Share to: share facebook share twitter share wa share telegram print page

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a database) constrains the ability of a subject or initiator to access or modify on an object or target.[1] In the case of operating systems, the subject is a process or thread, while objects are files, directories, TCP/UDP ports, shared memory segments, or IO devices. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, the operating system kernel examines these security attributes, examines the authorization rules (aka policy) in place, and decides whether to grant access. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

In mandatory access control, the security policy is centrally controlled by a policy administrator and is guaranteed (in principle) to be enforced for all users. Users cannot override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions or assign security attributes.

Historically and traditionally, MAC has been closely associated with multilevel security (MLS) and specialized military systems. In this context, MAC implies a high degree of rigor to satisfy the constraints of MLS systems. More recently,[when?] however, MAC has deviated out of the MLS niche and has started to become more mainstream. The more recent MAC implementations, such as SELinux and AppArmor for Linux and Mandatory Integrity Control for Windows, allow administrators to focus on issues such as network attacks and malware without the rigor or constraints of MLS.

History and background

Historically, MAC was strongly associated with multilevel security (MLS) as a means of protecting classified information of the United States. The Trusted Computer System Evaluation Criteria (TCSEC), the seminal work on the subject and often known as the Orange Book, provided the original definition of MAC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity".[2] Early implementations of MAC such as Honeywell's SCOMP, USAF's SACDIN, NSA's Blacker, and Boeing's MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement.

The word "mandatory" in MAC has acquired a special meaning derived from its use with military systems. In this context, MAC implies an extremely high degree of robustness that assures that the control mechanisms can resist any type of subversion, thereby enabling them to enforce access controls that are mandated by the order of a government such as the Executive Order 12958. Enforcement is supposed to be more imperative than for commercial applications. This precludes enforcement by best-effort mechanisms. Only mechanisms that can provide absolute or near-absolute enforcement of the mandate are acceptable for MAC. This is a tall order and sometimes assumed unrealistic by those unfamiliar with high assurance strategies, and very difficult for those who are.

In some systems, users have the authority to decide whether to grant access to any other user. To allow that, all users have clearances for all data. This is not necessarily true of an MLS system. If individuals or processes exist that may be denied access to any of the data in the system environment, then the system must be trusted to enforce MAC. Since there can be various levels of data classification and user clearances, this implies a quantified scale for robustness. For example, more robustness is indicated for system environments containing classified "Top Secret" information and uncleared users than for one with "Secret" information and users cleared to at least "Confidential." To promote consistency and eliminate subjectivity in degrees of robustness, an extensive scientific analysis and risk assessment of the topic produced a landmark benchmark standardization quantifying security robustness capabilities of systems and mapping them to the degrees of trust warranted for various security environments. The result was documented in CSC-STD-004-85.[3] Two relatively independent components of robustness were defined: Assurance level and functionality. Both were specified with a degree of precision that warranted significant confidence in certifications based on these criteria.

The Common Criteria standard[4] is based on this science and it intended to preserve the assurance level as EAL levels and the functionality specifications as Protection Profiles. Of these two essential components of objective robustness benchmarks, only EAL levels were faithfully preserved. In one case, TCSEC level C2[5] (not a MAC-capable category) was fairly faithfully preserved in the Common Criteria, as the Controlled Access Protection Profile (CAPP).[6] MLS Protection Profiles (such as MLSOSPP similar to B2)[7] is more general than B2. They are pursuant to MLS, but lack the detailed implementation requirements of their Orange Book predecessors, focusing more on objectives. This gives certifiers more subjective flexibility in deciding whether the evaluated product’s technical features adequately achieve the objective, potentially eroding consistency of evaluated products and making it easier to attain certification for less trustworthy products. For these reasons, the importance of the technical details of the Protection Profile is critical to determining the suitability of a product.

Such an architecture prevents an authenticated user or process at a specific classification or trust-level from accessing information, processes, or devices in a different level. This provides a containment mechanism of users and processes, both known and unknown. An unknown program might comprise an untrusted application where the system should monitor or control accesses to devices and files.

A few MAC implementations, such as Unisys' Blacker project, were certified robust enough to separate Top Secret from Unclassified late in the last millennium. Their underlying technology became obsolete and they were not refreshed. Today there are no current implementations certified by TCSEC to that level of robust implementation. However, some less robust products exist.

In operating systems

Microsoft

Starting with Windows Vista and Server 2008, Microsoft has incorporated Mandatory Integrity Control (MIC) in the Windows operating system, which adds integrity levels (IL) to running processes. The goal is to restrict access of less trustworthy processes to sensitive info. MIC defines five integrity levels: Low, medium, high, system, and trusted installer.[8] By default, processes started at medium IL. Elevated processes receive high IL.[9] Child processes, by default, inherit their parent's integrity, although the parent process can launch them with a lower IL. For example, Internet Explorer 7 launches its subprocesses with low IL. Windows controls access to objects based on ILs. Named objects, including files, registry keys or other processes and threads, have an entry in their ACL indicating the minimum IL of the process that can use the object. MIC enforces that a process can write to or delete an object only when its IL is equal to or higher than the object’s IL. Furthermore, to prevent access to sensitive data in memory, processes can’t open processes with a higher IL for read access.[10]

Apple

Apple Inc. has incorporated an implementation of the TrustedBSD framework in its iOS and macOS operating systems.[11] (The word "mac" in "macOS" is short for "Macintosh" and has nothing to do with the abbreviation of "mandatory access control.") The command-line function sandbox_init provides a limited high-level sandboxing interface.[12]

Google

Version 5.0 and later of the Android operating system, developed by Google, use SELinux to enforce a MAC security model on top of its original UID-based DAC approach.[13]

Linux family

Linux and many other Unix distributions have MAC for CPU (multi-ring), disk, and memory. While OS software may not manage privileges well, Linux became famous during the 1990s as being more secure and far more stable than non-Unix alternatives.[citation needed]

Amon Ott's RSBAC (Rule Set Based Access Control) provides a framework for Linux kernels that allows several different security policy / decision modules. One of the models implemented is Mandatory Access Control model. A general goal of RSBAC design was to try to reach (obsolete) Orange Book (TCSEC) B1 level. The model of mandatory access control used in RSBAC is mostly the same as in Unix System V/MLS, Version 1.2.1 (developed in 1989 by the National Computer Security Center of the USA with classification B1/TCSEC). RSBAC requires a set of patches to the stock kernel, which are maintained quite well by the project owner.

Smack (Simplified Mandatory Access Control Kernel) is a Linux kernel security module that protects data and process interaction from malicious manipulation using a set of custom mandatory access control rules, with simplicity as its main design goal.[14] It has been officially merged since the Linux 2.6.25 release.[15]

TOMOYO Linux is a lightweight MAC implementation for Linux and Embedded Linux, developed by NTT Data Corporation. It has been merged in Linux Kernel mainline version 2.6.30 in June 2009.[16] Differently from the label-based approach used by SELinux, TOMOYO Linux performs a pathname-based Mandatory Access Control, separating security domains according to process invocation history, which describes the system behavior. Policy are described in terms of pathnames. A security domain is simply defined by a process call chain, and represented by a string. There are 4 modes: disabled, learning, permissive, enforcing. Administrators can assign different modes for different domains. TOMOYO Linux introduced the "learning" mode, in which the accesses occurred in the kernel are automatically analyzed and stored to generate MAC policy: this mode could then be the first step of policy writing, making it easy to customize later.

SUSE Linux and Ubuntu 7.10 have added a MAC implementation called AppArmor, which utilizes the Linux Security Modules (LSM) interface of Linux 2.6. LSM provides a kernel API that allows modules of kernel code to govern ACL (DAC ACL, access-control lists). AppArmor is not capable of restricting all programs and is optionally in the Linux kernel as of version 2.6.36.[17]

grsecurity is a patch for the Linux kernel providing a MAC implementation (precisely, it is an RBAC implementation). grsecurity is not implemented via the LSM API.[18]

Astra Linux OS developed for Russian Army has its own mandatory access control.[19]

Other OSes

FreeBSD supports Mandatory Access Control, implemented as part of the TrustedBSD project. It was introduced in FreeBSD 5.0. Since FreeBSD 7.2, MAC support is enabled by default. The framework is extensible; various MAC modules implement policies such as Biba and multilevel security.

Sun's Trusted Solaris uses a mandatory and system-enforced access control mechanism (MAC), where clearances and labels are used to enforce a security policy. However note that the capability to manage labels does not imply the kernel strength to operate in multilevel security mode[citation needed]. Access to the labels and control mechanisms are not[citation needed] robustly protected from corruption in protected domain maintained by a kernel. The applications a user runs are combined with the security label at which the user works in the session. Access to information, programs and devices are only weakly controlled[citation needed].

See also

Access control

Other topics

Footnotes

  1. ^ Belim, S. V.; Belim, S. Yu. (December 2018). "Implementation of Mandatory Access Control in Distributed Systems". Automatic Control and Computer Sciences. 52 (8): 1124–1126. doi:10.3103/S0146411618080357. ISSN 0146-4116. S2CID 73725128.
  2. ^ "Trusted Computer Evaluation Criteria" (PDF). National Institute of Standards and Technology. 15 August 1983. Archived (PDF) from the original on 13 April 2023. Retrieved 25 June 2023.
  3. ^ "Technical Rational Behind CSC-STD-003-85: Computer Security Requirements". 1985-06-25. Archived from the original on July 15, 2007. Retrieved 2008-03-15.
  4. ^ "The Common Criteria Portal". Archived from the original on 2006-07-18. Retrieved 2008-03-15.
  5. ^ US Department of Defense (December 1985). "DoD 5200.28-STD: Trusted Computer System Evaluation Criteria". Retrieved 2008-03-15.
  6. ^ "Controlled Access Protection Profile, Version 1.d". National Security Agency. 1999-10-08. Archived from the original on 2012-02-07. Retrieved 2008-03-15.
  7. ^ "Protection Profile for Multi-Level Operating Systems in Environments Requiring Medium Robustness, Version 1.22" (PDF). National Security Agency. 2001-05-23. Retrieved 2018-10-06.
  8. ^ Matthew Conover. "Analysis of the Windows Vista Security Model". Symantec Corporation. Archived from the original on 2008-03-25. Retrieved 2007-10-08.
  9. ^ Steve Riley. "Mandatory Integrity Control in Windows Vista". Retrieved 2007-10-08.
  10. ^ Mark Russinovich. "PsExec, User Account Control and Security Boundaries". Retrieved 2007-10-08.
  11. ^ TrustedBSD Project. "TrustedBSD Mandatory Access Control (MAC) Framework". Retrieved 2008-03-15.
  12. ^ "sandbox_init(3) man page". 2007-07-07. Archived from the original on 2008-07-25. Retrieved 2008-03-15.
  13. ^ "Security-Enhanced Linux in Android". Android Open Source Project. Archived from the original on 19 June 2023. Retrieved 25 June 2023.
  14. ^ "Official SMACK documentation from the Linux source tree". Archived from the original on 2013-05-01.
  15. ^ Jonathan Corbet. "More stuff for 2.6.25". Archived from the original on 2012-11-02.
  16. ^ "TOMOYO Linux, an alternative Mandatory Access Control". Linux 2 6 30. Linux Kernel Newbies.
  17. ^ "Linux 2.6.36 released 20 October 2010". Linux 2.6.36. Linux Kernel Newbies.
  18. ^ "Why doesn't grsecurity use LSM?".
  19. ^ (in Russian) Ключевые особенности Astra Linux Special Edition по реализации требований безопасности информации Archived 2014-07-16 at the Wayback Machine

References

  • Weblog post on the how virtualization can be used to implement Mandatory Access Control.
  • Weblog post from a Microsoft employee detailing Mandatory Integrity Control and how it differs from MAC implementations.
  • GWV Formal Security Policy Model A Separation Kernel Formal Security Policy, David Greve, Matthew Wilding, and W. Mark Vanfleet.

Read other articles:

The environmental impact of cocoa production includes deforestation, soil contamination, and herbicide resistance. The majority of cocoa farms are now located in Côte d'Ivoire and Ghana. Background Cocoa beans are a high demand consumer item all over the world. They are used in products such as chocolate, candy bars, drinks and cocoa powder. However, cocoa farming and the production of cocoa beans are extremely fragile and labour-intensive processes. The cocoa trees are also called Cacao trees.…

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Januari 2023. Hoshi no Furumachiほしのふるまち MangaPengarangHidenori HaraPenerbitShogakukanMajalahWeekly Young SundayTerbit2006 – 2008Volume7 Film laga hidupTayang26 Maret 2011  Portal anime dan manga Hoshi no Furumachi (ほしのふるまちcode: ja…

Artikel ini perlu diwikifikasi agar memenuhi standar kualitas Wikipedia. Anda dapat memberikan bantuan berupa penambahan pranala dalam, atau dengan merapikan tata letak dari artikel ini. Untuk keterangan lebih lanjut, klik [tampil] di bagian kanan. Mengganti markah HTML dengan markah wiki bila dimungkinkan. Tambahkan pranala wiki. Bila dirasa perlu, buatlah pautan ke artikel wiki lainnya dengan cara menambahkan [[ dan ]] pada kata yang bersangkutan (lihat WP:LINK untuk keterangan lebih lanjut). …

Ne doit pas être confondu avec Polype (zoologie). Polype Polype du côlon sigmoïde tel que révélé par la coloscopie. Le polype d'environ 1 cm de diamètre a été enlevé par cautérisation. Données clés Classification et ressources externes CIM-10 K62.1 - K63.5 - N84 DiseasesDB 000266 MedlinePlus 000266 eMedicine 172674 MeSH D011127 Mise en garde médicale modifier - modifier le code - voir Wikidata (aide) En médecine, un polype est une croissance anormale de tissus en saillie (adénome…

Inhaltsverzeichnis 1 Weichbildsteine 2 Weblinks 3 Einzelnachweise In Dresden blieben mehrere Weichbildsteine erhalten. Sie dienten der Abgrenzung des Weichbildes der Stadt und bildeten damit die Stadtgerichtsgrenze. Die Weichbildsteine stehen unter Denkmalschutz. Denkmaltext des Landesamts für Denkmalpflege: „Weichbildstein mit Wappen und Jahreszahlen; ortsgeschichtlich bedeutend, zudem als älteres Zeugnis der Stadtgeschichte mit Seltenheitswert.“ In der sächsischen Landeshauptstadt wurde…

У Вікіпедії є статті про інших людей із прізвищем Гелмс. Сьюзен Джейн ГелмсSusan Jane Helms Дата народження 26 лютого 1958(1958-02-26) (65 років)Місце народження Шарлотт, Північна Кароліна, СШАAlma mater: Школа льотчиків-випробовувальників ВПС СШАd, Військово-повітряна академія США, Стенфо

Yoo Teo (2023) Koreanische Schreibweise Hangeul 유태오 Hanja 刘台午 RevidierteRomanisierung Yu Tae-o McCune-Reischauer Yu T’aeo Siehe auch: Koreanischer Name Yoo Teo (* 11. April 1981 in Köln, Deutschland) ist ein deutsch-südkoreanischer Schauspieler. Inhaltsverzeichnis 1 Leben 2 Filmografie 2.1 Filme 2.2 Fernsehserien 3 Weblinks 4 Einzelnachweise Leben Yoo Teo, auch bekannt unter der westlichen Namensreihenfolge Teo Yoo, wurde am 11. April 1981 als Sohn südkoreanischer Gastarb…

Family of true bugs Acanaloniidae Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Arthropoda Class: Insecta Order: Hemiptera Suborder: Auchenorrhyncha Infraorder: Fulgoromorpha Superfamily: Fulgoroidea Family: AcanaloniidaeAmyot & Serville 1843 Acanaloniidae is a family of planthoppers. It is sometimes treated as a subfamily of Issidae (as Acanaloniinae).[1][2] Genera Genera include:[3] Acanalonia Spinola, 1839 Aylaella Demir & Özdikmen, 200…

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (أبريل 2019) آر. بروس كينغ معلومات شخصية الميلاد 27 فبراير 1938 (85 سنة)  مواطنة الولايات المتحدة  الحياة العملية المدرسة الأم جامعة هارفارد  المهنة كيميائي،  وعالم ك

Matt Prokop2008PekerjaanAktorTahun aktif2006 – sekarangSitus webhttp://www.mattprokop.com Matt Prokop (lahir 29 Juli 1990) adalah aktor asal Amerika Serikat. Ia berperan sebagai Jimmie The Rocket Zara dalah film High School Musical 3: Senior Year. Filmografi Tahun Judul Peran Catatan Lain 2010 Furry Vengeance Tyler Sanders Main Role Cougar Hunting Tyler Main Role 2009 Medium Kyle 'Casey' Covington Episode Once in a Lifetime In the Motherhood Luke TV Series, Unaired Pilot 2008 High School …

Pemilihan umum Presiden Venezuela 20132012201814 April 2013 (2013-04-14)Kehadiran pemilih79.68%Kandidat   Calon Nicolás Maduro Henrique Capriles Radonski Partai Partai Sosialis Bersatu Venezuela Primero Justicia Aliansi Gran Polo Patriótico Mesa de la Unidad Democrática Negara bagian Distrik Ibukota Venezuela Miranda Negara bagian 15 + Distrik Ibukota Venezuela 8 Suara rakyat 7.587.579 7.363.980 Persentase 50,6% 49,1% Peta persebaran suara Peta hasil pemilu.Merah dime…

1930s Polish cruiser tank prototype 10TP TypeLight tankPlace of originPolandService historyIn service1938-1939 (prototype)Used byPolish ArmySpecificationsMass12.8 tonsLength5.4 m (17 ft 9 in)Width2.55 m (8 ft 4 in)Height2.2 m (7 ft 3 in)Crew4ArmorHull: 8-20 mmTurret: 16 mmMainarmament1× 37 mm Bofors wz. 36Secondaryarmament1× 7.92 mm Ckm wz.30Engine12-cylinder American LaFrance engine210 hp (160 kW)Transmission5-speed ge…

1895 opera by Giacomo Puccini For Ruggero Leoncavallo's opera of the same name, see La bohème (Leoncavallo). For other uses, see La bohème (disambiguation). La bohèmeOpera by Giacomo PucciniOriginal 1896 poster by Adolfo HohensteinLibrettist Luigi Illica Giuseppe Giacosa LanguageItalianBased onHenri Murger's Scènes de la vie de bohèmePremiere1 February 1896 (1896-02-01)Teatro Regio, Turin La bohème (/ˌlɑː boʊˈɛm/ LAH boh-EM,[1] Italian: [la boˈɛm]) is…

International sporting eventSwimming at the2007 Pan American GamesFreestyle50 mmenwomen100 mmenwomen200 mmenwomen400 mmenwomen800 mwomen1500 mmenBackstroke100 mmenwomen200 mmenwomenBreaststroke100 mmenwomen200 mmenwomenButterfly100 mmenwomen200 mmenwomenIndividual medley200 mmenwomen400 mmenwomenFreestyle relay4×100 mmenwomen4×200 mmenwomenMedley relay4×100 mmenwomenvte Main article: Swimming at the 2007 Pan American Games The Women's 200m freestyle at the 2007 Pan American Games occurred at …

Hard Rock CafeJenisSwastaIndustriKafe, restoran, kasino, hotelDidirikanLondon, Inggris14 Juni 1971PendiriIsaac Tigrett dan Peter MortonKantorpusatOrlando, Florida, Amerika SerikatCabang175 (2012)TokohkunciHamish Dodds, Presiden/CEOJohn Galloway, CMOTom Gispanski, CFOPemilikSeminole Tribe of FloridaSitus webhttp://www.hardrock.com Hard Rock Cafe adalah jaringan restoran bertema yang didirikan pada tahun 1971 oleh warga Amerika Serikat Isaac Tigrett dan Peter Morton di London. Pada 1979, kafe ters…

この記事は英語版の対応するページを翻訳することにより充実させることができます。(2022年2月)翻訳前に重要な指示を読むには右にある[表示]をクリックしてください。 英語版記事を日本語へ機械翻訳したバージョン(Google翻訳)。 万が一翻訳の手がかりとして機械翻訳を用いた場合、翻訳者は必ず翻訳元原文を参照して機械翻訳の誤りを訂正し、正確な翻訳にしな…

American comic book writer Marv WolfmanWolfman at the 2023 WonderConBornMarvin Arthur Wolfman (1946-05-13) May 13, 1946 (age 77)Brooklyn, New York City, U.S.NationalityAmericanArea(s)Writer, EditorNotable worksThe Tomb of DraculaBladeThe Amazing Spider-ManDaredevilNovaThe New Teen TitansCrisis on Infinite EarthsAdventures of SupermanNightwingAwardsShazam Award, 1973Inkpot Award, 1979Eagle Award, 1982, 1984Jack Kirby Award, 1985 and 1986Scribe Award, 2007National Jewish Book Award, 2008Spous…

2018 United States House of Representatives elections in Oregon ← 2016 November 6, 2018 (2018-11-06) 2020 → All 5 Oregon seats to the United States House of Representatives   Majority party Minority party   Party Democratic Republican Last election 4 1 Seats won 4 1 Seat change Popular vote 1,061,412 702,531 Percentage 57.45% 38.02% Swing 3.74% 0.21% Election results Election results by county Democratic   50–60% …

Indian esports player Ankur DiwakarBorn (1991-04-19) 19 April 1991 (age 32)Bombay, IndiaNationalityIndianOther namesJauntyTankOccupationEsports Athlete Ankur Diwakar (born 19 April 1991) better known by his alias Jauntytank, is an Indian professional esports player. He is the winner of UCypher MTV India Season 1 tournament in India.[1] He represented India in Asian Games 2018[2] and won the South Asian Championship.[3] Esports career Diwakar plays FIFA, Pro Evol…

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Black Canaan – news · newspapers · books · scholar · JSTOR (June 2010) (Learn how and when to remove this template message) Short story by Robert E. HowardBlack CanaanShort story by Robert E. HowardCountryUnited StatesLanguageEnglishGenre(s)Horror, Southern Go…

Kembali kehalaman sebelumnya

Lokasi Pengunjung: 3.141.45.83