More Technical Aspects of Security Policy
Introduction.
Probably one of the more perplexing aspects of
developing security for many technically oriented people
is to make certain they are meeting the business needs of the people who
will be using the system so they can work effectively. These
approaches must also stay up-to-date and always be on the lookout for
realistic ways to improve. The following outline summarizes many of the issues related to the more technical aspects of providing security.
Governmental Ratings. The US Government has developed criteria for security ratings. The DOD's TCSEC -Trusted Computer System Evaluation Criteria is sometimes called the orange book. It is used in conjunction with the TNI - Trusted Network Implementation of the TCSEC which can be referred to as the red book. The TNI has developed ratings that start at A, which is the highest security rating. They go to D which is the lowest security rating. The C rating is divided into two, the C1 and higher C2. The C2 rating is sought after by organizations that want to obtain governmental contracts. The C2 requires the operating system to be able to do the following among other things.
The following table surveys operating systems and shows the security ratings they have been able to achieve. |
Operating System | Vendor | NSA Certification |
UNIX XTS-200 and XTS 300 | Wang Government Services | Orange Book B3 |
UNIX Trusted Xenix 3 and 4 | Trusted Information Systems | Orange Book B2 |
UNIX HP-UX 8.04 and 9,0,9 | Hewlett Packard | Orange Book B1 |
UNIX UNICOS 8.0.2 | Cray Research | Red Book B1 |
UNIX RS/6000 | IBM | Orange Book C2 |
Windows NT 3.5/SP3 and Windows NT 4.0 |
Microsoft | Orange Book C2 |
NetWare 4 and 4.11 | Novell | Red Book C2 |
Merely installing the operating system doesn't guarantee
the rating. There are other criteria such as network
connectivity and operating system features. The entire hardware
and software configuration must achieve the rating. These
baselines for the NOSs help. Now we need to discuss some aspects of auditing before getting back to our outline. Auditing is the process of tracking the activities of users and the system. Most operating systems have these built into them. Log files are maintained that track what are determined to be salient events and aspects of the network. Most auditing makes use of passive detection where in order to find out particular information a sys admin must actually go and search log files for particular activities. In situations requiring more intense security there needs to be active detection in which software continually scans the network for signs of intrusion. Some programs even alert sys admins in certain situations and disconnect suspicious sessions. The following list contains some examples of active detection software.
Getting back to our outline.
Impact of Organization Size and Type. The size of the organization is going to have huge impact on security implementation and how many people are involved. Whether the organization is small, medium or large and how technically oriented it infrastructure needs to be in order to be competitive are going to have a huge impact on how security is implemented. The levels of security requirements for their operation are something else that are going to be very important. |