the encryption
- key uniquely identifies a sensitivity level. A sin-
- gle or private key must be protected at the level of
- the data that it encrypts.
-
-
- 4.1.1.3.2 Exportation of Labeled Information
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall designate each communication channel and I/O
- device as either single-level or multilevel. Any change in
- this designation shall be done manually and shall be audit-
- able by the TCB. The TCB shall maintain and be able to
- audit any change in the sensitivity level or levels associ-
- ated with a communications channel or I/O device.
-
- + Interpretation
-
- Each communication channel and network component shall
- be designated as either single-level or multilevel. Any
- change in this designation shall be done with the cognizance
- and approval of the administrator or security officer in
- charge of the affected components and the administrator or
- security officer in charge of the NTCB. This change shall
- be auditable by the network. The NTCB shall maintain and be
- able to audit any change in the device labels associated
- with a single-level communication channel or the range asso-
- ciated with a multilevel communication channel or component.
- The NTCB shall also be able to audit any change in the set
- of sensitivity levels associated with the information which
- can be transmitted over a multilevel communication channel
- or component.
-
- + Rationale
-
- Communication channels and components in a network are
- analogous to communication channels and I/O devices in
- stand-alone systems. They must be designated as either mul-
- tilevel (i.e., able to distinguish and maintain separation
- among information of various sensitivity levels) or single-
- level. As in the TCSEC, single-level devices may only be
- attached to single-level channels.
-
- The level or set of levels of information that can be
- sent to a component or over a communication channel shall
- only change with the knowledge and approval of the security
- officers (or system administrator, if there is no security
- officer) of the network, and of the affected components.
- This requirement ensures that no significant security-
- relevant changes are made without the approval of all
- affected parties.
-
-
- 4.1.1.3.2.1 Exportation to Multilevel Devices
-
- + Statement from DoD 5200.28-STD
-
- When the TCB exports an object to a multilevel I/O device,
- the sensitivity label associated with that object shall also
- be exported and shall reside on the same physical medium as
- the exported information and shall be in the same form
- (i.e., machine-readable or human-readable form). When the
- TCB exports or imports an object over a multilevel communi-
- cations channel, the protocol used on that channel shall
- provide for the unambiguous pairing between the sensitivity
- labels and the associated information that is sent or
- received.
-
- + Interpretation
-
- The components, including hosts, of a network shall be
- interconnected over "multilevel communication channels,"
- multiple single-level communication channels, or both, when-
- ever the information is to be protected at more than a sin-
- gle sensitivity level. The protocol for associating the
- sensitivity label and the exported information shall provide
- the only information needed to correctly associate a sensi-
- tivity level with the exported information transferred over
- the multilevel channel between the NTCB partitions in indi-
- vidual components. This protocol definition must specify the
- representation and semantics of the sensitivity labels
- (i.e., the machine-readable label must uniquely represent
- the sensitivity level).
-
- The "unambiguous" association of the sensitivity level
- with the communicated information shall meet the same level
- of accuracy as that required for any other label within the
- NTCB, as specified in the criterion for Label Integrity.
- This may be provided by protected and highly reliable direct
- physical layer connections, or by traditional cryptographic
- link protection in which any errors during transmission can
- be readily detected, or by use of a separate channel. The
- range of information imported or exported must be con-
- strained by the associated device labels.
-
- + Rationale
-
- This protocol must specify the representation and
- semantics of the sensitivity labels. See the Mandatory
- Access Control Policies section in Appendix B. The mul-
- tilevel device interface to (untrusted) subjects may be
- implemented either by the interface of the reference moni-
- tor, per se, or by a multilevel subject (e.g., a "trusted
- subject" as defined in the Bell-LaPadula Model) that pro-
- vides the labels based on the internal labels of the NTCB
- partition.
-
- The current state of the art limits the support for
- mandatory policy that is practical for secure networks.
- Reference monitor support to ensure the control over all the
- operations of each subject in the network must be completely
- provided within the single NTCB partition on which that sub-
- ject interfaces to the NTCB. This means that the entire
- portion of the "secure state" represented in the formal
- security policy model that may be changed by transitions
- invoked by this subject must be contained in the same
- component.
-
- The secure state of an NTCB partition may be affected
- by events external to the component in which the NTCB parti-
- tion resides (e.g., arrival of a message). The effect
- occurs asynchronusly after being initiated by an event in
- another component or partition. For example, indeterminate
- delays may occur between the initiation of a message in one
- component, the arrival of the message in the NTCB partition
- in another component, and the corresponding change to the
- secure state of the second component. Since each component
- is executing concurrently, to do otherwise would require
- some sort of network-wide control to synchronize state tran-
- sitions, such as a global network-wide clock for all proces-
- sors; in general, such designs are not practical and prob-
- ably not even desirable. Therefore, the interaction between
- NTCB partitions is restricted to just communications between
- pairs (at least logically) of devices-multilevel devices if
- the device(s) can send/receive data of more than a single
- level. For broadcast channels the pairs are the sender and
- intended receiver(s). However, if the broadcast channel
- carries multiple levels of information, additional mechanism
- (e.g., cryptochecksum maintained by the TCB) may be required
- to enforce separation and proper delivery.
-
- A common representation for sensitivity labels is
- needed in the protocol used on that channel and understood
- by both the sender and receiver when two multilevel devices
- (in this case, in two different components) are intercon-
- nected. Each distinct sensitivity level of the overall net-
- work policy must be represented uniquely in these labels.
-
- Within a monolithic TCB, the accuracy of the sensi-
- tivity labels is generally assured by simple techniques,
- e.g., very reliable connections over very short physical
- connections, such as on a single printed circuit board or
- over an internal bus. In many network environments there is
- a much higher probability of accidentally or maliciously
- introduced errors, and these must be protected against.
-
-
- 4.1.1.3.2.2 Exportation to Single-Level Devices
-
- + Statement from DoD 5200.28-STD
-
- Single-level I/O devices and single-level communication
- channels are not required to maintain the sensitivity labels
- of the information they process. However, the TCB shall
- include a mechanism by which the TCB and an authorized user
- reliably communicate to designate the single sensitivity
- level of information imported or exported via single-level
- communication channels or I/O devices.
-
- + Interpretation
-
- Whenever one or both of two directly connected com-
- ponents is not trusted to maintain the separation of
- information of different sensitivity levels, or whenever the
- two directly connected components have only a single sensi-
- tivity level in common, the two components of the network
- shall communicate over a single-level channel. Single-level
- components and single-level communication channels are not
- required to maintain the sensitivity labels of the informa-
- tion they process. However, the NTCB shall include a reli-
- able communication mechanism by which the NTCB and an
- authorized user (via a trusted path) or a subject within an
- NTCB partition can designate the single sensitivity level of
- information imported or exported via single-level communica-
- tion channels or network components. The level of informa-
- tion communicated must equal the device level.
-
- + Rationale
-
- Single-level communications channels and single-level
- components in networks are analogous to single level chan-
- nels and I/O devices in stand-alone systems in that they are
- not trusted to maintain the separation of information of
- different sensitivity levels. The labels associated with
- data transmitted over those channels and by those components
- are therefore implicit; the NTCB associates labels with the
- data because of the channel or component, not because of an
- explicit part of the bit stream. Note that the sensitivity
- level of encrypted information is the level of the cipher-
- text rather than the original level(s) of the plaintext.
-
-
- 4.1.1.3.2.3 Labeling Human-Readable Output
-
- + Statement from DoD 5200.28-STD
-
- The ADP system administrator shall be able to specify the
- printable label names associated with exported sensitivity
- labels. The TCB shall mark the beginning and end of all
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the output. The TCB
- shall, by default, mark the top and bottom of each page of
- human-readable, paged, hardcopy output (e.g., line printer
- output) with human-readable sensitivity labels that prop-
- erly1 represent the sensitivity of the page. The TCB shall,
- by default and in an appropriate manner, mark other forms of
- human readable output (e.g., maps, graphics) with human-
- readable sensitivity labels that properly1 represent the
- sensitivity of the output. Any override of these markings
- defaults shall be auditable by the TCB.
- _________________________
- 1 The hierarchical classification component in human-
- readable sensitivity labels shall be equal to the
- greatest hierarchical classification of any of the in-
- formation in the output that the labels refer to; the
- non-hierarchical category component shall include all
- of the non-hierarchical categories of the information
- in the output the labels refer to, but no other non-
- hierarchical categories.
-
- + Interpretation
-
- This criterion imposes no requirement to a component
- that produces no human-readable output. For those that do
- produce human-readable output, each sensitivity level that
- is defined to the network shall have a uniform meaning
- across all components. The network administrator, in con-
- junction with any affected component administrator, shall be
- able to specify the human-readable label that is associated
- with each defined sensitivity level.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system and
- partitioned NTCB as defined for these network interpreta-
- tions.
-
-
- 4.1.1.3.3 Subject Sensitivity Labels
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall immediately notify a terminal user of each
- change in the sensitivity level associated with that user
- during an interactive session. A terminal user shall be
- able to query the TCB as desired for a display of the
- subject's complete sensitivity label.
-
- + Interpretation
-
- An NTCB partition shall immediately notify a terminal
- user attached to its component of each change in the sensi-
- tivity level associated with that user.
-
- + Rationale
-
- The local NTCB partition must ensure that the user
- understands the sensitivity level of information sent to and
- from a terminal. When a user has a surrogate process in
- another component, adjustments to its level may occur to
- maintain communication with the user. These changes may
- occur asynchronously. Such adjustments are necessitated by
- mandatory access control as applied to the objects involved
- in the communication path.
-
-
- 4.1.1.3.4 Device Labels
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support the assignment of minimum and maximum
- sensitivity levels to all attached physical devices. These
- sensitivity levels shall be used by the TCB to enforce con-
- straints imposed by the physical environments in which the
- devices are located.
-
- + Interpretation
-
- This requirement applies as written to each NTCB parti-
- tion that is trusted to separate information based on sensi-
- tivity level. Each I/O device in a component, used for com-
- munication with other network components, is assigned a dev-
- ice range, consisting of a set of labels with a maximum and
- minimum. (A device range usually contains, but does not
- necessarily contain, all possible labels "between" the max-
- imum and minimum, in the sense of dominating the minimum and
- being dominated by the maximum.)
-
- The NTCB always provides an accurate label for informa-
- tion exported through devices. Information exported or
- imported using a single-level device is labelled implicitly
- by the sensitivity level of the device. Information
- exported from one multilevel device and imported at another
- must be labelled through an agreed-upon protocol, unless it
- is labelled implicitly by using a communication link that
- always carries a single level.
-
- Information exported at a given sensitivity level can
- be sent only to an importing device whose device range con-
- tains that level or a higher level. If the importing device
- range does not contain the given level, the information is
- relabelled upon reception at a higher level within the
- importing device range. Relabelling should not occur other-
- wise.
-
- + Rationale
-
- The purpose of device labels is to reflect and con-
- strain the sensitivity levels of information authorized for
- the physical environment in which the devices are located.
-
- The information transfer restrictions permit one-way
- communication (i.e., no acknowledgements) from one device to
- another whose ranges have no level in common, as long as
- each level in the sending device range is dominated by some
- level in the receiving device range. It is never permitted
- to send information at a given level to a device whose range
- does not contain a dominating level. (See Appendix C for
- similar interconnection rules for the interconnected AIS
- view.)
-
- 4.1.1.4 Mandatory Access Control
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall enforce a mandatory access control policy over
- all resources (i.e., subjects, storage objects, and I/O dev-
- ices) that are directly or indirectly accessible by subjects
- external to the TCB. These subjects and objects shall be
- assigned sensitivity labels that are a combination of
- hierarchical classification levels and non-hierarchical
- categories, and the labels shall be used as the basis for
- mandatory access control decisions. The TCB shall be able
- to support two or more such sensitivity levels. (See the
- Mandatory Access Control interpretations.) The following
- requirements shall hold for all accesses between all sub-
- jects external to the TCB and all objects directly or
- indirectly accessible by these subjects. A subject can
- read an object only if the hierarchical classification in
- the subject's sensitivity level is greater than or equal to
- the hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level include all the non-hierarchical
- categories in the object's sensitivity level. A subject can
- write an object only if the hierarchical classification in
- the subject's sensitivity level is less than or equal to the
- hierarchical classification of the object's sensitivity
- level and the non-hierarchical categories in the subject's
- sensitivity level are included in the non-hierarchical
- categories in the object's sensitivity level. Identification
- and authentication data shall be used by the TCB to authen-
- ticate the user's identity and to ensure that the sensi-
- tivity level and authorization of subjects external to the
- TCB that may be created to act on behalf of the individual
- user are dominated by the clearance and authorization of
- that user.
-
- + Interpretation
-
- Each partition of the NTCB exercises mandatory access
- control policy over all subjects and objects in its com-
- ponent. In a network, the responsibility of an NTCB parti-
- tion encompasses all mandatory access control functions in
- its component that would be required of a TCB in a stand-
- alone system. In particular, subjects and objects used for
- communication with other components are under the control of
- the NTCB partition. Mandatory access control includes
- secrecy and integrity control to the extent that the network
- sponsor has described in the overall network security pol-
- icy.
-
- Conceptual entities associated with communication
- between two components, such as sessions, connections and
- virtual circuits, may be thought of as having two ends, one
- in each component, where each end is represented by a local
- object. Communication is viewed as an operation that copies
- information from an object at one end of a communication
- path to an object at the other end. Transient data-carrying
- entities, such as datagrams and packets, exist either as
- information within other objects, or as a pair of objects,
- one at each end of the communication path.
-
- The requirement for "two or more" sensitivity levels
- can be met by either secrecy or integrity levels. When
- there is a mandatory integrity policy, the stated require-
- ments for reading and writing are generalized to: A subject
- can read an object only if the subject's sensitivity level
- dominates the object's sensitivity level, and a subject can
- write an object only if the object's sensitivity level dom-
- inates the subject's sensitivity level. Based on the
- integrity policy, the network sponsor shall define the domi-
- nance relation for the total label, for example, by combin-
- ing secrecy and integrity lattices. -
-
- + Rationale
-
- An NTCB partition can maintain access control only over
- subjects and objects in its component. At levels B2 and
- above, the NTCB partition must maintain access control over
- all subjects and objects in its component. Access by a sub-
- ject in one component to information contained in an object
- in another component requires the creation of a subject in
- the remote component which acts as a surrogate for the first
- subject.
-
- The mandatory access controls must be enforced at the
- interface of the reference monitor (viz. the mechanism that
- controls physical processing resources) for each NTCB parti-
- tion. This mechanism creates the abstraction of subjects
- and objects which it controls. Some of these subjects out-
- side the reference monitor, per se, may be designated to
- implement part of an NTCB partition's mandatory policy,
- e.g., by using the ``trusted subjects" defined in the Bell-
- LaPadula model.
-
- The prior requirements on exportation of labeled infor-
- mation to and from I/O devices ensure the consistency
- between the sensitivity labels of objects connected by a
- communication path. As noted in the introduction, the net-
- work architecture must recognize the linkage between the
- overall mandatory network security policy and the connection
- oriented abstraction. For example, individual data-carrying
- entities such as datagrams can have individual sensitivity
- labels that subject them to mandatory access control in each
- component. The abstraction of a single-level connection is
- realized and enforced implicitly by an architecture while a
- connection is realized by single-level subjects that neces-
- sarily employ only datagrams of the same level.
-
- The fundamental trusted systems technology permits the
- DAC mechanism to be distributed, in contrast to the require-
- ments for mandatory access control. For networks this
- separation of MAC and DAC mechanisms is the rule rather than
- _________________________
- - See, for example, Grohn, M. J., A Model of a Pro-
- _ _____ __ _ ___
- tected Data Management System, ESD-TR-76-289, I. P.
- ______ ____ __________ ______
- Sharp Assoc. Ltd., June, 1976; and Denning, D .E.,
- Lunt, T. F., Neumann, P. G., Schell, R. R., Heckman, M.
- and Shockley, W., Secure Distributed Data Views, Secu-
- ______ ___________ ____ _____ ____
- rity Policy and Interpretation for a Class A1 Multilev-
- ____ ______ ___ ______________ ___ _ _____ __ ________
- el Secure Relational Database System,SRI International,
- __ ______ __________ ________ ______
- November 1986.
-
-
- the exception.
-
- The set of total sensitivity labels used to represent
- all the sensitivity levels for the mandatory access control
- (combined data secrecy and data integrity) policy always
- forms a partially ordered set. Without loss of generality,
- this set of labels can always be extended to form a lattice,
- by including all the combinations of non-hierarchical
- categories. As for any lattice, a dominance relation is
- always defined for the total sensitivity labels. For admin-
- istrative reasons it may be helpful to have a maximum level
- which dominates all others.
-
-
- 4.1.2 Accountability
- _ _ _ ______________
-
-
- 4.1.2.1 Identification and Authentication
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall require users to identify themselves to it
- before beginning to perform any other actions that the TCB
- is expected to mediate. Furthermore, the TCB shall maintain
- authentication data that includes information for verifying
- the identify of individual users (e.g., passwords) as well
- as information for determining the clearance and authoriza-
- tions of individual users. This data shall be used by the
- TCB to authenticate the user's identity and to ensure that
- the sensitivity level and authorization of subjects external
- to the TCB that may be created to act on behalf of the indi-
- vidual user are dominated by the clearance and authorization
- of that user. The TCB shall protect authentication data so
- that it cannot be accessed by any unauthorized user. The
- TCB shall be able to enforce individual accountability by
- providing the capability to uniquely identify each indivi-
- dual ADP system user. The TCB shall also provide the capa-
- bility of associating this identity with all auditable
- actions taken by that individual.
-
- + Interpretation
-
- The requirement for identification and authentication
- of users is the same for a network system as for an ADP sys-
- tem. The identification and authentication may be done by
- the component to which the user is directly connected or
- some other component, such as an identification and authen-
- tication server. Available techniques, such as those
- described in the Password Guideline=, are generally also
- applicable in the network context. However, in cases where
- the NTCB is expected to mediate actions of a host (or other
- network component) that is acting on behalf of a user or
- group of users, the NTCB may employ identification and
- _________________________
- = Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, CSC-STD-002-85
- ____
-
-
- authentication of the host (or other component) in lieu of
- identification and authentication of an individual user, so
- long as the component identifier implies a list of specific
- users uniquely associated with the identifier at the time of
- its use for authentication. This requirement does not apply
- to internal subjects.
-
- Authentication information, including the identity of a
- user (once authenticated) may be passed from one component
- to another without reauthentication, so long as the NTCB
- protects (e.g., by encryption) the information from unau-
- thorized disclosure and modification. This protection shall
- provide at least a similar level of assurance (or strength
- of mechanism) as pertains to the protection of the authenti-
- cation mechanism and authentication data.
-
- + Rationale
-
- The need for accountability is not changed in the con-
- text of a network system. The fact that the NTCB is parti-
- tioned over a set of components neither reduces the need nor
- imposes new requirements. That is, individual accountabil-
- ity is still the objective. Also, in the context of a net-
- work system at the (C2) level or higher "individual accoun-
- tability" can be satisfied by identification of a host (or
- other component) so long as the requirement for traceability
- to individual users or a set of specific individual users
- with active subjects is satisfied. There is allowed to be an
- uncertainty in traceability because of elapsed time between
- changes in the group membership and the enforcement in the
- access control mechanisms. In addition, there is no need in
- a distributed processing system like a network to reauthen-
- ticate a user at each point in the network where a projec-
- tion of a user (via the subject operating on behalf of the
- user) into another remote subject takes place.
-
- The passing of identifiers and/or authentication infor-
- mation from one component to another is usually done in sup-
- port to the implementation of the discretionary access con-
- trol (DAC). This support relates directly to the DAC
- regarding access by a user to a storage object in a dif-
- ferent NTCB partition than the one where the user was
- authenticated. Employing a forwarded identification implies
- additional reliance on the source and components along the
- path. If the authenticated identification is used as the
- basis of determining a sensitivity label for a subject, it
- must satisfy the Label Integrity criterion.
-
- An authenticated identification may be forwarded
- between components and employed in some component to iden-
- tify the sensitivity level associated with a subject created
- to act on behalf of the user so identified.
-
- 4.1.2.1.1 Trusted Path
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support a trusted communication path between
- itself and users for use when a positive TCB-to-user connec-
- tion is required (e.g., login, change subject sensitivity
- level). Communications via this trusted path shall be
- activated exclusively by a user or the TCB and shall be
- logically and unmistakably distinguishable from other paths.
-
-
- + Interpretation
-
- A trusted path is supported between a user (i.e.,
- human) and the NTCB partition in the component to which the
- user is directly connected.
-
- + Rationale
-
- When a user logs into a remote component, the user id
- is transmitted securely between the local and remote NTCB
- partitions in accordance with the requirements in Identifi-
- cation and Authentication.
-
- Trusted Path is necessary in order to assure that the
- user is communicating with the NTCB and only the NTCB when
- security relevant activities are taking place (e.g., authen-
- ticate user, set current session sensitivity level). How-
- ever, Trusted Path does not address communications within
- the NTCB, only communications between the user and the NTCB.
- If, therefore, a component does not support any direct user
- communication then the component need not contain mechanisms
- for assuring direct NTCB to user communications.
-
- The requirement for trusted communication between one
- NTCB partition and another NCTB partition is addressed in
- the System Architecture section. These requirements are
- separate and distinct from the user to NTCB communication
- requirement of a trusted path. However, it is expected that
- this trusted communication between one NTCB partition and
- another NTCB partition will be used in conjunction with the
- trusted path to implement trusted communication between the
- user and the remote NTCB partition.
-
-
- 4.1.2.2 Audit
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall be able to create, maintain, and protect from
- modification or unauthorized access or destruction an audit
- trail of accesses to the objects it protects. The audit
- data shall be protected by the TCB so that read access to it
- is limited to those who are authorized for audit data. The
- TCB shall be able to record the following types of events:
- use of identification and authentication mechanisms,
- introduction of objects into a user's address space (e.g.,
- file open, program initiation), deletion of objects, actions
- taken by computer operators and system administrators and/or
- system security officers, and other security relevant
- events. The TCB shall also be able to audit any override of
- human-readable output markings. For each recorded event,
- the audit record shall identify: date and time of the event,
- user, type of event, and success or failure of the event.
- For identification/authentication events the origin of
- request (e.g., terminal ID) shall be included in the audit
- record. For events that introduce an object into a user's
- address space and for object deletion events the audit
- record shall include the name of the object and the object's
- sensitivity level. The ADP system administrator shall be
- able to selectively audit the actions of any one or more
- users based on individual identify and/or object sensitivity
- level. The TCB shall be able to audit the identified
- events that may be used in the exploitation of covert
- storage channels. The TCB shall contain a mechanism that
- is able to monitor the occurrence or accumulation of secu-
- rity auditable events that may indicate an imminent viola-
- tion of security policy. This mechanism shall be able to
- immediately notify the security administrator when thres-
- holds are exceeded and, if the occurrence or accumulation of
- these security relevant events continues, the system shall
- take the least disruptive action to terminate the event.
-
- + Interpretation
-
- This criterion applies as stated. The sponsor must
- select which events are auditable. If any such events are
- not distinguishable by the NTCB alone (for example those
- identified in Part II), the audit mechanism shall provide an
- interface, which an authorized subject can invoke with
- parameters sufficient to produce an audit record. These
- audit records shall be distinguishable from those provided
- by the NTCB. In the context of a network system, "other
- security relevant events" (depending on network system
- architecture and network security policy) might be as fol-
- lows:
-
-
- 1. Identification of each access event (e.g., estab-
- lishing a connection or a connectionless association
- between processes in two hosts of the network) and
- its principal parameters (e.g., host identifiers of
- the two hosts involved in the access event and user
- identifier or host identifier of the user or host
- that is requesting the access event)
-
- 2. Identification of the starting and ending times of
- each access event using local time or global syn-
- chronized time
-
- 3. Identification of security-relevant exceptional con-
- ditions (e.g., potential violation of data
- integrity, such as misrouted datagrams) detected
- during the transactions between two hosts
-
- 4. Utilization of cryptographic variables
-
- 5. Changing the configuration of the network (e.g., a
- component leaving the network and rejoining)
-
- In addition, identification information should be
- included in appropriate audit trail records, as necessary,
- to allow association of all related (e.g., involving the
- same network event) audit trail records (e.g., at different
- hosts) with each other. Furthermore, a component of the
- network system may provide the required audit capability
- (e.g., storage, retrieval, reduction, analysis) for other
- components that do not internally store audit data but
- transmit the audit data to some designated collection com-
- ponent. Provisions shall be made to control the loss of
- audit data due to unavailability of resources.
-
- In the context of a network system, the "user's address
- space" is extended, for object introduction and deletion
- events, to include address spaces being employed on behalf
- of a remote user (or host). However, the focus remains on
- users in contrast to internal subjects as discussed in the
- DAC criterion. In addition, audit information must be
- stored in machine-readable form.
-
- The capability must exist to audit the identified
- events that may be used in the exploitation of covert
- storage channels. To accomplish this, each NTCB partition
- must be able to audit those events locally that may lead to
- the exploitation of a covert storage channel which exist
- because of the network.
-
- The sponsor shall identify the specific auditable
- events that may indicate an imminent violation of security
- policy. The component which detects the occurrence or accu-
- mulation of such events must be able to notify an appropri-
- ate administrator when thresholds are exceeded, and to ini-
- tiate actions which will result in termination of the event
- if the accumulation continues. For example, when the thres-
- hold of unsuccessful login attempts within a period of time
- is exceeded, login shall be inhibited for a specific time
- period.
-
- + Rationale
-
- For remote users, the network identifiers (e.g., inter-
- net address) can be used as identifiers of groups of indivi-
- dual users (e.g., "all users at Host A") to eliminate the
- maintenance that would be required if individual identifica-
- tion of remote users was employed. In this class (C2), how-
- ever, it must be possible to identify (immediately or at
- some later time) the individuals represented by a group
- identifier. In all other respects, the interpretation is a
- straightforward extension of the criterion into the context
- of a network system. Identification of covert channel
- events is addressed in the Covert Channel Analysis section.
-
- Because of concurrency and synchronization problems, it
- may not be possible to detect in real time the accumulation
- of security auditable events that are occurring in different
- NTCB partitions. However, each NTCB partition that has been
- allocated audit responsibility must have the capability to
- detect the local accumulation of events, to notify the par-
- tition security administrator and/or the network security
- administrator, and to initiate actions which will result in
- termination of the event locally.
-
-
- 4.1.3 Assurance
- _ _ _ _________
-
-
- 4.1.3.1 Operational Assurance
-
-
- 4.1.3.1.1 System Architecture
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall maintain a domain for its own execution that
- protects it from external interference or tampering (e.g.,
- by modification of its code or data structures). The TCB
- shall maintain process isolation through the provision of
- distinct address spaces under its control. The TCB shall be
- internally structured into well-defined largely independent
- modules. It shall make effective use of available hardware
- to separate those elements that are protection-critical from
- those that are not. The TCB modules shall be designed such
- that the principle of least privilege is enforced. Features
- in hardware, such as segmentation, shall be used to support
- logically distinct storage objects with separate attributes
- (namely: readable, writable). The user interface to the TCB
- shall be completely defined and all elements of the TCB
- identified. The TCB shall be designed and structured to
- use a complete, conceptually simple protection mechanism
- with precisely defined semantics. This mechanism shall play
- a central role in enforcing the internal structuring of the
- TCB and the system. The TCB shall incorporate significant
- use of layering, abstraction and data hiding. Significant
- system engineering shall be directed toward minimizing the
- complexity of the TCB and excluding from the TCB modules
- that are not protection-critical.
-
- + Interpretation
-
- The system architecture criterion must be met individu-
- ally by all NTCB partitions. Implementation of the require-
- ment that the NTCB maintain a domain for its own execution
- is achieved by having each NTCB partition maintain a domain
- for its own execution. Since each component is itself a dis-
- tinct domain in the overall network system, this also satis-
- fies the requirement for process isolation through distinct
- address spaces in the special case where a component has
- only a single subject.
-
- The NTCB must be internally structured into well-
- defined largely independent modules and meet the hardware
- requirements. This is satisfied by having each NTCB parti-
- tion so structured. The NTCB controls all network resources.
- These resources are the union of the sets of resources over
- which the NTCB partitions have control. Code and data
- structures belonging to the NTCB, transferred among NTCB
- subjects (i.e., subjects outside the reference monitor but
- inside the NTCB) belonging to different NTCB partitions,
- must be protected against external interference or tamper-
- ing. For example, a cryptographic checksum or physical
- means may be employed to protect user authentication data
- exchanged between NTCB partitions.
-
- Each NTCB partition must enforce the principle of least
- privilege within its component. Additionally, the NTCB must
- be structured so that the principle of least privilege is
- enforced in the system as a whole.
-
- The NTCB must be designed and structured according to
- the network security architecture to use a complete, concep-
- tually simple protection mechanism. Furthermore, each NTCB
- partition must also be so designed and structured.
-
- Significant system engineering should be directed
- toward minimizing the complexity of each NTCB partition, and
- of the NTCB. Care shall be taken to exclude modules (and
- components) that are not protection-critical from the NTCB.
-
- It is recognized that some modules and/or components
- may need to be included in the NTCB and must meet the NTCB
- requirements even though they may not appear to be directly
- protection-critical. The correct operation of these
- modules/components is necessary for the correct operation of
- the protection-critical modules and components. However,
- the number and size of these modules/components should be
- kept to a minimum.
-
- Each NTCB partition provides isolation of resources
- (within its component) in accord with the network system
- architecture and security policy so that "supporting ele-
- ments" (e.g., DAC and user identification) for the security
- mechanisms of the network system are strengthened compared
- to C2, from an assurance point of view, through the provi-
- sion of distinct address spaces under control of the NTCB.
-
- As discussed in the Discretionary Access Control sec-
- tion, the DAC mechanism of a NTCB partition may be imple-
- mented at the interface of the reference monitor or may be
- distributed in subjects that are part of the NTCB in the
- same or different component. When distributed in NTCB sub-
- jects (i.e., when outside the reference monitor), the
- assurance requirements for the design and implementation of
- the DAC shall be those of class C2 for all networks of class
- C2 or above.
-
- + Rationale
-
-
- The requirement that the NTCB be structured into
- modules and meet the hardware requirements applies within
- the NTCB partitions in the various components.
-
- The principle of least privilege requires that each
- user or other individual with access to the system be given
- only those resources and authorizations required for the
- performance of this job. In order to enfore this principle
- in the system it must be enforced in every NTCB partition
- that supports users or other individuals. For example,
- prohibiting access by administrators to objects outside the
- NTCB partition (e.g., games) lessens the opportunity of dam-
- age by a Trojan Horse.
-
- The requirement for the protection of communications
- between NTCB partitions is specifically directed to subjects
- that are part of the NTCB partitions. Any requirements for
- such protection for the subjects that are outside the NTCB
- partitions are addressed in response to the integrity
- requirements of the security policy.
-
- There are certain parts of a network (modules and/or
- components) that may not appear to be directly protection-
- critical in that they are not involved in access control
- decisions, do not directly audit, and are not involved in
- the identification/authentication process. However, the
- security of the network must depend on the correct operation
- of these modules and/or components. An example of this is a
- single level packet switch. Although it may not normally be
- involved directly in enforcing the discretionary security
- policy, this switch may be trusted not to mix data from dif-
- ferent message streams. If the switch does not operate
- correctly, data could get mixed, and unauthorized access
- could result. Therefore, these modules/components must be
- included in the NTCB and must meet the NTCB requirements
- applicable to the policy element(s) for which they are
- responsible.
-
-
- 4.1.3.1.2 System Integrity
-
- + Statement from DoD 5200.28-STD
-
- Hardware and/or software features shall be provided that can
- be used to periodically validate the correct operation of
- the on-site hardware and firmware elements of the TCB.
-
- + Interpretation
-
- Implementation of the requirement is partly achieved by
- having hardware and/or software features that can be used to
- periodically validate the correct operation of the hardware
- and firmware elements of each component's NTCB partition.
- Features shall also be provided to validate the identity and
- correct operation of a component prior to its incorporation
- in the network system and throughout system operation. For
- example, a protocol could be designed that enables the com-
- ponents of the partitioned NTCB to exchange messages period-
- ically and validate each other's correct response. The pro-
- tocol shall be able to determine the remote entity's ability
- to respond. NTCB partitions shall provide the capability to
- report to network administrative personnel the failures
- detected in other NTCB partitions.
-
- Intercomponent protocols implemented within a NTCB
- shall be designed in such a way as to provide correct opera-
- tion in the case of failures of network communications or
- individual components. The allocation of mandatory and dis-
- cretionary access control policy in a network may require
- communication between trusted subjects that are part of the
- NTCB partitions in different components. This communication
- is normally implemented with a protocol between the subjects
- as peer entities. Incorrect access within a component shall
- not result from failure of an NTCB partition to communicate
- with other components.
-
- + Rationale
-
- The first paragraph of the interpretation is a
- straightforward extension of the requirement into the con-
- text of a network system and partitioned NTCB as defined for
- these network criteria.
-
- NTCB protocols should be robust enough so that they
- permit the system to operate correctly in the case of local-
- ized failure. The purpose of this protection is to preserve
- the integrity of the NTCB itself. It is not unusual for one
- or more components in a network to be inoperative at any
- time, so it is important to minimize the effects of such
- failures on the rest of the network. Additional integrity
- and denial of service issues are addressed in Part II.
-
- It should be clear that some integrity and denial of
- service features can reside outside the NTCB. Otherwise all
- software in a network would be in the NTCB. Every piece of
- software that has an opportunity to write to some data or
- protocol field is "trusted" to preserve integrity or not
- cause denial of service to some extent. For example, it is
- necessary to "trust" TELNET to correctly translate user
- data, and to eventually transmit packets. FTP also has to
- be "trusted" to not inappropriately modify files, and to
- attempt to complete the file transfer. These protocols can
- be designed, however to exist outside the NTCB (from a pro-
- tection perspective). It is beneficial to do this type of
- security engineering so that the amount of code that must be
- trusted to not disclose data is minimized. Putting every-
- thing inside the NTCB contradicts the requirement to perform
- "significant system engineering ... directed toward ...
- excluding from the TCB modules that are not protection crit-
- ical," which removes the primary difference between B2 and
- B3. If everything has to be in the TCB to ensure data
- integrity and protection against denial of service, there
- will be considerably less assurance that disclosure protec-
- tion is maximized.
-
-
-
- 4.1.3.1.3 Covert Channel Analysis
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall conduct a thorough search for
- covert channels and make a determination (either by actual
- measurement or by engineering estimation) of the maximum
- bandwidth of each identified channel. (See the Covert Chan-
- nels Guideline section.) FORMAL METHODS SHALL BE USED IN THE
- ANALYSIS.
-
- + Interpretation
-
- The requirement, including the TCSEC Covert Channel
- Guideline, applies as written. In a network, there are
- additional instances of covert channels associated with com-
- munication between components. THE FORMAL METHODS SHALL BE
- USED IN THE ANALYSIS OF EACH INDIVIDUAL COMPONENT DESIGN AND
- IMPLEMENTATION.
-
- + Rationale
-
- The exploitation of network protocol information (e.g.,
- headers) can result in covert storage channels. Exploitation
- of frequency of transmission can result in covert timing
- channels. The topic has been addressed in the literature.-
-
-
-
- 4.1.3.1.4 Trusted Facility Management
-
- + Statement from DoD 5200.28-STD
-
- The TCB shall support separate operator and administrator
- functions. The functions performed in the role of a secu-
- rity administrator shall be identified. The ADP system
- administrative personnel shall only be able to perform secu-
- rity administrator functions after taking a distinct audit-
- able action to assume the security administrator role on the
- ADP system. Non-security functions that can be performed in
- the security administration role shall be limited strictly
- _________________________
- - See, for example, Girling, C. G., "Covert Channels
- in LAN's," IEEE Transactions on Software Engineering,
- ____ ____________ __ ________ ___________
- Vol. SE-13, No. 2, February 1987; and Padlipsky, M. A.,
- Snow, D. P., and Karger, P. A., Limitations of End-to-
- ___________ __ ___ __
- End Encryption in Secure Computer Networks, MITRE
- ___ __________ __ ______ ________ ________
- Technical Report, MTR-3592, Vol. I, May 1978 (ESD TR
- 78-158, DTIC AD A059221).
-
- to those essential to performing the security role effec-
- tively.
-
- + Interpretation
-
- This requirement applies as written to both the network
- as a whole and to individual components which support such
- personnel.
-
- + Rationale
-
- It is recognized that based on the allocated policy
- elements some components may operate with no human inter-
- face.
-
-
-
- 4.1.3.1.5 Trusted Recovery
-
- + Statement from DoD 5200.28-STD
-
- Procedures and/or mechanisms shall be provided to assure
- that, after an ADP system failure or other discontinuity,
- recovery without a protection compromise is obtained.
-
- + Interpretation
-
- The recovery process must be accomplished without a
- protection compromise after the failure or other discon-
- tinuity of any NTCB partition. It must also be accomplished
- after a failure of the entire NTCB.
-
- + Rationale
-
- This is a straight-forward extension of the requirement
- into the network context, and takes into account that it is
- possible for parts of the system to fail while other parts
- continue to operate normally. This may be a security-
- relevant event; if so it must be audited.
-
-
- 4.1.3.2 Life-Cycle Assurance
-
-
- 4.1.3.2.1 Security Testing
-
- + Statement from DoD 5200.28-STD
-
- The security mechanisms of the ADP system shall be tested
- and found to work as claimed in the system documentation. A
- team of individuals who thoroughly understand the specific
- implementation of the TCB shall subject its design documen-
- tation, source code, and object code to through analysis and
- testing. Their objectives shall be: to uncover all design
- and implementation flaws that would permit a subject exter-
- nal to the TCB to read, change, or delete data normally
- denied under the mandatory or discretionary security policy
- enforced by the TCB; as well as to assure that no subject
- (without authorization to do so) is able to cause the TCB to
- enter a state such that it is unable to respond to communi-
- cations initiated by other users. The TCB shall be found
- resistant to penetration. All discovered flaws shall be
- removed or neutralized and the TCB retested to demonstrate
- that they have been eliminated and that new flaws have not
- been introduced. Testing shall demonstrate that the TCB
- implementation is consistent with the descriptive top-level
- specification. No design flaws and no more than a few
- correctable implementation flaws may be found during testing
- and there shall be reasonable confidence that few remain.
- MANUAL OR OTHER MAPPING OF THE FTLS TO THE SOURCE CODE MAY
- FORM A BASIS FOR PENETRATION TESTING. (See the Security
- Testing Guidelines.)
-
- + Interpretation
-
- Testing of a component will require a testbed that
- exercises the interfaces and protocols of the component
- including tests under exceptional conditions. The testing
- of a security mechanism of the network system for meeting
- this criterion shall be an integrated testing procedure
- involving all components containing an NTCB partition that
- implement the given mechanism. This integrated testing is
- additional to any individual component tests involved in the
- evaluation of the network system. The sponsor should iden-
- tify the allowable set of configurations including the sizes
- of the networks. Analysis or testing procedures and tools
- shall be available to test the limits of these configura-
- tions. A change in configuration within the allowable set
- of configurations does not require retesting.
-
- The testing of each component will include the intro-
- duction of subjects external to the NTCB partition for the
- component that will attempt to read, change, or delete data
- normally denied. If the normal interface to the component
- does not provide a means to create the subjects needed to
- conduct such a test, then this portion of the testing shall
- use a special version of the untrusted software for the com-
- ponent that results in subjects that make such attempts.
- The results shall be saved for test analysis. Such special
- versions shall have an NTCB partition that is identical to
- that for the normal configuration of the component under
- evaluation.
-
- The testing of the mandatory controls shall include
- tests to demonstrate that the labels for information
- imported and/or exported to/from the component accurately
- represent the labels maintained by the NTCB partition for
- the component for use as the basis for its mandatory access
- control decisions. The tests shall include each type of
- device, whether single-level or multilevel, supported by the
- component.
-
- The NTCB must be found resistant to penetration. This
- applies to the NTCB as a whole, and to each NTCB partition
- in a component of this class.
-
- + Rationale
-
- The phrase "no subject (without authorization to do so)
- is able to cause the TCB to enter a state such that it is
- unable to respond to communications initiated by other
- users" relates to the security services (Part II of this
- TNI) for the Denial of Service problem, and to correctness
- of the protocol implementations.
-
- Testing is an important method available in this
- evaluation division to gain any assurance that the security
- mechanisms perform their intended function. A major purpose
- of testing is to demonstrate the system's response to inputs
- to the NTCB partition from untrusted (and possibly mali-
- cious) subjects.
-
- In contrast to general purpose systems that allow for
- the dynamic creation of new programs and the introductions
- of new processes (and hence new subjects) with user speci-
- fied security properities, many network components have no
- method for introducing new programs and/or processes during
- their normal operation. Therefore, the programs necessary
- for the testing must be introduced as special versions of
- the software rather than as the result of normal inputs by
- the test team. However, it must be insured that the NTCB
- partition used for such tests is identical to the one under
- evaluation.
-
- Sensitivity labels serve a critical role in maintaining
- the security of the mandatory access controls in the net-
- work. Especially important to network security is the role
- of the labels for information communicated between com-
- ponents - explicit labels for multilevel devices and impli-
- cit labels for single-level devices. Therefore the testing
- for correct labels is highlighted.
-
- The requirement for testing to demonstrate consistency
- between the NTCB implementation and the FTLS is a straight-
- forward extension of the TCSEC requirement into the context
- of a network system.
-
-
-
- 4.1.3.2.2 Design Specification and Verification
-
- + Statement from DoD 5200.28-STD
-
- A formal model of the security policy supported by the TCB
- shall be maintained over the life cycle of the ADP system
- that is proven and demonstrated to be consistent with its
- axioms. A descriptive top-level specification (DTLS) of the
- TCB shall be maintained that completely and accurately
- describes the TCB in terms of exceptions, error messages,
- and effects. A FORMAL TOP-LEVEL SPECIFICATION (FTLS) OF THE
- TCB SHALL BE MAINTAINED THAT ACCURATELY DESCRIBES THE TCB IN
- TERMS OF EXCEPTIONS, ERROR MESSAGES, AND EFFECTS. THE DTLS
- AND FTLS SHALL INCLUDE THOSE COMPONENTS OF THE TCB THAT ARE
- IMPLEMENTED AS HARDWARE AND/OR FIRMWARE IF THEIR PROPERTIES
- ARE VISIBLE AT THE TCB INTERFACE. THE FTLS SHALL BE SHOWN
- to be an accurate description of the TCB interface. A con-
- vincing argument shall be given that the DTLS is consistent
- with the model AND A COMBINATION OF FORMAL AND INFORMAL
- TECHNIQUES SHALL BE USED TO SHOW THAT THE FTLS IS CONSISTENT
- WITH THE MODEL. THIS VERIFICATION EVIDENCE SHALL BE CON-
- SISTENT WITH THAT PROVIDED WITHIN THE STATE-OF-THE-ART OF
- THE PARTICULAR NATIONAL COMPUTER SECURITY CENTER-ENDORSED
- FORMAL SPECIFICATION AND VERIFICATION SYSTEM USED. MANUAL
- OR OTHER MAPPING OF THE FTLS TO THE TCB SOURCE CODE SHALL BE
- PERFORMED TO PROVIDE EVIDENCE OF CORRECT IMPLEMENTATION.
-
- + Interpretation
-
- The overall network security policy expressed in this
- model will provide the basis for the mandatory access con-
- trol policy exercised by the NTCB over subjects and storage
- objects in the entire network. The policy will also be the
- basis for the discretionary access control policy exercised
- by the NTCB to control access of named users to named
- objects. Data integrity requirements addressing the effects
- of unauthorized MSM need not be included in this model. The
- overall network policy must be decomposed into policy ele-
- ments that are allocated to appropriate components and used
- as the basis for the security policy model for those com-
- ponents.
-
- The level of abstraction of the model, and the set of
- subjects and objects that are explicitly represented in the
- model, will be affected by the NTCB partitioning. Subjects
- and objects must be represented explicitly in the model for
- the partition if there is some network component whose NTCB
- partition exercises access control over them. The model
- shall be structured so that the axioms and entities applica-
- ble to individual network components are manifest. Global
- network policy elements that are allocated to components
- shall be represented by the model for that component.
-
- AN FTLS FOR A NETWORK CONSISTS OF A COMPONENT FTLS FOR
- EACH UNIQUE TRUSTED NETWORK COMPONENT, PLUS ANY GLOBAL
- DECLARATIONS AND ASSERTIONS THAT APPLY TO MORE THAN ONE COM-
- PONENT. IF THE MODEL FOR EACH COMPONENT REPRESENTS ALL THE
- GLOBAL MANDATORY POLICY ELEMENTS ALLOCATED TO THAT COM-
- PONENT, THERE MAY NOT BE ANY GLOBAL ASSERTIONS NEEDED, AND
- IN THIS CASE THE COLLECTION OF COMPONENT FTLS, WITH ANY
- SHARED DECLARATIONS, IS THE NETWORK FTLS. EACH COMPONENT
- FTLS SHALL DESCRIBE THE INTERFACE TO THE NTCB PARTITION OF
- ITS COMPONENTS. The requirements for a network DTLS are
- given in the Design Documentation section.
-
- + Rationale
-
- The treatment of the model depends to a great extent on
- the degree of integration of the communications service into
- a distributed system. In a closely coupled distributed sys-
- tem, one might use a model that closely resembles one
- appropriate for a stand-alone computer system.
-
- In all cases, the model of each partition will be
- expected to show the role of the NTCB partition in each kind
- of component. It will most likely clarify the model,
- although not part of the model, to show access restrictions
- implied by the system design; for example, subjects
- representing protocol entities might have access only to
- objects containing data units at the same layer of protocol.
- The allocation of subjects and objects to different proto-
- col layers is a protocol design choice which need not be
- reflected in the security policy model.
-
- THE FTLS MUST REPRESENT THE UNDERLYING REFERENCE MONI-
- TOR AND ANY SUBJECTS IMPLEMENTING THE MANDATORY POLICY.
- OTHER POLICY ELEMENTS DISTRIBUTED IN NTCB SUBJECTS (SEE THE
- INTERPRETATION OF SYSTEM ARCHITECTURE) NEED NOT BE
- REPRESENTED BY THE FTLS.
-
-
-
- 4.1.3.2.3 Configuration Management
-
- + Statement from DoD 5200.28-STD
-
- During THE ENTIRE LIFE-CYCLE, I.E. DURING THE DESIGN,
- DEVELOPMENT, and maintenance of the TCB, a configuration
- management system shall be in place FOR ALL SECURITY-
- RELEVANT HARDWARE, FIRMWARE, AND SOFTWARE that maintains
- control of changes to THE FORMAL MODEL, the descriptive AND
- FORMAL top-level SPECIFICATIONS, other design data, imple-
- mentation documentation, source code, the running version of
- the object code, and test fixtures and documentation. The
- configuration management system shall assure a consistent
- mapping among all documentation and code associated with the
- current version of the TCB. Tools shall be provided for
- generation of a new version of the TCB from source code.
- Also available shall be tools, MAINTAINED UNDER STRICT CON-
- FIGURATION CONTROL, for comparing a newly generated version
- with the previous TCB version in order to ascertain that
- only the intended changes have been made in the code that
- will actually be used as the new version of the TCB. A COM-
- BINATION OF TECHNICAL, PHYSICAL, AND PROCEDURAL SAFEGUARDS
- SHALL BE USED TO PROTECT FROM UNAUTHORIZED MODIFICATION OR
- DESTRUCTION THE MASTER COPY OR COPIES OF ALL MATERIAL USED
- TO GENERATE THE TCB.
-
- + Interpretation
-
- The requirement applies as written, with the following
- extensions:
-
- 1. A configuration management system must be in place
- for each NTCB partition.
-
- 2. A configuration management plan must exist for the
- entire system. If the configuration management sys-
- tem is made up of the conglomeration of the confi-
- guration management systems of the various NTCB par-
- titions, then the configuration management plan must
- address the issue of how configuration control is
- applied to the system as a whole.
-
- ALL MATERIAL USED IN GENERATING A NEW VERSION OF THE
- NTCB AND EACH NTCB PARTITION MUST BE PROTECTED, REGARDLESS
- OF WHERE IT PHYSICALLY RESIDES.
-
- + Rationale
-
- Each NTCB partition must have a configuration manage-
- ment system in place, or else there will be no way for the
- NTCB as a whole to have an effective configuration manage-
- ment system. The other extensions are merely reflections of
- the way that networks operate in practice.
-
- THIS NEW REQUIREMENT EXPLICITLY MANDATES THE PROTECTION
- OF MATERIAL USED TO GENERATE AN NTCB PARTITION, EVEN WHEN
- THE GENERATION OCCURS BY DOWN-LINE LOADING OF A REMOTE COM-
- PONENT.
-
-
-
-
- 4.1.3.2.4 Trusted Distribution
-
- + Statement from DoD 5200.28-STD
-
- A TRUSTED ADP SYSTEM CONTROL AND DISTRIBUTION FACILITY SHALL
- BE PROVIDED FOR MAINTAINING THE INTEGRITY OF THE MAPPING
- BETWEEN THE MASTER DATA DESCRIBING THE CURRENT VERSION OF
- THE TCB AND THE ON-SITE MASTER COPY OF THE CODE FOR THE
- CURRENT VERSION. PROCEDURES (E.G., SITE SECURITY ACCEPTANCE
- TESTING) SHALL EXIST FOR ASSURING THAT THE TCB SOFTWARE,
- FIRMWARE, AND HARDWARE UPDATES DISTRIBUTED TO A CUSTOMER ARE
- EXACTLY AS SPECIFIED BY THE MASTER COPIES.
-
- + Interpretation
-
- THIS REQUIREMENT APPLIES AS STATED, WITH THE ADDITIONAL
- REQUIREMENT THAT, IF DOWN-LINE LOADING IS USED, THERE MUST
- BE A TRUSTED METHOD OF GENERATING, SENDING, AND LOADING ANY
- SOFTWARE INVOLVED.
-
- + Rationale
-
- THIS IS A STRAIGHTFORWARD EXTENSION OF THE REQUIREMENT
- INTO THE NETWORK CONTEXT.
-
-
- 4.1.4 Documentation.
- _ _ _ _____________
-
-
- 4.1.4.1 Security Features User's Guide
-
- + Statement from DoD 5200.28-STD
-
- A single summary, chapter, or manual in user documentation
- shall describe the protection mechanisms provided by the
- TCB, interpretations on their use, and how they interact
- with one another.
-
- + Interpretation
-
- This user documentation describes user visible protec-
- tion mechanisms at the global (network system) level and at
- the user interface of each component, and the interaction
- among these.
-
- + Rationale
-
- The interpretation is an extension of the requirement
- into the context of a network system as defined for these
- network criteria. Documentation of protection mechanisms
- provided by individual components is required by the cri-
- teria for trusted computer systems that are applied as
- appropriate for the individual components.
-
-
- 4.1.4.2 Trusted Facility Manual
-
- + Statement from DoD 5200.28-STD
-
- A manual addressed to the ADP system administrator shall
- present cautions about functions and privileges that should
- be controlled when running a secure facility. The procedures
- for examining and maintaining the audit files as well as the
- detailed audit record structure for each type of audit event
- shall be given. The manual shall describe the operator and
- administrator functions related to security, to include
- changing the security characteristics of a user. It shall
- provide interpretations on the consistent and effective use
- of the protection features of the system, how they interact,
- how to securely generate a new TCB, and facility procedures,
- warnings, and privileges that need to be controlled in order
- to operate the facility in a secure manner. The TCB modules
- that contain the reference validation mechanism shall be
- identified. The procedures for secure generation of a new
- TCB from source after modification of any modules in the TCB
- shall be described. It shall include the procedures to
- ensure that the system is initially started in a secure
- manner. Procedures shall also be included to resume secure
- system operation after any lapse in system operation.
-
- + Interpretation
-
- This manual shall contain specifications and procedures
- to assist the system administrator(s) maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address the following:
-
- 1. The hardware configuration of the network itself;
-
- 2. The implications of attaching new components to the
- network;
-
- 3. The case where certain components may periodically
- leave the network (e.g., by crashing, or by being
- disconnected) and then rejoin;
-
- 4. Network configuration aspects that can impact the
- security of the network system; (For example, the
- manual should describe for the network system
- administrator the interconnections among components
- that are consistent with the overall network system
- architecture.)
-
- 5. Loading or modifying NTCB software or firmware
- (e.g., down-line loading).
-
- 6. Incremental updates; that is, it must explicitly
- indicate which components of the network may change
- without others also changing.
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- The components of the network that form the NTCB must
- be identified. Furthermore, the modules within an NTCB par-
- tition that contain the reference validation mechanism (if
- any) within that partition must be identified.
-
- The procedures for the secure generation of a new ver-
- sion (or copy) of each NTCB partition from source must be
- described. The procedures and requirements for the secure
- generation of the NTCB necessitated by changes in the net-
- work configuration shall be described.
-
- Procedures for starting each NTCB partition in a secure
- state shall be specified. Procedures must also be included
- to resume secure operation of each NTCB partition and/or the
- NTCB after any lapse in system or subsystem operation.
-
- + Rationale
-
- There may be multiple system administrators with
- diverse responsibilities. The technical security measures
- described by these criteria must be used in conjunction with
- other forms of security in order to achieve security of the
- network. Additional forms include administrative security,
- physical security, emanations security, etc.
-
- Extension of this criterion to cover configuration
- aspects of the network is needed because, for example,
- proper interconnection of components is typically essential
- to achieve a correct realization of the network architec-
- ture.
-
- As mentioned in the section on Label Integrity, cryp-
- tography is one common mechanism employed to protect commun-
- ication circuits. Encryption transforms the representation
- of information so that it is unintelligible to unauthorized
- subjects. Reflecting this transformation, the sensitivity
- of the ciphertext is generally lower than the cleartext. If
- encryption methodologies are employed, they shall be
- approved by the National Security Agency (NSA).
-
- The encryption algorithm and its implementation are
- outside the scope of these interpretations. This algorithm
- and implementation may be implemented in a separate device
- or may be a function of a subject in a component not dedi-
- cated to encryption. Without prejudice, either implementa-
- tion packaging is referred to as an encryption mechanism
- herein.
-
- The requirements for descriptions of NTCB generation
- and identification of modules and components that form the
- NTCB are straightforward extensions of the TCSEC require-
- ments into the network context. In those cases where the
- vendor does not provide source code, an acceptable procedure
- shall be to request the vendor to perform the secure genera-
- tion.
-
- Given the nature of network systems (e.g., various com-
- ponents tend to be down at different times, and the network
- system must continue operation without that component), it
- is imperative to know both how to securely start up an NTCB
- partition, and how to resume operation securely. It is also
- necessary to know how to resume secure operation of the NTCB
- after any partition has been down.
-
-
- 4.1.4.3 Test Documentation
-
- + Statement from DoD 5200.28-STD
-
- The system developer shall provide to the evaluators a docu-
- ment that describes the test plan, test procedures that show
- how the security mechanisms were tested, and results of the
- security mechanisms' functional testing. It shall include
- results of testing the effectiveness of the methods used to
- reduce covert channel bandwidths. THE RESULTS OF THE MAP-
- PING BETWEEN THE FORMAL TOP-LEVEL SPECIFICATION AND THE TCB
- SOURCE CODE SHALL BE GIVEN.
-
-
- + Interpretation
-
- The "system developer" is interpreted as "the network
- system sponsor". The description of the test plan should
- establish the context in which the testing was or should be
- conducted. The description should identify any additional
- test components that are not part of the system being
- evaluated. This includes a description of the test-relevant
- functions of such test components and a description of the
- interfacing of those test components to the system being
- evaluated. The description of the test plan should also
- demonstrate that the tests adequately cover the network
- security policy. The tests should include the features
- described in the System Architecture and the System
- Integrity sections. The tests should also include network
- configuration and sizing.
-
- THE MAPPING BETWEEN THE FTLS AND THE NTCB SOURCE CODE
- MUST BE CHECKED TO ENSURE TO THE EXTENT POSSIBLE THAT THE
- FTLS IS A CORRECT REPRESENTATION OF THE SOURCE CODE, AND
- THAT THE FTLS HAS BEEN STRICTLY ADHERED TO DURING THE DESIGN
- AND DEVELOPMENT OF THE NETWORK SYSTEM. THIS CHECK MUST BE
- DONE FOR EACH COMPONENT OF THE NETWORK SYSTEM FOR WHICH AN
- FTLS EXISTS.
-
- + Rationale
-
- The entity being evaluated may be a networking subsys-
- tem (see Appendix A) to which other components must be added
- to make a complete network system. In that case, this
- interpretation is extended to include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
- The bandwidths of covert channels are used to determine
- the suitability of a network system for a given environment.
- The effectiveness of the methods used to reduce these
- bandwidths must therefore be accurately determined.
-
-
- 4.1.4.4 Design Documentation
-
- + Statement from DoD 5200.28-STD
-
- Documentation shall be available that provides a description
- of the manufacturer's philosophy of protection and an expla-
- nation of how this philosophy is translated into the TCB.
- The interfaces between the TCB modules shall be described.
- A formal description of the security policy model enforced
- by the TCB shall be available and an explanation provided to
- show that it is sufficient to enforce the security policy.
- The specific TCB protection mechanisms shall be identified
- and an explanation given to show that they satisfy the
- model. The descriptive top-level specification (DTLS) shall
- be shown to be an accurate description of the TCB interface.
- Documentation shall describe how the TCB implements the
- reference monitor concept and give an explanation why it is
- tamper resistant, cannot be bypassed, and is correctly
- implemented. The TCB implementation (i.e., in hardware,
- firmware, and software) shall be informally shown to be con-
- sistent with the FORMAL TOP-LEVEL SPECIFICATION (FTLS). The
- elements of the FTLS shall be shown, using informal tech-
- niques, to correspond to the elements of the TCB. Documen-
- tation shall describe how the TCB is structured to facili-
- tate testing and to enforce least privilege. This documen-
- tation shall also present the results of the covert channel
- analysis and the tradeoffs involved in restricting the chan-
- nels. All auditable events that may be used in the exploi-
- tation of known covert storage channels shall be identified.
- The bandwidths of known covert storage channels, the use of
- which is not detectable by the auditing mechanisms, shall be
- provided. (See the Covert Channel Guideline section.)
- HARDWARE, FIRMWARE, AND SOFTWARE MECHANISMS NOT DEALT WITH
- IN THE FTLS BUT STRICTLY INTERNAL TO THE TCB (E.G., MAPPING
- REGISTERS, DIRECT MEMORY ACCESS I/O) SHALL BE CLEARLY
- DESCRIBED.
-
- + Interpretation
-
- Explanation of how the sponsor's philosophy of protec-
- tion is translated into the NTCB shall include a description
- of how the NTCB is partitioned. The security policy also
- shall be stated. The description of the interfaces between
- the NTCB modules shall include the interface(s) between NTCB
- partitions and modules within the partitions if the modules
- exist. The sponsor shall describe the security architecture
- and design, including the allocation of security require-
- ments among components.
-
- The documentation includes both a system description
- and a set of component DTLS's. The system description
- addresses the network security architecture and design by
- specifying the types of components in the network, which
- ones are trusted, and in what way they must cooperate to
- support network security objectives. A component DTLS shall
- be provided for each trusted network component, i.e., each
- component containing an NTCB partition. Each component DTLS
- shall describe the interface to the NTCB partition of its
- component. Both the system description and each component
- DTLS shall be shown consistent with those assertions in the
- model that apply to it. Appendix A addresses component
- evaluation issues.
-
- To show the correspondence between the FTLS and the
- NTCB implementation, it suffices to show correspondence
- between each component FTLS and the NTCB partition in that
- component.
-
- As stated in the introduction to Division B, the spon-
- sor must demonstrate that the NTCB employs the reference
- monitor concept. The security policy model must be a model
- for a reference monitor.
-
- The security policy model for each partition implement-
- ing a reference monitor shall fully represent the access
- control policy supported by the partition, including the
- discretionary and mandatory security policy for secrecy
- and/or integrity. For the mandatory policy the single domi-
- nance relation for sensitivity labels, including secrecy
- and/or integrity components, shall be precisely defined.
-
- + Rationale
-
- The interpretation is a straightforward extension of
- the requirement into the context of a network system as
- defined for this network interpretation. Other documenta-
- tion, such as description of components and description of
- operating environment(s) in which the networking subsystem
- or network system is designed to function, is required else-
- where, e.g., in the Trusted Facility Manual.
-
- In order to be evaluated, a network must possess a
- coherent Network Security Architecture and Design. (Inter-
- connection of components that do not adhere to such a single
- coherent Network Security Architecture is addressed in the
- Interconnection of Accredited AIS, Appendix C.) The Network
- Security Architecture must address the security-relevant
- policies, objectives, and protocols. The Network Security
- Design specifies the interfaces and services that must be
- incorporated into the network so that it can be evaluated as
- a trusted entity. There may be multiple designs that con-
- form to the same architecture but are more or less incompa-
- tible and non-interoperable (except through the Interconnec-
- tion Rules). Security related mechanisms requiring coopera-
- tion among components are specified in the design in terms
- of their visible interfaces; mechanisms having no visible
- interfaces are not specified in this document but are left
- as implementation decisions.
-
- The Network Security Architecture and Design must be
- available from the network sponsor before evaluation of the
- network, or any component, can be undertaken. The Network
- Security Architecture and Design must be sufficiently com-
- plete, unambiguous, and free from obvious flaws to permit
- the construction or assembly of a trusted network based on
- the structure it specifies.
-
- When a component is being designed or presented for
- evaluation, or when a network assembled from components is
- assembled or presented for evaluation, there must be a
- priori evidence that the Network security Architecture and
- Design are satisfied. That is, the components can be assem-
- bled into a network that conforms in every way with the Net-
- work Security Architecture and Design to produce a physical
- realization that is trusted to the extent that its evalua-
- tion indicates.
-
- In order for a trusted network to be constructed from
- components that can be built independently, the Network
- Security Architecture and Design must completely and
- unambiguously define the security functionality of com-
- ponents as well as the interfaces between or among com-
- ponents. The Network Security Architecture and Design must
- be evaluated to determine that a network constructed to its
- specifications will in fact be trusted, that is, it will be
- evaluatable under these interpretations.
-
-
- The term "model" is used in several different ways in a
- network context, e.g., a "protocol reference model," a "for-
- mal network model," etc. Only the "security policy model" is
- addressed by this requirement and is specifically intended
- to model the interface, viz., "security perimeter," of the
- reference monitor and must meet all the requirements defined
- in the TCSEC. It must be shown that all parts of the TCB
- are a valid interpretation of the security policy model,
- i.e., that there is no change to the secure state except as
- represented by the model.
-
-
- Part II: Other Security Services
- ____ __ _____ ________ ________
-
-
- 5. Introduction
- _ ____________
-
- Part I of this Interpretation contains interpretations
- of the Department of Defense Trusted Computer System Evalua-
- tion Criteria (TCSEC), DOD 5200.28-STD. Part I deals with
- controlling access to information. Part II contains addi-
- tional network security concerns. These concerns differen-
- tiate the network environment from the stand-alone computer.
- Some concerns take on increased significance in the network
- environment; other concerns do not exist on stand-alone com-
- puters. Some of these concerns are outside the scope of
- Part I; others lack the theoretical basis and formal
- analysis underlying Part I. The criteria in this Part II
- address these concerns in the form of additional security
- requirements that may vary among applications. Overlap
- between Part I and Part II is minimized as much as possible.
- However, when an overlap occurs the association between the
- concerns addressed in both parts is defined. Part II ser-
- vices may be provided by mechanisms outside the NTCB.
-
- 5.1. Purpose and Scope
- _ _ _______ ___ _____
-
- This Part II addresses network security disjoint from
- Part I. The rating derived in Part I is not effected by Part
- II. Every component or system must have a Part I evaluation
- as a basis for the Part II evaluation. Part II includes
- generic requirements, security features, and evaluation cri-
- teria. As described below, Part II evaluations differ from
- Part I. The purpose of these evaluations is similar, how-
- ever: to provide guidance to network managers and accredi-
- tors as to the reliance they can place in security services.
- These evaluations are input to the accreditor's decisions
- concerning the operational mode and range of sensitive
- information entrusted to the network.
-
- The network sponsor shall identify the security ser-
- vices offered by his system or component(s). Those services
- will be evaluated against the criteria for those services in
- Part II.
-
- 5.2. Criteria Form
- _ _ ________ ____
-
- The general form of Part II criteria is a relatively
- brief statement, followed by a discussion of functionality,
- strength of mechanism, and assurance, as appropriate.
-
- Functionality refers to the objective and approach of a
- _____________
- security service; it includes features, mechanism, and per-
- formance. Alternative approaches to achieving the desired
- functionality may be more suitable in different applications
- environments.
-
-
- Strength of mechanism refers to how well a specific
- ________ __ _________
- approach may be expected to achieve its objectives. In some
- cases selection of parameters, such as number of bits used
- in a checksum or the number of permutations used in an
- encryption algorithm, can significantly affect strength of
- mechanism.
-
- Assurance refers to a basis for believing that the
- _________
- functionality will be achieved; it includes tamper resis-
- tance, verifiability, and resistance against circumvention
- or bypass. Assurance is generally based on analysis involv-
- ing theory, testing, software engineering, validation and
- verification, and related approaches. The analysis may be
- formal or informal, theoretical or applied.
-
- For example, consider communications integrity protec-
- tion against message stream modification. A functionality
- decision is to select error detection only, or detection and
- correction; also one may select whether it is sufficient to
- detect an odd number of bit errors, error bursts of speci-
- fied duration, or a specified probability of an undetected
- error. Available mechanisms include parity, longitudinal
- redundancy check (LRC), cyclic redundancy check (CRC), and
- cryptographic checkfunction. The strength of the CRC is
- measured in the probability of an undetected error; this is
- dependent upon the number of bits employed in the CRC.
- There is no assurance of security associated with any of the
- mentioned mechanisms except cryptographic checkfunction.
- The algorithms are well known; an adversary could change
- message contents and recalculate the non-cryptographic
- checkfunction. The recipient would calculate the checkfunc-
- tion and not discover that the message had been manipulated.
- A cryptographic checkfunction would be resistant to such
- manipulation.
-
- 5.3. Evaluation Ratings
- _ _ __________ _______
-
- Part II evaluations are qualitative, as compared with
- the hierarchically-ordered ratings (e.g., C1, C2, ...)
- resulting from Part I. At present it is not considered pos-
- sible or desirable to employ the same ratings scale in Part
- II. The results of a Part II evaluation for offered services
- will generally be summarized using the terms none, minimum,
- ____ _______
- fair, and good. Services not offered by the sponsor will be
- ____ ____
- assigned a rating of not offered. For some services it will
- ___ _______
- be most meaningful to assign a rating of none or present.
- _______
- The term none is used when the security service is not
- offered. In some cases the functionality evaluations may be
- limited to present or none.
-
- The assurance rating for each service is bounded by the
- Part I or Appendix A evaluation as appropriate because the
- integrity of the service depends on the protection of the
- NTCB. Table II-1 relates the Part II assurance rating to
- the minimum corresponding Part I evaluation ratings.
-
- These Part II evaluations tend to be more qualitative
- and subjective, and will exhibit greater variance than the
- Part I evaluations. Nevertheless, Part II evaluations are
- valuable information concerning the capabilities of the
- evaluated systems and their suitability for specific appli-
- cations environments. If functionality, strength of mechan-
- ism, and assurance are separately evaluated then a term may
- be applied to each. In some cases the strength of mechanism
- may be expressed quantitatively as a natural consequence of
- the technology (e.g., the number of bits in a CRC, the par-
- ticular function employed); this quantitative measure of
- strength may be employed as the basis for rating.
-
- The Part II evaluations may also be expected to exhibit
- a greater sensitivity to technological advances than the
- Part I evaluations. This sensitivity derives from the
- present empirical basis of some of the Part II security ser-
- vices as compared to the theoretical foundation of Part I.
- Research advances may help change this situation. As the
- state-of-the-art advances, the threshold for high evalua-
- tions may also be expected to increase. Therefore, a rating
- may become dated and may change upon reevaluation.
-
- In general, mechanisms that only protect against
- accidents and malfunctions cannot achieve an evaluation of
- strength of mechanism above minimum. Mechanisms must pro-
- vide protection against deliberate attacks in order to
- obtain at least a good evaluation.
-
- The summary report of a network product will contain
- the rating reflecting the Part I evaluation plus a paired
- list of Part II services and the evaluation for each. For
- example, network product XYZ might be rated as follows: [B2,
- security service-1: minimum, security service-2: not
- offered, security service-3: none, ... ,security service-n:
- (functionality: good, strength of mechanism: fair,
- assurance: good)]. In some cases where the security service
- is addressed outside this document (e.g., COMSEC), the
- evaluation from the external source may be reflected in the
- evaluation report. In such cases, the terms used will
- differ from those listed above.
-
- 5.4. Relationship to ISO OSI-Architecture
- _ _ ____________ __ ___ ___ ____________
-
- An effort is underway to extend the ISO Open System
- Interconnection (OSI) architecture by defining "general
- security-related architectural elements which can be applied
- appropriately in the circumstances for which protection of
- communications between open systems is required." - Fami-
- liarity with OSI terminology is assumed in this discussion.
- The scope of this security addendum "provides a general
- description of security services and related mechanisms,
- _________________________
- - ISO 7498/Part 2 - Security Architecture, ISO / TC
- ___ ____ ____ _ ________ ____________
- 97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
- Project 97.21.18, September 1986.
-
-
-
- which may be provided by the Reference Model; and defines
- the positions within the Reference Model where the services
- and mechanisms may be provided."
-
- There is considerable overlap between the OSI Security
- Addendum and Part II. At the time of writing, the OSI docu-
- ment is evolving, making it difficult to exactly define the
- relationship. Therefore, the following statements may have
- to be modified in the future.
-
- Some of the security services identified in the OSI
- Security Addendum are covered by Part I of this Interpreta-
- tion; others are addressed in Part II. The emphasis is on
- making sure that all services are covered. The distinction
- between the security service and the mechanism that imple-
- ments the service is less strong in this Interpretation than
- in the OSI Security Addendum. The OSI Addendum generally
- addresses Functionality, occasionally addresses Strength of
- Mechanism, and rarely addresses Assurance, while in this
- Interpretation, especially in Part I, assurance is a major
- factor.
-
- The scope of the OSI Security Addendum is limited: "OSI
- Security is not concerned with security measures needed in
- end systems, installations and organizations except where
- these have implications on the choice and position of secu-
- rity services visible in OSI." The TCSEC and this Interpre-
- tation include OSI concerns as a proper subset.
-
- 5.5. Selecting Security Services for a Specific Environment
- _ _ _________ ________ ________ ___ _ ________ ___________
-
- The enumeration of security services in Part II is
- representative of those services that an organization may
- choose to employ in a specific network for a specific
- environment. But not all security services will be equally
- important in a specific environment, nor will their relative
- importance be the same among different environments. The
- network management has to decide whether the rating achieved
- by a network product for a specific criterion is satisfac-
- tory for the application environment.
-
- As an abstract example, consider the network product
- XYZ which has received the rating [B2, security service-1:
- minimum, security service-2: not offered, ... ]. The
- management of network K may decide that they do not require
- security service-2, so the absence of this service does not
- effect the acceptability of the XYZ product; however, the
- management of network Q may decide that security service-2
- is essential, so the absence of this service disqualifies
- product XYZ. The management of network P may decide secu-
- rity service-1 is very important and that any rating less
- than good is unacceptable, thereby disqualifying product
- XYZ; while the management of network R may decide that secu-
- rity service-1 need only be rated minimum.
-
- As a more concrete example, consider an application
- environment where wire-tapping is not a threat, such as
- aboard an airplane or in an underground bunker. A Local
- Area Network (LAN) in such an environment can be physically
- protected to the system-high security mode without encryp-
- tion because the system exists within a protected perimeter.
- In such environments, management may decide that labeling
- and access control based on labels provide sufficient pro-
- tection if sufficient mechanisms exist to protect the
- integrity of the labels. Cryptographic mechanisms are
- deemed unnecessary. By way of contrast, when the LAN
- environment involves passage through unprotected space,
- management may decide that a LAN must provide integrity pro-
- tection employing a cryptographic mechanism.
-
-
-
- 6. General Assurance Approaches
- _ _______ _________ __________
-
- This section addresses assurance approaches applicable
- to many security services.
-
- The logic of the protocols and the implementation of
- countermeasures may be shown correct and effective by formal
- methods where possible (i.e., where tools exist) and infor-
- mal ones otherwise.
-
- To provide assurance that the security service can
- respond to various forms of external attacks, various
- methods of real and simulated testing can be applied,
- including:
-
-
- 1. Functional testing
-
-
- 2. Periodic testing
-
-
- 3. Penetration testing
-
-
- 4. Stress testing
-
-
- 5. Protocol testing for deadlock, liveness, and other
- security properties of the protocol suites
-
- In addition, the trusted computer base provides an exe-
- cution environment that is extremely valuable in enhancing
- the assurance of a variety of security services. The dis-
- cretionary and mandatory access controls can be employed in
- the design and implementation of these services to segregate
- unrelated services. Thus, service implementation that is
- complex and error-prone or obtained from an unevaluated sup-
- plier can be prevented from degrading the assurance of other
- services implemented in the same component. Furthermore, a
- TCB ensures that the basic protection of the security and
- integrity- of the information entrusted to the network is
- not diluted by various supporting security services identi-
- fied in this Part II. See also the discussion of Integrity
- in the Supportive Primitives section.
-
- In general, assurance may be provided by implementing
- these features in a limited set of subjects in each applica-
- ble NTCB partition whose code and data have a unique manda-
- tory integrity level to protect against circumvention and
- tampering.
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Computer Systems," ESD-TR-76-372, MTR-
- 3153, The MITRE Corporation, Bedford, MA, April 1977.
-
- Assurance of trustworthiness of the design and imple-
- mentation of Part II mechanisms may be related to the
- assurance requirements in Part I. The following factors are
- identified as contributing to an assurance evaluation: ser-
- vice design and implementation, service testing, design
- specification and verification, configuration management,
- and distribution.
-
- 6.1. Service Design and Implementation Factors
- _ _ _______ ______ ___ ______________ _______
-
- An evaluation rating of fair indicates that the imple-
- mentation of the service employs the provisions of the TCB
- for a distinct address space. In addition, the implementa-
- tion of the service is internally structured into well-
- defined largely independent modules; makes effective use of
- available hardware to separate those elements that are
- protection-critical to the service from those that are not;
- is designed such that the principle of least privilege is
- enforced; and the user interface is completely defined and
- all elements relevant to the service are identified.
-
- An evaluation rating of good indicates that the ser-
- vice, in addition, incorporates significant use of layering,
- abstraction and data hiding; and employs significant system
- engineering directed toward minimizing complexity and
- separating modules that are critical to the service.
-
- 6.2. Service Testing Factors
- _ _ _______ _______ _______
-
- With respect to security testing, an evaluation of
- minimum indicates that the service was tested and found to
- work as claimed in the system documentation; that testing
- was done to assure that there are no obvious ways for an
- unauthorized user to bypass or otherwise defeat the security
- constraints and objectives; and that testing included a
- search for obvious flaws that would allow inconsistent or
- improper modification of data used by the service, either by
- external software or by errors in the implementation of the
- service.
-
- An evaluation rating of fair indicates that, in addi-
- tion to the minimum factors, a team of individuals who
- thoroughly understand the specific implementation subjected
- its design documentation, source code, and object code to
- through analysis and testing with the objectives of uncover-
- ing all design and implementation flaws that would permit a
- subject external to the NTCB to defeat the purposes of the
- service. A fair system is relatively resistant to defeat of
- the purpose of the service. A fair evaluation indicates
- that all discovered flaws were removed or neutralized and
- the system retested to demonstrate that they have been elim-
- inated and that new flaws have not been introduced. Testing
- demonstrates that the service implementation is consistent
- with the specification.
-
- An evaluation rating of good indicates that, in addi-
- tion to the fair factors, the system is more resistant to
- defeat of service; and that no design flaws and no more than
- a few correctable implementation flaws were found during
- testing and there is reasonable confidence that few remain.
- Manual or other mapping of the specifications to the source
- code may form a basis for testing.
-
- 6.3. Design Specification and Verification Factors
- _ _ ______ _____________ ___ ____________ _______
-
- With respect to design specification and verification,
- an evaluation rating of minimum indicates that an informal
- model of the properties of the service is maintained over
- the life cycle of the system. Additional requirements for
- an evaluation rating of fair have not been defined.
-
- An evaluation rating of good indicates that, in addi-
- tion, a formal model of the properties of the service is
- maintained over the life cycle of the system and demon-
- strated to be consistent with its axioms; and that a
- descriptive specification of the service-relevant code is
- maintained that completely and accurately describes it in
- terms of exceptions, error messages, and effects.
-
- 6.4. Configuration Management Factors
- _ _ _____________ __________ _______
-
- With respect to configuration management, an evaluation
- rating of minimum indicates that during development and
- maintenance of the service, a configuration management sys-
- tem was in place that maintained control of changes to
- specifications, other design data, implementation documenta-
- tion, source code, the running version of the object code,
- test fixtures, test code, and documentation.
-
- An evaluation rating of fair indicates that, in addi-
- tion, the configuration management system assures a con-
- sistent mapping among all documentation and code associated
- with the current version of the system; and for comparing a
- newly generated version with the previous version in order
- to ascertain that only the intended changes have been made
- in the code.
-
- An evaluation rating of good indicates that, in addi-
- tion, configuration management covers the entire life-
- cycle; that it applies to all firmware, and hardware that
- supports the service; and that a combinations of technical,
- physical, and procedural safeguards are used to protect from
- unauthorized modification or destruction the master copy or
- copies of all material used to generate the implementation
- of the service.
-
- 6.5. Distribution Factors
- _ _ ____________ _______
-
- There are currently no requirements for minimum and
- fair evaluation ratings.
-
- With respect to distribution, an evaluation rating of
- good indicates that a control and distribution facility is
- provided for maintaining the integrity of the mapping
- between the master data describing the current version of
- the service and the master copy of the code for the current
- version. Procedures (e.g., site security acceptance test-
- ing) shall exist for assuring that the software, firmware,
- and hardware updates distributed are exactly as specified by
- the master copies.
-
- 7. Supportive Primitives
- _ __________ __________
-
- This subsection describes mechanisms and assurance
- techniques that apply across multiple security services.
- They are grouped together here for convenience and are
- referenced in the appropriate service subsections of Section
- 8.
-
- Encryption is a pervasive mechanism for many security
- services; protocols are of fundamental essence in networks.
- The information in this Section 7 is provided as background
- and support for the services addressed in Section 8.
-
- 7.1. The Encryption Mechanism
- _ _ ___ __________ _________
-
- 7.1.1. Functionality Factors
- _ _ _ _____________ _______
-
- Encryption is a tool for protecting data from comprom-
- ise or modification attacks. Through its use, release of
- message content and traffic analysis can be prevented; mes-
- sage stream modification, some denial of message service,
- and masquerading can be detected. For example, an ISO docu-
- ment-, describing the use of encipherment techniques in com-
- munications architectures, has been published as a U.S.
- member body contribution for consideration as cryptographic
- security protection in the Open System Interconnection
- environment. Encryption is probably the most important and
- widely used security mechanism when there is a wiretap
- threat; sometimes it is even confused with being a service.
-
- Use of the encryption mechanism leads to a requirement
- for key management (e.g., manually or in the form of key
- distribution protocols and key-distribution centers.)
-
- 7.1.2. Strength of Mechanism Factors
- _ _ _ ________ __ _________ _______
-
-
- The strength of a cryptographic cipher is determined by
- mathematical and statistical analysis; the results are typi-
- cally expressed in the workfunction required for unauthor-
- ized decryption. In many cases this analysis is classified;
- the results are available only as a statement of the highest
- level of classified data which may be protected by use of
- the mechanism.
-
- When encryption is used in networks, it may be combined
- with network protocols to protect against disclosure. The
- strength of the ciphers, the correctness of the protocol
- logic, and the adequacy of implementation, are primary fac-
- tors in assessing the strength of Data Confidentiality using
- _________________________
- - Addendum to the Transport Layer Protocol Definition
- ________ __ ___ _________ _____ ________ __________
- for Providing Connection Oriented End-to-End Crypto-
- ___ _________ __________ ________ ___ __ ___ ______
- graphic Data Protection Using A 64-bit Block Cipher,
- _______ ____ __________ _____ _ __ ___ _____ ______
- ISO TC 97 / SC 20 / WG 3, N 37, January 10, 1986.
-
-
- cryptography techniques. Algorithms are characterized by
- the National Security Agency on a pass/fail basis in terms
- of the sensitivity of the information which the encryption
- algorithm is approved to protect.
-
-
- 7.1.3. Assurance Factors
- _ _ _ _________ _______
-
- The analysis of encryption techniques is quite dif-
- ferent from the formal specification and verification tech-
- nology employed as the basis of trust in the TCSEC. Much of
- this analysis is classified. Consequently, assurance of
- encryption techniques will be provided by the National Secu-
- rity Agency. Normally, a separate assurance rating will not
- be given.
-
- 7.2. Protocols
- _ _ _________
-
- 7.2.1. Functionality Factors
- _ _ _ _____________ _______
-
- Protocols are a set of rules and formats (semantic and
- syntactic) that determine the communication behavior between
- entities in a network. Their design and implementation is
- crucial to the correct, efficient, and effective transfer of
- information among network systems and sub-systems.
-
- Many network security services are implemented with the
- help of protocols, and failures and deficiencies in the pro-
- tocol result in failures and deficiencies in the security
- service supported by the protocol.
-
- One class of design, or logical, deficiencies in proto-
- cols are those having some form of denial of service as a
- consequence. This class includes deadlocks, livelocks,
- unspecified receptions, lack-of-liveness, and non-executable
- interactions. A protocol with one of these design flaws can
- cease to function under circumstances that can occur during
- normal operation but which were not anticipated by the
- designer. Such flaws result in trapping the protocol into
- states that are nonproductive or which cause the protocol to
- halt or have unpredictable effects.
-
- Another class of design concerns are typical of proto-
- cols that must work despite various kinds of random
- interference or communication difficulties, such as noise,
- message loss, and message reordering. It should be noted
- that most networks are designed in a layered fashion, in
- which each protocol-based service is implemented by invoking
- services available from the next lower layer. This means
- that if one layer provides protection from certain types of
- communication difficulties, higher layers need not address
- those problems in their design.
-
- A third class of design deficiency might occur in pro-
- tocols that are expected to work in the presence of mali-
- cious interference, such as active wiretapping. Such proto-
- cols should have countermeasures against Message Stream
-
- Modification (MSM) attacks.
-
- 7.2.2. Strength of Mechanism Factors
- _ _ _ ________ __ _________ _______
-
- Protocol deficiencies may lie either in their design or
- their implementation. By an implementation deficiency is
- meant a lack of correspondence between a protocol specifica-
- tion and its implementation in software.
-
- 7.2.3. Assurance Factors
- _ _ _ _________ _______
-
- Assurances of implementation correctness may be
- addressed by techniques such as design specification and
- verification, and testing.
-
- Ideally, all of the network protocol functions would be
- verified to operate correctly. However, verification of
- large amounts of code is prohibitively expensive (if not
- impossible) at the current state-of-the-art, so the code to
- be verified must be kept to an absolute minimum. It seems
- feasible to split up a complex protocol (e.g., the TCP) into
- trusted portions (i.e., the software that performs
- security-related functions) and untrusted portions (i.e.,
- other software) so that only the security-related portions
- must be shown to meet the requirements of Part I. However,
- there is a general concern about the extent to which trusted
- portions of protocols can be identified and protected from
- untrusted portions.
-
- Methods for assuring the design correctness of proto-
- cols involve the use of tools and techniques specially
- oriented toward the kinds of problems peculiar to protocols.
- Either formal methods, or testing, or both, may be used.
-
- Some assurance in design correctness may be obtained
- simply by basing the protocol design on a well-understood
- model or technique found in the literature if it is known to
- address the kinds of problems likely to arise. This
- assurance is lessened to the extent that the actual protocol
- differs from the published version.
-
- 7.2.3.1. Formal Methods
- _ _ _ _ ______ _______
-
- Formal techniques of protocol definition and validation
- have advanced to the point that they may be applied to
- actual protocols to verify the absence of deadlocks,
- livelocks, and incompleteness for design verification. When
- the state-of-the-art of formal tools is inadequate, or when
- the sponsor decides not to employ formal tools, informal
- methods may be used. The evaluation of protocol specifica-
- tion and verification should indicate which assurance tools
- have been employed.
-
- Formal methods for protocol specification and verifica-
- tion are typically based on a finite-state machine concept,
- extended in one of various ways to represent the concurrency
- and communication properties characteristic of networks.
- Communicating sequential machines and Petri nets have been
- used as a functional modeling context for protocols, and
- experimental automated verification tools based on these
- models have been developed. Different models and tools may
- need to be used depending on the design objective for which
- assurance is desired.
-
- To the extent that the protocol model and implementa-
- tion permit separation by layers, the functional model,
- proofs, demonstration, and arguments may optionally be
- applied to individual layers or sets of adjacent layers.
- Generally, the assurances obtained about protocols in one
- layer are conditional on, or relative to, assurances for
- protocols in lower layers.
-
- 7.2.3.2. Testing
- _ _ _ _ _______
-
- Protocol testing is another method to assure the
- correctness of the protocols other than formal verification.
- Protocol testing has been employed to certify implementation
- conformance to standards such as X.25, TCP, and TP4 with a
- moderate level of success.
-
- The type of testing called for can be referred to as
- conformance testing and penetration testing. The purpose of
- performing these tests is to obtain a moderate level of con-
- fidence on the correct operation of the protocols.
-
- Objectives should be to uncover design and implementa-
- tion flaws that would cause the protocols to perform their
- functions incorrectly, and to determine if the Message
- Stream Modification (MSM) countermeasures are effective, if
- applicable. They may attempt to uncover all kinds of logi-
- cal deficiencies, such as deadlocks, livelocks, unspecified
- receptions, lack-of-liveness, and non-executable interac-
- tions. All discovered flaws should be corrected and the
- implementations retested to demonstrate that they have been
- eliminated and that new flaws have not been introduced. For
- a successful conclusion to a test suite, no design flaws and
- no more than a few correctable implementation flaws may be
- found during testing, and there should be reasonable confi-
- dence that few remain. Manual or other mapping of the pro-
- tocol specification to the source code may form a basis for
- testing.
-
- Protocols should be thoroughly analyzed and tested for
- their responses to both normal and abnormal data type mes-
- sages. Testing must be done for both normal and degraded
- mode of operation both in controlled environment and in the
- environment of deployment.
-
- 8. Documentation
- _ _____________
-
- The section headings in these Part II Documentation
- criteria are the same as those employed for Part I Documen-
- tation criteria. The documentation produced in response to
- both sets of criteria may optionally be combined or pub-
- lished separately, as the sponsor sees fit.
-
- 8.1. Security Features User's Guide
- _ _ ________ ________ ____ _ _____
-
- A single summary, chapter, or manual in user documenta-
- tion shall describe the Part II security services, guide-
- lines on their use, and how they interact with one another.
-
- This user documentation describes security services at
- the global (network system) level, at the user interface of
- each component, and the interaction among these.
-
- 8.2. Trusted Facility Manual
- _ _ _______ ________ ______
-
- A manual addressed to the network and component sub-
- system administrator shall present cautions about functions
- and privileges that should be controlled to maintain network
- security. The manual shall describe the operator and
- administrator functions related to security services. It
- shall provide guidelines on the consistent and effective use
- of the network security services, how they interact, and
- facility procedures, warnings, and privileges that need to
- be controlled in order to maintain network security.
-
- The software modules that provide security services
- shall be identified. The procedures for secure generation
- of new security service object modules from source after
- modification of source code shall be described. It shall
- include the procedures, if any, required to ensure that the
- network is initially started in a secure manner. Procedures
- shall also be included to resume secure system operation
- after any lapse in operation.
-
- This manual shall contain specifications and procedures
- to assist the system administrator to maintain cognizance of
- the network configuration. These specifications and pro-
- cedures shall address:
-
- 1. The implications of attaching new components to the
- network.
-
- 2. The case where certain components may periodically
- leave the network (e.g., by crashing or by being
- disconnected) and then rejoin.
-
- 3. Incremental updates; that is, it must explicitly
- indicate which security services may change without
- others also changing.
-
- The physical and administrative environmental controls
- shall be specified. Any assumptions about security of a
- given network should be clearly stated (e.g., the fact that
- all communications links must be physically protected to a
- certain level).
-
- 8.3. Test Documentation
- _ _ ____ _____________
-
- A document shall be provided that describes the test
- plan and test procedures that show how the security services
- were tested, and results of the security services' func-
- tional testing.
-
- The description of the test plan should establish the
- context in which the testing was or should be conducted.
- The description should identify any additional test com-
- ponents that are not part of the system being evaluated.
- This includes a description of the test-relevant functions
- of such test components, and a description of the interfac-
- ing of those test components to the system being evaluated.
- The description of the test plan should also demonstrate
- that the tests adequately cover the network security policy.
- The tests should also include network configuration and siz-
- ing.
-
- As identified in Appendix A, the entity being evaluated
- may be a networking subsystem to which other components must
- be added to make a complete network system. In that case,
- test documentation must include contextual definition
- because, at evaluation time, it is not possible to validate
- the test plans without the description of the context for
- testing the networking subsystem.
-
- 8.4. Design Documentation
- _ _ ______ _____________
-
- Documentation shall be available that provides a
- description of the network philosophy of protection and an
- explanation of how this philosophy is translated into the
- security services offered. The interfaces between security
- services shall be described. The security policy also shall
- be stated.
-
- The system description addresses the network security
- architecture and design by specifying the security services
- in the network, and in what way they must cooperate to sup-
- port network security objectives. If a network supports a
- set of security policies and permits components with dif-
- ferent policies to communicate, the relationships between
- the policies shall be defined.
-
- 9. Specific Security Services
- _ ________ ________ ________
-
- This section contains specific security services that
- may be provided in networks. The structure of the specific
- security services in the balance of Part II is represented
- in Table II-2. This table shows the network security con-
- cerns addressed, the criteria for each concern, and the
- evaluation range for each criterion.
-
- 9.1. Communications Integrity
- _ _ ______________ _________
-
- Communications integrity is a collective term for a
- number of security services. These services, described
- below, are all concerned with the accuracy, faithfulness,
- non-corruptibility, and believability of information
- transfer between peer entities through the computer communi-
- cations network.
-
- Integrity is an important issue. However, there is
- considerable confusion and inconsistency in the use of the
- term. The term is used to address matters such as con-
- sistency, accuracy, concurrency, and data recovery, modifi-
- cation access control (write, append, delete, update) and
- the credibility of information that is read by a process.-
-
- The mechanisms that can be used to enforce communica-
- tion integrity have some strong similarities to the mechan-
- isms that are used to enforce discretionary and mandatory
- access controls. Integrity in Part I is concerned with
- access control, specifically the ability of subjects to
- modify objects. This should be contrasted with the Part II
- concerns for communications integrity described below.
-
- 9.1.1. Authentication
- _ _ _ ______________
-
- + Functionality
- _____________
-
- The network should ensure that a data exchange is esta-
- blished with the addressed peer entity (and not with an
- entity attempting a masquerade or a replay of a previous
- establishment). The network should assure that the data
- source is the one claimed. When this service is provided in
- support of a connection-oriented association, it is known as
- Peer Entity Authentication; when it supports a connection-
- less association, it is known as Data Origin Authentication.
-
- Attempts to create a session under a false identity or
- playing back a previous legitimate session initiation
- sequence are typical threats for which peer entity
- _________________________
- - See, for example, Biba, K.J., "Integrity Considera-
- tion for Secure Systems," ESD-TR-76-372, MTR-3153, The
- Mitre Corporation, Bedford, MA, April 1977; and Juene-
- man, R. R., "Electronic Document Authentication," IEEE
- ____
- Network Magazine, April 1987, pp 17-23.
- _______ ________
-
-
- authentication is an appropriate countermeasure.
-
- Authentication generally follows identification, estab-
- lishing the validity of the claimed identity providing pro-
- tection against fraudulent transactions. Identification,
- authentication, and authorization information (e.g., pass-
- words) should be protected by the network.
-
- Available techniques which may be applied to peer
- authentication mechanisms are:
-
- 1. Something known by the entity (e.g., passwords)
-
- 2. Cryptographic means
-
- 3. Use of the characteristics and/or possessions of
- the entity
-
- The above mechanisms may be incorporated into the (N)-
- layer peer-to-peer protocol to provide peer entity authenti-
- cation.
-
- To tie data to a specific origin, implicit or explicit
- identification information must be derived and associated
- with data. Ad hoc methods exist for authentication which
- may include verification through an alternate communications
- channel, or a user-unique cryptographic authentication.
-
- When encryption is used for authentication service, it
- can be provided by encipherment or signature mechanisms. In
- conventional private-key cryptosystems, the encryption of a
- message with a secret key automatically implies data origin
- authenticity, because only the holder of that key can pro-
- duce an encrypted form of a message. However, the kind of
- authentication provided by the conventional private-key
- cryptosystem can protect both sender and receiver against
- third party enemies, but it cannot protect against fraud
- committed by the other. The reason is that the receiver
- knowing the encryption key, could generate the encrypted
- form of a message and forge messages appearing to come from
- the sender. In the case where possible disputes that may
- arise from the dishonesty of either sender or receiver, a
- digital signature scheme is required.
-
- In public-key cryptosystems, message secrecy and
- message/sender authenticity are functionally independent.
- To achieve authenticity, the message is "decrypted" with the
- secret key of the sender to provide proof of its origin, but
- that does not conceal the message. If both secrecy and
- authenticity are required, a public-key signature scheme
- must be used. This subject is extensively addressed in the
- ISO/CCITT context of Directory authentication=.
- _________________________
- = The Directory - Authentication Framework (Mel-
- ___ _________ ______________ _________ ___
- bourne, April 1986), ISO/CCITT Directory Convergence
- ______ _____ ____
- Document #3.
-
-
-
- Basis for Rating: Presence or absence.
-
- Evaluation Range: None or present.
-
- + Strength of Mechanism
- ________ __ _________
-
- The security provided by the passwords mechanism is
- very sensitive to how passwords are selected and protected.
- The security provided by a password depends on composition,
- lifetime, length, and protection from disclosure and substi-
- tution. Password Management Guidance is contained in a
- separate document-.
-
- When cryptographic techniques are used, they may be
- combined with "hand-shaking" protocols and "liveness"
- assurance procedures to protect against masquerading and
- replay. The "liveness" assurance procedures may be provided
- by:
-
- 1. Synchronized clocks
-
- 2. Two and three ways handshakes
-
- 3. Non-repudiation services provided by digital sig-
- nature and/or notarization mechanisms
-
- The strength of the ciphers, the correctness of the
- protocol logic, and the adequacy of implementation are three
- primary factors in assessing the strength of authentication
- using cryptography techniques. See also the Encryption
- Mechanism section.
-
- Basis for Rating: In order to obtain a rating of good
- using passwords, such usage must conform to Password Manage-
- ment Guidance-. The strength of a cryptographic mechanism
- will be provided by the National Security Agency.
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Basis for rating assurance is concerned with guarantee-
- ing or providing confidence that features to address authen-
- tication threats have been implemented correctly and that
- the control objectives of each feature have been actually
- and accurately achieved.
-
- This assurance may be addressed by analysis of the
- strength of the authentication exchange mechanism. This
- includes password scheme and/or cryptographic algorithm
- analysis and the automated protocol testing for deadlock,
- _________________________
- - Department of Defense Password Management Guide-
- __________ __ _______ ________ __________ _____
- line, National Computer Security Center, CSC-STD-002-
- ____
- 85, 12 April 1985.
-
-
-
- liveness, and other security properties of the "hand-
- shaking" protocols.
-
- Many of the assurance approaches are common to other
- security services. See the General Assurance Approaches
- section for further information. Cryptographic mechanisms
- may be employed for peer entity authentication. These
- mechanisms, and their assurance, are discussed in a separate
- section.
-
- Basis for Rating: See the General Assurance Approaches
- section.
-
- Evaluation Range: None to good.
-
-
- 9.1.2. Communications Field Integrity
- _ _ _ ______________ _____ _________
-
- Communications Field Integrity refers to protection of
- any of the fields involved in communications from unauthor-
- ized modification. Two well-known fields are the protocol-
- information (a.k.a. header) field and the user-data field.
- A protocol-data-unit (PDU) (a.k.a. packet, datagram) always
- contains protocol-information; user-data is optional.
-
- Other division and identification of fields are possi-
- ble. Some communications systems identify such fields as
- control and priority. For generality, this section refers
- to any field as containing data; this data may in fact be
- protocol-information or the contents of some other identi-
- fied field. For convenience, the term data integrity will
- be used synonymously with communications field integrity.
- Data integrity may be provided on a selective field basis;
- some selection may be made by the network architect, some
- selection may be made by the network administration, and
- some may be left to the user.
-
- It should be mentioned that in a layered protocol the
- combination of layer N protocol-information plus layer N
- user-data is considered to be all user-data in layer N-1.
- It is also important to note the definition of a message and
- the relationship between PDUs and messages. Each PDU may
- constitute an independent message, or a sequence of PDUs may
- constitute a single message.
-
- + Functionality
- _____________
-
- Data integrity service counters active threats and pro-
- tects data against unauthorized alteration. The network
- should ensure that information is accurately transmitted
- from source to destination (regardless of the number of
- intermittent connecting points). The network should be able
- to counter both equipment failure as well as actions by per-
- sons and processes not authorized to alter the data. Proto-
- cols that perform code or format conversion will preserve
- the integrity of data and control information.
-
- The network should also have an automated capability of
- testing for, detecting, and reporting errors that exceed a
- threshold.
-
- Since communication may be subject to jamming/spoofing
- attack, line and node outages, hardware and software
- failures, and active wiretapping attacks, there should exist
- effective countermeasures to counter possible communications
- threats. The countermeasures may include policy, procedures,
- automated or physical controls, mechanisms, and protocols
- means.
-
- Basis for Rating: Data Integrity service may be
- evaluated according to its ability to detect integrity vio-
- lations. The following progression relates features and
- evaluation.
-
- Functionality would be evaluated as minimum if either
- of the following two levels of features were provided:
-
- 1. Integrity of a single connectionless PDU. This
- takes the form of determining whether a received
- PDU has been modified.
-
- 2. Integrity of selected fields within a connection-
- less PDU. This takes the form of determining
- whether the selected fields have been modified.
-
- Functionality would be evaluated as fair if, in addi-
- tion, either of the following two levels of features were
- provided:
-
- 1. Integrity of selected fields transferred over a
- connection. This takes the form of determining
- whether the selected fields have been modified,
- inserted, deleted, or replayed.
-
- 2. Integrity of all user-data on a protocol layer
- connection. This service detects any modifica-
- tion, insertion, deletion, or replay of any PDU of
- an entire PDU sequence with no recovery attempted.
-
- Functionality would be evaluated as good if, in addi-
- tion, the following feature is provided:
-
- Integrity of all user-data on a protocol layer con-
- nection. This service detects any modification,
- insertion, deletion, or replay of any PDU of an
- entire PDU sequence with recovery attempted.
-
- Evaluation Range: None to good.
-
-
- + Strength of Mechanism
- ________ __ _________
-
- Policy, procedures, automated or physical controls,
- mechanisms, and protocols should exist for ensuring that
- data has not been subject to excessive random errors and
- unauthorized message stream modification, such as altera-
- tion, substitution, reordering, replay, or insertion. Mes-
- sage stream modification (MSM) countermeasures should be
- identified and shown to be effective. A technology of ade-
- quate strength should be selected to resist MSM.
-
- The probability of an undetected error should be speci-
- fied as an indication of the strength of mechanism. The net-
- work should have an automated capability for testing,
- detecting, reporting, and/or recovering from those communi-
- cation errors/corruptions that exceed specified network
- requirements.
-
- Basis for Rating: When encryption is used in networks,
- it is combined with network protocols to protect against
- unauthorized data modification. The strength of the
- ciphers, the correctness of the protocol logic, and the ade-
- quacy of implementation are three primary factors in assess-
- ing the strength of Data Integrity using cryptography tech-
- niques. See the Encryption Mechanism section for further
- information.
-
- Evaluation Range: None to good.
-
-
- + Assurance
- _________
-
- Basis for rating: Assurance is concerned with guaran-
- _____ ___ ______
- teeing or providing confidence that features to address Data
- Integrity threats have been implemented correctly and that
- the control objectives of each feature have been actually
- and accurately achieved.
-
- Many of the assurance approaches for data integrity are
- common to other security services. See the General
- Assurance section for further information.
-
- Evaluation Range: None to good.
-
-
- 9.1.3. Non-repudiation
- _ _ _ ___ ___________
-
- + Functionality
- _____________
-
- Non-repudiation service provides unforgeable proof of
- shipment and/or receipt of data.
-
- This service prevents the sender from disavowing a leg-
- itimate message or the recipient from denying receipt. The
- network may provide either or both of the following two
- forms:
-
- 1. The recipient of data is provided with proof of
- origin of data that will protect against any
- attempt by the sender to falsely deny sending the
- data or its contents.
-
- 2. The sender is provided with proof of delivery of
- data such that the recipient cannot later deny
- receiving the data or its contents.
-
- Basis for Rating: Presence or absence of each of the
- two forms.
-
- Evaluation Range: None or present.
-
- Discussion: Digital signatures are available techniques
- that may be applied to non-repudiation mechanisms. Digital
- signature mechanisms define two procedures:
-
- 1. Signing a data unit
-
- 2. Verifying a signed data unit
-
- The signing process typically employs either an enci-
- pherment of the data unit or the production of a crypto-
- graphic checkfunction of the data unit, using the signer's
- private information as a private key.
-
- The verification process involves using the public pro-
- cedure and information to determine whether the signature
- was produced with the signer's private key.
-
- It is essential that the signature mechanism be
- unforgeable and adjudicable. This means that the signature
- can only be produced using the signer's private information,
- and in case the signer should disavow signing the message,
- it must be possible for a judge or arbitrator to resolve a
- dispute arising between the signer and the recipient of the
- message.
-
- Digital signature schemes are usually classified into
- one of two categories: true signatures or arbitrated signa-
- tures. In a true signature scheme, signed messages produced
- by the sender are transmitted directly to the receiver who
- verifies their validity and authenticity. In an arbitrated
- signature scheme, all signed messages are transmitted from
- the sender to the receiver via an arbitrator who serves as a
- notary public. In the latter case, a notarization mechanism
- is needed.
-
- Both public-key and conventional private-key cryptosys-
- tems can be utilized to generate digital signatures. When a
- message M is to be signed by a private-key cryptosystem, the
- signature is a computed quantity catenated to M and sent
- along with it. In a public-key implementation, when a mes-
- sage M is to be signed, a transformation using the secret
- key is applied to M before transmitting it. Thus, the signa-
- ture is presented by the resulting transformed message.
-
-
- + Strength of Mechanism
- ________ __ _________
-
- Basis for Rating: The strength and trustworthiness
- given to non-repudiation service is bounded by the trust in
- the underlying cryptography implementing digital signature
- mechanism, the correctness of the protocol logic, and the
- adequacy of protocol implementation. Additional information
- may be found in the separate sections addressing these sub-
- jects.
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Basis for Rating: Assurance is concerned with guaran-
- teeing or providing confidence that features to provide
- non-repudiation service have been implemented correctly and
- that the control objectives of each feature have been actu-
- ally and accurately achieved.
-
- This assurance is addressed by analysis of the logic of
- the protocols and the implementation of the digital signa-
- ture mechanisms to show correctness and effectiveness by
- formal methods where possible (i.e., where tools exist) and
- informal ones otherwise.
-
- The information in the General Assurance, Encryption
- Mechanisms, and Protocols sections also applies.
-
- Evaluation Range: None to good.
-
- 9.2. Denial of Service
- _ _ ______ __ _______
-
- Assurance of communications availability would probably
- be more properly identified as a service, while denial-of-
- service (DOS) would be identified as a threat. However, it
- is traditional to employ denial of service as the identifier
- of this topic.
-
- DOS detection is highly dependent on data integrity
- checking/detection mechanisms. Other mechanisms relating to
- data ordering, modification, loss, or replay (e.g., sequence
- numbers, frame counts) are also measures of DOS protection.
-
- A denial-of-service condition exists whenever the
- throughput falls below a pre-established threshold, or
- access to a remote entity is unavailable. DOS also exists
- when resources are not available to users on an equitable
- basis. Priority and similar mechanisms should be taken into
- account in determining equity. If a connection is active, a
- DOS condition can be detected by the maximum waiting time
- (MWT) or the predetermined minimum throughput. However,
- when a connection is quiescent, a protocol entity at one end
- of a connection has no way of determining when the next
- packet should arrive from its corresponding peer entity. It
- is thus unable to detect a DOS attack that completely cuts
- off the flow of packets from that entity.
-
- Denial of service conditions should be considered for
- all services being provided by the network. As discussed
- below for specific services, depending on the strength of
- mechanism the network should be able to detect, recover,
- and/or resist denial of service conditions. The specific
- conditions, which the network will address, are determined
- through the use of informal models, such as Mission(s)
- Model, Threat Model, Life Cycle Model, and Service Oriented
- Model. The network manager or sponsor shall determine the
- network's denial of service requirements and shall establish
- the desired service criteria accordingly.
-
- 9.2.1. Continuity of Operations
- _ _ _ __________ __ __________
-
- + Functionality
- _____________
-
- The security features providing resistance against DOS
- external attacks and the objectives that each feature will
- achieve may include the following:
-
- 1. Use of active or passive replacement or other forms
- of redundancy throughout the network components
- (i.e., network nodes, connectivity, and control
- capability) may enhance reliability, reduce single-
- point-of-failure, enhance survivability, and provide
- excess capacity.
-
- 2. Reconfiguration to provide network software mainte-
- nance and program down-loading to network nodes for
- software distribution, and to provide initialization
- and reconfiguration after removing failed or faulty
- components and replacing with replaced components
- can isolate and/or confine network failures, accom-
- modate the addition and deletion of network com-
- ponents, and circumvent a detected fault.
-
- 3. Distribution and flexibility of network control
- functions utilizing a distributed control capability
- to reduce or eliminate the possibility of disabling
- the network by destroying or disabling one or a few
- network control facilities, and a flexible control
- capability which is able to respond promptly to
- emergency needs, such as increase in traffic or
- quick restoration, can improve the capability to
- respond promptly to the changes in network topology
- and network throughput thereby enhancing survivabil-
- ity and continuity of operation, perhaps by enforc-
- ing precedence and preemption on traffic handling.
-
- 4. Fault tolerance mechanisms provide a capability to
- deal with network failures and to maintain con-
- tinuity of operations of a network including the
- following features: error/fault detection, fault
- treatment, damage assessment (analysis on effects of
- failures), error/failure recovery, component/segment
- crash recovery, and whole network crash recovery.
-
- 5. Security controls could include community of
- interest separation through creation of logical sub-
- nets with disjoint non-hierarchical mandatory access
- control categories, and protection of control infor-
- mation from active wiretapping.
-
- Basis for Rating: The network should ensure some
- minimum specified continuing level of service. The follow-
- ing service would be considered minimum:
-
- a) Detect conditions that would degrade service below
- a pre-specified minimum and would report such
- degradation to its operators.
-
- The following service would be considered fair:
-
- b) Service that would continue in the event of equip-
- ment failure and actions by persons and processes
- not authorized to alter the data. The resiliency
- may be provided by redundancy, alternate facili-
- ties, or other means. The service provided may be
- degraded and/or may invoke priorities of service.
-
- The following service would be considered good:
-
- c) The same as (a), but with automatic adaptation.
-
- Evaluation Range: None to good.
-
- + Strength of Mechanism
- ________ __ _________
-
- Network operational maintenance is based on mechanisms
- whose robustness may decrease inversely with network load-
- ing. It may be nearly impossible to guarantee sufficiently
- robust testing, regardless of whether done off-line with
- simulated loading or operationally.
-
- In addition to rigorous analysis to assure algorithmic
- correctness in dealing with the "internal failures" (e.g.,
- component, segment, or system failures caused by errors in
- resource allocation policy or mechanism implementation),
- countermeasures shall also be employed against "external
- attacks" such as physical attacks.
-
- Basis for Rating: For each DOS feature defined above,
- it is possible to assign a rating such as none, minimum,
- fair, and good for the assessment of a network's "DOS
- strength" with respect to that particular feature.
-
- For example, major ways of providing fault-tolerant
- mechanisms include:
-
- 1. Error/fault detection
-
- 2. Fault treatment
-
- 3. Damage assessment (analysis on effects of
- failures)
-
- 4. Error/failure recovery
-
- 5. Component/segment crash recovery
-
- 6. Whole network crash recovery
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Assurance is concerned with guaranteeing or providing
- confidence that features to address DOS threats have been
- implemented correctly and that the objectives of each
- feature have been actually and accurately achieved.
-
- This assurance may be addressed by analysis for weak-
- ness or anomalous behavior of the resource allocation
- policy/mechanisms of the network using various formal models
- such as queuing theoretic models, hierarchical service
- models, protocol models, or resource allocation models which
- can be analyzed for deadlock, liveness, and other security
- properties.
-
- Basis for Rating: To provide assurance that the network
- can respond to various forms of denial of service condi-
- tions, the following methods may be employed:
-
- 1. Simulation
-
- 2. Testing
-
- a. Functional
-
- b. Periodic
-
- c. Penetration
-
- 3. Measurement under extreme conditions
-
- Distribution, as discussed as one of the General
- Assurance Factors, can increase the assurance that the
- software deployed is authentic and appropriate in the con-
- text of deployment of new software and in crash recovery.
- In addition, development in a closed environment can
- increase assurance.
-
- Evaluation Range: None to good.
-
- 9.2.2. Protocol Based DOS Protection Mechanisms
- _ _ _ ________ _____ ___ __________ __________
-
- + Functionality
- _____________
-
- Mechanisms for addressing DOS are often protocol based
- and may involve testing or probing. Any communications
- availability service should consider using existing communi-
- cations protocol mechanisms where feasible so as not to
- increase network overhead. DOS mechanisms add overhead that
- may have some adverse impact on network performance. The
- benefits of value-added functions should offset the resul-
- tant performance cost.
-
- For example, in order to detect throughput denial of
- service, a process may exist to measures the transmission
- rate between peer entities under conditions of input queu-
- ing. The measured transmission rate shall be compared with
- a predetermined minimum to detect a DOS condition and
- activate an alarm.
-
- Another example is a protocol to detect failure to
- respond within a predetermined time between peer entities.
- This protocol would determine the remote entity's ability to
- respond to the protocol.
-
- A request-response mechanism such as "are-you-there"
- message exchange may be employed to detect DOS conditions
- when the connection is quiescent. The request-response
- mechanism involves the periodic exchange of "hello", and
- "are-you-there" messages between peer entities to verify
- that an open path exists between them; such a mechanism
- should be protected against selective message passing.
- Based on the ability to respond and the response time to the
- request-response mechanism, the "availability" of a remote
- entity can be determined and the DOS condition can be
- detected.
-
- Request-response mechanisms have been known to crash
- networks when coupled with hardware failures and/or abnormal
- loading. Incompatibilities also sometimes show up when dis-
- similar networks are interconnected. Any polling sequence
- should probably be metered to prevent creating a DOS condi-
- tion.
-
- Basis for Rating: The number of protocol based mechan-
- isms could be used for evaluation. If only one mechanism
- were provided, the functionality might be rated as minimum.
- If two or three mechanisms were provided, the functionality
- might be rated as fair. If more than three mechanisms were
- provided, the functionality might be rated as good.
-
- Evaluation Range: None to good.
-
- + Strength of Mechanism
- ________ __ _________
-
- Basis for Rating: Network protocol robustness may
- decrease inversely with network loading. Testing, off-line
- with simulated loading or operationally, and rigorous
- analysis to assure protocol correctness in dealing with the
- "internal failures" and against "external attacks" are
- appropriate ways of establishing strength of mechanism.
-
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Assurance is concerned with guaranteeing or providing
- confidence that features to address DOS threats have been
- implemented correctly and that the objectives of each
- feature have been actually and accurately achieved.
-
- Basis for Rating: This assurance may be addressed by
- analysis for weakness or anomalous behavior of the network
- protocols using various formal models such as queuing
- theoretic models, hierarchical service models, petri nets,
- or resource allocation models which can be analyzed for
- deadlock, liveness, and other security properties.
-
- To provide assurance that the network can response to
- various forms of external attacks, the following methods may
- be employed:
-
- 1. simulation
-
- 2. testing
-
- - functional
-
- - periodic
-
- - penetration
-
- 3. measurement under extreme conditions
-
- Distribution, as discussed as one of the General
- Assurance Factors, can increase the assurance that the
- software deployed is authentic and appropriate in the con-
- text of deployment of new software and in crash recovery.
- In addition, development in a closed environment can
- increase assurance.
-
- Evaluation Range: None to good.
-
- 9.2.3. Network Management
- _ _ _ _______ __________
-
- + Functionality
- _____________
-
- DOS resistance based on a system/message integrity
- measure is two- tiered. Tier one deals with communications
- protocols. Tier two addresses network management (and
- maintenance). These tiers for the most part operate
- independently.
-
- Network management and maintenance in tier two deals
- with network health, detecting failures and overt acts that
- result in denial or reduced service. Simple throughput may
- not necessarily be a good measure of proper performance.
- Loading above capacity, flooding, replays, and protocol
- retry due to noise in the channel can reduce service below
- an acceptable level and/or cause selective outages. Manage-
- ment protocols, such as those which configure the network or
- monitor its performance, are not described well by the
- existing protocol reference models.
-
- A DOS attack may cause disruption of more than one peer
- entity association. For this reason detection and correc-
- tion may be implemented in tier two. The detection of a
- potential DOS condition by a peer entity should be reported
- by the layer management functions of those entities. The
- determination of a DOS attack is an application management
- function, and the corrective action is a system management
- function.
-
- Basis for Rating: Presence or absence.
-
- Evaluation Range: None or present.
-
- + Strength of Mechanism
- ________ __ _________
-
- Network operational maintenance is based on mechanisms
- whose robustness may decrease inversely with network loading
- (e.g., update of routing tables).
-
- Basis for Rating: Integrity and adequacy of control in
- a network are the keys in coping with denial of service con-
- ditions. In addition to rigorous analysis to assure algo-
- rithmic correctness in dealing with the "internal failures"
- (e.g., component, segment, or system failures caused by
- errors in resource allocation policy or mechanism implemen-
- tation), countermeasures shall also be employed against
- "external attacks," such as physical attacks and attacks
- against network control.
-
- Based on these characterizations, a set of ratings can
- be assigned to each category under the fault tolerance
- feature and an overall rating can then be determined for a
- network's strength in providing "fault tolerance mechan-
- isms".
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Basis for Rating: Assurance may be addressed by
- analysis for weakness or anomalous behavior of the network
- management policy/mechanisms of the network using various
- formal models such as queuing theoretic models, hierarchical
- service models, protocol models, or resource allocation
- models which can be analyzed for deadlock, liveness, and
- other security properties.
-
- Distribution, as discussed as one of the General
- Assurance Factors, can increase the assurance that the
- software deployed is authentic and appropriate in the con-
- text of deployment of new software and in crash recovery.
- In addition, development in a closed environment can
- increase assurance.
-
- Evaluation Range: None to good.
-
- 9.3. Compromise Protection
- _ _ __________ __________
-
- Compromise protection is a collective term for a number
- of security services. These services, described below, are
- all concerned with the secrecy, or non-disclosure of infor-
- mation transfer between peer entities through the computer
- communications network. Physical security, such as pro-
- tected wireways, can also provide transmission security. The
- network manager or sponsor must decide on the balance
- between physical, administrative, and technical security.
- This document only addresses technical security.
-
- 9.3.1. Data Confidentiality
- _ _ _ ____ _______________
-
- + Functionality
- _____________
-
- Data confidentiality service protects data against
- unauthorized disclosure. Data confidentiality is mainly
- compromised by passive wiretapping attacks. Passive attacks
- consist of observation of information passing on a link.
- Release of message content to unauthorized users is the fun-
- damental compromise.
-
- Prevention of release of message contents can be accom-
- plished by applying an encryption mechanism. (See also the
- Encryption Mechanism section.) The granularity of key dis-
- tribution is a trade-off between convenience and protection.
- Fine granularity would employ a unique key for each sensi-
- tivity level for each session; coarse granularity would
- employ the same key for all sessions during a time period.
-
- The network must provide protection of data from unau-
- thorized disclosure. Confidentiality can have the following
- features:
-
- 1. Confidentiality of all user-data on a specific
- protocol layer connection. Note: depending on use
- and layer, it may not be appropriate to protect
- all data, e.g., expedited data or data in a con-
- nection request.
-
- 2. Confidentiality of all user-data in a single con-
- nectionless datagram
-
- 3. Confidentiality of selected fields within the
- user-data of an PDU
-
- Basis for Rating: Presence or absence of each feature.
-
- Evaluation Range: None or present.
-
- + Strength of Mechanism
- ________ __ _________
-
- Physical protection and encryption are the fundamental
- techniques for protecting data from compromise. Through
- their use, release of message content and traffic analysis
- can be prevented.
-
- Basis for Rating: The evaluation of data confidential-
- ity mechanisms is outside the scope of this document. The
- cognizant authorities will evaluate the mechanisms relative
- to a specific environment according to their own rules and
- procedures.
-
- Evaluation Range: Sensitivity level of data approved to
- protect.
-
- + Assurance
- _________
-
- Basis of rating: Assurance is concerned with guarantee-
- _____ __ ______
- ing or providing confidence that features to address Data
- Confidentiality threats have been implemented correctly and
- that the control objectives of each feature have been actu-
- ally and accurately achieved. Blacker is an example of such
- an application of a TCB for high assurance of data confiden-
- tiality.
-
- Many of the assurance approaches for data confidential-
- ity are common to other security services. See the General
- Assurance section for further information.
-
- Evaluation Range: None to good.
-
-
- 9.3.2. Traffic Flow Confidentiality
- _ _ _ _______ ____ _______________
-
- + Functionality
- _____________
-
- Traffic flow confidentiality service protects data
- against unauthorized disclosure. Traffic analysis is a
- compromise in which analysis of message length, frequency,
- and protocol components (such as addresses) results in
- information disclosure through inference.
-
- Traffic flow confidentiality is concerned with masking
- the frequency, length, and origin-destination patterns of
- communications between protocol entities. Encryption can
- effectively and efficiently restrict disclosure above the
- transport layer; that is, it can conceal the process and
- application but not the host computer node.
-
- The OSI Addendum- notes: "Traffic padding mechanisms
- can be used to provide various levels of protection against
- traffic analysis. This mechanism can be effective only if
- the traffic padding is protected by a confidentiality
- _________________________
- - ISO 7498/Part 2 - Security Architecture, ISO / TC
- ___ ____ ____ _ ________ ____________
- 97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
- Project 97.21.18, September 1986.
-
-
- service."
-
- Basis for Rating: Presence or absence.
-
- Evaluation Range: None or present.
-
- + Strength of Mechanism
- ________ __ _________
-
- Physical protection, encryption, and traffic padding
- are the fundamental countermeasures for traffic analysis.
-
- Basis for Rating: The evaluation of traffic confiden-
- _____ ___ ______
- tiality mechanisms are outside the scope of this document.
- The cognizant authorities will evaluate the mechanisms rela-
- tive to a specific environment according to their own rules
- and procedures.
-
- Evaluation Range: Sensitivity level of data approved to
- protect.
-
- + Assurance
- _________
-
- Basis for rating: Assurance is concerned with guaran-
- _____ ___ ______
- teeing or providing confidence that features to address
- Traffic Confidentiality threats have been implemented
- correctly and that the control objectives of each feature
- have been actually and accurately achieved.
-
- Many of the assurance approaches for traffic confiden-
- tiality are common to other security services. See the Gen-
- eral Assurance section for further information.
-
- Evaluation Range: None to good.
-
-
- 9.3.3. Selective Routing
- _ _ _ _________ _______
-
- + Functionality
- _____________
-
- "Routing control is the application of rules during the
- process of routing so as to choose or avoid specific net-
- works, links or relays-.... Routes can be chosen either
- dynamically or by prearrangement so as to use only physi-
- cally secure sub-networks, relays, or links. End-systems
- may, on detection of persistent manipulation attacks, wish
- to instruct the network service provider to establish a con-
- nection via a different route. Data carrying labels may be
- forbidden by the security policy to pass through certain
- sub-networks, relays or links. Also the initiator of a con-
- nection (or the sender of a connectionless data unit) may
- specify routing caveats requesting that specific sub-
- networks, links or relays be avoided."
- _________________________
- - ISO 7498/Part 2 - Security Architecture, ISO / TC
- ___ ____ ____ _ ________ ____________
- 97 / SC 21 / N1528 / WG 1 Ad hoc group on Security,
- Project 97.21.18, September 1986.
-
-
- For example, there are national laws and network
- administration policies governing individual privacy rights,
- encryption, and trans-border data flow. A user in a end
- system may wish to specify countries through which certain
- information should not flow.
-
- Basis for Rating: Presence or absence.
-
- Evaluation Range: None or present.
-
- + Strength of Mechanism
- ________ __ _________
-
- Basis for Rating: The factors discussed under Suppor-
- tive Primitives (Section 7) apply.
-
- Evaluation Range: None to good.
-
- + Assurance
- _________
-
- Basis for Rating: The General Assurance Approaches
- apply.
-
- Evaluation Range: None to good.
-
-
- Table II-1. Part II Assurance Rating Relationship to Part I Evaluation
- _____ __ _ ____ __ _________ ______ ____________ __ ____ _ __________
-
-
- (note: Table not included)
-
-
-
-
-
- Table II-2. Evaluation Structure for the Network Security Services
- _____ __ _ __________ _________ ___ ___ _______ ________ ________
-
- (note: Table not included)
-
-
-
-
- Appendix A
- ________ _
-
-
- Evaluation of Network Components
- __________ __ _______ __________
-
-
-
-
-
-
-
- A.1. Purpose
- _ _ _______
-
- Part I of this Trusted Network Interpretation (TNI)
- provides interpretations of the Trusted Computer Security
- Evaluation Criteria (TCSEC) appropriate for evaluating a
- network of computer and communication devices as a single
- system with a single Trusted Computing Base (TCB), called
- the Network Trusted Computing Base (NTCB), which is physi-
- cally and logically partitioned among the components of the
- network. These interpretations stem from the recognition
- that networks form an important and recognizable subclass of
- ADP systems with distinctive technical characteristics that
- allow tailored interpretations of the TCSEC to be formulated
- for them.
-
- An extension of this view of networks can be taken:
- that a trusted network represents a composition of trusted
- components. This view is sound, consistent with the first,
- and useful. The approach to evaluation of a network sug-
- gested by this view is to partition the system into com-
- ponents, rate each component to determine its security-
- relevant characteristics, and then evaluate the composition
- of the components to arrive at an overall rating class for
- the network. This approach aids in the assigning of an
- overall network evaluation class in two ways: 1) it allows
- for the evaluation of components which in and of themselves
- do not support all the policies required by the TCSEC (which
- will then contribute to the overall evaluation of any net-
- work which uses the evaluated component), and 2) it allows
- for the reuse of the evaluated component in different net-
- works without the need for a re-evaluation of the component.
-
- This approach to evaluation does not negate or override
- any of the interpretations presented in Part I of this docu-
- ment, which describe the global characteristics of a trusted
- network. In order to present a unified and self-consistent
- exposition within Part I of the document, a deliberate
- choice was made to express the basic network interpretations
- in terms of the view that networks are instances of ADP sys-
- tems to which the TCSEC are applied on a system-wide basis.
- This choice allows Part I to follow the TCSEC closely
- because the basic structural model underlying the TCSEC,
- that of a system with a single Trusted Computer Base (TCB),
- has not been altered.
-
- This appendix provides guidance for the evaluation of
- the individual components of a trusted network. The com-
- ponent evaluation guidelines constitute a refinement and
- application of the total network interpretations expressed
- within Part I and Part II of this document, and are intended
- to support the eventual evaluation of a network or network
- subsystem product to attain an overall network class using
- the Part I interpretations. Note that Part II applies to
- components without further interpretation. No implication
- is intended in this appendix that all networks must be com-
- posed from evaluated components: it is conceivable that a
- complete network could be evaluated as a whole using the
- system interpretations presented in Part I. In many practi-
- cal cases, however, the techniques presented here for con-
- sidering first the individual components, and then their
- composition into an evaluatable whole, constitutes a viable
- and attractive means for actually conducting the evaluation
- of the system under Part I interpretations.
-
- Three major issues must be confronted by the architect
- or evaluator of a trusted system when the partitioned
- viewpoint is applied:
-
- 1. How is the network to be partitioned in such a way
- that evaluation of individual components will sup-
- port eventual evaluation of the entire network?
-
- 2. What evaluation criteria should be applied to each
- component when rating that component?
-
- 3. How can the composition of rated components be
- evaluated?
-
- The first of these issues is addressed in the separate
- Appendix B, Rationale Behind NTCB Partitions. The remaining
- two issues are addressed in this Appendix: the first, in
- section A.1.1 and section A.3, and the last in section A.2.
-
- Section A.1.1 presents a taxonomy (classification
- scheme) for processing components based upon subordinate
- policy elements to be enforced, as well as the rating struc-
- ture for individual components.
-
- Section A.2 presents techniques and guidelines for the
- composition of rated processing components to achieve par-
- ticular system ratings for the assembled network. This gui-
- dance is based on characterizing each component according to
- the policy elements supported where these are organized into
- the four broad policy areas of Mandatory Access Controls,
- Discretionary Access Controls, Identification and Authenti-
- cation, and Audit support.
-
- Section A.3 presents specific evaluation guidance in
- terms of the network interpretations articulated in Part I
- of this document, to allow individual processing components
- to be rated preparatory to their utilization in a trusted
- network. The sections are organized according to component
- type, as defined in section A.1.1. For each component type,
- the applicable interpretations, from Part I, are provided,
- organized according to rating class.
-
- A.1.1. Component Taxonomy and Rating Structure
- _ _ _ _________ ________ ___ ______ _________
-
- The primary difference between a processing component,
- regarded as part of a larger network system, and regarded as
- a stand-alone ADP system is that as a stand-alone system all
- of the TCSEC requirements for a particular class must be
- met: for policy requirements (i.e., what features the sys-
- tem must support) the intent of the TCSEC is to enforce a
- collection of features which are felt to be operationally
- complete and consistent for a total system. In the context
- of a larger system, however, it may well be (and usually is)
- the case that the set of policy-related features to be sup-
- ported by the component need not be the complete set
- required for a stand-alone system: features not supplied by
- one component for the system are supplied by another.
-
- In rating a product for potential use as a network com-
- ponent, we would like, in theory, to be able to characterize
- its security properties exactly: in practice, we shall be
- content to identify the component as being of a particular
- type (which identifies the general policy elements the com-
- ponent supports) and of a particular evaluation class (which
- identifies the assurance levels provided for each supported
- feature), and the target architecture. The description of
- the target architecture shall include a description of the
- services that must be provided by other devices.
-
- In order to limit the number of component types we
- break the ``maximal'' set of policy-related features,
- defined by the TCSEC for A1 systems, into four relatively
- independent categories which can be characterized as sup-
- porting Mandatory Access Controls (MAC), Discretionary
- Access Controls (DAC), Audit, and Identification and Authen-
- tication. (In various tables and text in the remainder of
- this appendix, these categories will be given the one-letter
- designations M, D, A, and I, respectively).
-
- A given component can be intended (by the component
- sponsor) or required (by the network sponsor) to provide any
- combination of M, D, A or I functionality. Logically, then,
- there are sixteen different component types which can be
- rated using the guidelines of section A.3, corresponding to
- the sixteen possible combinations of M, D, A, and I theoret-
- ically possible. Of these combinations one (no M, no D, no
- A, no I) typifies a component intended (or required) to
- enforce no security policy whatsoever, and therefore has no
- TCSEC requirements to meet and need not be evaluated. How-
- ever, it is still possible to utilize such components as
- part of a secure network system, if the architecture of the
- system induces a nil subordinate policy upon the component.
- The remaining component types are denoted M, D, A, I, MD,
- MA, MI, DA, DI, IA, MDA, MDI, MIA, IAD, and MIAD with the
- obvious meanings (for example, an "MIA component" supports
- aspects of Mandatory, Audit, and Authentication and ID poli-
- cies, with the exact features provided being specified in
- section A.3 depending upon both evaluation class and type).
-
- Table A1. Component Type Maximum and Minimum Class
-
- COMPONENT TYPE MIN CLASS MAX CLASS
- M B1 A1
- D C1 C2+
- I C1 C2
- A C2 C2+
- DI C1 C2+
- DA C2 C2+
- IA C2 C2+
- IAD C2 C2+
- MD B1 A1
- MA B1 A1
- MI B1 A1
- MDA B1 A1
- MDI B1 A1
- MIA B1 A1
- MIAD B1 A1
-
-
-
- In addition to a type based upon the policy elements
- supported, an evaluated processing component is assigned a
- single evaluation class. In order to achieve a particular
- class, the component must meet all of the guidelines for
- that rating level for the applicable component type provided
- in section A.3. In general, these guidelines are straight-
- forward interpretations of the TCSEC for the subset of pol-
- icy features to be provided. Each component type has a max-
- imum and minimum class listed in Table A1 below. To achieve
- a particular class, a component must meet appropriate
- requirements for policy, assurance, accountability, and
- documentation.
-
- The maximum class for each component type is derived
- from the TCSEC, and is that evaluation class which imposes
- the highest requirement relevant to the component type.
- Similarly, the lowest class available for each component
- type is the TCSEC evaluation class which first imposes a
- requirement relevant to that component type.
-
- Exceptions to this general approach have been made for
- the requirements for DAC and Audit support at the B3 level
- as the additional support for these policy categories at
- these levels (namely, the provision of ACL's for DAC and for
- real-time alarms for Audit) are not at the high level of
- assurance provided for the B3 MAC support. It is considered
- more appropriate to use the notation of C2+ for component
- types including D or A, but not M which meet the functional
- requirements of the B3 system ratings for D or A.
-
- Components including support for I may be required to
- provide identification and authentication support for DAC
- (at possibly relatively low levels of assurance) or both DAC
- and MAC (at relatively high levels of assurance). There-
- fore, rating levels ranging from C1 to A1 for type I com-
- ponents have been provided. The ratings above B2 reflect
- the need for added assurance for the label integrity for the
- MAC label information, rather than any additional require-
- ments for features.
-
- Components including support for I are required to pro-
- vide Identification and Authentication which supports the
- DAC Policy. The TCSEC Identification-Authentication
- requirements for establishing a user clearance are reflected
- in M Components, since this requirement is in essence estab-
- lishing a security label for a user.
-
- Components of multiple types have been given minimum
- and maximum levels based upon meaningful combinations of the
- included types.
-
- It might be noted in passing that a C1 stand-alone sys-
- tem has exactly the same certification requirements as a C1
- DI component, a C2 system as a C2 IAD component, and B1-A1
- systems as B1-A1 MIAD components.
-
- A.2. Composition Rules
- _ _ ___________ _____
-
- A.2.1. Purpose
- _ _ _ _______
-
- In order for a (sub)system composed of components to be
- assigned a rating, the components that make up the network
- must be interconnected in such a way that the connections do
- not violate the assumptions made at the time the components
- were individually evaluated. This section presents the
- rules for the composition of evaluated components to form an
- evaluatable (sub)system and the method for assigning a rat-
- ing to a (sub)system conforming to the rules.
-
- This section does not consider the relative risk of
- utilizing the evaluated (sub)system to separate data at
- various levels of sensitivity: that is the role of the
- environmental security requirements, such as those of Com-
- ____
- puter Security Requirements, Guidance for applying the
- _____ ________ ____________ ________ ___ ________ ___
- Department of Defense Trusted Computer System Evaluation
- __________ __ _______ _______ ________ ______ __________
- Criteria in Specific Environments, CSC-STD-003-85. This
- ________ __ ________ ____________
- section presents a technical basis for assigning a rating to
- a (sub)system which is composed of more than one component.
- The rating assigned indicates a minimum level of security as
- provided by the rated (sub)system as a whole.
-
- Components must provide interfaces to support the other
- policies as required.
-
- The composition rules are divided up according to the
- 15 possible combinations of the four policies supported by
- evaluated components (i.e., Mandatory Access Control, Dis-
- cretionary Access Control, Audit, and Identification-
- Authentication).
-
- A.2.2. Discretionary Access Control (D-Only) Composition
- _ _ _ _____________ ______ _______ _ ____ ___________
- Rules
- _____
-
- The rules presented below are based on the concept of
- properly composing a new component from previously evaluated
- components. Specifically, the rules presented in this sec-
- tion deal with the composition of a component with respect
- to the DAC Policy of the Network. It is expected that the
- composition of a D-Component will require significant
- engineering and system architectural consideration.
-
- When a D-Component is evaluated, it will be evaluated
- against some stated Network DAC Policy and a stated target
- Network Security Architecture. Included in the component
- definition will be a statement of supported protocol for
- passing Identifiers which will be used as the basis for mak-
- ing DAC decisions. The stated protocol will be evaluated to
- assure that it is sufficient to support the target Network
- DAC Policy (e.g., if the Network DAC Policy is that access
- be designated down to the granularity of a single user, then
- an Identification Protocol which maps all users into a sin-
- gle Network ID would not suffice).
-
- The type of Components discussed below, D-Components,
- are components that have received a rating relative to DAC
- (e.g., C1-C2+ D-Only Component, C1-C2+ DI Component, B1-A1
- MD Component, etc.). The rules of this section are con-
- cerned only with the composition of these components with
- respect to the DAC Policy.
-
- A.2.2.1. Composition of Two D-Components
- _ _ _ _ ___________ __ ___ _ __________
-
- Whenever two D-Components are directly connected the
- Identification Passing Protocol used to pass identifiers
- from one component to the other (for the purposes of making
- DAC decisions) must be the same in both components. It must
- be the case that the Identification Passing Protocol pro-
- vided by the composed component must support the Identifica-
- tion Passing Protocol of the target Network Architecture.
- In addition, the composed DAC Policy (defined by the combi-
- nation of the DAC Policy provided by one component over the
- named objects under its control and by the DAC Policy pro-
- vided by the other component over the named objects under
- its control) must be shown to be able to support the target
- Network DAC Policy.
-
- A.2.2.2. Discretionary Access Control Policy Composition
- _ _ _ _ _____________ ______ _______ ______ ___________
- Rating
- ______
-
- Given that a component is composed as described above,
- the evaluation class assigned to the composed component,
- with relation to DAC, will be the rating of the lowest class
- assigned to any D-Component within the composed component.
-
- A.2.3. Identification-Authentication (I-Only) Composition
- _ _ _ ______________ ______________ _ ____ ___________
- Rules
- _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the Identifi-
- cation and Authentication Policy of the Network. It is
- expected that the composition of an I-Component will require
- significant engineering and system architectural
- consideration.
-
- When an I-Component is evaluated it will be evaluated
- against some stated Network Identification-Authentication
- Policy and a stated target Network architecture. Included
- in the component definition will be a statement of the sup-
- ported protocol for communicating User Identification and
- Authentication Information, and the interfaces provided by
- the I-Component. The composition of two I-Components must
- maintain the protocol which supports the Identification-
- Authentication Policy of the Network. In addition the
- interfaces provided by the composed I-Component, which sup-
- port the stated protocol, must be identified.
-
- A.2.3.1. Identification-Authentication Composition Rating
- _ _ _ _ ______________ ______________ ___________ ______
-
- Given that a component is composed as described above,
- the evaluation class assigned to the composed component,
- with relation to Identification-Authentication, will be the
- rating of the lowest class assigned to any I-Component
- within the composed component.
-
- A.2.4. Audit (A-Only) Composition Rules
- _ _ _ _____ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the Audit
- Policy of the Network. It is expected that the composition
- of an A-Component will require significant engineering and
- system architectural consideration.
-
- When an A-Component is evaluated it will be evaluated
- against some stated Network Audit Policy and a stated target
- Network architecture. Included in the component definition
- will be a statement of the supported protocol that the com-
- ponent uses for receiving Audit information. The composi-
- tion of two A-Components must maintain the protocol which
- supports the Audit Policy of the Network.
-
- A.2.4.1. Audit Composition Rating
- _ _ _ _ _____ ___________ ______
-
- Given that a component is composed as described above,
- the evaluation class assigned to the composed component,
- with relation to Audit, will be the rating of the lowest
- class assigned to any A-Component within the composed com-
- ponent.
-
- A.2.5. Mandatory Access Control (M-Only) Composition Rules
- _ _ _ _________ ______ _______ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from two directly connected
- (at the physical layer) components. Specifically, the rules
- presented in this section deal with the composition of a
- component with respect to the MAC Policy of the Network.
-
- The MAC Composition Rules provide a strong guarantee
- that if the network is composed of directly connected,
- evaluated components, and each connection meets the MAC
- Composition Rules, the Network MAC Policy will be supported.
- These rules permit the recursive definition of a component
- based on the MAC Policy.
-
- The MAC Composition Rules are divided into two sec-
- tions. The first section addresses the composition of a
- component from two directly connected components with mul-
- tilevel devices at each end of the connection. The second
- section addresses the composition of a component from two
- directly connected components with single-level devices at
- each end of the connection.
-
- The type of Components discussed below, M-Components,
- are components which have received a rating relative to the
- MAC Policy (e.g., B1-A1 M-Only Components, B1-A1 MD-
- Components, B1-A1 MI-Components, etc.).
-
- A.2.5.1. Multilevel Devices
- _ _ _ _ __________ _______
-
- Whenever two M-Components are directly connected, via a
- communication channel, with a multilevel device at each end
- of the connection, the labeling protocol (as required by the
- Exportation to Multilevel Devices requirements, sections
- 3.1.1.3.2.1, 3.2.1.3.2.1, 3.3.1.3.2.1, and 4.1.1.3.2.1) must
- be the same at the network interface to both devices.
-
- Whenever two Class B1 M-Component are directly con-
- nected, the range of sensitivity labels denoted by the max-
- imum and minimum levels (System High and System Low) associ-
- ated with each of the Class B1 M-Components must be the
- same. (This is because there are no explicit device labels
- for Class B1.)
-
- Whenever a Class B1 M-Component is directly connected
- to a Class B2-A1 M-Component, the range of sensitivity
- labels denoted by the maximum and minimum levels (System
- High and System Low) associated with the Class B1 M-
- Component must be the same as the range of sensitivity
- labels denoted by the maximum and minimum levels associated
- with the multilevel device of the Class B2-A1 M-Component.
-
- Whenever two Class B2-A1 M-Components are directly con-
- nected with a multilevel device at each end of the connec-
- tion, the range of sensitivity labels denoted by the maximum
- and minimum levels associated with the each of the connected
- devices must be the same.
-
- A.2.5.2. Single-Level Devices
- _ _ _ _ ______ _____ _______
-
- Whenever two M-Components are directly connected with a
- single-level device at each end of the connection, the sen-
- sitivity level associated with the two devices must be the
- same.
-
- Whenever two Non-M-Components are directly connected
- the maximum sensitivity level of data processed by the two
- Non-M-Components must be the same.
-
- A.2.5.3. Mandatory Access Control Policy Composition Rating
- _ _ _ _ _________ ______ _______ ______ ___________ ______
-
- Given that a component is composed as described in sec-
- tions 2.5.1 and 2.5.2 above, the evaluation class assigned
- to the composed component, with regard to MAC, will be the
- rating of the lowest class assigned to any M-Component
- within the composed component.
-
- A.2.6. DI-Component (D-Only and I-Only) Composition Rules
- _ _ _ __ _________ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the DAC Pol-
- icy and the Identification-Authentication Policy of the Net-
- work. It is expected that the composition of a DI-Component
- will require significant engineering and system architec-
- tural consideration.
-
- Whenever an I-Component and a D-Component are composed
- to form a DI-Component the DI-Component must preserve the
- Network DAC Policy of the D-Component. This implies that,
- depending on the DAC Policy, a protocol for receiving DAC
- information and returning data might be required for each
- DAC interface. This protocol must be able to support the
- Network DAC policy. (Note that if the Network DAC policy is
- defined such that access decisions are based on the user
- being a "member of the network group", i.e., is a legitimate
- user of another component, then the DAC interface may not
- require any identifiers to be passed to the DI-Component.)
-
- In addition, for class C2 and above, the composed DI-
- Component must preserve the Audit Interface(s) used for
- exporting audit information from the D-Component and the I-
- Component. This implies that the DI-Component must provide
- a means for exporting audit information generated by actions
- taken within each of its parts.
-
- The DI-Component may provide Identification-
- Authentication support services to other components. In
- this case the Identification Interface of the DI-Component
- must be defined and a protocol established for this inter-
- face which is able to support the Network I/A Policy. In
- this case the DI-Component may be further composed with
- other D-Only Components to form new DI-Components, using the
- rules defined above.
-
- However, it is not necessary that the DI-Component pro-
- vide Identification-Authentication services to other com-
- ponents. In this case the DI-Component may only be composed
- with other components (i.e., DI-Components, MIAD-Components,
- MI-Components, etc.) which are also self sufficient with
- respect to Identification-Authentication services.
-
- If the composed DI-Component supports directly con-
- nected users then the DI-Component must, minimally, meet all
- the requirements for a Class C1 Network System.
-
- A.2.6.1. DI-Component Composition Rating
- _ _ _ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C1, the
- evaluation class assigned to the composed DI-Component, will
- be C1.
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2, the
- evaluation class assigned to the composed DI-Component, will
- be equal to the evaluation class of the D-Component.
-
- A.2.7. DA (D-Only and A-Only) Composition Rules
- _ _ _ __ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the DAC Pol-
- icy and the Audit Policy of the Network. It is expected
- that the composition of a DA-Component will require signifi-
- cant engineering and system architectural consideration.
-
- Whenever an A-Component and a D-Component are composed
- to form a DA-Component, the DA-Component must preserve the
- Network DAC Policy of the D-Component. This implies that,
- depending on the DAC Policy, a protocol for receiving DAC
- information and returning data, might be required for each
- DAC interface. This protocol must be able to support the
- Network DAC policy. (Note that if the Network DAC policy is
- defined such that access decisions are based on the user
- being a "member of the network group", i.e., is a legitimate
- user of another component, then the DAC interface may not
- require any identifiers to be passed to the DI-Component.)
-
- The DA-Component may provide Audit support services to
- other components. In this case the Audit Interface of the
- DA-Component must be defined and a protocol established for
- this interface, which is able to support the Network Audit
- Policy. In this case the DA-Component may be further com-
- posed with other D-Only Components to form new DA-
- Components, using the rules defined above.
-
- However, it is not necessary that the DA-Component pro-
- vide Audit services to other components. In this case the
- DA-Component may only be composed with other components
- (i.e., DA-Components, MIAD-Components, MA-Components, etc.)
- that are also self sufficient with respect to Audit ser-
- vices.
-
- A.2.7.1. DA-Component Composition Rating
- _ _ _ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the D-Component has an evaluation class of at least
- C2, the evaluation class assigned to the composed DA-
- Component, will be the rating of the lowest class assigned
- to either of the two components which make up the composed
- component.
-
- A.2.8. IA (I-Only and A-Only) Composition Rules
- _ _ _ __ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the
- Identification-Authentication Policy and the Audit Policy of
- the Network. It is expected that the composition of a IA-
- Component will require significant engineering and system
- architectural consideration.
-
- Whenever an IA-Component is composed of an I-Component
- connected to an A-Component, the IA-Component must preserve
- both the Network Audit Interface and Protocol of the A-
- Component and the Network Identification-Authentication
- Interface and Protocol of the I-Component. This implies
- that the composed IA-Component must provide an Audit Inter-
- face as well as a Identification-Authentication Interface. A
- protocol, for receiving Audit data, must be defined for each
- Audit Interface. This protocol must be able to support the
- Network Audit Policy. In addition, a protocol, for receiv-
- ing Identification-Authentication data and returning authen-
- ticated user-ids, must be defined for each Identification
- Interface. This protocol must be able to support the Net-
- work I/A policy.
-
- A.2.8.1. IA-Component Composition Rating
- _ _ _ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of at least
- C2, the evaluation class assigned to the composed IA-
- Component, will be the rating of the A-Component.
-
- A.2.9. MD (M-Only and D-Only) Composition Rules
- _ _ _ __ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy and the DAC Policy of the Network. It is expected that
- the composition of an MD-Component will require significant
- engineering and system architectural consideration.
-
- Whenever an MD-Component is composed from an M-
- Component directly connected to a D-Component, the composi-
- tion rules, with respect to the MAC Policy, are that the M-
- Component must only connect to the D-Component via a
- single-level device, and the sensitivity level of the device
- must be the same as the maximum sensitivity level of data
- processed by the D-Component. Any network interfaces pro-
- vided by the MD-Component via direct connections to the D-
- Component must be at the level of the D-Component.
-
- The composition rules, with respect to the DAC Policy,
- are that any network interfaces provided by the MD-Component
- (including those which only involve direct connections to
- the M-Component) must support the Identification Passing
- Protocol used by the D-Component. (Note that if the Network
- DAC policy is defined such that access decisions are based
- on the user being a ``member of the network group'', i.e.,
- is a legitimate user of another component, then the DAC
- interface may not require any identifiers to be passed to
- the DI-Component.)
-
- In addition, the composed MD-Component must ensure that
- any external requests for access to data under the control
- of the composed component are subject to both the MAC and
- DAC Policies of the original M and D Components.
-
- A.2.9.1. MD-Component Composition Rating
- _ _ _ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the D-Component has an evaluation class of C2, the
- evaluation class assigned to the composed MD-Component, will
- be either B1 (if the evaluation class of the M-Component is
- B1) or B2 (if the evaluation class of the M-Component is
- greater than B1).
-
- Given that a component is composed as described above,
- and that the D-Component has an evaluation class of C2+, the
- evaluation class assigned to the composed MD-Component, will
- be equal to the evaluation class of the M-Component.
-
- A.2.10. MI (M-Only and I-Only) Composition Rules
- _ _ __ __ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy and the Identification-Authentication Policy of the Net-
- work. It is expected that the composition of an MI-Component
- will require significant engineering and system architec-
- tural consideration.
-
- Whenever an MI-Component is composed from an M-
- Component directly connected to an I-Component, the composi-
- tion rules, with respect to the MAC Policy, are that the M-
- Component must only connect to the I-Component via a
- single-level device, and the sensitivity level of the device
- must be the same as the maximum sensitivity level of data
- processed by the I-Component. Any network interfaces pro-
- vided by the MI-Component via direct connections to the I-
- Component must be at the level of the I-Component.
-
- In addition, the composed MI-Component must preserve
- the Audit Interface(s) used for exporting audit information
- from the M-Component and the I-Component. This implies that
- the MI-Component must provide a means for exporting audit
- information generated by actions taken within each of its
- parts.
-
- The MI-Component may provide Identification-
- Authentication support services to other components. In
- this case the Identification Interface of the MI-Component
- must be defined and a protocol established for this inter-
- face, which is able to support the Network I/A Policy. In
- this case the MI-Component may be further composed with
- other M-Only Components to form new MI-Components, using the
- rules defined above.
-
- However, it is not necessary that the MI-Component pro-
- vide Identification-Authentication services to other com-
- ponents. In this case the MI-Component may only be composed
- with other components (i.e., MI-Components, MIAD-Components,
- DI-Components, etc.) that are also self sufficient with
- respect to Identification-Authentication services.
-
- The composed MI-Component must assure that MAC Policy
- and the Identification-Authentication Policy of the Network
- is supported on any direct User connections to the MI-
- Component. This implies that if the M-Component supports
- direct User connections, the M-Component must support a pro-
- tocol on these connections such that Identification-
- Authentication information may be exchanged (with the I-
- Component) which will fully support the IA Policy of the
- Network.
-
- A.2.10.1. MI-Component Composition Rating
- _ _ __ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2, the
- evaluation class assigned to the composed MI-Component will
- be equal to the evaluation class of the M-Component.
-
- A.2.11. MA (M-Only and A-Only) Composition Rules
- _ _ __ __ _ ____ ___ _ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy and the Audit Policy of the Network. It is expected
- that the composition of an MA-Component will require signi-
- ficant engineering and system architectural consideration.
-
- Whenever an MA-Component is composed from an M-
- Component directly connected to an A-Component, the composi-
- tion rules, with respect to the MAC Policy, are that the M-
- Component must only connect to the A-Component via a
- single-level device and the sensitivity level of the device
- must be the same as the maximum sensitivity level of data
- processed by the A-Component (probably Network High). Any
- network interfaces provided by the MA-Component via direct
- connections to the A-Component must be at the level of the
- A-Component.
-
- The MA-Component may provide Audit support services to
- other components. In this case the Audit Interface of the
- MA-Component must be defined and a protocol established for
- this interface which is able to support the Network Audit
- Policy. In this case the MA-Component may be further com-
- posed with other M-Only Components to form new MA-
- Components, using the rules defined above.
-
- However, it is not necessary that the MA-Component
- provide Audit services to other components. In this case
- the MA-Component may only be composed with other components
- (i.e., MA-Components, MIAD-Components, DA-Components, etc.)
- which are also self sufficient with respect to Audit ser-
- vices.
-
- A.2.11.1. MA-Component Composition Rating
- _ _ __ _ __ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the A-Component has an evaluation class of C2, the
- evaluation class assigned to the composed MA-Component, will
- be either B1 (if the evaluation class of the M-Component is
- B1) or B2 (if the evaluation class of the M-Component is
- greater than B1).
-
- Given that a component is composed as described above,
- and that the A-Component has an evaluation class of C2+, the
- evaluation class assigned to the composed MA-Component will
- be equal to the evaluation class of the M-Component.
-
- A.2.12. IAD Composition Rules
- _ _ __ ___ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the DAC Pol-
- icy, the Identification-Authentication Policy, and the Audit
- Policy of the Network. It is expected that the composition
- of a IAD-Component will require significant engineering and
- system architectural consideration.
-
- Whenever a IAD-Component is composed from directly con-
- nected components, the IAD-Component must conform to the
- composition rules for a DI-Component, a DA-Component, and an
- IA-Component. If the IAD-Component supports directly con-
- nected users then the IAD-Component must, minimally, meet
- all the requirements for a Class C2 Network System.
-
- A.2.12.1. IAD-Component Composition Rating
- _ _ __ _ ___ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component and D-Component each have an
- evaluation class of C2, the evaluation class assigned to the
- composed IAD-Component will be C2.
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2 and
- the D-Component has an evaluation class of C2+, the evalua-
- tion class assigned to the composed IAD-Component will be
- the evaluation class of the A-Component.
-
- A.2.13. MDA Composition Rules
- _ _ __ ___ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy, the DAC Policy, and the Audit Policy of the Network.
- It is expected that the composition of a MDA-Component will
- require significant engineering and system architectural
- consideration.
-
- Whenever a MDA-Component is composed from directly con-
- nected components, the MDA-Component must conform to the
- composition rules for an MD-Component, an MA-Component, and
- a DA-Component.
-
- A.2.13.1. MDA-Component Composition Rating
- _ _ __ _ ___ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the A-Component has an evaluation class of C2, and
- the D-Component has an evaluation class of C2 or higher, the
- evaluation class assigned to the composed MDA-Component will
- be either B1 (if the evaluation class of the M-Component is
- B1) or B2 (if the evaluation class of the M-Component is
- greater than B1).
-
- Given that a component is composed as described above,
- and that the D-Component and A-Component each have an
- evaluation class of C2+, the evaluation class assigned to
- the composed MDA-Component will be equal to the evaluation
- class of the M-Component.
-
- A.2.14. MDI Composition Rules
- _ _ __ ___ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy, the DAC Policy, and the Identification-Authentication
- Policy of the Network. It is expected that the composition
- of a MDI-Component will require significant engineering and
- system architectural consideration.
-
- Whenever a MDI-Component is composed from directly con-
- nected components, the MDI-Component must conform to the
- composition rules for an MD-Component, an MI-Component, and
- a DI-Component.
-
- A.2.14.1. MDI-Component Composition Rating
- _ _ __ _ ___ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component and the D-Component each have an
- evaluation class of C2, the evaluation class assigned to the
- composed MDA-Component will be either B1 (if the evaluation
- class of the M-Component is B1) or B2 (if the evaluation
- class of the M-Component is greater than B1).
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2, and
- the D-Component has an evaluation class of C2+, the evalua-
- tion class assigned to the composed MDI-Component will be
- equal to the evaluation class of the M-Component.
-
- A.2.15. MIA Composition Rules
- _ _ __ ___ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy, the Identification-Authentication Policy, and the Audit
- Policy of the Network. It is expected that the composition
- of a MIA-Component will require significant engineering and
- system architectural consideration.
-
- Whenever a MIA-Component is composed from directly con-
- nected components, the MIA-Component must conform to the
- composition rules for an MI-Component, an MA-Component, and
- a IA-Component.
-
- A.2.15.1. MIA-Component Composition Rating
- _ _ __ _ ___ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component and the A-Component each have an
- evaluation class of C2, the evaluation class assigned to the
- composed MIA-Component, will be either B1 (if the evaluation
- class of the M-Component is B1) or B2 (if the evaluation
- class of the M-Component is greater than B1).
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2 and
- the A-Component has an evaluation class of C2+, the evalua-
- tion class assigned to the composed MIA-Component, will be
- equal to the evaluation class of the M-Component.
-
- A.2.16. MIAD Composition Rules
- _ _ __ ____ ___________ _____
-
- The rules presented below are based on the concept of
- properly composing a component from evaluated components.
- Specifically, the rules presented in this section deal with
- the composition of a component with respect to the MAC Pol-
- icy, the DAC Policy, the Identification-Authentication Pol-
- icy, and the Audit Policy of the Network. It is expected
- that the composition of a MIA-Component will require signi-
- ficant engineering and system architectural consideration.
-
- Whenever an MIAD-Component is composed from directly
- connected components, the MIAD-Component must conform to the
- composition rules for an MIA-Component, an MDA-Component, an
- MDI-Component, and a IAD-Component. If the MIAD-Component
- supports directly connected users then the MIAD-Component
- must, minimally, meet all the requirements for a Class B1
- Network System.
-
- A.2.16.1. MIAD-Component Composition Rating
- _ _ __ _ ____ _________ ___________ ______
-
- Given that a component is composed as described above,
- and that the I-Component and the D-Component each have an
- evaluation class of C2, the evaluation class assigned to the
- composed MIAD-Component will be either B1 (if the evaluation
- class of the M-Component is B1) or B2 (if the evaluation
- class of the M-Component is greater than B1).
-
- Given that a component is composed as described above,
- and that the I-Component has an evaluation class of C2, and
- the D-Component and the A-Component each have an evaluation
- class of C2+, the evaluation class assigned to the composed
- MIAD-Component will be equal to the evaluation class of the
- M-Component.
-
- A.3. Guidelines for Specific Component Evaluation
- _ _ __________ ___ ________ _________ __________
-
- A.3.1. Mandatory Only Components (M-Components)
- _ _ _ _________ ____ __________ _ __________
-
- Mandatory Only Components are components that provide
- network support of the MAC Policy as specified in the Net-
- work Interpretation of the DoD Trusted Computer System
- Evaluation TCSEC. M-Components do not include the mechan-
- isms necessary to completely support any of the 3 other net-
- work policies (i.e., DAC, Identification-Authentication, and
- Audit) as defined in the Interpretation.
-
- M-Components belong to one of four classes B1, B2, B3,
- and A1 (as defined by the requirements below).
-
- M-Components are rated according to the highest level
- for which all the requirements of a given class are met.
-
- A.3.1.1. Overall Interpretation
- _ _ _ _ _______ ______________
-
- In the requirements referenced, TCB will be understood
- to refer to the NTCB Partition of the M-Component. Also any
- reference to audit for an M-Component will be interpreted to
- mean "the M-Component shall produce audit data about any
- auditable actions performed by the M-Component". In addi-
- tion the M-Component shall contain a mechanism for making
- the audit data available to an audit collection component.
-
- A.3.1.2. Generally Interpreted Requirements
- _ _ _ _ _________ ___________ ____________
-
- The requirements listed in the Table A2 apply directly
- to M-Components as interpreted in Part I of this
- interpretation.
-
- Table A2. M-Component Requirements That Can Be Applied
- _____ __ _ _________ ____________ ____ ___ __ _______
- Without Further Interpretation
- _______ _______ ______________
- (NOTE: Table not included)
-
-
-
- A.3.1.3. Specifically Interpreted Requirements
- _ _ _ _ ____________ ___________ ____________
-
- The following requirements require additional interpre-
- tation as indicated. -
-
- A.3.1.3.1. Subject Sensitivity Labels
- _ _ _ _ _ _______ ___________ ______
-
- + Criteria
- (Class B2 - Section 3.2.1.3.3; Class B3 -
- Section 3.3.1.3.3; Class A1 - Section 4.1.1.3.3)
-
- + Interpretation
-
- An M-Component need not support direct terminal input
- in which case this requirement is not applicable. Any M-
- Component which does support direct terminal input must meet
- _________________________
- - For brevity, the following TCSEC sections contain
- pointers to the sections of Part I of the Network In-
- terpretation being interpreted, instead of the actual
- requirements.
-
-
- the requirement as stated.
-
-
- + Rationale
-
- The only way that a user can change the current level
- of the session is to be directly connected to a component
- that supports the MAC Policy. If the user is directly con-
- nected to a component that does not support the MAC Policy
- then the user will always operate at the level of the com-
- ponent to which he is directly attached. If the user is
- directly connected to a M-Component then this M-Component
- must meet the requirements as stated. M-Components which
- may be part of the network which do not directly communicate
- with users need not support this requirement since the
- requirement will be met by the M-Component with which the
- user is directly communicating.
-
- A.3.1.3.2. Trusted Path
- _ _ _ _ _ _______ ____
-
-
- + Criteria
-
- (Class B2 - Section 3.2.2.1.1; Class B3 -
- Section 3.3.2.1.1; Class A1 - Section 4.1.2.1.1)
-
-
- + Interpretation
-
- An M-Component need not support direct user input
- (e.g., the M-Component may not be attached to any user I/O
- devices such as terminals) in which case this requirement is
- not applicable. Any M-Component which does support direct
- communication with users must meet the requirement as
- stated. In addition, an M-Component with directly connected
- users must provide mechanisms which establish the clearance
- of users and associate that clearance with the users current
- session.
-
-
- + Rationale
-
- Trusted Path is necessary in order to assure that the
- user is communicating with the TCB and only the TCB when
- security relevant activities are taking place (e.g., authen-
- ticate user, set current session security level). However,
- Trusted Path does not address communications within the TCB,
- only communications between the user and the TCB. If,
- therefore, an M-Component does not support any direct user
- communication then the M-Component need not contain mechan-
- isms for assuring direct TCB to user communications.
-
- In the case where an M-Component does support direct
- user communication the Clearance of the user must be esta-
- blished by the M-Component. There are three possible means
- of providing this support: a) all direct user connections
- are via single-level channels, where the maximum level of
- the channel equals the minimum level of the channel, and
- physical access to the channel implies clearance to the
- level of the channel; in this case there may exist no secu-
- rity relevant activities so that the applicable trusted path
- requirements may be met by reason of the device labels
- alone, b) some direct user connections are via single-level
- channels, where the maximum level of the channel does not
- equal the minimum level of the channel, and physical access
- to the channel implies clearance to the maximum level of the
- channel, c) some direct user connections are via single-
- level channels, where the maximum level of the channel does
- not equal the minimum level of the channel, and the M-
- Component contains some internal mechanism for mapping the
- user clearance to the range on the channel. The first two
- options map the user clearance to the activities of the user
- through external means. The third option requires some
- internal mechanism. Such a mechanism might be a user
- id/password/clearance database maintained by the M-
- Component. Another acceptable mechanism might be a protocol
- and interface definition within the M-Component for obtain-
- ing such information (via a multilevel channel - the channel
- is multilevel because it is passing labels, i.e., the user
- clearance) from some other M-Component.
-
- A.3.1.3.3. System Architecture
- _ _ _ _ _ ______ ____________
-
- + Criteria
-
- (Class B1 - Section 3.1.3.1.1; Class B2 - Section
- 3.2.3.1.1; Class B3 - Section 3.3.3.1.1; Class A1 -
- Section 4.1.3.1.1)
-
- + Interpretation
-
- An M-Component must meet the requirement as stated. In
- this interpretation the words "The user interface to the TCB
- shall be completely defined..." shall be interpreted to mean
- the interface between the reference monitor of the M-
- Component and the subjects external to the reference monitor
- shall be completely defined.
-
- + Rationale
-
- The M-Component may not have a direct user interface
- but is expected to support subjects which are not part of
- the TCB. It is important that the interface between the TCB
- and subjects external to the TCB be completely defined.
- (Note that in such a case the subjects are always internal
- to the component, viz., are "internal subjects").
-
- A.3.1.3.4. Covert Channel Analysis
- _ _ _ _ _ ______ _______ ________
-
- + Criteria
-
- (Class B2 - Section 3.2.3.1.3; Class B3 -
- Section 3.3.3.1.3; Class A1 - Section 4.1.3.1.3)
-
- + Interpretation
-
- An M-Component must meet the requirement as stated. In
- addition, if the analysis indicates that channels exist that
- need to be audited (according to the Covert Channel Analysis
- Guideline), the M-Component shall contain a mechanism for
- making audit data (related to possible use of covert chan-
- nels) available outside of the M-Component (e.g., by passing
- the data to an audit collection component).
-
- + Rationale
-
- If an M-Component contains covert channels that need
- to be audited the M-Component must produce the audit data
- such that auditing can be performed. Since all covert chan-
- nels in the network occur in an M-Component, the M-Component
- must be the source of the audit record which records the
- possible use of the covert channel.
-
- A.3.1.3.5. Security Testing
- _ _ _ _ _ ________ _______
-
- + Criteria
-
- (Class B1 - Section 3.1.3.2.1; Class B2 -
- Section 3.2.3.2.1; Class B3 - Section 3.3.3.2.1; Class
- A1 - Section 4.1.3.2.1)
-
- + Interpretation
-
- An M-Component must meet the requirement as stated
- except for the words ``normally denied under the ... discre-
- tionary security policy,'' which are not applicable to an
- M-Component.
-
- + Rationale
-
- An M-Component does not support a discretionary secu-
- rity policy, and therefore testing for violations of such a
- policy is of no value.
-
- A.3.1.3.6. Design Specification and Verification
- _ _ _ _ _ ______ _____________ ___ ____________
-
-
- + Criteria
- (Class B1 - Section 3.1.3.2.2; Class B2 - Section
- 3.2.3.2.2; Class B3 - Section 3.3.3.2.2; Class A1 -
- Section 4.1.3.2.2)
-
-
- + Interpretation
-
- An M-Component must meet the requirement as stated.
-
- Security Policy is interpreted to mean the MAC Policy
- supported by the component. Model is interpreted to be
- those portions of a reference monitor model that are
- relevant to the MAC Policy supported by the Component (e.g.,
- the representation of the current access set and the sensi-
- tivity labels of subjects and objects, and the Simple Secu-
- rity and Confinement Properties of the Bell and LaPadula
- Model).
-
- A.3.1.3.7. Trusted Facility Manual
- _ _ _ _ _ _______ ________ ______
-
-
- + Criteria
-
- (Class B1 - Section 3.1.4.2; Class B2 - Section 3.2.4.2;
- Class B3 - Section 3.3.4.2; Class A1 - Section 4.1.4.2)
-
-
- + Interpretation
-
- An M-Component must meet the requirement as stated
- except for the words ``The procedures for examining and
- maintaining the audit files as well as...''. These words are
- interpreted to mean "the mechanisms and protocols associated
- with exporting of audit data must be defined." Also, the
- words "...to include changing the security characteristics
- of a user", shall not be applicable to an M-Component.
-
- + Rationale
-
- An M-Component does not maintain the audit files nor
- does it provide mechanisms for examining them. It must,
- however provide mechanisms for exporting the audit files and
- these mechanisms need to be defined in the Trusted Facility
- Manual. The M-Component also does not maintain user infor-
- mation.
-
- A.3.1.4. Representative Application of M-Components
- _ _ _ _ ______________ ___________ __ _ __________
-
- As an example of an M-Component, consider a MLS packet
- switch that provides MAC through a verified Security Kernel,
- as shown in Figure A1. This component supports 16 levels
- and 64 categories for non-discretionary access classes. The
- MLS packet switch is rated as an A1 M-Component against the
- requirements described above.
-
- Such an A1 M-Component may, as an example, be used in a
- network as a Multilevel Packet Switch. The M-Component
- could be configured with several single-level channels and
- some number of multilevel channels. As part of the example,
- assume that the multilevel channels each have a maximum of
- Top Secret and a minimum of Secret. Also imagine that the
- single-level channels are either Top Secret or Secret. The
- Multilevel channels are directly connected to B2 hosts each
- with a system high of Top Secret and a system low of Secret.
- The single-level channels are directly connected to C2 hosts
- with some of them running at dedicated Secret and some run-
- ning at dedicated Top Secret. One of the Dedicated Top
- Secret Hosts and one of the Dedicated Secret Hosts would be
- responsible for collecting the audit messages sent from the
- M-Component. In this fashion one could create a network
- which could permit the multilevel hosts to securely communi-
- cate with each other as well as with the single-level hosts.
- The separation necessary for such communications would be
- provided by the M-Component being used as a Multilevel
- Secure Packet Switch. It is noted that the composition
- rules of Section A.2 (A.2.5 in particular) result in an
- evaluation class of B2 for the overall NTCB.
-
- A.3.2. Discretionary Only Components (D-Components)
- _ _ _ _____________ ____ __________ _ __________
-
- Discretionary Only Components are components that pro-
- vide network support of the DAC Policy as specified in the
- Network Interpretation of the DoD Trusted Computer System
- Evaluation TCSEC. D-Components do not include the mechan-
- isms necessary to completely support any of the three other
- network policies (i.e., MAC, Identification-Authentication,
- and Audit) as defined in the Interpretation.
-
- D-Components belong to one of three classes, C1, C2,
- and C2+ (as defined by the requirements below).
-
- D-Components are rated according to the highest level
- for which all the requirements of a given class are met.
-
- A.3.3. Overall Interpretation
- _ _ _ _______ ______________
-
- In the requirements referenced, TCB will be understood
- to refer to the NTCB Partition of the D-Component. Also any
- reference to audit for an D-Component will be interpreted to
- mean "the D-Component shall produce audit data about any
- auditable actions performed by the D-Component." In addi-
- tion the D-Component shall contain a mechanism for making
- the audit data available to an audit collection component.
-
- A.3.3.1. Generally Interpreted Requirements
- _ _ _ _ _________ ___________ ____________
-
- The requirements listed in Table A3 apply directly to
- D-Components as interpreted in Part I of this interpreta-
- tion.
-
- A.3.3.2. Specifically Interpreted Requirements
- _ _ _ _ ____________ ___________ ____________
-
- The following requirements require additional interpre-
- tation as indicated. -
-
-
- _________________________
- - For brevity, the following TCSEC sections contain
- pointers to the sections of Part I of the Network In-
- terpretation being interpreted, instead of the actual
- requirements.
-
-
-
-
-
- A.3.3.2.1. Trusted Facility Manual
- _ _ _ _ _ _______ ________ ______
-
-
- + Criteria
-
- (Class C1 - Section 2.1.4.2; Class C2 - Section 2.2.4.2;
- Class C2+ - Section 2.2.4.2)
-
-
- + Interpretation
-
- A D-Component must meet the requirement as stated
- except for the words ``The procedures for examining and
- maintaining the audit files as well as...''. These words are
- interpreted to mean "the mechanisms and protocols associated
- with exporting of audit data must be defined."
-
- + Rationale
-
- A D-Component does not maintain the audit files, nor
- does it provide mechanisms for examining them. It must,
- however provide mechanisms for exporting audit data to an
- audit component, and these mechanisms need to be defined in
- the Trusted Facility Manual.
-
- A.3.3.2.2. Design Documentation
- _ _ _ _ _ ______ _____________
-
-
- + Criteria
-
- (Class C1 - Section 2.1.4.4; Class C2 - Section 2.2.4.4;
- Class C2+ - Section 2.2.4.4)
-
-
- + Interpretation
-
- A D-Component must meet the requirement as stated. In
- addition the Design Documentation must include a description
- of the protocol used by the D-Component to communicate Sub-
- ject permissions (i.e., user ids), where applicable, with
- other components. This protocol must be shown to be suffi-
- cient to support the DAC policy enforced by the D-Component.
-
- + Rationale
-
- A D-Component does not maintain the user
- Identification-Authentication information. It may, however,
- use some form of authenticated user identification as a
- basis for making DAC decisions. Such information must be
- provided to the D-Component through the identification pro-
- tocol. The protocol used by the D-Component may vary, but
- it must be shown to be adequate to support the DAC policy
- supported by the D-Component. As an example consider a sim-
- ple DAC policy in which access is granted, or denied, on a
- per host basis. In this case the protocol used might be to
- staticly assign a host-id to each port. All requests coming
- in from a given port would be associated with the access
- permissions allowed for that host. This protocol would not
- be adequate to support a DAC policy of access granted, or
- denied, on a per user basis.)
-
- A.3.3.3. Representative Application of D-Components
- _ _ _ _ ______________ ___________ __ _ __________
-
- As an example of a D-Component, consider a system that
- provides DAC through Access Control Lists on files, as shown
- in Figure A2. The system is rated as a C2+ D-Component
- against the requirements described above.
-
- Figure A2. Representative Application of D-Components
- ______ __ ______________ ___________ __ _ __________
-
- B1: box wid 1.15i ht .95i "Class B3" "Host" B2: box wid
- 1.15i ht .96i "Class C2+" "Host" "(Network Audit" "Collec-
- tion" "Facility)" at B1.e +(3i,0) B3: box wid 1.15i ht .96i
- "Class C2+" "D-Component" "(Single Level" "File Server" at
- B2.s -(1.75i,.30i) B4: box wid 1.85i ht .96i "Class C2"
- "Host" "(Network Identification &" "Authentication" "Facili-
- ty)" at B1.s -(0,1.05i) B5: box wid 1.15i ht .96i "Class A1"
- "Host" at B2.s -(0,1.05i) B6: box invis "(S)" at B1.e
- +(.50i,.30i) B7: box invis "(S)" at B2.w -(.50i, -.30i) B8:
- box invis "(S)" at B4.e +(.50i,.2) B9: box invis "(S)" at
- B5.w -(.50i,.2) A1: arrow <-> from B4.e to (B3.s.x-
- (B3.s.x+.2,B5.w.y) to (B3.s.x+.2,B3.s.y) A3: arrow left 1i
- from B6.c +(.48,-.15i) A4: arrow right 1i from B7.c
- -(.48i,.15i) A5: arrow down .39i from A4.w A6: arrow down
-
-
- Such a C2+ D-Component may, as an example, be used in a
- network as a Single Level File Server. The D-Component
- could be configured with several communication channels
- (each of which would be connected to single-level devices
- with the same access class). As part of the example, con-
- sider all files on the system to be secret and all channels
- leaving the system to be connected to other single-level
- secret components or, in the case of multi-level components,
- to be connected to single-level secret devices. The docu-
- mentation associated with the D-Component must specify the
- protocol used to pass user-ids and filenames. This protocol
- must be followed on each connection to the component. In
- addition the documentation must specify the protocol used to
- output audit information. The audit protocol must be
- exactly the same as the protocol of the audit node to which
- it is attached. It is noted that the composition rules of
- Section A.2 result in an evaluation class of B3 for the
- overall NTCB.
-
- A.3.4. Identification-Authentication Only Components (I-
- _ _ _ ______________ ______________ ____ __________ _
- Components)
- __________
-
- Identification-Authentication Only Components are com-
- ponents that provide network support of the Identification-
- Authentication Policy as specified in the Network Interpre-
- tation of the DoD Trusted Computer System Evaluation TCSEC.
- I-Components do not include the mechanisms necessary to
- completely support any of the three other network policies
- (i.e., MAC, DAC, and Audit) as defined in the Interpreta-
- tion.
-
- I-Components belong to one of two classes, C1 and C2
- (as defined by the requirements below).
-
- I-Components are rated according to the highest level
- for which all the requirements of a given class are met.
-
- A.3.4.1. Overall Interpretation
- _ _ _ _ _______ ______________
-
- In the requirements referenced, TCB will be understood
- to refer to the NTCB Partition of the I-Component. Also any
- reference to audit for an I-Component will be interpreted to
- mean "the I-Component shall produce audit data about any
- auditable actions performed by the I-Component.'' In addi-
- tion the I-Component shall contain a mechanism for making
- the audit data available to an audit collection component.
-
- A.3.4.2. Generally Interpreted Requirements
- _ _ _ _ _________ ___________ ____________
-
- The requirements listed in Table A4 apply directly to
- I-Components as interpreted in Part I of this interpreta-
- tion.
-
- Table A4. I-Component Requirements That Can Be Applied
- _____ __ _ _________ ____________ ____ ___ __ _______
- Without Further Interpretation
- _______ _______ ______________
- (Note: Table not included)
-
-
-
- A.3.4.3. Specifically Interpreted Requirements
- _ _ _ _ ____________ ___________ ____________
-
- The following requirements require additional interpre-
- tation as indicated. -
-
- A.3.4.3.1. Trusted Facility Manual
- _ _ _ _ _ _______ ________ ______
-
-
-
- _________________________
- - For brevity, the following TCSEC sections contain
- pointers to the sections of Part I of the Network In-
- terpretation being interpreted, instead of the actual
- requirements.
-
-
- + Criteria
-
- (Class C1 - Section 2.1.4.2; Class C2 - Section 2.2.4.2;
- Class C2+ - Section 2.2.4.2)
-
-
- + Interpretation
-
- An I-Component must meet the requirement as stated
- except for the words ``The procedures for examining and
- maintaining the audit files as well as...''. These words are
- interpreted to mean "the mechanisms and protocols associated
- with exporting of audit data must be defined."
-
- + Rationale
-
- An I-Component does not maintain the audit files, nor
- does it provide mechanisms for examining them. It must,
- however, provide mechanisms for exporting audit data to an
- audit component, and these mechanisms need to be defined in
- the Trusted Facility Manual.
-
- A.3.4.3.2. Design Documentation
- _ _ _ _ _ ______ _____________
-
-
- + Criteria
-
- (Class C1 - Section 2.1.4.4; Class C2 - Section 2.2.4.4;
- Class C2+ - Section 2.2.4.4)
-
-
- + Interpretation
-
- An I-Component must meet the requirement as stated. In
- addition the Design Documentation must include a description
- of the protocol used by the I-Component to export Authenti-
- cated Subject Identifiers to other components.
-
- + Rationale
-
- The Authenticated Identifiers provided by an I-
- Component will not be primarily used on the I-Component
- itself but instead will be used by other Components enforc-
- ing the network DAC policy. It is therefore necessary for
- the I-Component to define the protocol which it will use to
- pass authenticated user-ids to other components.
-
- A.3.4.4. Representative Application of I-Components
- _ _ _ _ ______________ ___________ __ _ __________
-
- As an example of an I-Component, consider a system
- which provides Identification and Authentication facilities,
- such as a TAC with a name server, as shown in Figure A3. The
- system is rated as a C2 I-Component against the requirements
- described above. The I-Component could be configured with
- several communication channels (each of which would be con-
- nected to single-level devices with the same access class).
- As part of the example, consider the TAC to be an
- unclassified TAC (i.e., accessible through the phone system
- without any encryption support) and all channels leaving
- the system to be connected to other single-level unclassi-
- fied components or, in the case of multi-level components,
- to be connected to single-level unclassified devices. All
- authentication is done in the TAC, and Authenticated Ids are
- passed to the other nodes of the network to be used as a
- basis for DAC decisions and audit entries. The documenta-
- tion associated with the I-Component must specify the proto-
- col used to pass user-ids to the attached components. This
- protocol must be supported on each connection to the com-
- ponent. In addition the documentation must specify the pro-
- tocol used to output audit information. The audit protocol
- must be exactly the same as the protocol of the audit com-
- ponent to which it is attached. It is noted that the compo-
- sition rules of Section 3 result in an evaluation class of
- B3 for the overall NTCB.
-
- A.3.5. Audit Only Components (A-Components)
- _ _ _ _____ ____ __________ _ __________
-
- Audit Only Components are components which provide net-
- work support of the Audit Policy as specified in the Network
- Interpretation of the DoD Trusted Computer System Evaluation
- TCSEC. A-Components do not include the mechanisms necessary
- to completely support any of the three other network poli-
- cies (i.e., MAC, DAC, and Identification-Authentication) as
- defined in the Interpretation.
-
- A-Components belong to one of two classes C2 and C2+
- (as defined by the requirements below). (The difference
- between a C2 A-Component and a C2+ A-Component is the sup-
- port of real time alarms required by class B3 Audit.)
-
- A-Components are rated according to the highest level
- for which all the requirements of a given class are met.
-
- A.3.5.1. Overall Interpretation
- _ _ _ _ _______ ______________
-
- In the requirements referenced, TCB will be understood
- to refer to the NTCB Partition of the A-Component.
-
- A.3.5.2. Generally Interpreted Requirements
- _ _ _ _ _________ ___________ ____________
-
- The requirements listed in Table A5 apply directly to
- A-Components as interpreted in Part I of this interpreta-
- tion.
-
- A.3.5.3. Specifically Interpreted Requirements
- _ _ _ _ ____________ ___________ ____________
-
- The following requirements require additional interpre-
- tation as indicated. -
-
- _________________________
- - For brevity, the following TCSEC sections contain
- pointers to the sections of Part I of the TNI being in-
- terpreted, instead of the actual requirements.
-
-
- A.3.5.3.1. Design Documentation
- _ _ _ _ _ ______ _____________
-
-
- + Criteria
-
- (Class C2 - Section 2.2.4.4; Class C2+ - Section 2.2.4.4)
-
-
- + Interpretation
-
- An A-Component must meet the requirement as stated. In
- addition the Design Documentation must include a description
- of the protocol used by the A-Component to import Audit Data
- from other nodes.
-
- + Rationale
-
- The Audit component will potentially be used for col-
- lection of audit data generated on many different com-
- ponents. Each of these components must be able to transfer
- the information to the A-component in a form that will allow
- the A-Component to create an audit record. The mechanism
- for defining the acceptable form of information is the pro-
- tocol used by the audit component.
-
- A.3.5.4. Representative Application of A-Components
- _ _ _ _ ______________ ___________ __ _ __________
-
- As an example of an A-Component, consider a system that
- provides Audit Collection and review facilities for a net-
- work environment, as illustrated in Figure A4. The system
- is rate C2+ against the requirements described above.
-
- As part of the example, consider the A-Component to be
- operating at System High (Top Secret) collecting information
- from several components through single-level (Top Secret)
- channels. The A-Component provides auditing functions for
- the network as a whole. The A-Component defines an audit
- protocol which is used by each of the components to communi-
- cate information to the A-Component which results in the
- creation of audit records. Note that in this example the
- Auditor (i.e., the person responsible for reviewing audit
- files) is accessing the A-Component through an operators
- console attached to the A-Component. In a different
- scenario, it might be the case that the Auditor accesses the
- A-Component via another component, in which case the A-
- Component would be responsible for enforcing an access con-
- trol policy that defined which users (i.e., the auditor)
- could view audit data. This would require the A-Component
- to establish a user-id passing protocol much like a D-
- Component. It is noted that the composition rules of Sec-
- tion 3 result in an evaluation class of B3 for the overall
- NTCB.
-
-
- Figure A1. Representative Application of M-Components
- ______ __ ______________ ___________ __ _ __________
-
- (Note: Figure not included)
-
-
- Table A3. D-Component Requirements That Can Be Applied
- _____ __ _ _________ ____________ ____ ___ __ _______
- Without Further Interpretation
- _______ _______ ______________
- (Note: Table not included)
-
-
-
- Figure A3. Representative Application of I-Component
- ______ __ ______________ ___________ __ _ _________
-
- (Note: Figure not included)
-
-
- Table A5. Audit Component Requirements That Can Be Applied
- _____ __ _____ _________ ____________ ____ ___ __ _______
- Without Further Interpretation
- _______ _______ ______________
-
- (Note: Table not included)
-
-
-
- Appendix B
- ________ _
-
-
- Rationale Behind NTCB Partitions
- _________ ______ ____ __________
-
-
-
-
-
- B.1. Purpose
- _ _ _______
-
- Part I of this Trusted Network Interpretation (TNI)
- provides interpretations of the Trusted Computer Security
- Evaluation Criteria (TCSEC) appropriate for evaluating a
- network of computer and communication devices as a single
- system with a single Trusted Computing Base (TCB), called
- the Network Trusted Computing Base (NTCB), which is physi-
- cally and logically partitioned among the components of the
- network. Implicit to this approach is the view that the
- network to be evaluated (including the interconnected hosts)
- is analogous to a single stand-alone computer system, and
- can therefore be evaluated using the TCSEC under appropriate
- interpretation. It is the purpose of this appendix to pro-
- vide the main technical rationale and illustrative examples
- supporting this view. This underlying rationale may also be
- of help to the sponsors and evaluators of networks and net-
- work components in understanding how a network can be
- cleanly partitioned into components in a way that will
- facilitate its eventual evaluation and certification. It is
- recognized that this appendix is in places quite theoretical
- and philosophical. Therefore, readers whose interest is
- primarily in applying the TNI without reviewing its deriva-
- tion may choose not to study this appendix in detail.
-
- The separate Appendix A, providing Interpretations for
- the Evaluation of Network Components, rests upon this view
- as well: the evaluation of particular network components is
- viewed as a useful preliminary step for the eventual evalua-
- tion of the network as a whole, which must proceed, however,
- in the context of an overall network architecture providing
- a clean decomposition of an overall network security policy
- into policies for the individual components. The overall
- architecture and design will, once individual component
- evaluations have been finished, support the final evaluation
- of the network as a sound composition of trusted elements,
- each enforcing its allocated policy, and together enforcing
- the policy defined for the entire network. Specific guide-
- lines for actually partitioning the various network policy
- elements to components are presented under the relevant
- headings in the separate Appendix A for Evaluation of Net-
- work Components: the general rationale supporting the view
- that such a partitioning is possible is presented here.
-
- It is emphasized that the view of what a network is
- (and how its NTCB may be partitioned into NTCB partitions
- completely contained in individual network components)
- described in this appendix is adopted with one goal in mind:
- the evaluation and assignment to the network of a single
- certification as meeting the TCSEC criteria for a given
- evaluation class. It is recognized that this goal may not
- be appropriate for every circumstance, or meet the needs of
- sponsors wishing to interconnect already existing systems.
- The risk assessment and accreditation of such systems is an
- important and interesting problem. It is not, however, the
- problem being addressed here, viz., the evaluation of an
- entire network which is to support a network security policy
- given a priori.
- _ ______
-
- B.2. Background and Overview
- _ _ __________ ___ ________
-
- B.2.1. Organization of this Appendix
- _ _ _ ____________ __ ____ ________
-
- The material within this appendix is organized as fol-
- lows. Section B.3 discusses some considerations for properly
- formulating the policy to be enforced by the network NTCB,
- and its allocation to the various components of the network.
- Section B.4 presents an argument supporting the adequacy of
- the partitioned NTCB view and the conclusion that the refer-
- ence monitor for an entire network may be implemented as a
- collection of locally autonomous reference monitors. Sec-
- tion B.5 discusses the idealization of intercomponent com-
- munications channels, assumed as an axiom in Section B.4, in
- the context of real communications channels, and provides
- insight into when the techniques of communications security,
- and when the techniques of trusted systems technology are
- applicable. Section B.6 provides additional rationale sup-
- porting the partitioned NTCB view.
-
- B.3. Security Policy
- _ _ ________ ______
-
- The TCSEC Glossary defines ``Security Policy'' as ``the
- set of laws, rules, and practices that regulate how an
- organization manages, protects, and distributes sensitive
- information''. It should be noted that ``Security Policy''
- is a distinct notion from that of ``Formal Security Policy
- Model'' and a ``Security Policy Model''. The ``Security
- Policy'' of an organization has the ultimate goal of con-
- trolling the access of people to information.
- ______
-
- Because a Security Policy concerns, by definition, the
- access of people to sensitive information and includes both
- secrecy and integrity; it can, ideally, be stated in a
- manner that is free of computer, network, or communication
- jargon. Moreover, we would observe that the evaluation of a
- network ultimately is possible only if a single, uniform
- network security policy can be adopted by the organizations
- whose information is to be stored, transmitted, or processed
- by the network and its components. The existence of such a
- policy is a precondition of any attempt to evaluate a net-
- work or its components in the sense of this appendix. If a
- network is to be used to allow the sharing of information
- among many organizations, the definition of a mutually
- acceptable Security Policy applicable to that sharing must
- be an early goal during the design of the network if the
- successful certification of a network providing that capa-
- bility is desired.
-
- B.3.1. Mandatory Access Control Policies
- _ _ _ _________ ______ _______ ________
-
- One may observe that, for those access controls nor-
- mally denoted as ``Mandatory Access Controls'', the defini-
- tion of a mutually acceptable joint policy may be expected
- to be relatively straightforward, as such controls are
- based, by definition, upon the comparison of a label denot-
- ing the sensitivity of the information contained within an
- information repository with a user clearance denoting the
- formal authorization of a user to access that information.
- The definition of a jointly acceptable policy may involve
- the merging of several systems of classifications and clear-
- ances into a unified system; in practice, if the systems in
- use by the various organizations are not already identical,
- those responsible for the protection of information within
- each organization must determine which external user clear-
- ances will be honored as an adequate basis for providing
- access to which classes of information.
-
- It may also be true that a particular organization may
- have no explicit policy describable as ``mandatory'' in the
- __
- sense defined by the TCSEC. (In particular, many commercial
- or private institutions may be so characterized)-. It is
- possible to formulate a trivial mandatory access control
- policy for such organizations, however, with a single access
- class and clearance level (i.e., every user belonging to the
- institution has clearance to access all information belong-
- ing to the institution, except as refined by less rigorous
- access controls). Thus, it could well be that an overall
- system of mandatory access controls, at the policy level,
- for an arbitrary collection of institutions wishing to share
- information using a network, can be resolved in a relatively
- straightforward way; at least in the sense that the policy
- issues and effects of particular decisions are easy to
- understand.
-
- B.3.2. Discretionary Access Control Policies
- _ _ _ _____________ ______ _______ ________
-
- Turning to those policies characterizable as involving
- Discretionary Access Controls, one finds substantially
- greater freedom in the sorts of policies an organization
- might adopt. The notion of ``Discretionary Access Con-
- trols'', as defined in the TCSEC Glossary, involves the res-
- triction of access by users to information based upon the
- identity of the users or their membership in a particular
- group, as well as the ability of a user with authorized
- access to an object containing information to pass that
- authorization to other users or groups either directly, or
- _________________________
- - See, for example, Steven B. Lipner, ``Non-
- Discretionary Controls for Commercial Applications'',
- IEEE Proceedings of the 1982 Symposium on Security and
- ____ ___________ __ ___ ____ _________ __ ________ ___
- Privacy, April 26-28, 1982, Oakland, CA.
- _______
-
-
- indirectly (viz., by copying it and providing authorization
- to access the copy). Within these limits, there is an
- extremely broad range of permissible policies, differing in
- how users may be grouped, the sorts of named information
- repositories that may form the basis for access controls,
- the modes of access that may form the basis for controls,
- and the mechanisms that may be defined for users to limit or
- propagate permission to access information. One would
- expect, therefore, that when designing a network, the formu-
- lation of an overall Discretionary Policy by a group of
- organizations may require a period of intensive generaliza-
- tion of policy. Moreover, the overall policy resulting from
- this activity may be expected to depend, to a relatively
- large extent, upon the underlying capabilities and func-
- tionality ascribed to the network.
-
- B.3.3. Supporting Policies
- _ _ _ __________ ________
-
- In addition to the basic access control policies (man-
- datory and discretionary) addressed by the TCSEC are addi-
- tional capabilities relating to the accountability of indi-
- viduals for their security-relevant actions. These capabil-
- ities are usually thought of as comprising ``supporting''
- policy: they provide an environment that allows for the
- effective enforcement and monitoring of the basic access
- policies enforced.
-
- Accountability requirements are comprised of two major
- policy subcategories: identification and authentication pol-
- icy, and audit policy. The former supports both mandatory
- and discretionary access control policy by specifying the
- requirements for authenticating the identity and clearance
- of an individual prior to permitting access, is the basis
- for determining the clearance of an individual in the case
- of mandatory access policy, is the basis for determining the
- group membership of an individual in the case of discretion-
- ary access policy, and is the basis for recording the iden-
- tity of the individual taking or causing an auditable
- action.
-
- Audit policy proper provides for the recording of those
- security-relevant events that can be uniquely associated
- with an individual user, so that those responsible for the
- security of sensitive information may hold users accountable
- for the security-relevant actions they take.
-
- The supporting policies adopted by different organiza-
- tions may differ even more widely than discretionary access
- control policies. The task of formulating a mutually
- acceptable set of overall supporting policies may be
- expected to be even more challenging for the sponsors of a
- network than for discretionary policy.
-
- B.3.4. Formal Security Policy Model
- _ _ _ ______ ________ ______ _____
-
- As defined in the TCSEC, a Formal Security Policy Model
- has a mathematically precise statement of a Security Policy.
- Whereas the objective of stating Security Policy is to
- reflect the requirements imposed upon a system by external
- authority, the purpose of a Formal Security Policy Model is
- to serve as a precise starting point in the chain of argu-
- ments leading to the higher levels of assurance required for
- systems of the higher evaluation classes. Thus, the
- requirement to state a Formal Security Policy Model con-
- sistent with its axioms is first introduced at Evaluation
- Class B2; it is not introduced earlier because the chain of
- arguments needed for lower evaluation classes does not
- require mathematical precision at their onset. The point of
- this observation is that the definition of a Formal Security
- Model is not a gratuitous requirement, but serves the pur-
- pose of facilitating construction of the chain of arguments
- required for the higher evaluation Classes.
-
- Current practice requires a formal security policy
- model only for the access control policies to be enforced.
- The model is a representation of the reference monitor for a
- specific class of systems. The choice of model representa-
- tion is strongly influenced by the technical characteristics
- of the system to be built, as the feasibility and economy of
- constructing the chain of assurance arguments needed to sup-
- port a class B2 or above evaluation is typically substan-
- tially increased by utilizing a model that has an intui-
- tively attractive resemblance to the abstractions of sub-
- ject, object, and access properties of the target system.
-
- As previously described, the reference monitor for a
- partitioned NTCB is composed of a collection of security
- kernels for individual components. In order to obtain the
- required levels of assurance that each such security kernel
- works correctly, a Formal Security Policy Model must be for-
- mulated for each such component. We would argue, however,
- that it is too restrictive to require that the formal model
- for each security kernel be the same, or that an overall
- model be formulated for the network, provided that each
- model is shown by convincing arguments to correctly
- represent the overall Security Policy, as allocated to the
- component. As the only function of a formal model is to
- support the evaluation of a security kernel, the sponsors
- and designers of network components should be free to choose
- that model which will most efficiently serve this purpose,
- relative to the engineering characteristics of the com-
- ponent; subject, of course, to the requirement that the
- model be an accurate representation of the Security Policy
- to be enforced by the component.
-
- B.3.5. Summary of Policy Considerations for a Network
- _ _ _ _______ __ ______ ______________ ___ _ _______
-
- In summary, a precondition for the evaluation of a
- networked system of computers is the formulation of overall
- mandatory (when applicable), discretionary, and supporting
- policies, mutually acceptable to the managements of the
- organizations involved, and stated in terms of people
- accessing information (i.e., free, to the extent feasible,
- of computer and network jargon). In the case of mandatory
- policy, we would expect the formulation of an overall policy
- to involve the relatively straightforward issues of how
- clearances in use by one organization are to relate to the
- information access classes in use by another organization:
- the formulation of appropriate discretionary and supporting
- policies may be expected to be more challenging and signifi-
- cantly influenced by the particular network architecture
- chosen.
-
- B.4. Derivation of the Partitioned NTCB View
- _ _ __________ __ ___ ___________ ____ ____
-
- B.4.1. Introduction to the Partitioned NTCB Concept
- _ _ _ ____________ __ ___ ___________ ____ _______
-
- Using the definitions provided above, the following
- conclusion may be stated: if it is supposed (1) that a sub-
- ject is confined to a single component throughout its life-
- time, (2) that it may directly access only objects within
- its component, (3) that every component contains a component
- reference monitor that mediates all accesses made locally
- (and enforce the same access control policy), and (4) that
- all communications channels linking components do not
- compromise the security of the information entrusted to
- them, one may conclude that the total collection of com-
- ponent reference monitors is a reference monitor for the
- network. The conclusion follows because (1) all network
- accesses are mediated (because there are no non-local
- accesses); and (2) the network reference monitor cannot be
- tampered with (because none of its component reference moni-
- tors can be tampered with), and it is simple enough to vali-
- date (its correct operation, under the suppositions given,
- is assured if the correct operation of each of its component
- reference monitors is individually assured - the stricture
- against access across components prevents the introduction
- of additional complexity).
-
- It is useful, before expanding this basic argument
- within the context of non-idealized network systems, to
- examine briefly the individual preconditions (axioms) that
- must be met in order for the conclusion to be valid, and
- state concisely why there is reason to believe that each can
- be achieved within the current state of network technology.
- Generally, the crucial step the sponsors and architects of a
- proposed network must perform (prior to its evaluation) is
- its partitioning into components and communication channels
- in such a way that all of the axioms can be easily validated
- by the evaluators.
-
- The first axiom is that regarding confinement of sub-
- jects (to a single component). Adoption of the conventional
- notion of a subject as a <process, domain> pair is adequate
- to fulfill this axiom, provided it is recognized that limit-
- ing the access of subjects to objects within the same com-
- ponent ensures that no domain encompasses objects from more
- than one component. It follows that no subject may ``move''
- from one component to another. Even if we permit (as is
- sometimes done) the notion of a ``remote process'', once
- execution begins in a remote component a new subject has
- been introduced (because there has been a change in protec-
- tion domains).
-
- The second axiom requires that a subject be able to
- directly access objects only within the component with which
- the subject is associated. The major theoretical issue to
- be confronted is to understand how information may be
- transmitted between components without the sharing of
- objects between them. This issue is explored in some depth
- in Section B.5. Logically, the connection of components by
- an ideal communication channel is viewed as involving the
- transfer of information from one device to another without
- the existence of an intermediate object. (i.e., information
- ``in motion'' is not regarded as an object - a view which
- seems valid provided that no subjects may access it until it
- ``comes to rest'' within the destination component - and is
- then within an object again). This view is consistent with
- the TCSEC Glossary definition of ``object'' which includes
- the sentence, ``Access to an object potentially implies
- access to the information it contains''. For a Security-
- Compliant communication channel (discussed in Section
- B.6.2), there are no subjects with potential access to the
- information being transmitted while it is in transit: it is
- _____ __ __ __ _______
- therefore unnecessary (and misleading) to treat such infor-
- mation as an object. (This argument is invalid for complex
- channels, which contain internal subjects, which is the rea-
- son that such channels must be further partitioned.)
-
- The third axiom requires that every component contain a
- component reference monitor which enforces that part of the
- network access control policy relevant to subjects and
- objects within the component. In validating this axiom, it
- is important to understand that for certain components, a
- degenerate component reference monitor may suffice (e.g.,
- for a dedicated component for which all subjects and objects
- have, by virtue of the system architecture, the same author-
- ization and sensitivity, respectively, so that no local
- access attempts need be denied on the basis of policy
- enforcement). It is logically equivalent, in such cases, to
- claim that there is a reference monitor (which never does
- anything) or that there is no reference monitor (because
- nothing ever needs to be done). It is also important to
- understand that each reference monitor need only to enforce
- that subset of access control policy relevant (in terms of
- the network system architecture) to the local accesses pos-
- sible within the component.
-
- The fourth axiom requires that communications channels
- between components not compromise the security of sensitive
- information entrusted to them. Establishing that this axiom
- is actually met is a complex problem with some issues dealt
- with during system evaluation, and others during accredita-
- tion for use. A detailed discussion of the issues involved
- is provided in Section B.6 of this Appendix. Until that
- discussion, the validity of the axiom is assumed as a boun-
- dary condition allowing the evaluation of individual trusted
- components of the network, and their composition into a com-
- plete system.
-
- B.4.2. Overview of the Argument for a Partitioned NTCB
- _ _ _ ________ __ ___ ________ ___ _ ___________ ____
-
- To present the concept of a partitioned NTCB, and show
- how the TCSEC Criteria may be applied to it, an application
- analogous to a network of ``loosely-coupled'' NTCB parti-
- tions is described as running upon a single, stand-alone
- computer system with a TCB assumed to be evaluatable in
- terms of the existing Criteria. A series of transformations
- is then performed upon the simulation, that convert it into
- the hypothesized network with a single, partitioned NTCB.
- This argument is meant to demonstrate that the notion of
- partitioning a single NTCB into a set of loosely-coupled
- NTCB partitions is conceptually sound and does not require a
- radical departure from current evaluation practice. In
- effect, the argument serves as a constructive proof
- (although informally stated) that a trusted network is sim-
- ply an instance of a trusted computer system.
-
- B.4.3. Characterization of the Target Monolithic System
- _ _ _ ________________ __ ___ ______ __________ ______
-
- Consider first a multiprocessor, multiprogrammed monol-
- ithic computer system, presumed to conform to the TCSEC Cri-
- teria at, for example, a Class B2 level or higher. It has a
- Formal Security Policy Model, e.g., the Bell and LaPadula
- model, and it has been shown that the system is a valid
- interpretation of that model. In the presumed system, sup-
- pose that the code and data of the TCB is shared among the
- concurrently executing processors, which are tightly-coupled
- on a single bus. (Worked examples of such systems targeted
- for Class B2 or higher exist). Since this is a monolithic
- system with (it is presumed) an ``ordinary'' secure mul-
- tiprogramming operating system, it can support a given pro-
- cess on any processor, which can (potentially) access any
- memory segments it may need to share with any other process
- on any other processor. Additionally, each process can use
- devices through I/O channels that are accessed by service
- calls to the TCB. In particular, assume that there are
- available multilevel I/O channels which can be controlled by
- multilevel trusted processes executing under the control of
- the TCB. Each multilevel channel conforms to the concept of
- a connected multilevel device as identified in the TCSEC
- Criteria.
-
- B.4.4. Characterization of the Loosely-Coupled Trusted Net-
- _ _ _ ________________ __ ___ _______ _______ _______ ____
- work
- ____
-
- Next, consider an arbitrary network architecture, con-
- sisting of various types of nodes (e.g., packet switches,
- network interface units, hosts, etc.) processing information
- at various levels, connected with communication channels,
- possibly multilevel. It is assumed that the network is
- secure, and meets the axioms described in section B.3.1,
- viz., (1) each subject is confined to a single component,
- (2) no subject may access an object within a different com-
- ponent, (3) each component possesses a locally autonomous
- reference monitor, (4) the communications channels are
- secure, in the sense that they do not compromise the secu-
- rity of the information entrusted to them. Host components
- are interconnected via a multilevel communications subnet
- (which may itself be composed of components and simple com-
- munications channels. Subjects within one component can (by
- interacting with the appropriate device drivers) cause
- information to be exchanged between components in a secure
- way.
-
- Note that a point-to-point connection may be abstracted
- as a pair of devices (one at each end) linked by a communi-
- cation medium. A broadcast channel may be abstracted as a
- set of devices (one for each host) linked by a shared com-
- munication medium. The hypothesized network may contain
- both single-level and multi-level connections.
-
- B.4.5. Simulation of the Network on the Monolithic System
- _ _ _ __________ __ ___ _______ __ ___ __________ ______
-
- The proposed system may be simulated in a very natural
- way on the evaluated monolithic computer system.
-
- Each component subject (in the network) is simulated as
- a single subject (on the monolithic target system.) For rea-
- sons that will become clear later, all of the network sub-
- jects within a single component are allocated to a single
- processor of the monolithic system, and it is assumed that
- there is a processor available for each network component.
-
- All of the communication devices are provided as I/O
- devices within the computer system; single- or multi- level
- as appropriate. For each device, it is supposed that there
- is a server subject, which correctly implements the protocol
- ascribed to the communication channel and, for multilevel
- devices, has the trust properties required to function as a
- trusted subject. As each device is local to a processing
- node in the network system, it is made local to the associ-
- ated processor in the monolithic computer system (i.e., it
- is accessible only by that processor).
-
- Finally, the I/O devices are linked using the appropri-
- ate physical media, (which is considered to be external to
- the system): in pairs, for point-to-point channels, and in
- sets, for broadcast channels.
-
- The simulation is now an accurate representation of the
- hypothesized network. Since it runs on an evaluated monol-
- ithic system, it is secure to the degree of assurance
- ascribed to the monolithic system, subject, of course, to
- the provision of appropriate levels of communication secu-
- rity to the various communications channels. The Criteria
- Interpretations provided in the TNI may be viewed (for the
- higher evaluation Classes) as specifying the characteristics
- a network must have to be simulated in the way described.
-
- B.4.6. Transformation of the Monolithic Simulation to a
- _ _ _ ______________ __ ___ __________ __________ __ _
- Distributed System
- ___________ ______
-
- It is instructive to examine certain of the properties
- of the network simulation.
-
- It may be observed that there are no application memory
- segments shared by subjects allocated to different proces-
- sors. This stems from the allocation of all subjects within
- a single network component to a single processor of the
- monolithic system, and from the rule (for the network) that
- no subjects access objects in a different component.
-
- Furthermore subjects executing on different processors
- do not utilize any of the inter-process communications
- mechanisms provided by the TCB; all inter-processor communi-
- cation is provided by means of the I/O device protocols
- embedded in the I/O device drivers, which are part of the
- TCB. Moreover, the (correct) operation of these protocols
- does not depend upon the sharing of memory since they were
- usable in the network being simulated, and thus presumably
- provide for the cooperation of remote devices coupled by a
- shared physical medium.
-
- Thus, outside of the security kernel, no memory seg-
- ments are shared by any two processes running on different
- processors. Assuming that each processor has local memory,
- all application segments may be moved (without effect) to
- the appropriate processor-local memory address space. Sup-
- posing the TCB code is ``pure'' (i.e., re-entrant), complete
- copies of the TCB code may also be removed to the local
- memory address space of each processor without effect.
- Similarly, internal TCB data structures that have elements
- that are accessed only by a single processor can be removed
- to the local memory of that processor without effect.
-
- It may be noted (based upon available worked examples)
- that the only data structures within the TCB, that must be
- ____
- shared by processors, are those representing resources
- shared by processes running on the various processors. How-
- ever, in the simulation just described, there are no such
- shared resources. Devices in the network are local to net-
- work components and are therefore accessed only by subjects
- running on one processor in the computer system. No inter-
- process communication takes place between processors (it is
- all via external communication channels), and the only
- shared global memory required is for the table controlling
- global memory allocated to the subjects, of which there is
- none.
-
- Thus, in the particular network simulation described,
- despite the potential for shared resources assumed by the
- underlying TCB, that potential is never exercised. The par-
- titioning of code and data described allows the internal
- restructuring of the TCB in such a way that the TCB is par-
- titioned and removed to processor local memory throughout,
- with no residual code or data in global memory. This inter-
- nal restructuring in no way affects the operation of the
- system and in no way impacts its compliance with the TCSEC
- Criteria (for the specific application).
-
- Another result of the described partitioning and local-
- ization of the TCB is that no communication ever takes place
- over the system bus: all of the TCB tables may be locked
- locally so that no inter-processor communication within the
- TCB is required, and there are no global memory segments.
- It follows that the bus may be completely severed without
- affecting either the operation of the system or its compli-
- ance (in this particular case) with the Criteria. An
- interesting observation is that no single step in the res-
- tructuring described can be regarded as changing the fact
- that the collection of processors is utilizing a single TCB,
- which is compliant with the Criteria. It is this observa-
- tion that impels one to conclude that a single TCB can be
- properly implemented as a collection of TCB partitions.
-
- The resulting partitioned TCB is now examined. Within
- the TCB are a set of (trusted or untrusted, as appropriate)
- I/O device drivers, one for each I/O device. As con-
- structed, a particular device is utilized only by the sub-
- jects being executed by a single processor: the driver sub-
- ject for that device exists, but is quiescent, on all other
- processors (because none of the application subjects are
- attempting to utilize that device). The driver subject, its
- code, and its data may therefore be removed from the TCB
- partitions for all of the processors except that for which
- the device is local. Again, the system remains a valid
- interpretation of the model, and remains compliant with the
- Criteria.
-
- The resulting system still has only one TCB, parti-
- tioned among a number of asynchronous processors, with the
- code and data for supporting various devices provided only
- within those TCB partitions where they are needed to support
- local devices. The only links between the physical proces-
- ____
- sors are the various single- and multi-level communication
- channels provided. These channels are afforded, it has been
- assumed, the appropriate levels of physical security by com-
- munications security techniques, just as they would be if
- they were media connecting a computer to a remote terminal:
- the provision of this physical security is an axiom in the
- _____
- context of evaluating the validity of the system from a
- ``computer security'' point of view. (This is discussed
- fully in section B.6, as the importance of communications
- security techniques in the context of a network of systems
- must not be trivialized).
-
- Each processor, and its associated devices, is now
- packaged in a separate physical box. There is now little
- difference between the hypothesized ``monolithic computer
- system'' (with an admittedly very specialized application
- running on it) and the network originally hypothesized. The
- single TCB of the partitioned ``monolithic system'' remains
- a single TCB, which has, however, been transformed into a
- ______
- collection of TCB partitions, each of which is responsible
- for enforcing access control policy within its ``local par-
- tition'', or component.
-
- The TCB in a particular box may now be replaced by an
- equivalent TCB (that is, a TCB with the same top-level
- specifications, and with an equivalent degree of assurance)
- without impacting the overall security of the system or its
- adherence to the TCSEC Criteria. In fact, both the hardware
- and software TCB bases within a partition could be replaced,
- as long as the replacement has the same (or greater) evalua-
- tion class and completely honors the interface protocols
- (and thus, for example, correctly receives and transmits
- labeled datagrams) defined for the devices connecting it it
- with the other processors.
-
- Finally, the particular Formal Security Policy Models
- upon which the TCBs within each box are based might be
- allowed to differ without adverse impact, so long as each
- model used was a valid representation of the single Network
- Security Policy to be enforced, as allocated to the activi-
- ties of the application subjects within the box.
-
- B.4.7. Conclusions Regarding the Simulation Argument
- _ _ _ ___________ _________ ___ __________ ________
-
- This informal argument shows how a network of process-
- ing nodes, which are ``locally autonomous'' (with respect to
- their enforcement of a global Security Policy for access
- controls), can be simulated upon a clearly evaluatable
- monolithic system with a security kernel, and, in turn, how
- that system can be physically partitioned into a confedera-
- tion of components, each with its own TCB partition. The
- resulting system is the originally desired network in all of
- its essential features, and is clearly in harmony with the
- intent of the TCSEC Criteria. This argument provides an
- intuitive basis for the interpretation of the Criteria pro-
- vided in the TNI. It also shows the sense in which the col-
- lection of NTCB partitions may be viewed as forming a single
- ______
- NTCB: there is a single NTCB because there is a single Secu-
- rity Policy for the network, which is locally enforced by
- each NTCB partition upon its local subjects and objects
- (i.e., upon the resources it controls).
-
- Of significance for the design and evaluation of net-
- works targeted for the higher evaluation classes is the fact
- that under the assumptions that an overall Network Security
- Policy has been defined, and that the communication channels
- between components function correctly, (i.e., maintain the
- proper associations between labels, user identifications,
- clearances, and names of objects), there is no compelling
- reason to insist that the required assurance for each pro-
- cessing node be obtained using the same Formal Security Pol-
- icy Model.
-
- B.5. Cooperation Among Partitions
- _ _ ___________ _____ __________
-
- In this section we focus on that part of the NTCB out-
- side the security kernel, i.e., that part involved in the
- implementation of supporting policies and typically carried
- out by trusted subjects. Some non-kernel NTCB functions are
- essentially the same as those normally provided in a non-
- networked trusted computer system, such as login authentica-
- tion of local users. Such functions in an NTCB partition
- can be understood in terms of the services they perform
- within the network component.
-
- Other non-kernel NTCB functions provide distinctively
- network-related services that can best be understood in the
- context of the network security architecture. We shall
- refer to these as trusted network services. Very often, an
- essential task of these functions is to implement a protocol
- for conveying security-critical information between trusted
- subjects in different components. The trusted protocol is
- not an end in itself, but a means to accomplish services for
- which cooperation between NTCB partitions is needed. A sim-
- ple example would be the need to change the security level
- of a single-level communications channel. While each com-
- ponent could internally relabel the I/O device connected to
- its own end of a channel, a trusted protocol is required to
- coordinate the changes.
-
- In this section there will be two brief examples illus-
- trating the relationship between a network security archi-
- tecture and an associated trusted network service. One
- example network uses trusted network interface units and
- protected wire distribution, and the other uses end-to-end
- encryption. After the examples, design specification and
- verification of trusted network services will be discussed.
-
- B.5.1. Trusted Interface Unit Example
- _ _ _ _______ _________ ____ _______
-
- Consider a network in which untrusted hosts operating
- at various single security levels communicate through
- trusted network interface units (TIU's) that send and
- receive labeled messages in the clear over a protected com-
- munication subnet. The function of a TIU is to place mes-
- sage sensitivity labels on outgoing messages, and to check
- labels on incoming messages, so that hosts may send and
- receive only messages labeled in accordance with their
- accreditation.
-
- Because the communication subnet carries messages at
- all levels, the I/O device connecting any TIU and the subnet
- is single-level system-high. But the connection between any
- TIU and its host is at the level of the host. Thus, a TIU
- for a low-level host must contain a trusted subject that
- reads high and writes low.
-
- There is a trusted protocol in this example, though it
- is relatively trivial, since it merely identifies a header
- field in each message that should contain a sensitivity
- label, and perhaps also a checksum to guard against
- transmission errors. A protocol of this kind is required
- whenever information is exported or imported over a mul-
- tilevel communications channel. See section 3.1.1.3.2.1 of
- Part I of this document.
-
- B.5.2. End-to-End Encryption Example
- _ _ _ ___ __ ___ __________ _______
-
- Consider a network in which hosts operating at various
- security levels communicate through trusted front-end pro-
- cessors (TFE's) that send and receive encrypted messages
- over a public communication subnet. Suppose that the TFE's
- obtain encryption keys at the level of the information to be
- protected from a central key distribution center (KDC) sup-
- porting the various security levels of the network, attached
- to the network in the same way as a host. A key is sent
- from the KDC to a TFE upon request, using an appropriately
- certified protocol that authenticates both the requester and
- the new key.
-
- The purpose of key distribution is really to support a
- trusted local service within the TFE, namely, the ability to
- transform classified messages from the host into unclassi-
- fied encrypted messages suitable for transmission over the
- subnet. In other words, there is a trusted subject that
- reads high and writes low.
-
- Part of the trusted network service is implemented
- within the KDC, which must generate new keys for the level
- of information being communicated, and must also decide, on
- the basis of an access control policy, which TFE's may share
- keys. A single level subject in the KDC at the level of the
- information which the key is for does not necessarily
- require privileged treatment from the kernel in the KDC;
- however, such trusted network service subjects at the vari-
- ous levels must correctly implement a certain policy and a
- certain protocol.
-
- B.5.3. Design Specification and Documentation
- _ _ _ ______ _____________ ___ _____________
-
- To obtain the level of assurance needed for systems of
- Evaluation Class A1, a formal top-level specification (FTLS)
- of the NTCB is required, including a component FTLS for each
- NTCB partition. As in the case of stand-alone computer sys-
- tems, non-kernel portions of the NTCB must be specified even
- though they support policies that are not part of the access
- control policy represented in the formal security policy
- model. In particular, software supporting trusted network
- services in each component must be specified.
-
- Where a trusted network service supporting the manda-
- tory policy depends on a protocol, the protocol will neces-
- sarily appear in FTLS of some component(s) of the network.
- As a minimum, the role of the trusted subject in each NTCB
- partition will be implicit in each component FTLS. Trying
- to understand a protocol by looking at each participating
- process separately, however, is like trying to read a play
- in which the lines have been sorted by character. For pur-
- poses of documentation, it is desirable to provide a
- representation of each trusted protocol in a fashion that
- exhibits the interactions between participants, and the
- correspondence between this representation and the relevant
- parts of component FTLS's should be shown.
-
- Just as the FTLS of a stand-alone TCB contains
- representations of operating system conceptual entities,
- such as processes, devices, memory segments, and access
- tables, the FTLS of an NTCB contains representations of pro-
- tocol entities and concepts, such as connections, where they
- occur, such as in trusted network service specifications.
-
- In the end-to-end encryption example, correspondence of
- the FTLS to the trusted network services supporting policy
- should include the demonstration of at least the properties
- that all data transmitted over the communication subnet is
- encrypted with the proper key (e.g., for the correct secu-
- rity level), and that the KDC allows keys to be shared only
- in accordance with its access control restrictions. Both
- properties might be stated and proved in terms of connec-
- tions between hosts. In the trusted interface unit example,
- the correspondence should show that each TIU marks and
- checks message labels in accordance with a given host label.
-
- B.5.4. Summary
- _ _ _ _______
-
- Some non-kernel NTCB functions in a network may be
- characterized as trusted network services. They provide
- trusted protocols to implement security-critical cooperation
- between trusted subjects in different NTCB partitions.
- Showing correspondence between the FTLS for these services
- and their supporting policies implies proving certain pro-
- perties, expressed in terms of network-specific concepts,
- which convey essential features of the network security
- architecture.
-
- B.6. Communication Channels Between Components
- _ _ _____________ ________ _______ __________
-
- In this section the communication channels used to con-
- nect components are examined more closely, with the goal of
- understanding when the characteristics of a particular chan-
- nel are relevant to the security characteristics of the sys-
- tem, how the characteristics of such a channel are to be
- evaluated and related to the overall evaluation of the net-
- work, and those factors that must be deferred to the assess-
- ment of the adequacy of the network to support a particular
- application of it preceding its accreditation.
-
- The discussion is organized into the following major
- parts. In section B.6.1, the notion of a ``communication
- channel'' is related to the technical terminology provided
- by the TCSEC Glossary. In section B.6.2, the notion of a
- ``Security-Compliant communication channel'' is defined.
- The remaining parts of the section discuss the important
- cases of channels that are single-level and multilevel (in
- the mandatory policy sense).
-
- B.6.1. Basic Notion of A Communication Channel
- _ _ _ _____ ______ __ _ _____________ _______
-
- For the purposes of the TNI the network is viewed as a
- system of components, connected (at the physical layer) by
- communication channels. The term ``communication channel''
- is used as a refinement of the term ``channel'', defined in
- the TCSEC Glossary as ``an information transfer path within
- a system.'' The term may also refer to the mechanism by
- which the path is effected. It is further required, for the
- purposes of applying the TNI to a network, that the network
- architecture be formulated in sufficient detail that all
- communication channels are Security-Compliant as defined
- below.
-
- ``Point-to-point'' communication channels are discussed
- first. The notions of ``communication channel'' and ``I/O
- device'' are distinct: a point-to-point communication chan-
- nel is viewed as consisting of two I/O devices (each local
- to the component it is attached to) coupled by a communica-
- tions medium (which may in reality consist of a complex
- arrangement of internal devices, switches, and communica-
- tions links). From the point of view of the components,
- information is transmitted via the transmitting and receiv-
- ing devices in a sufficiently error-free, physically secure
- fashion to merit the particular labels associated with the
- device. It is, of course, the concern of both the sponsor
- and evaluator of a particular network to confirm that this
- condition is met to an appropriate level of assurance,
- depending upon the security policy allocated to the channel.
- This requirement, which is a boundary condition upon which
- the evaluation of the NTCB partition itself, will typically
- be met by a combination of error-detection and recovery
- techniques, cryptographic techniques, and other communica-
- tions security techniques as addressed in Section 9 of Part
- II.
-
-
- (Note: Figure not included)
-
- Figure B1. Point-to-point communication channel.
-
- For example, two processing nodes connected by a single
- channel would be modeled as shown in Figure B1. Here, we
- would speak of processing component P1 using I/O Device D1
- to communicate, via I/O Device D2, with processing component
- P2. D1 and D2 are assumed to be linked by some sort of phy-
- sical medium M (perhaps a set of wires, perhaps something
- more complicated.) Subject S1 in component P1 may transmit
- information to a subject S2 in P2 as follows: each subject
- obtains an object of the appropriate class for use as a
- buffer. Each subject attaches its locally available device.
- Subject S1 in P1 then transmits the information in its
- buffer to D1; subject S2 receives the information via D2 in
- its buffer. Note that in this description, it was quite
- unnecessary to introduce the notion of either a shared
- object or a shared device. Of course, the details of the
- inter-communication will depend upon a shared communications
- protocol.
-
- Broadcast communication channels are only slightly dif-
- ferent, from the point of view adopted within the TNI, from
- point-to-point communication channels. Instead of a pair of
- I/O devices linked by a physical medium, there is a set of
- I/O devices linked by a physical medium. Each device may be
- a receiver, a transmitter, or a transceiver in nature. It
- is assumed that anything transmitted by a transmitter can be
- received by any receiver. (It is, of course, determined by
- the communication protocols being executed by the various
- devices whether reception actually results in any meaningful
- action by a particular receiver.)
-
- B.6.2. Security-Compliant Channels as the Basis for Evalua-
- _ _ _ ________ _________ ________ __ ___ _____ ___ _______
- tion
- ____
-
- Communication channels in trusted network architecture
- must be Security-Compliant. A channel is Security-Compliant
- ________ _________
- if the enforcement of the network policy depends only upon
- characteristics of the channel either (1) included in the
- evaluation, or (2) assumed as a installation constraint and
- clearly documented in the Trusted Facility Manual. The first
- approach tends to produce evaluated network systems whose
- security characteristics are relatively immune to installa-
- tion or configuration choices. The second approach yields
- evaluated network systems whose security is more strongly
- conditioned upon the appropriateness of installation or con-
- figuration choices; however, the conditions and limitations
- of the evaluation are clearly documented.
-
- The overall security of the network can be assessed by
- verifying the correctness of the NTCB partitions (an evalua-
- tion issue) and by verifying that the required environmental
- constraints documented for all communications channels are,
- in fact, met by the installation (an accreditation issue).
- The thrust of this section is to show that channels that are
- not Security-Compliant may be reduced to Security-Compliant
- channels so that the resulting architecture will support a
- viable network evaluation. Three general techniques are
- available for rendering a channel Security-Compliant: 1) the
- utilization of the channel for security-critical transmis-
- sions may be restricted by using controls internal to the
- NTCB partitions of the components linked by the channel; 2)
- end-to-end communications technologies (such as encryption)
- may be installed and evaluated as part of the linked NTCB
- partitions to eliminate the influence of the channel's phy-
- sical environment on the security properties of the channel;
- and 3) constraints on the intrinsic characteristics assumed
- for the channel may be documented in the Trusted Facilities
- Manual. The last approach, in effect, reserves determination
- of the adequacy of a particular channel to the accreditor:
- the evaluation proper will be based upon a communications
- channel, which will be assumed to have the desired charac-
- teristics.
-
- The evaluation effort is focused upon establishing the
- correctness of the technique, or combination of techniques
- employed. The adequacy of the mechanisms is an accreditation
- issue. For example, the issues related to the adequacy of
- data confidentiality service are discussed in Part II.
-
- A channel can be made Security-Compliant by using a
- combination of the above techniques: cryptographic sealing,
- for example, addresses the issues of both prevention of
- unauthorized modification and error-detection. In evaluating
- each channel, three vulnerabilities related to external
- environmental factors and one related to internal exploita-
- tion must be addressed. They are as follows:
-
- 1. Communication security - unauthorized disclosure or
- modification of sensitive information in transit
-
- 2. Communication reliability - unreliable delivery of
- information, (e.g., non-delivery, misdelivery, and
- delivery of erroneous data) the delivery of which is
- required for the correct operation of the NTCB (such
- as audit records or inter-partition security coordi-
- nation)
-
- 3. Communication fidelity - changes to security-
- critical data, such as transmitted security labels,
- due to noise. (Note that changes due to unauthor-
- ized modification are categorized as a communica-
- tions security problem)
-
- 4. Covert signaling - manipulation of the channel
- mechanisms to signal information covertly
-
- The use of a channel as a covert signaling mechanism
- will be evaluated in the normal course of events (if
- required by the Criteria) when the required covert channel
- analysis of the channel drivers, which are part of the
- linked NTCB partitions, is performed. See the Covert Chan-
- nel Analysis section in Part I. Techniques for addressing
- the remaining three vulnerabilities are listed below.
-
- The first vulnerability, to the security of sensitive
- information in transit, must be addressed by one or more of
- the following techniques:
-
- 1. Documenting a constraint in the Trusted Facilities
- Manual that the installed channel be completely con-
- tained within an adequate security perimeter
- (thereby deferring an assessment of compliance to
- accreditation)
-
- 2. Providing, for the channel, suitable end-to-end com-
- munications security techniques which are documented
- and evaluated as part of the NTCB partitions linked
- by the channel
-
- 3. Restricting utilization of the channel to the
- transmission of non-sensitive information by means
- of controls internal to the NTCB partitions linked
- by the channel
-
- Vulnerability of a channel to the unreliable delivery
- of security-critical information must be addressed by one or
- more of the following techniques:
-
- 1. Documenting a constraint in the Trusted Facilities
- Manual that the channel be comprised of intrinsi-
- cally reliable media and devices (thereby deferring
- an assessment of compliance to accreditation)
-
- 2. Providing for the channel suitable end-to-end proto-
- cols for the reliable transmission of information
- within the NTCB partitions coupled by the channel,
- which will thereby be evaluated for correctness
-
- 3. Restricting use of the channel to transmissions, the
- delivery of which is not critical to the functioning
- of the NTCB, by means of controls internal to the
- NTCB partitions linked by the channel, which will
- thereby be evaluated for correctness
-
- Vulnerability of a channel to noise, which may comprom-
- ise the correctness of security-relevant data (such as secu-
- rity labels) must be addressed by one or more of the follow-
- ing techniques:
-
- 1. Documenting a constraint in the Trusted Facilities
- Manual that the channel be comprised of intrinsi-
- cally noise- free media and devices (thereby defer-
- ring an assessment of compliance to accreditation)
-
- 2. Providing for the channel suitable end-to-end noise
- reduction techniques within the NTCB partitions
- linked by the channel, which will thereby be
- evaluated for correctness
-
- 3. Restricting use of the channel to transmissions, the
- noise-free delivery of which is not critical to the
- functioning of the NTCB, by means of controls inter-
- nal to the NTCB partitions linked by the channel,
- which will thereby be evaluated for correctness
-
- Three example scenarios are provided below, showing how
- these techniques might be employed.
-
- Example A. Two loosely-coupled trusted coprocessors,
- _______ _
- one in active use and the other in ``hot standby'', are to
- be linked by a dedicated communications channel.
- Significant amounts of dynamic, security-relevant data will
- be exchanged over this channel. The channel must be trusted
- to preserve label integrity and provide reliable and noise-
- free delivery of security-critical data. Noise is not a
- design issue. The channel must reside in a physically secure
- environment.
-
- The simplest evaluation strategy would be to document
- the required environmental constraints in the Trusted Facil-
- ities Manual: that the channel be placed within the
- ``system-high'' security perimeter, and that it be comprised
- of intrinsically reliable and noise-free media and devices.
- During evaluation the proper documentation of these con-
- straints would be verified. Compliance of the selected chan-
- nel in the physical installation to them would be an accred-
- itation issue which, in this case, would (apparently) be
- easy to verify. This evaluation approach would have the
- advantage of allowing replacement of the original channel
- with a higher-performance version without inducing re-
- evaluation (although the system would have to be accredited
- again).
-
- Example B. Numerous single-level hosts (at several
- _______ _
- levels) are interconnected via a multilevel packet switch,
- which emulates multiple point-to-point networks between com-
- munities of hosts of the same level. Communications between
- host and packet switch are in the clear the sensitivity
- level of each host is determined at the switch by internally
- labeling the hard-wired communication ports. The communica-
- tion channel must be secure (separation of data of different
- levels must be maintained), but it need be neither reliable
- nor noise-free (from the point of view of security).
-
- Two quite different approaches might be regarded as
- suitable for the evaluation of this architecture. In the
- first, (and most natural), the architecture would be refor-
- mulated to show the packet switch as a network component,
- connected to each host with a single-level channel. Network
- documentation would then indicate that each of the new chan-
- nels be constrained to be located within an appropriate
- security perimeter (so that physical security is main-
- tained), and that no security-critical information requiring
- either reliability or fidelity is transmitted over them. The
- second assertion would be verified during evaluation, and
- the first during accreditation.
-
- A second (radical) approach would be to insist that the
- packet switch is part of the communication channel. In this
- case, it is difficult to see how the required Security-
- Compliance is to be attained while encompassing the packet
- switch within the evaluation, as end-to-end techniques are
- not in use, and it is obvious that sensitive information is
- being transmitted. The sponsor could document a constraint
- upon the interconnection of hosts that the (nominally
- point-to-point) channels be each confined within a security
- perimeter, thereby excluding the packet switch from evalua-
- tion, but it is also then dropped from the description of
- the network being evaluated, and is replaced by ``nomi-
- nally'' Security-Compliant point-to-point channels, docu-
- mented in the Trusted Facilities Manual. The decision to use
- a particular multilevel packet switch to meet the documented
- requirement for an adequate security perimeter between the
- point-to-point virtual channels would then be the responsi-
- bility of the accreditor of such a system alone. In effect,
- such a strategy when applied to the system described is a
- decision to use the techniques described in Appendix C (the
- system actually evaluated is an uninteresting subset of the
- originally envisioned system)
-
- Example C. Two trusted multilevel systems are to con-
- _______ _
- duct file transfers over a channel, which is intrinsically
- noisy, unreliable, and insecure. The data is to be encrypted
- and cryptographically sealed. Reliable transmission is
- enforced by non-NTCB software. (This is not security-
- relevant, however, because the loss of a data packet is not
- an insecurity).
-
- The communications security and cryptographic sealing
- techniques must be included within the evaluated NTCB parti-
- tions. Assessment of their correctness will be part of the
- evaluation, and assessment of their adequacy, based upon the
- true sensitivity of the information transferred, will be
- part of the accreditation. In order to address channel reli-
- ability, the NTCB internal control mechanisms preventing the
- utilization of the channel for security data needing to be
- transmitted reliably must be documented and evaluated (in
- this case, the argument is probably the degenerate case:
- that no such information exists.) See, for example, the
- Encryption Mechanism section in Part II.
-
- B.6.3. TCSEC Criteria for Multilevel Communication Channels
- _ _ _ _____ ________ ___ __________ _____________ ________
-
- In this section, those TCSEC Criteria relevant to the
- utilization of communication channels within networks are
- examined, from the point of view of countering internal
- threats. As the Criteria for Class A1 are the most
- stringent and are a superset of the requirements for other
- classes, they are the basis for the discussion.
-
- The Class A1 Criteria (Section 4.1.1.3.4) requires that
- ``the TCB shall support the assignment of minimum and max-
- imum security levels to all attached physical devices.'' The
- basis for making this designation is also stated in Section
- 4.1.1.3.4: ``these sensitivity levels [i.e., for devices]
- shall be used by the TCB to enforce constraints imposed by
- the physical environments in which the devices are
- located''.
-
- In the case of a communication channel connecting com-
- ponents of a network, the ``physical environment'' must be
- interpreted to include the environment of the devices and
- the medium linking them. The range of access classes (from
- the Network Mandatory Access Control Policy) to be assigned
- to the channel must take into account the physical security
- afforded to the medium, the communications security tech-
- niques that have been applied to the secure information
- being transmitted through the medium, the physical accessi-
- bility of the devices involved in the channel, and the
- intended use of the channel from an architectural point of
- view for the network. Within these constraints, the Cri-
- teria cited requires that the devices comprising the channel
- be appropriately labeled (with, it may be inferred, locally
- ``appropriate'' internal labels). For example, a particular
- channel may be designed to support the transmission of
- UNCLASSIFIED through SECRET information. The receivers and
- transmitters coupling the transmission medium to the hosts
- (assuming all hosts receive and transmit at all levels) must
- be labeled within each host with whatever the local internal
- labels are designating the UNCLASSIFIED through SECRET
- range. That such labels exist is guaranteed by the require-
- ment to interpret properly a network Security Policy for
- each NTCB partition.
-
- In addition to the labeling of devices coupling network
- processing components to the communication channels which
- may exist, the TCSEC requires, for multi-level channels,
- that all information exported to, and imported from, the
- channel be properly labeled: ``when exported by the TCB,
- sensitivity labels shall accurately and unambiguously
- represent the internal labels and shall be associated with
- the information being exported'' (Section 4.1.1.3.2); furth-
- ermore, ``when the TCB exports or imports an object [sic]
- over a multilevel channel, the protocol used on that channel
- shall provide the unambiguous pairing between the sensi-
- tivity labels and the associated information that is sent or
- received'' (Section 4.1.1.3.2.1). The interpretation of
- these Criteria appears to be straightforward: in the context
- of a network communication channel, they imply that informa-
- tion be properly labeled when it is exported, that there be
- a shared protocol between the exporting and importing dev-
- ices which unambiguously and correctly maintains the label-
- _____________ ___ _________
- information association, and that the resulting imported
- label be honored by the receiving NTCB partition. Note that
- the requirement for integrity relative to label-data associ-
- ations is clearly stated and need not be hypothesized as a
- requirement specific to networks.
-
- B.6.4. Single-Level Communication Channels
- _ _ _ ______ _____ _____________ ________
-
- The Criteria states that ``the TCB shall support the
- assignment of minimum and maximum security levels to all
- attached physical devices'' which ``enforce constraints
- imposed by the physical environments in which devices are
- located'' (Section 4.1.1.3.4). Note that this capability is
- required to exist for all devices, whether ``single-level''
- ___
- or ``multilevel''. The distinguishing characteristic of
- ``single-level devices and channels'' is stated in Section
- 4.1.1.3.2.2, ``single-level I/O devices and channels are not
- required to maintain the sensitivity labels of the informa-
- tion they process''. Thus, a device and/or channel which
- does not support the transmission of labeled information is,
- by definition, ``single-level''.
-
- There are two cases: the minimum and maximum security
- levels of the devices coupling the channel to the processing
- nodes may be all the same, or not.
-
- The case in which all of the minimum and maximum secu-
- rity levels are identical is the normal case (for network
- communication channels) of a channel which is to transmit
- information of a single, invariant, sensitivity level.
-
- It is also possible that the minimum and maximum ranges
- of the various devices associated with a single-level chan-
- nel are not all the same. In this case, the channel may
- carry unlabeled information, but of only one sensitivity
- level at a time. It is the responsibility of each NTCB par-
- tition coupled to the channel to prevent the transmission of
- information of a sensitivity level different from the
- current level of the channel in accordance with Section
- 4.1.1.3.2.2, ``the TCB shall include a mechanism by which
- the TCB and an authorized user reliably communicate to
- designate the single security level of information imported
- or exported via single-level communication channels or I/O
- devices''. In the context of a partitioned NTCB, this means
- that single-level channels may be defined as part of the
- network architecture which can be manually shifted from the
- transmission of one level of unlabeled information to
- another by an authorized user. The natural interpretation
- of the criterion cited above is that a reliable protocol
- must exist for informing each NTCB partition involved in
- controlling access to the channel that a change in level has
- been ordered, prior to the transmission of any information
- over the channel (so that the ``implied'' label can be
- correctly assigned by each NTCB partition to information
- received).
-
- B.7. Miscellaneous Considerations
- _ _ _____________ ______________
-
- B.7.1. Reference Monitor, Security Kernel, and Trusted Com-
- _ _ _ _________ _______ ________ ______ ___ _______ ____
- puting Base
- ______ ____
-
- The notion of a ``reference monitor'' is the primary
- abstraction allowing an orderly evaluation of a stand-alone
- computer system with respect to its abilities to enforce
- both mandatory and discretionary access controls for the
- higher evaluation Classes.
-
- The TCSEC Glossary defines the ``Reference Monitor Con-
- cept'' as ``an access control concept that refers to an
- abstract machine that mediates all accesses to objects by
- subjects''. Although the reference monitor abstraction
- includes the notion of protection, the abstraction itself is
- independent of any particular access control policy. The
- abstraction assumes that a system is comprised of a set of
- active entities called ``subjects'' and a set of passive
- entities called ``objects''. The control over the relation-
- ships between subjects and objects, i.e., the access of
- objects by subjects, is mediated by the reference monitor in
- such a way that only accesses permitted by the access con-
- trol policy being enforced, are permitted by the reference
- monitor. The reference monitor is thus the manager of the
- physical resources of a system. A distinguishing feature of
- the monitor is that there is a well-defined interface, or
- ``perimeter'', between the reference monitor itself and the
- subjects and objects it controls. To be effective in pro-
- viding protection, the implementation of a reference monitor
- must be (1) tamper-proof, (2) always invoked, and (3) simple
- enough to support the analysis leading to a high degree of
- assurance that it is correct.
-
- The hardware and software components of a computer sys-
- tem implementing a reference monitor meeting these princi-
- ples is called a ``security kernel'', defined in the TCSEC
- Glossary as ``the hardware, firmware, and software elements
- of a Trusted Computing Base that implement the reference
- monitor concept. It must mediate all accesses, be protected
- ___
- from modification, and be verifiable as correct''.
-
- From this definition, it is apparent that a ``security
- kernel'' (if there is one) is always part of the TCB of a
- computer system, defined as ``the totality of protection
- mechanisms within a computer system - including hardware,
- firmware, and software - the combination of which is respon-
- sible for enforcing a security policy ... the ability of a
- Trusted Computing Base to correctly enforce a security pol-
- icy depends solely on the mechanisms within the TCB and on
- the correct input by system administrative personnel of
- parameters (e.g., a users' clearance) related to the secu-
- rity policy.'' In particular, the TCB includes those mechan-
- isms involved in the implementation of supporting policies,
- while the (included) security kernel (if there is one) is
- involved only with the enforcement of access control poli-
- cies.
-
- B.7.2. Network Trusted Computer Base and Reference Monitor
- _ _ _ _______ _______ ________ ____ ___ _________ _______
-
- The notions of a TCB, and, for the higher evaluation
- classes, security kernel and reference monitor can, with
- suitable interpretation, be applied directly to the evalua-
- tion of trusted networks without significant change. In
- particular, the Network Trusted Computing Base can be
- defined as the totality of protective mechanisms within the
- network (including mechanisms provided by connected host
- systems) responsible for enforcing the (overall) security
- policy. Implied in this definition is the strong notion
- that an evaluated network has a single NTCB, as the NTCB is,
- ______
- by definition, the totality of enforcement mechanisms for
- ________
- the stated policy.
-
- For the higher evaluation classes the TCSEC requires,
- in effect, that a reference monitor be implemented as part
- of the TCB. This, at least in theory, is not the only con-
- ceivable technology for implementing a highly-assured system
- (one could envision a completely verified system, for
- instance); however, it appears to be the only current tech-
- nology with a proven track record, and within the current
- state-of-the-art to be able to be implemented economically.
-
- For these reasons, the Part I of the TNI takes a prag-
- matic stance with regard to specifying interpretations for
- Trusted Networks: that the TCSEC notions of ``reference mon-
- itor'' and ``security kernel'' be applied in the network
- system context with as little change as possible for the
- higher evaluation classes. We therefore assume that the
- NTCB of a Trusted Network of class B2 or above must contain
- the physical realization of a reference monitor which medi-
- ates all references within the networked system of subjects
- to objects, is tamperproof, and is small enough, in aggre-
- gate, to validate.
-
- B.7.3. NTCB Partitions
- _ _ _ ____ __________
-
- The view taken of a ``network system'' throughout the
- TNI is that the network can be partitioned into ``com-
- ponents'', each of which has various processing and communi-
- cation capabilities. Given such a decomposition, the func-
- tions of the NTCB must be allocated in some coherent way to
- the various components of the network.
-
- The following terminology is introduced: the totality
- of hardware, firmware, and software mechanisms within a sin-
- gle network component which is responsible for enforcing the
- security policy of the network, is called the NTCB partition
- within that component. As the collection of network com-
- ponents and communication channels is meant to be exhaustive
- (i.e., every part of the network system, including hosts, is
- accounted for) and disjoint (i.e., no parts are shared
- between components), the NTCB partitions collectively are a
- true partition of the NTCB; they are non-overlapping and
- complete.
-
- For Mandatory Access Control Policy, a large and useful
- class of networks can be envisioned, which allows a clean
- decomposition of the NTCB into NTCB partitions. The result-
- ing partitions can be evaluated relative to enforcement of
- mandatory access controls using conservative interpretations
- of the TCSEC, and the correctness of the composition of
- these components into a network enforcing the overall policy
- for mandatory access controls is easily confirmable as well.
- For sponsors wishing to obtain an overall evaluation class
- for a network system, such a ``partitionable'' network
- architecture should be chosen.
-
- Concisely, the network architecture must have the fol-
- lowing salient features: (1) subjects and objects within
- multilevel processing components are given the usual TCSEC
- interpretation; (2) subjects and objects are confined
- within their individual components, i.e., no subjects may
- directly access information within a different component
- ________
- (In practice, this means there are no directly accessible,
- shared memory registers); and (3) information representing
- the access-relevant security state of the subjects and
- objects within a component, is maintained locally by the
- NTCB partition of that component. (It may be the case that
- information representing the components state may be distri-
- buted to other components for the purpose of overall network
- control, recovery, etc. but the decision to permit or
- prohibit access is always made locally, based on locally
- available state information.
-
- A network of host processors and peripherals, intercon-
- nected according to these rules, may be roughly described,
- with regard to security, as a network of ``loosely-coupled''
- security kernels. Each security kernel is autonomous with
- regard to the accesses made locally (i.e., within the com-
- ponent whose resources the reference monitor controls). A
- subject within one component may transmit data, under the
- control of the two security kernels, to a subject in another
- component. However, the basic principle to be seen at this
- point is the following: because all accesses are local
- (i.e., constrained to be by a subject within a component to
- an object within that component), all accesses are mediated
- by the security kernel within a component. Thus, the total-
- ity of all of the security kernels within the system is ade-
- quate to mediate all accesses made within the system.
-
- B.8. Summary and Conclusions
- _ _ _______ ___ ___________
-
- In this Appendix, the rationale for the partitioning of
- the NTCB into a set of cooperating, loosely-coupled NTCB
- partitions has been presented. Each NTCB partition may be
- viewed as a locally autonomous reference monitor, enforcing
- the access of local subjects to local objects and devices.
- Because the partitioning is carefully constrained to reflect
- the lack of sharing of objects among components, (while
- allowing the transmission of information between components
- through shared physical media), the aggregate of locally
- autonomous NTCB partitions is adequate to mediate all
- accesses of subjects to objects and thus is adequate to form
- the basis for a reference monitor for the entire network
- system. Under the conditions of loose coupling assumed, the
- specification of a network-wide Security Policy, properly
- interpreted as an individual Formal Security Policy Model
- for each component enforcing access controls, suffices to
- provide the basis for demonstrations that each component
- meets the requirements of the Security Policy. The postu-
- lated network architecture and design (that are presented by
- the network sponsor) suffices to allow evaluation of the
- supporting policy capabilities required to attain the tar-
- geted evaluation class.
-
-
- APPENDIX C
- ________ _
-
-
- Interconnection of Accredited AIS
- _______________ __ __________ ___
-
-
-
- C.1. Purpose
- _ _ _______
-
- As was discussed in the Introduction to this document,
- there are many "networks" that can not be meaningfully
- evaluated as a ``single trusted system'' because they are
- sufficiently complex and heterogeneous that no single
- evaluation rating can adequately reflect the trust that can
- be placed in the "network". The purpose of this Appendix is
- to provide guidance concerning how to interconnect systems
- in such a way that mandatory security policies are not
- violated.
-
- C.1.1. Problem Statement
- _ _ _ _______ _________
-
- The interconnected accredited Automated Information
- System (AIS) view is an operational perspective which recog-
- nizes that parts of the network may be independently
- created, managed, and accredited. Interconnected accredited
- AIS consist of multiple systems (some of which may be
- trusted) that have been independently assigned accreditation
- ranges, reflecting the various sensitivity levels of infor-
- mation that may be simultaneously processed on that system.
- In this view, the individual AIS may be thought of as "dev-
- ices" with which neighboring systems can send and receive
- information. Each AIS is accredited to handle sensitive
- information at a single level or over a range of levels.
-
- An example of when the interconnected accredited AIS
- view is necessary is a network consisting of two A1 systems
- and two B2 systems, all of which are interconnected and all
- of which may be accessed locally by some users. It is easy
- to see that, if we regard this as a single trusted system,
- it would be impossible for it to achieve a rating against
- Part I of this document higher than B2. This might not be an
- accurate reflection of the trust that could be placed in the
- two A1 systems and interconnections between them. The sin-
- gle rating of B2 assigned to this network could be mislead-
- ing.
-
- While it provides much less information about a system
- than does a meaningful evaluation rating, taking the inter-
- connected accredited AIS view of the network provides gui-
- dance on appropriate interconnection strategies.
-
- C.1.2. Component Connection View and Global Network View
- _ _ _ _________ __________ ____ ___ ______ _______ ____
-
- There are two aspects of the Interconnected Accredited
- AIS view of a network that must be addressed: the component
- connection view and the global network view. These two
- views are discussed below and will be examined in greater
- detail later in this Appendix.
-
- Any AIS that is connected to other AIS must enforce an
- "Interconnection Rule" that limits the sensitivity levels of
- information that it may send or receive. Using the com-
- ponent connection view, each component responsible for main-
- taining the separation of multiple levels of information
- must decide locally whether or not information can be sent
- or received. This view, then, does not require a component
- to know the accreditation ranges of all other components on
- the network; only of its immediate neighbors (i.e., those
- with which it can communicate without an intermediary).
-
- In addition to the Interconnection Rule, there may be
- other constraints placed on a network to combat potential
- security problems. The global network view is a way of
- addressing some of the other constraints placed on a net-
- work. This view requires one to have a knowledge of the
- accreditation ranges of all components of the system. These
- accreditation ranges are taken into account when determining
- whether or not a component should be allowed to connect to
- the system. In this way, the potential damage that can
- occur when information is compromised or modified can be
- limited to an acceptable level.
-
- An example of a problem for which constraints may be
- placed on the network is what is called the "Cascading Prob-
- lem." This occurs when AIS are interconnected in such a way
- that the potential damage from unauthorized disclosure or
- modification is above an acceptable level. The network
- sponsor may wish to limit the damage that can occur by lim-
- iting the accreditation ranges of AISs that can be intercon-
- nected.
-
- C.2. Accreditation Ranges and the Interconnection Rule
- _ _ _____________ ______ ___ ___ _______________ ____
-
- C.2.1. Accreditation Ranges
- _ _ _ _____________ ______
-
- The AIS accreditation range reflects the judgement of
- the accreditor on the ability of the component to appropri-
- ately segregate and manage information with respect to its
- network connections in accord with the designated sensi-
- tivity levels. An ADP system that has been accredited for
- (stand-alone) system high operation would be assigned an
- accreditation range having a single sensitivity level equal
- to the system high sensitivity level of the system. Such a
- system is not relied upon to segregate the several actual
- levels of information processed. All the information
- exported from such a system must be labeled with the
- system-high sensitivity label until there is a competent
- manual review to assign a lower level. A multilevel
- (stand-alone) AIS might be assigned an accreditation range
- equal to the entire set of levels processed. In this case,
- the label of the exported data is equal to the actual level
- of the data processed within the accredited range.
-
- In a network context, the accreditation range bounds
- the sensitivity levels of information that may be sent
- (exported) to or received (imported) from other components.
- If a network has only dedicated and system-high components,
- each component will be assigned single-valued accreditation
- ranges (i.e., an accreditation range consisting of one sen-
- sitivity level).
-
- Consider an example, illustrated in Figure C1, which
- uses accreditation ranges along with an approach based on
- the Environmental Guidelines.- Component A is a class B2
- _____________ __________
- system and has an accreditation range of CONFIDENTIAL
- through SECRET. Component B is a class A1 system and has an
- accreditation range of CONFIDENTIAL through TOP SECRET.
- Thus, if Component A has a direct connection to Component B,
- the accreditation ranges provide a basis for both components
- to be assured that any data sent or received will not
- "exceed" (that is, will be dominated by) SECRET in its clas-
- sification.
-
- Figure C1. Accreditation Ranges Illustrated
- ______ __ _____________ ______ ___________
-
- (Note: Figure not included)
-
-
-
- C.2.2. Interconnection Rule
- _ _ _ _______________ ____
-
- A multilevel network is one in which some users do not
- have the necessary clearances for all information processed.
- A multilevel network therefore is one that processes a range
- of sensitive information, which must be protected from unau-
- thorized disclosure or modification.
-
- Each component of the network must be separately
- accredited to operate in an approved security mode of opera-
- tion and for a specific accreditation range. The component
- is accredited to participate in the network at those levels
- and only those levels.
-
- According to this definition, a multilevel network may
- comprise a mixture of dedicated, system high, compartmented,
- controlled, and multilevel components, where two or more
- differ in their classification categories and/or compart-
- ments, and/or some users do not have all formal access
- approvals.
-
- The following requirement must be met in multilevel
- networks.
- _________________________
- - Security Requirements: Guidance for Applying the
- ________ ____________ ________ ___ ________ ___
- Department of Defense Trusted Computer System Evalua-
- __________ __ _______ _______ ________ ______ ______
- tion Criteria in Specific Environments,CSC-STD-003-85
- ____ ________ __ ________ ____________
-
-
-
- C.2.2.1. Information Transfer Restrictions
- _ _ _ _ ___________ ________ ____________
-
- Each I/O device used by an AIS to communicate with
- other AIS must have a device range associated with it. The
- device range may be a single level, or it may be a set of
- levels (in which case the device is referred to as mul-
- tilevel), and it must be included within the AIS accredita-
- tion range.
-
- Information exported or imported using a single-level
- device is labeled implicitly by the security level of the
- device. Information exported from one multilevel device and
- imported at another must be labeled through an agreed-upon
- protocol, unless it is labeled implicitly by using a commun-
- ication link that always carries a single level.
-
- Information exported at a given security level can be
- sent only to an importing device whose device range contains
- that level or a higher level. If the importing device range
- does not contain the given level, the information is rela-
- beled upon reception at a higher level within the importing
- device range. Relabeling should not occur otherwise.
-
- C.2.2.2. Discussion
- _ _ _ _ __________
-
- The purpose of device labels is to reflect and con-
- strain the security levels of information authorized for the
- physical environment in which the devices are located.
-
- The information transfer restrictions permit one-way
- communication (i.e., no acknowledgements) from one device to
- another whose ranges have no level in common, as long as
- each level in the sending device range is dominated by some
- level in the receiving device range. It is never permitted
- to send information at a given level to a device whose range
- does not contain a dominating level.
-
- It is not necessary for an AIS sending information to
- another AIS through several other AISs to know the accredi-
- tation range of the destination system, but it may be bene-
- ficial to network performance; if the originator knows that
- the information cannot be delivered, then it will not try to
- send it and network resources will not be used fruitlessly.
-
- In the case of interconnected accredited AISs, the
- accreditation of a component system and the device ranges of
- its network interface devices are set by a component
- administrator in agreement with the network administrator.
- These ranges are generally static, and any change in them is
- considered to be a reconfiguration of the network.
-
- In summary, then, if the Interconnection Rule is fol-
- lowed, information will never be improperly sent to a com-
- ponent that is not accredited to handle information of that
- sensitivity.
-
-
- C.3. The Global Network View
- _ _ ___ ______ _______ ____
-
- The above rule applies for communication between any
- two (or more) accredited systems. However, it does not
- enforce any of the additional constraints that may be placed
- on a network. Even when all components have been evaluated
- (either against the TCSEC, or against Appendix A of this
- document), and the interconnection rule is followed, there
- may be other potential security problems. In order to
- address these problems, it is necessary to adopt a global
- view of the network. That is, it is no longer determinable
- locally whether or not a constraint is being satisfied.
-
- Two global concerns will be discussed below. One con-
- cern is the propagation of local risk; the other is the cas-
- cading problem.
-
- C.3.1. Propagation of Local Risk
- _ _ _ ___________ __ _____ ____
-
- The Environmental Guidelines recommend minimum classes
- of trusted systems for specific environments. The recommen-
- dations represent an informed technical judgment on the
- minimum architectural requirements and assurance appropriate
- to counter a specific level of risk.
-
- In many cases, operational needs have led to the
- accreditation of systems for multilevel operation that would
- not meet the requirements of the recommended class. While
- the increased risk may be accepted by the users of a partic-
- ular AIS, connection of such an AIS to a network exposes
- users of all other AISs in the network to the additional
- risk.
-
- Consequently, when an unevaluated AIS, or one that does
- not meet the class recommended for its accreditation, is
- proposed for connection to a network, constraints should be
- considered, such as one-way connections, manual review of
- transmissions, cryptographic isolation, or other measures to
- limit the risk it introduces.
-
- C.3.2. The Cascading Problem
- _ _ _ ___ _________ _______
-
- One of the problems that the interconnection rule does
- not address is the cascading problem. The cascading problem
- _________ _______
- exists when a penetrator can take advantage of network con-
- nections to compromise information across a range of secu-
- rity levels that is greater than the accreditation range of
- any of the component systems he must defeat to do so. Cas-
- cading is possible in any connected network that processes a
- greater range of security levels than any one of its com-
- ponent systems is accredited to handle, and it is possible
- in others as well.
-
- As an example of the cascading problem, consider two
- systems, each of which is accredited to handle two adjacent
- classifications of information, as shown in Figure C2.
- System A processes SECRET and TOP SECRET information, and
- all users are cleared to at least the SECRET level. System
- B processes CONFIDENTIAL and SECRET information, and all
- users are cleared to at least the CONFIDENTIAL level.
-
- While the risk of compromise in each of these systems
- is small enough to justify their use with two levels of
- information, the system as a whole has three levels of
- information, increasing the potential harm that could be
- caused by a compromise. When they are connected so that
- SECRET information can pass from one to the other, a pene-
- trator able to defeat the protection mechanisms in these
- systems can make TOP SECRET information available at the
- CONFIDENTIAL level.
-
- Figure C2. Cascade Problem, Illustration 1
- ______ __ _______ _______ ____________ _
-
- (Note: Figure not included)
-
-
-
- Consider this chain of events: a penetrator (1) over-
- comes the protection mechanism in System A to downgrade some
- TOP SECRET information to SECRET; (2) causes this informa-
- tion to be sent over the network to System B; and (3) over-
- comes the protection mechanism in System B to downgrade that
- same information to CONFIDENTIAL. This is the cascading
- problem.
-
- C.3.2.1. Problem Identification
- _ _ _ _ _______ ______________
-
- There are various approaches, with different degrees of
- complexity and precision, for recognizing a potential cas-
- cading problem. Two of these approaches will be addressed
- in this Appendix. The first is a fairly simple test that
- can ensure that a network does not have a cascading problem:
- ___
- the nesting condition. The second, discussed in Section
- _______ _________
- C.4, is a less conservative but much more complex heuristic
- that takes into account the connectivity of the network and
- the evaluation classes of the component AIS.
-
- The nesting condition is satisfied if the accreditation
- ranges of every two AISs are either disjoint (have no level
- in common) or nested, i.e., one is included within the
- other. In most cases, the nesting condition is enough to
- determine whether there is a cascading problem. However,
- this is a somewhat conservative test; there are cases where
- the nesting condition fails, but there is actually no cas-
- cading problem.
-
- Example 1: Consider the situation illustrated in Fig-
- ure C1. The accreditation range of Component A is nested
- within that of Component B (i.e., C-S is completely con-
- tained within C-TS). Therefore, the nesting condition is
- satisfied, and there is no cascading problem.
-
- Example 2: Consider the situation illustrated in Fig-
- ure C2. The accreditation ranges of System A and System B
- are not disjoint; neither is one completely contained within
- the other. Therefore, the nesting condition fails, and a
- cascading condition is indicated.
-
- Example 3: Consider the situation illustrated in Fig-
- ure C3. Again, the nesting condition does not hold, because
- the accreditation range of System B is neither disjoint from
- nor contained in that of Systems A and C. A cascading con-
- dition is thus indicated. However, it will be shown below
- in this Appendix that Figure C3 actually does not contain a
- cascading condition, due to the presence of the end-to-end
- encryption devices.
-
- C.3.2.2. Solutions
- _ _ _ _ _________
-
- When a cascading problem is to be addressed, there are
- several ways to do so. One solution is to use a more
- trusted system at appropriate nodes in the network, so that
- a penetrator will be forced to overcome a protection mechan-
- ism commensurate with the seriousness of the potential
- compromise. In the example depicted in Figure C2, If either
- system A or system B is evaluated at class B3, which is suf-
- ficient according to the Environmental Guidelines for a
- range of TOP SECRET to CONFIDENTIAL, then the penetrator is
- presented with an acceptable level of difficulty.
-
- Another possible solution is to eliminate certain net-
- work connections, either physically or by means of end-to-
- end encryption. End-to-end encryption allows hosts that need
- to communicate to do so, while eliminating additional
- unnecessary cascading risk on the path from one to the
- other.
-
- Figure C3. Cascade Problem, Illustration 2 (End-to-End Encryption)
- ______ __ _______ _______ ____________ _ ___ __ ___ __________
-
- (Note: Figure not included)
-
-
-
- In Figure C3, suppose that System A needs only to com-
- municate with System C, and B is just an intermediate node.
- The possible cascade from TOP SECRET in A to CONFIDENTIAL in
- B can be avoided by applying end-to-end encryption from A to
- C, since encrypted data from A can be released at the CONFI-
- DENTIAL level in B without compromise.
-
- Note that end-to-end encryption is of no help in the
- Figure C2 example, since the systems participating in the
- cascade were required to communicate.
-
- In some situations where the potential for a cascading
- problem exists, the risk of its occurrence is actually not
- significant. A penetration making use of network connec-
- tions, as described above, generally requires coordination
- between attacks on two connected systems. It may be possi-
- ble to determine, in individual cases, that opportunities
- for this kind of coordination, in the form of common
- software or common users, are unlikely. One might then
- disregard cascading over the connections in question.
-
- On a more global scale, one might divide the network
- into communities, with respect to the possibility of cascad-
- ing. If connections between one community and another were
- believed not to support a cascade threat, then a cascading
- analysis would be performed only within each community.
-
- C.3.2.3. Networks of Evaluated Systems
- _ _ _ _ ________ __ _________ _______
-
- If the systems to be interconnected can be assigned
- evaluation classes, the ratings of these systems can be used
- as input to analysis procedures for detecting the cascade
- problem and testing proposed solutions. The first step in
- developing analysis procedures is to define formally the
- conditions necessary for the absence or presence of a cas-
- cade problem.
-
- An assertion called the Cascade Condition will be
- _______ _________
- defined below. A network satisfying the Cascade Condition
- does not have a cascade problem. This condition is stated
- in terms of the evaluation ratings of the interconnected
- systems and the direction and sensitivity level of connec-
- tions between them.
-
- Some definitions are needed in order to state the cas-
- cade condition formally. The terminology given below is
- meant to be used only in the context of this section.
-
- A protection region is a pair (h,s) such that h is a
- __________ ______ _ _ _
- network component and s is a sensitivity level processed by
- _
- component h.
- _
-
- A step is an ordered pair of protection regions
- ____
- (h1,s1), (h2,s2) such that either
- __ __ __ __
-
- 1. s1 = s2 and h1 sends to h2 at level s1 (a network
- __ __ __ __ __
- link), or
-
- 2. h1 = h2 (an information flow within a component).
- __ __
-
- A path is a sequence of protection regions such that
- ____
- each consecutive pair of regions is a step.
-
- A path is a sequence of protection regions that may be
- traversed, step by step, by data. A step along a network
- link is possible either when there is a direct communica-
- tions link from one component to the other carrying
- information at a given level, or when there is an indirect,
- end-to-end encrypted connection in which intermediate com-
- ponents are unable to read the data. A step between two
- regions in the same component may be (but does not have to
- be) a covert channel.
-
- Given a host h, let L(h) be the minimum clearance of
- _ _ _
- users of h. Given a sensitivity level s, one can use the
- _ _
- Environmental Guidelines to determine the minimum evaluation
- class C(s,h) required for a system with the associated risk
- _ _ _
- index. The requirement for open environments should be used
- unless all systems on the path are closed. Note that C(s,h)
- _ _ _
- will be at least B1 if the risk index associated with s and
- _
- L(h) is greater than zero.
- _ _
-
- With these definitions, we can now state the Cascade
- _______
- Condition:
- _________
-
- For any path (h1,s1),...,(hn,sn) such that sn = L(hn)
- __ __ __ __ __ _ __
- and C(s1,hn) is at least B1, there must exist at least one
- _ __ __
- step (hi,si),(hi+1,si+1) such that hi = hi+1, the evaluation
- __ __ __ _ __ _ __ __ _
- class of hi is at least C(s1,hn), and si is not dominated by
- __ _ __ __ __
- si+1.
- __ _
-
- This condition can be paraphrased by saying that every
- path that might compromise data of level s1 by making it
- __
- available to an insufficiently cleared user of hn must over-
- __
- come the protection mechanism in a component of class at
- least C(s1,hn).
- _ __ __
-
- C.4. EXAMPLE: An Heuristic Procedure for Determining if an
- _ _ _______ __ _________ _________ ___ ___________ __ __
- Interconnection Should Be Allowed
- _______________ ______ __ _______
-
- There should be some way of determining whether a sys-
- tem has a risk index that is too great for its evaluation
- rating (and the evaluation ratings of its components).
- Given the goal of not allowing a greater risk than is recom-
- mended by the Environmental Guidelines, the following is an
- heuristic algorithm that has been developed to examine sys-
- tems and determine if they fall within the bounds prescribed
- by the Environmental Guidelines. (In formal terms, this
- algorithm is an approximate test for the Cascade Condition,
- described above.) It should be noted that this algorithm is
- not intended to be prescriptive: it is merely one way of
- examining the problem. There are doubtless many other ways
- that are just as valid.
-
- Furthermore, as any heuristic algorithm, this cannot be
- derived from first principles. It has been derived largely
- through trial and error; it produces reasonable results
- (e.g., it disallows systems when it seems prudent; it recom-
- mends levels of security that are consistent with the
- Environmental Guidelines).
-
- This algorithm should not be taken to be anything more
- than intended; it does not magically solve all network secu-
- rity problems. It does, however, provide useful guidance and
- recommendations as to the prudence of interconnecting vari-
- ous systems.
-
- The following describes an algorithm for determining
- whether or not a given network, composed of evaluated com-
- ponents, meets the risk categories of the Environmental
- Guidelines. The algorithm is based on the idea of dividing
- up a network into groups (where a group is defined to be a
- group of components that can potentially exchange informa-
- tion i.e., send and receive data at a common sensitivity
- level, and have an evaluation Class at or below a given
- level).
-
- The risk presented by any given group can be compared
- to the maximum allowed risk, as defined by the Yellow Book
- for a system at the given evaluation class, to determine if
- any community presents an unacceptable risk.
-
- 1. Create a Network Table listing all components within
- the network. This table, illustrated in Table C1,
- should include for each component the following
- information: Component ID, Evaluation Class, Range
- of Security Classifications at which the component
- sends data to the network, List of Security Classif-
- ications at which the component receives data from
- the network, Maximum of (highest level of data
- received from network and highest level of data pro-
- cessed by component), Minimum of (clearance of the
- user with the lowest clearance of the users with
- direct access to the component and lowest level of
- data sent to the network from the component).
-
- Table C1. Example Entry:
- _____ __ _______ _____
-
-
- (Note: Table not included)
-
-
-
- 2. Produce a Network Table Evaluation Class, a Network
- Table Maximum and a Network Table Minimum. The Net-
- work Table Evaluation Class will be the highest
- evaluation class of any component listed in the
- table. (In Table C1, this is A1.) The Network
- Table Maximum will be the maximum of the Maximums
- associated with all the components listed in the
- table which send data to the network. (This is
- determined by taking the highest entry in the "Max-
- imum" column; in Table C1, it is TS.) The Network
- Table Minimum will be the minimum of the Minimums
- associated with all the components listed in the
- table which receive data from the network. (This is
- determined by taking the lowest entry in the
- "Minimum" column; in Table C1, this is FOUO.)
-
- 3. If the Network Table Evaluation Class is greater
- than B1, (i.e, A1, B3, or B2) then tables for each
- evaluation class lower than the Class of the Network
- Table, must be produced, down to table(s) for the C1
- class. These tables will be produced for each
- evaluation class by first listing any one component
- whose evaluation class is less than or equal to the
- evaluation class for the table. Then, add to the
- table all components that meet all of the following
- conditions:
-
- a) They have an evaluation class less than or
- equal to the class of the table.
-
- b) They receive data from the network at a level
- that is being sent by a component who is
- already in the table.
-
- c) They send data to the network at a level that
- is equal to or less than any node already in
- the table.
-
- 4. After all the tables have been constructed then the
- Network Table Evaluation Class of each table is com-
- pared to the Maximum and Minimum for the Table with
- regard to the rules specified by the Environmental
- Guidelines.
-
- 5. If all Tables satisfy the assurance requirements for
- the Environmental Guidelines then the Network passes
- the assurance requirements. If any of the Tables
- provide a greater risk index than is permitted by
- the Environmental Guidelines then the Network pro-
- vides a high level of risk, and should not be con-
- nected as currently designed.
-
- Table C2. B2 TABLE 1
- _____ __ __ _____ _
-
-
- (Note: Table not included)
-
-
-
- Table C3. B2 TABLE 1, EXTENDED
- _____ __ __ _____ _ ________
-
- (Note: Table not included)
-
-
- Table C4:
- _____ __
-
- Table C4(a). B2 TABLE 1
- _____ __ _ __ _____ _
-
- (Note: Table not included)
-
-
- Table C4(b). B2 TABLE 2
- _____ __ _ __ _____ _
-
- (Note: Table not included)
-
-
- C.4.1. Example B2 Table
- _ _ _ _______ __ _____
-
- As an example consider Table C2. This represents a B2
- table under construction with a single entry. If in the net-
- work there existed another node which was evaluated at B2
- and could receive and send at C-S, this node would be added
- to the table, producing Table C3. In contrast if there
- existed in the network a B2 node that could receive at S-TS
- but could only send at TS, this node would not be added to
- Table C3 but could be used to start a second B2 table.
- There would then be a set of two tables, represented in
- Table C4.
-
- C.4.2. Sample Network and Tables
- _ _ _ ______ _______ ___ ______
-
- A sample network is illustrated in Figure C4. The
- tables that are produced for it are given in Tables C5(a)
- through C5(h).
-
- Notice at the B2 level the network is represented by
- two tables, C5(b) and C5(c). This is due to the fact that
- one of the components (Component C) is a receive-only com-
- ponent. Such components will always end up in a table by
- themselves due to the fact that they never can affect the
- security of other nodes on the network. (The only security
- consideration to make with such components is whether they
- are receiving data at a level dominated by the approved max-
- imum processing level for the component.)
-
- Notice at the B1 level the components are each in a
- table by themselves (Tables C5(d), C5(e), and C5(f)). This
- is due to the fact that although Component B may receive
- data from Component E, it never sends data to the network at
- a level lower than that sent by E (i.e., B can only send TS,
- never Confidential or Unclassified). Thus there is no
- "added" risk in having B receive data from E. If it were the
- case the B could send data at a level lower than (or equal
- to) E then they would be included in the same table since
- they present an added (or equal) risk.
-
- C.5. Environmental Considerations
- _ _ _____________ ______________
-
- Because of the very nature of networks, it is necessary
- to say something about the assumptions made with respect to
- physical and logical protection of network links. While the
- requirements stated in Part II of this document apply to the
- single trusted system view, and not to the networks
- addressed by this Appendix, the issues are also important in
- the interconnected accredited AIS view. Therefore, this sec-
- tion presents a brief description of some of the important
- considerations. The interested reader is referred to Part
- II of this document for further detail.
-
- It is not, repeat, NOT the intent of this Appendix to
- define the measures that are considered adequate under all
- circumstances. Rather, it is to identify the requirements,
- and where known, common methods of achieving the desired
- protection.
-
- This Appendix establishes the requirement for integrity
- protection of control information in unclassified networks
- and the requirement to preserve the integrity of both con-
- trol data and information in any other network.
-
- C.5.1. Communications Integrity
- _ _ _ ______________ _________
-
- The accreditor(s) will define transmission accuracy
- requirements for interconnecting two components. All ele-
- ments involved in the interconnection of the components will
- demonstrate either by testing or by otherwise convincing
- argument that they meet the requirements. Since absolute
- transmission accuracy is not possible, a capability of test-
- ing for, detecting and reporting errors will be demon-
- strated. Acceptable methods of limiting errors include use
- of cryptographic checksums, protected wireways, and reliable
- delivery protocols used separately or in combination.
-
- Hardware and/or software will be provided that can be
- used to periodically validate the correct operation of all
- elements involved in interconnecting two accredited com-
- ponents.
-
- Trusted communications paths will be provided between
- network elements whenever secure element-to-element communi-
- cations are required. (Initialization, cryptographic key
- management, change of subject or object security levels or
- access authorizations, etc.)
-
- C.5.2. Denial of Service
- _ _ _ ______ __ _______
-
- The accreditor(s) will define denial of service condi-
- tions relative to the services being provided by the inter-
- connected components. Hardware and or software will be pro-
- vided to periodically assure the accessibility of the inter-
- connected components.
-
- C.5.3. Data Content Protection
- _ _ _ ____ _______ __________
-
- Where classified information or sensitive but unclassi-
- fied information is to be exchanged between logically con-
- nected components, it is the responsibility of each of the
- DAAs to assure that the content of their communication is
- _______
- protected from unauthorized observation. Acceptable means
- of providing this protection include cryptography, and Pro-
- tected Wireline Distribution Systems (PWDS).
-
- Where the connection infrastructure is operated by a
- services organization for a number of different subscribers,
- suitable communications protection may be offered by the
- service organization. Regardless, it is the responsibility
- of the individual DAA to determine whether this protection
- is adequate for the information to be exchanged.
-
- Figure C4. A Sample Network
- ______ __ _ ______ _______
-
- (Note: Figure not included)
-
-
-
- Component ID Permitted Operations
-
- A Send and Receive data from C through TS
- B Send and Receive TS-only
- C Can Receive only audit records,
- all of which are treated as TS
- D Can Send and Receive C through TS
- E Can Send and Receive S-only
- F Send and Receive S and TS data
-
-
-
- Table C5(a). NETWORK TABLE
- _____ __ _ _______ _____
-
- NETWORK TABLE EVAL CLASS = A1
- NETWORK TABLE MAXIMUM = TS
- NETWORK TABLE MINIMUM = C
- ENVIRONMENTAL GUIDELINES RULING = OK
-
- (Note: Table not included)
-
-
- (Note: since there are no B3 components, the B3 tables are
- identical to the B2 tables and are therefore not reproduced
- here.)
-
-
- Table C5(b). B2 TABLE 1 Table C5(c). B2 TABLE 2
- _____ __ _ __ _____ _ _____ __ _ __ _____ _
-
- TABLE EVAL CLASS = B2 TABLE EVAL CLASS = B2
- TABLE MAXIMUM = TS TABLE MAXIMUM = TS
- TABLE MINIMUM = S TABLE MINIMUM = TS
- ENV. GUIDELINES RULING= OK ENV. GUIDELINES RULING= OK
-
- (Note: Tables not included)
-
-
-
- Table C5(d). B1 TABLE 1 Table C5(e). B1 TABLE 2
- _____ __ _ __ _____ _ _____ __ _ __ _____ _
-
- TABLE EVAL CLASS = B1 TABLE EVAL CLASS = B1
- TABLE MAXIMUM = S TABLE MAXIMUM = TS
- TABLE MINIMUM = S TABLE MINIMUM = TS
- ENV. GUIDELINES RULING = OK ENV. GUIDELINES RULING = OK
-
-
- (Note: Table not included)
-
-
-
-
-
-
-
-
-
-
- Acronyms
- ________
-
-
- ACL - Access Control List
- ADP - Automatic Data Processing
- AIS - Automated Information System
- ARPANET - Advanced Research Projects Agency Network
- COMSEC - Communications Security
- CPU - Central Processing Unit
- CRC - Cyclic Redundancy Code or Cyclic Redundancy Check
- DAA - Designated Approving Authority
- DBMS - Data Base Management System
- DAC - Discretionary Access Control
- DDN - Defense Data Network
- DoD - Department of Defense
- DoDIIS - Department of Defense Intelligence Information System
- DOS - Denial-of-service
- DTLS - Descriptive Top-Level Specification
- E3 - End-to-end Encryption
- FTLS - Formal Top-Level Specification
- FTP - File Transfer Protocol
- IP - Internet Protocol
- I S/A AMPE - Inter-Service/Agency Automatic Message Processing Exchange
- ISDN - Integrated Services Digital Network
- ISO - International Standards Organization
- KDC - Key Distribution Center
- LAN - Local Area Network
- LRC - Longitudinal Redundancy Check
- MAC - Mandatory Access Control
- MDC - Manipulation Detection Code
- MSM - Message Stream Modification
- MWT - Maximum Waiting Time
- NSA - National Security Agency
- NTCB - Network Trusted Computing Base
- OSI - Open System Interconnection
- PABX - Private Automated Branch Exchange
- PDU - Protocol Data Unit (a.k.a. packet, datagram)
- PKC - Public Key Cryptosystem
- PWDS - Protected Wireline Distribution System
- ROM - Read Only Memory
- SACDIN - Strategic Air Command Digital Network
- TAC - Terminal Access Controller
- TCB - Trusted Computer Base
- TCP - Transmission Control Protocol
- TELNET - Network Virtual Terminal Protocol
- TLS - Top Level Specification
- TCSEC - Trusted Computer System Evaluation Criteria
- TFE - Trusted Front-end Processor
- TIU - Trusted Network Interface Unit
- TNI - Trusted Network Interpretations
- VMM - Virtual Machine Monitor
-
-
-
- Glossary
- ________
-
-
-
-
-
- - A -
- _
-
- Access - (1) A specific type of interaction between a
- subject and an object that results in the flow of informa-
- tion from one to the other. (2) The ability and the means
- necessary to approach, to store or retrieve data, to commun-
- icate with, or to make use of any resource of an ADP system.
-
- Access control - (1) The limiting of rights or capabil-
- ities of a subject to communicate with other subjects, or to
- use functions or services in a computer system or network.
- (2) Restrictions controlling a subject's access to an
- object.
-
- Access control list - (1) A list of subjects authorized
- for specific access to an object. (2) A list of entities,
- together with their access rights, which are authorized to
- have access to a resource.
-
- Accountability - the quality or state which enables
- actions on an ADP system to be traced to individuals who may
- then be held responsible. These actions include violations
- and attempted violations of the security policy, as well as
- allowed actions.
-
- Accreditation - the managerial authorization and appro-
- val, granted to an ADP system or network to process sensi-
- tive data in an operational environment, made on the basis
- of a certification by designated technical personnel of the
- extent to which design and implementation of the system meet
- pre-specified technical requirements, e.g., TCSEC, for
- achieving adequate data security. Management can accredit a
- system to operate at a higher/lower level than the risk
- level recommended (e.g., by the Requirements Guideline-) for
- the certification level of the system. If management
- accredits the system to operate at a higher level than is
- appropriate for the certification level, management is
- accepting the additional risk incurred.
-
- Accreditation range - of a host with respect to a par-
- ticular network, is a set of mandatory access control levels
- _________________________
- - Security Requirements: Guidance for Applying the
- ________ ____________ ________ ___ ________ ___
- Department of Defense Trusted Computer System Evalua-
- __________ __ _______ _______ ________ ______ ______
- tion Criteria in Specific Environments,CSC-STD-003-85
- ____ ________ __ ________ ____________
-
-
- for data storage, processing, and transmission. The accredi-
- tation range will generally reflect the sensitivity levels
- of data that the accreditation authority believes the host
- can reliably keep segregated with an acceptable level of
- risk in the context of the particular network for which the
- accreditation range is given. Thus, although a host system
- might be accredited to employ the mandatory access control
- levels CONFIDENTIAL, SECRET, and TOP SECRET in stand-alone
- operation, it might have an accreditation range consisting
- of the single value TOP SECRET for attachment to some net-
- work.
-
- Audit trail - (1) A set of records that collectively
- provide documentary evidence of processing used to aid in
- tracing from original transactions forward to related
- records and reports, and/or backwards from records and
- reports to their component source transactions. (2) Infor-
- mation collected or used to facilitate a Security Audit.
-
- Authentication - (1) To establish the validity of a
- claimed identity. (2) To provide protection against fraudu-
- lent transactions by establishing the validity of message,
- station, individual, or originator.
-
-
- - B -
-
- Bell-LaPadula Model - a formal state transition model
- of computer security policy that describes a set of access
- control rules. In this formal model, the entities in a com-
- puter system are divided into abstract sets of subjects and
- objects. The notion of a secure state is defined and it is
- proven that each state transition preserves security by mov-
- ing from secure state to secure state; thus, inductively
- proving that the system is secure. A system state is
- defined to be "secure" if the only permitted access modes of
- subjects to objects are in accordance with a specific secu-
- rity policy. In order to determine whether or not a
- specific access mode is allowed, the clearance of a subject
- is compared to the classification of the object and a deter-
- mination is made as to whether the subject is authorized for
- the specific access mode. The clearance/classifications
- scheme is expressed in terms of a lattice. See also: Lat-
- tice, Simple Security Property, *-Property. For further
- information see Bell, D. Elliott and LaPadula, Leonard J.,
- Secure Computer Systems: Unified Exposition and MULTICS
- ______ ________ _______ _______ __________ ___ _______
- Interpretation, MTR 2997, The MITRE Corporation, April 1974.
- ______________
- (AD/A 020 445)
-
-
- - C -
-
- Category - a grouping of objects to which an non-
- hierarchical restrictive label is applied (e.g.,
- proprietary, compartmented information). Subjects must be
- privileged to access a category.
-
- Certification - the technical evaluation of a system's
- security features, made as part of and in support of the
- approval/accreditation process, that establishes the extent
- to which a particular system's design and implementation
- meet a set of specified security requirements.
-
- Closed user group - a closed user group permits users
- belonging to a group to communicate with each other, but
- precludes communications with other users who are not
- members of the group.
-
- Communication channel - the physical media and devices
- which provide the means for transmitting information from
- one component of a network to (one or more) other com-
- ponents.
-
- Communication link - the physical means of connecting
- one location to another for the purpose of transmitting
- and/or receiving data.
-
- Compartment - a designation applied to a type of sensi-
- tive information, indicating the special handling procedures
- to be used for the information and the general class of peo-
- ple who may have access to the information. It can refer to
- the designation of information belonging to one or more
- categories.
-
- Component - a device or set of devices, consisting of
- hardware, along with its firmware, and/or software that
- performs a specific function on a computer communications
- network. A component is a part of the larger system, and
- may itself consist of other components. Examples include
- modems, telecommunications controllers, message switches,
- technical control devices, host computers, gateways, commun-
- ications subnets, etc.
-
- Component Reference Monitor - an access control concept
- that refers to an abstract machine that mediates all access
- to objects within a component by subjects within the com-
- ponent.
-
- Compromise - a violation of the security system such
- that an unauthorized disclosure of sensitive information may
- have occurred.
-
- Confidentiality - the property that information is not
- made available or disclosed to unauthorized individuals,
- entities, or processes.
-
- Configuration control - management of changes made to a
- system's hardware, software, firmware, and documentation
- throughout the development and operational life of the sys-
- tem.
-
- Connection - a liaison, in the sense of a network
- interrelationship, between two hosts for a period of time.
- The liaison is established (by an initiating host) for the
- purpose of information transfer (with the associated host);
- the period of time is the time required to carry out the
- intent of the liaison (e.g., transfer of a file, a chatter
- session, delivery of mail). In many cases, a connection (in
- the sense of this glossary) will coincide with a host-host
- connection (in a special technical sense) established via
- TCP or equivalent protocol. However a connection (liaison)
- can also exist when only a protocol such as IP is in use (IP
- has no concept of a connection that persists for a period of
- time). Hence, the notion of connection as used here is
- independent of the particular protocols in use during a
- liaison of two hosts.
-
- Correctness - the extent to which a program satisfies
- its specifications.
-
- Covert channel - a communications channel that allows a
- process to transfer information in a manner that violates
- the system's security policy. A covert channel typically
- communicates by exploiting a mechanism not intended to be
- used for communication. See Covert storage channel and
- Covert timing channel. Compare Overt channel.
-
- Covert storage channel - a covert channel that involves
- the direct or indirect writing of a storage location by one
- process and the direct or indirect reading of the storage
- location by another process. Covert storage channels typi-
- cally involve a finite resource (e.g., sectors on a disk)
- that is shared by two subjects at different security levels.
-
- Covert timing channel - a covert channel in which one
- process signals information to another by modulating its own
- use of system resources (e.g., CPU time) in such a way that
- this manipulation affects the real response time observed by
- the second process.
-
-
- - D -
-
- Data confidentiality - the state that exists when data
- is held in confidence and is protected from unauthorized
- disclosure.
-
- Data integrity - (1) The state that exists when compu-
- terized data is the same as that in the source documents and
- has not been exposed to accidental or malicious alteration
- or destruction. (2) The property that data has not been
- exposed to accidental or malicious alteration or destruc-
- tion.
-
- Dedicated Security Mode - the mode of operation in
- which the system is specifically and exclusively dedicated
- to and controlled for the processing of one particular type
- or classification of information, either for full-time
- operation or for a specific period of time. Compare Mul-
- tilevel Security Mode, System High Security Mode.
-
- Denial of service - the prevention of authorized access
- to system assets or services, or the delaying of time criti-
- cal operations.
-
- Descriptive top-level specification (DTLS) - a top-
- level specification that is written in a natural language
- (e.g., English), an informal program design notation, or a
- combination of the two.
-
- Discretionary access control (DAC) - a means of res-
- tricting access to objects based on the identity of subjects
- and/or groups to which they belong. The controls are dis-
- cretionary in the sense that: (a) A subject with a certain
- access permission is capable of passing that permission
- (perhaps indirectly) on to any other subject; (b) DAC is
- often employed to enforce need-to-know; (c) Access control
- may be changed by an authorized individual. Compare to Man-
- datory Access Control.
-
- Domain - the set of objects that a subject has the
- ability to access.
-
- Dominated by (the relation) - a security level A is
- dominated by security level B if the
- clearance/classification in A is less than or equal to the
- clearance/classification in B and the set of access appro-
- vals (e.g., compartment designators) in A is contained in
- (the set relation) the set of access approvals in B (i.e.,
- each access approval appearing in A also appears in B).
- Depending upon the policy enforced (e.g., non-disclosure,
- integrity) the definition of "less than or equal to" and
- "contained in" may vary. For example, the level of an
- object of high integrity (i.e., an object which should be
- modifiable by very trustworthy individuals) may be defined
- to be "less than" the level of an object of low integrity
- (i.e., an object which is modifiable by everyone).
-
- Dominates (the relation) - security level B dominates
- security level A if A is dominated by B.
-
-
- - E -
-
- Exploitable channel - any channel that is usable or
- detectable by subjects external to the Trusted Computing
- Base.
-
-
- - F -
-
- Flaw - an error of commission, omission, or oversight
- in a system that allows protection mechanisms to be
- bypassed.
-
- Flaw hypothesis methodology - a system analysis and
- penetration technique where specifications and documentation
- for the system are analyzed and then flaws in the system are
- hypothesized. The list of hypothesized flaws is then prior-
- itized on the basis of the estimated probability that a flaw
- actually exists and, assuming a flaw does exist, on the ease
- of exploiting it and on the extent of control or compromise
- it would provide. The prioritized list is used to direct
- the actual testing of the system.
-
- Formal proof - a complete and convincing mathematical
- argument, presenting the full logical justification for each
- proof step, for the truth of a theorem or set of theorems.
- The formal verification process uses formal proofs to show
- the truth of certain properties of formal specification and
- for showing that computer programs satisfy their specifica-
- tions. Automated tools may (but need not) be used to formu-
- late and/or check the proof.
-
- Formal security policy model - a mathematically precise
- statement of security policy. To be adequately precise,
- such a model must represent the initial state of a system,
- the way in which the system progresses from one state to
- another, and a definition of a "secure" state of the system.
- To be acceptable as a basis for a TCB, the model must be
- supported by a formal proof that if the initial state of the
- system satisfies the definition of a "secure" state and if
- all assumptions required by the model hold, then all future
- states of the system will be secure. Some formal modeling
- techniques include: state transition models, temporal logic
- models, denotational semantics models, algebraic specifica-
- tion models. See also: Bell-LaPadula Model, Security Pol-
- icy Model.
-
- Formal top-level specification (FTLS) - a Top-Level
- Specification that is written in a formal mathematical
- language to allow theorems showing the correspondence of the
- system specification to its formal requirements to be
- hypothesized and formally proven.
-
- Formal verification - the process of using formal
- proofs to demonstrate the consistency (design verification)
- between a formal specification of a system and a formal
- security policy model or (implementation verification)
- between the formal specification and its program implementa-
- tion.
-
- Functional testing - the portion of security testing in
- which the advertised features of a system are tested for
- correct operation.
-
-
- - H -
-
- Hierarchical decomposition - the ordered, structured
- reduction of a system or a component to primitives.
-
- Host - any computer-based system connected to the net-
- work and containing the necessary protocol interpreter
- software to initiate network access and carry out
- information exchange across the communications network.
- This definition encompasses typical "mainframe" hosts, gen-
- eric terminal support machines (e.g., ARPANET TAC, DoDIIS
- NTC), and workstations connected directly to the communica-
- tions subnetwork and executing the intercomputer networking
- protocols. A terminal is not a host because it does not
- contain the protocol software needed to perform information
- exchange; a workstation (by definition) is a host because it
- does have such capability.
-
-
- - I -
-
- Integrity - See data integrity and integrity policy.
-
- Integrity Policy - a security policy to prevent unau-
- thorized users from modifying, viz., writing, sensitive
- information. See also Security Policy.
-
- Internal subject - a subject which is not acting as
- direct surrogate for a user. A process which is not associ-
- ated with any user but performs system-wide functions such
- as packet switching, line printer spooling, and so on. Also
- known as a daemon or a service machine.
-
-
- - L -
-
- Label - see Security Label and Sensitivity Label.
-
- Lattice - a partially ordered set for which every pair
- of elements has a greatest lower bound and a least upper
- bound.
-
- Least privilege - this principle requires that each
- subject in a system be granted the most restrictive set of
- privileges (or lowest clearance) needed for the performance
- of authorized tasks. The application of this principle lim-
- its the damage that can result from accident, error, or
- unauthorized use.
-
-
- - M -
-
- Mandatory access control - a means of restricting
- access to objects based on the sensitivity (as represented
- by a label) of the information contained in the objects and
- the formal authorization (i.e., clearance) of subjects to
- access information of such sensitivity.
-
- Multilevel device - a device that is used in a manner
- that permits it to simultaneously process data of two or
- more security levels without risk of compromise. To accom-
- plish this, sensitivity labels are normally stored on the
- same physical medium and in the same form (i.e., machine-
- readable or human-readable) as the data being processed.
-
- Multilevel secure - a class of system containing infor-
- mation with different sensitivities that simultaneously per-
- mits access by users with different security clearances and
- needs-to-know, but prevents users from obtaining access to
- information for which they lack authorization.
-
- Multilevel Security Mode - the mode of operation that
- allows two or more classification levels of information to
- be processed simultaneously within the same system when some
- users are not cleared for all levels of information present.
- Compare Dedicated Security Mode, System High Security Mode.
-
-
- - N -
-
- Network architecture - the set of layers and protocols
- (including formats and standards that different
- hardware/software must comply with to achieve stated objec-
- tives) which define a Network.
-
- Network component - a network subsystem which is
- evaluatable for compliance with the trusted network
- interpretations, relative to that policy induced on the com-
- ponent by the overall network policy.
-
- Network connection - A network connection is any logi-
- cal or physical path from one host to another that makes
- possible the transmission of information from one host to
- the other. An example is a TCP connection. But also, when
- a host transmits an IP datagram employing only the services
- of its "connectionless" Internet Protocol interpreter, there
- is considered to be a connection between the source and the
- destination hosts for this transaction.
-
- Network Reference Monitor - an access control concept
- that refers to an abstract machine that mediates all access
- to objects within the network by subjects within the net-
- work.
-
- Network security - the protection of networks and their
- services from unauthorized modification, destruction, or
- disclosure. Providing an assurance that the network performs
- its critical functions correctly and there are no harmful
- side-effects. Includes providing for information accuracy.
-
- Network security architecture - a subset of network
- architecture specifically addressing security-relevant
- issues.
-
- Network sponsor - the individual or organization that
- is responsible for stating the security policy enforced by
- the network, for designing the network security architecture
- to properly enforce that policy, and for ensuring that the
- network is implemented in such a way that the policy is
- enforced. For commercial, off-the- shelf systems, the net-
- work sponsor will normally be the vendor. For a fielded
- network system, the sponsor will normally be the project
- manager or system administrator.
-
- Network System - a system which is implemented with a
- collection of interconnected network components. A network
- system is based on a coherent security architecture and
- design.
-
- Network trusted computing base (NTCB) - the totality of
- protection mechanisms within a network system -- including
- hardware, firmware, and software -- the combination of which
- is responsible for enforcing a security policy. (See also
- Trusted Computing Base.)
-
- NTCB Partition - the totality of mechanisms within a
- single network component for enforcing the network policy,
- as allocated to that component; the part of the NTCB within
- a single network component.
-
-
- - O -
-
- Object - a passive entity that contains or receives
- information. Access to an object potentially implies access
- to the information it contains. Examples of objects are:
- records, blocks, pages, segments, files, directories, direc-
- tory trees, and programs, as well as bits, bytes, words,
- fields, processors, video displays, keyboards, clocks,
- printers, etc. See also Passive.
-
- Object reuse - the reassignment of a medium (e.g., page
- frame, disk sector, magnetic tape) that contained one or
- more objects to some subject. To be securely reassigned,
- such media must contain no residual data from the previously
- contained object(s).
-
- OSI Architecture - the International Organization for
- Standardization (ISO) provides a framework for defining the
- communications process between systems. This framework
- includes a network architecture, consisting of seven layers.
- The architecture is referred to as the Open Systems Inter-
- connection (OSI) model or Reference Model. Services and the
- protocols to implement them for the different layers of the
- model are defined by international standards. From a sys-
- tems viewpoint, the bottom three layers support the com-
- ponents of the network necessary to transmit a message, the
- next three layers generally pertain to the characteristics
- of the communicating end systems, and the top layer supports
- the end users. The seven layers are: 1. Physical Layer:
- Includes the functions to activate, maintain, and deactivate
- the physical connection. It defines the functional and pro-
- cedural characteristics of the interface to the physical
- circuit: the electrical and mechanical specifications are
- considered to be part of the medium itself. 2. Data Link
- Layer: Formats the messages. Covers synchronization and
- error control for the information transmitted over the phy-
- sical link, regardless of the content. "Point-to point
- error checking" is one way to describe this layer. 3.
- Network Layer: Selects the appropriate facilities. Includes
- routing communications through network resources to the sys-
- tem where the communicating application is: segmentation and
- reassembly of data units (packets) ; and some error correc-
- tion. 4. Transport Layer: Includes such functions as multi-
- plexing several independent message streams over a single
- connection, and segmenting data into appropriately sized
- packets for processing by the Network Layer. Provides end-
- to-end control of data reliability. 5. Session Layer:
- Selects the type of service. Manages and synchronizes
- conversations between two application processes. Two main
- types of dialogue are provided: two-way simultaneous (full-
- duplex), or two-way alternating (half-duplex). Provides
- control functions similar to the control language in com-
- puter system. 6. Presentation Layer: Ensures that informa-
- tion is delivered in a form that the receiving system can
- understand and use. Communicating parties determine the for-
- mat and language (syntax) of messages: translates if
- required, preserving the meaning (semantics). 7. Application
- Layer: Supports distributed applications by manipulating
- information. Provides resource management for file
- transfer, virtual file and virtual terminal emulation, dis-
- tributed processes and other applications.
-
- Overt channel - an overt channel is a path within a
- network which is designed for the authorized transfer of
- data.
-
-
- - P -
-
- Passive - (1) A property of an object or network object
- that it lacks logical or computational capability and is
- unable to change the information it contains. (2) Those
- threats to the confidentiality of data which, if realized,
- would not result in any unauthorized change in the state of
- the intercommunicating systems (e.g., monitoring and/or
- recording of data).
-
- Penetration - the successful violation of a protected
- system.
-
- Penetration testing - the portion of security testing
- in which the penetrators attempt to circumvent the security
- features of a system. The penetrators may be assumed to use
- all system design and implementation documentation, which
- may include listings of system source code, manuals, and
- circuit diagrams. The penetrators work under no constraints
- other than those that would be applied to ordinary users or
- implementors of untrusted portions of the component.
-
- Privacy - (1) the ability of an individual or organiza-
- tion to control the collection, storage, sharing, and dis-
- semination of personal and organizational information. (2)
- The right to insist on adequate security of, and to define
- authorized users of, information or systems. Note: The con-
- cept of privacy cannot be very precise and its use should be
- avoided in specifications except as a means to require secu-
- rity, because privacy relates to "rights" that depend on
- legislation.
-
- Process - a program in execution. It is completely
- characterized by a single current execution point
- (represented by the machine state) and address space.
-
- Protection-critical portions of the TCB - those por-
- tions of the TCB whose normal function is to deal with the
- control of access between subjects and objects. See also
- Subject, Object, Trusted Computer Base.
-
- Protection philosophy - an informal description of the
- overall design of a system that delineates each of the pro-
- tection mechanisms employed. A combination (appropriate to
- the evaluation class) of formal and informal techniques is
- used to show that the mechanisms are adequate to enforce the
- security policy.
-
-
- - R -
-
- Read - a fundamental operation that results only in the
- flow of information from an object to a subject.
-
- Read access - permission to read information.
-
-
- Reference monitor concept - an access control concept
- that refers to an abstract machine that mediates all
- accesses to objects by subjects. See also Security Kernel.
-
- Reliability - the extent to which a system can be
- expected to perform its intended function with required pre-
- cision.
-
- Resource - anything used or consumed while performing a
- function. The categories of resources are: time, informa-
- tion, objects (information containers), or processors (the
- ability to use information). specific examples are: CPU
- time; terminal connect time; amount of directly-addressable
- memory; disk space; number of I/O requests per minute, etc.
-
-
- - S -
-
- Secrecy Policy - a security policy to prevent unauthor-
- ized users from reading sensitive information. See also
- Security Policy
-
- Security architecture - the subset of computer archi-
- tecture dealing with the security of the computer or network
- system. See computer architecture, network architecture.
-
- Security-Compliant Channel - A channel is Security-
- Compliant if the enforcement of the network policy depends
- only upon characteristics of the channel either (1) included
- in the evaluation, or (2) assumed as a installation con-
- straint and clearly documented in the Trusted Facility
- Manual.
-
- Security Kernel - the hardware, firmware, and software
- elements of a Trusted Computing Base (or Network Trusted
- Computing Base partition) that implement the reference moni-
- tor concept. It must mediate all accesses, be protected
- ___
- from modification, and be verifiable as correct.
-
- Security label - see Sensitivity label.
-
- Security level - the combination of hierarchical clas-
- sification and a set of non-hierarchical categories that
- represents the sensitivity of information.
-
- Security policy - the set of laws, rules, and practices
- that regulate how an organization manages, protects, and
- distributes sensitive information.
-
- Security policy model - an informal presentation of a
- formal security policy model.
-
- Security testing - a process used to determine that the
- security features of a system are implemented as designed
- and that they are adequate for a proposed application
- environment. This process includes hands-on functional
- testing, penetration testing, and verification. See also:
- Functional Testing, Penetration Testing, Verification.
-
- Sensitivity label - A piece of information that
- represents the security level of an object and that
- describes the sensitivity (e.g., classification) of the data
- in the object. Sensitivity labels are used by the NTCB as
- the basis for mandatory access control decisions.
-
- Sensitivity level - See Security level.
-
- Simple security property - a Bell-LaPadula security
- model rule allowing a subject read access to an object only
- if the security level of the subject dominates the security
- level of the object.
-
- Single-level device - a device that is used to process
- data of a single security level at any one time. Since the
- device need not be trusted to separate data of different
- security levels, sensitivity labels do not have to be stored
- with the data being processed.
-
- *-property (star property) - a Bell-LaPadula security
- model rule allowing a subject write access to an object only
- if the security level of the subject is dominated by the
- security level of the object. Also known as the Confinement
- Property.
-
- Storage object - an object that supports both read and
- write accesses.
-
- Subject - an active entity, generally in the form of a
- person, process, or device that causes information to flow
- among objects or changes the system state. Technically, a
- process/domain pair.
-
- Subject security level - a subject's security level is
- equal to the security level of the objects to which it has
- both read and write access. A subject's security level must
- always be dominated by the clearance of the user the subject
- is associated with.
-
- System - an assembly of computer and/or communications
- hardware, software, and firmware configured for the purpose
- of classifying, sorting, calculating, computing, summariz-
- ing, transmitting and receiving, storing and retrieving data
- with the purpose of supporting users.
-
- System High - the highest security level supported by a
- system at a particular time or in a particular environment.
-
- System High Security Mode - the mode of operation in
- which system hardware and software is only trusted to pro-
- vide discretionary protection between users. In this mode,
- the entire system, to include all components electrically
- and/or physically connected, must operate with security
- measures commensurate with the highest classification and
- sensitivity of the information being processed and/or
- stored. All system users in this environment must possess
- clearances and authorization for all information contained
- in the system. All system output must be clearly marked
- with the highest classification and all system caveats until
- the information has been reviewed manually by an authorized
- individual to ensure appropriate classifications and that
- caveats have been affixed. Compare Dedicated Security Mode,
- Multilevel Security Mode.
-
- System Low - the lowest security level supported by a
- system at a particular time or in a particular environment.
-
- System Security Officer (SSO) - the person responsible
- for the security of a system. The SSO is authorized to act
- in the "security administrator" role. Functions that the
- SSO is expected to perform include: auditing and changing
- security characteristics of a user.
-
-
- - T -
-
- Top-level specification (TLS) - a non-procedural
- description of system behavior at the most abstract level.
- Typically a functional specification that omits all imple-
- mentation details.
-
- Trap-door - a hidden software or hardware mechanism
- that permits system protection mechanisms to be circum-
- vented. It is activated in some non-apparent manner (e.g.,
- special "random" key sequence at a terminal.
-
- Trojan horse - a computer program with an apparently or
- actually useful function that contains additional (hidden)
- functions that surreptitiously exploit the legitimate
- authorizations of the invoking process to the detriment of
- security. For example, making a "blind copy" of a sensitive
- file for the creator of the Trojan Horse.
-
- Trusted channel - a mechanism by which two NTCB parti-
- tions can communicate directly. This mechanism can be
- activated by either of the NTCB partitions, cannot be imi-
- tated by untrusted software, and maintains the integrity of
- information that is sent over it. A trusted channel may be
- needed for the correct operation of other security mechan-
- isms.
-
- Trusted computer system - a system that employs suffi-
- cient hardware and software integrity measures to allow its
- use for processing simultaneously a range of sensitive or
- classified information.
-
- Trusted computing base (TCB) - the totality of protec-
- tion mechanisms within a computer system -- including
- hardware, firmware, and software -- the combination of which
- is responsible for enforcing a security policy. It creates
- a basic protection environment and provides additional user
- services required for a trusted computer system. The abil-
- ity of a trusted computing base to correctly enforce a secu-
- rity policy depends solely on the mechanisms within the TCB
- and on the correct input by system administrative personnel
- of parameters (e.g., a user's clearance) related to the
- security policy.
-
- Trusted functionality - that which is determined to be
- correct with respect to some criteria, e.g. as established
- by a security policy. The functionality shall neither fall
- short of nor exceed the criteria.
-
- Trusted path - a mechanism by which a person at a ter-
- minal can communicate directly with the Trusted Computing
- Base. This mechanism can only be activated by the person or
- the Trusted Computing Base and cannot be imitated by
- untrusted software.
-
- Trusted software - the software portion of a Trusted
- Computing Base.
-
- Trusted subject - a subject that is part of the TCB.
- It has the ability to violate the security policy, but is
- trusted not to actually do so. For example in the Bell-
- LaPadulla model a trusted subject is not constrained by the
- *-property and thus has the ability to write sensitive
- information into an object whose level is not dominated by
- the (maximum) level of the subject, but it is trusted to
- only write information into objects with a label appropriate
- for the actual level of the information.
-
-
- - U -
-
- User - any person who interacts directly with a network
- system. This includes both those persons who are authorized
- to interact with the system and those people who interact
- without authorization (e.g., active or passive wiretappers).
- Note that "users" does not include "operators," "system pro-
- grammers," "technical control officers," "system security
- officers," and other system support personnel. They are
- distinct from users and are subject to the Trusted Facility
- Manual and the System Architecture requirements. Such indi-
- viduals may change the system parameters of the network sys-
- tem, for example by defining membership of a group. These
- individuals may also have the separate role of users.
-
-
- - V -
-
- Verification - the process of comparing two levels of
- system specification for proper correspondence (e.g., secu-
- rity policy model with top-level specification (TLS), TLS
- with source code, or source code with object code). This
- process may or may not be automated.
-
- Virus - malicious software, a form of Trojan horse,
- which reproduces itself in other executable code.
-
-
- - W -
-
- Write - a fundamental operation that results only in
- the flow of information from a subject to an object.
-
- Write access - permission to write an object.
-
-
-
-
- References
- __________
-
-
- Abrams, M. D. and H. J. Podell, Tutorial: Computer and Net-
- ________ ________ ___ ____
- work Security, IEEE Computer Society Press, 1987.
- ____ ________
-
- Addendum to the Transport Layer Protocol Definition for Pro-
- ________ __ ___ _________ _____ ________ __________ ___ ____
- viding Connection Oriented End-to-End Cryptographic Data
- ______ __________ ________ ___ __ ___ _____________ ____
- Protection Using A 64-bit Block Cipher, ISO TC 97 / SC 20 /
- __________ _____ _ __ ___ _____ ______
- WG 3, N 37, January 10, 1986.
-
- Biba K. J., Integrity Considerations for Secure Computer
- _________ ______________ ___ ______ ________
- Systems, MTR-3153, The MITRE Corporation, June 1975; ESD-
- _______
- TR-76-372, April 1977.
-
- Bell, D. Elliot and LaPadula, Leonard J., Secure Computer
- ______ ________
- Systems: Unified Exposition and Multics Interpretation, MTR
- _______ _______ __________ ___ _______ ______________
- 2997, The MITRE Corporation, April 1974. (AD/A 020 445)
-
- Denning, D .E., Lunt, T. F., Neumann, P. G., Schell, R. R.,
- Heckman, M. and Shockley, W., Secure Distributed Data
- ______ ___________ ____
- Views, Security Policy and Interpretation for a Class A1
- _____ ________ ______ ___ ______________ ___ _ _____ __
- Multilevel Secure Relational Database System, SRI Interna-
- __________ ______ __________ ________ ______
- tional, November 1986.
-
- Girling, C. G., "Covert Channels in LAN's," IEEE Transac-
- ____ ________
- tions on Software Engineering, Vol. SE-13, No. 2, February
- _____ __ ________ ___________
- 1987.
-
- Grohn, M. J., A Model of a Protected Data Management Sys-
- _ _____ __ _ _________ ____ __________ ____
- tem, ESD-TR-76-289, I. P. Sharp Assoc. Ltd., June, 1976.
- ___
-
- ``Integrity and Inference Group Report,'' Proceedings of the
- ___________ __ ___
- National Computer Security Center Invitational Workshop on
- ________ ________ ________ ______ ____________ ________ __
- Database Security, Baltimore, MD, 17-20 June 1986.
- ________ ________
-
- ISO 7498/Part 2 - Security Architecture, ISO / TC 97 / SC 21
- ___ ____ ____ _ ________ ____________
- / N1528 / WG 1 Ad hoc group on Security, Project 97.21.18,
- September 1986.
-
- Jueneman, R. R, "Electronic Document Authentication," IEEE
- ____
- Network Magazine, April 1987, pp 17-23.
- _______ ________
-
- Lipner, Steven B., ``Non-Discretionary Controls for Commer-
- cial Applications'', IEEE Proceedings of the 1982 Symposium
- ____ ___________ __ ___ ____ _________
- on Security and Privacy, April 26-28, 1982, Oakland, CA.
- __ ________ ___ _______
-
- National Computer Security Center, Department of Defense
- __________ __ _______
- Password Management Guideline, CSC-STD-002-85, 12 April
- ________ __________ _________
- 1985.
-
- National Computer Security Center, Department of Defense
- __________ __ _______
- Trusted Computer Security Evaluation Criteria, DOD 5200.28-
- _______ ________ ________ __________ ________
- STD, December 1985.
-
- National Computer Security Center, Security Requirements:
- ________ ____________
- Guidance for Applying the Department of Defense Trusted Com-
- ________ ___ ________ ___ __________ __ _______ _______ ____
- puter System Evaluation Criteria in Specific Environments,
- _____ ______ __________ ________ __ ________ ____________
- CSC-STD-003-85, 25 June 1985.
-
- Padlipsky, M. A., Snow, D. P., and Karger, P. A., Limita-
- _______
- tions of End-to-End Encryption in Secure Computer Networks,
- _____ __ ___ __ ___ __________ __ ______ ________ ________
- The MITRE Corporation, MTR-3592, Vol. I, May 1978 (ESD TR
- 78-158, DTIC AD A059221).
-
- The Directory - Authentication Framework (Melbourne, April
- ___ _________ ______________ _________ _________ _____
- 1986), ISO/CCITT Directory Convergence Document #3.
- ____
-
- Voydock, Victor L. and Stephen T. Kent, "Security Mechanisms
- in High-Level Network Protocols," Computing Surveys, Vol.
- _________ _______
- 15, No. 2, June 1983, pp 135-171.
-
-
- _________________________
- ISO developmental documents are of limited lifetime and availa-
- bility.
-
-