💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › POLICIES › policyasc.hac captured on 2022-07-17 at 01:57:29.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

A Draft Security Policy



This draft policy is provided as a model for your organization's consideration 
and adoption. It was prepared by the National Computer Security Association. 
We would appreciate your comments or revisions to it. You may write 
us at Suite 309, 4401-A Connecticut Av NW, Washington, DC 20008. Or 
you may call our BBS at 202-364-1304. Or you may call voice at 202-364-8252.





BASIC REQUIREMENTS



Each of the six basic requirements defined below are used by DoD in 
evaluating system security, and are appropriate throughout all computer 
systems, regardless of their actual security requirements.



Security Policy



<B>There must be an explicit and well-defined security policy enforced 
by the system.<D> Given identified subjects and objects, there must 
be a set of rules that are used by the system to determine whether 
a given subject can be permitted to gain access to a specific object. 
Computer systems of interest must enforce a mandatory security policy 
that can effectively implement access rules for handling sensitive 
information. These rules include requirements such as: <MI><169>No 
person lacking proper personnel security clearance shall obtain access 
to classified information.<170><D> In addition, discretionary security 
controls are required to ensure that only selected users or groups 
of users may obtain access to data <197> for instance, based on a 
need-to-know basis.



Marking



<B>Access control labels must be associated with objects<D>. In order 
to control access to information stored in a computer, according to 
the rules of a mandatory security policy, it must be possible to mark 
every object with a label that reliably identifies the object's sensitivity 
level and/or the modes of access accorded those subjects who may potentially 
access the object.



Identification



<B>Individual subjects must be identified<D>. Each access to information 
must be mediated based on who is accessing the information and what 
classes of information they are authorized to deal with. This identification 
and authorization information must be securely maintained by the computer 
system and be associated with every active element that performs some 
security-relevant action in the system.



Accountability



<B>Audit information must be selectively kept and protected so that 
actions affecting security can be traced to the responsible party.<D> 
A trusted system must be able to record the occurrences of security-relevant 
events in an audit log. The capability to select the audit events 
to be recorded is necessary to minimize the expense of auditing and 
to allow efficient analysis.  Audit data must be protected from modification 
and unauthorized destruction to permit detection and after-the-fact 
investigations of security violations.



Assurance



<B>The computer system must contain hardware/software mechanisms that 
can be independently evaluated to provide sufficient assurance that 
the system enforces the policy, marking, identification, and accountability 
requirements described above.<D> In order to assure that the four 
requirements are enforced by a computer system, there must be some 
identified and unified collection of hardware and software controls 
that perform these functions.  These mechanisms are typically embedded 
in the operating system of mainframes, or a combination of operating 
system features and added application software on LANs, and are designed 
to carry out the assigned tasks in a secure manner.  The basis for 
trusting such system mechanisms in their operational setting must 
be clearly documented such that it is possible to independently examine 
the evidence to evaluate their sufficiency.



Continuous Protection



<B>The trusted mechanisms that enforce these basic requirements must 
be continuously protected against tampering and/or unauthorized changes.<D> 
No computer system can be considered truly secure if the basic hardware 
and software mechanisms that enforce the security policy are themselves 
subject to unauthorized modification or subversion.  The continuous 
protection requirement has direct implications throughout the computer 
system's lifecycle.





IMPLEMENTATION CONCERNS



<MU>Creating<D> a security policy is fairly simple.  You can copy 
the material that follows, for instance, and get the chief to sign 
it. <MU>Implementing<D> a security policy is more difficult.

	*  The organizations with the most success in implementing security 
policies with PC users are those who get away from a project orientation 
and somehow convince all staff that security is an ongoing business 
function.

While seemingly everyone concerned with security agree that a policy 
is important, not everyone agrees that it should be agency-wide.  For 
example, NASA's Richard W. Carr believes that a standard approach 
like the NSA's C2 level of safeguarding is not cost-effective.  Because 
so much of NASA's scientific data is made public, Carr has opted for 
local approaches to safeguarding information, rather than an agency-wide 
approach.





HARDWARE CONCERNS



Before reviewing sophisticated data security issues, it is necessary 
to consider the basic physical protection of the equipment itself.



Access



Access to micros should be physically limited to authorized users.  Untrained 
or malicious individuals could damage or make inappropriate use of 
the equipment or the accessible data.  At some organizations, such 
as GTE, the entire microcomputer is kept in a locked room.  If users 
are reluctant to do this when they are finished with it, then they 
are provided with an external hard disk that can be locked up.

	*  Do not permit users to leave workstations or micros unattended, 
particularly if they are tied to a network.

	*  Install timelocks that activate after an interval of no keyboard 
activity, and require password to resume entry.

	*  Change all passwords immediately whenever an employee leaves the 
organization.

	*  Change passwords routinely - perhaps every other month - of all 
employees.



Theft



Personal computers and their component parts are high-value items.  Secure 
the rooms where the hardware is located, or install lockdown systems 
securing the equipment to a table or desk.



Environmental Damage



Electrical Power



Computers are sensitive to the quality of electrical power.  Use surge 
protectors.  Also, micros should be powered from a source isolated 
from heavy appliances or office equipment.



Smoking, Eating, and Drinking



Smoke can damage disks.  Food and ashes that are dropped in the keyboard 
can work down into the mechanism and cause malfunctions.  Smoking, 
eating, and drinking should be prohibited in the vicinity of computers.



Static Electricity



Static electricity can badly damage a computer.  This danger can be 
minimized through the use of anti-static sprays, carpets, or pads.



Magnetic Media Protection



Particular attention should be given to the protection of magnetic 
media, as it is the primary means of data storage.



Floppy Disks



Floppy disks should be handled with care.

	*  Always store in the protective jacket.

	*  Protect from bending or similar handling.

	*  Maintain an acceptable temperature range (50-125 degrees F.)

	*  Avoid contact with magnetic fields, such as telephone handsets.

	*  Do not write on the diskette, either directly or through the jacket 
or sleeve.



Hard Disks



Rough handling of hard disks may damage the device.  Take care not 
to jostle the unit unnecessarily.  Never power off the system without 
performing the recommended shutdown procedures.



Media Declassification or Destruction



Magnetic media, such as disks and tapes, that contain sensitive or 
classified information should not be put in regular waste containers.  They 
should be cleared by degaussing and reused, or rendered useless by 
shredding or burning.

Defective or damaged magnetic storage media that have been used in 
a sensitive environment should not be returned to the vendor unless 
they have been degaussed.  This is required since many <169>ERASE<170> 
commands do not actually erase the file.  The DoD-approved erasure 
method requires three overwrites of the file: first overwriting with 
<169>1"s, then <170>0"s, and then random bits.  Each overwrite should 
be verified by visually inspecting the file contents, using some low-level 
facility.



Electromagnetic Emanations



All electronic equipment emanates electromagnetic signals.  Emanations 
produced by computers, terminals, and communication lines can be detected 
and translated into readable form by monitoring devices.  Secure measures 
intended to combat these radio frequency emissions are known as <169>TEMPEST<170> 
controls.  TEMPEST-certified equipment is available, and used regularly 
by government organizations and contractors processing classified 
data.



Hardware Modifications



Hardware modifications should be strictly controlled. Uncontrolled 
or poorly considered hardware modifications can adversely affect the 
operation of the computer.  For example, any modifications to TEMPEST-approved 
devices may invalidate their emanation-shielding ability.  The configuration 
of any hardware systems used for sensitive processing should be very 
carefully monitored.  Such devices should be sealed to prevent tampering, 
and modifications made only by trusted, qualified personnel.



Trusted, Authorized Technicians



Advanced microelectronic techniques make computers vulnerable to <169>bugging.<170>  A 
transmitter chip can be installed by a hostile technician under the 
guise of a system repair or upgrade.  Therefore, the user should be 
certain that the technician performing maintenance is both authorized 
and qualified.  Also, circuit boards or components removed in the 
course of any maintenance at a classified facility should not leave 
without qualified technical review.





DATA CONCERNS





Classification



Classify your information.  IBM uses five classes of data, from unclassified, 
with no restrictions, to <169>registered IBM confidential<170>, available 
only to employees with a predetermined need to know.  If your organization 
has an approved classification system, use it. If not, develop one.



Labeling



Sensitive or classified information resources must be clearly labeled 
as such.  These <169>resources<170> include both the hardware and 
the storage media.



External Classification Labels on Micros



Micros should have external classification labels indicating the highest 
sensitivity of data processed on the device.  Avoid using hard disk 
systems for sensitive processing, as the data stored on a hard disk 
cannot be reliably removed except by degaussing the entire disk surface.  Also, 
it is very difficult to ascertain that sensitive information has not 
been stored on the disk.  Consequently, hard disk systems must be 
labeled to indicate the highest level of data sensitivity to which 
they have ever been exposed.



Floppy Disk Labels



Label all floppy disks to indicate the type and sensitivity of data 
on the disk.  A floppy must be considered to assume the sensitivity 
level of the device in which it is inserted.  For example, a hard 
disk that has some sensitive data must always be considered to be 
a sensitive device, and any floppy disk inserted into any machine 
connected (directly or through cabling) to such a hard disk must assume 
that level of sensitivity.  Conversely, if the floppy were more sensitive 
than the hard disk, the hard disk now assumes the higher sensitivity 
of the floppy.



Files



Files stored on a hard disk containing any sensitive files must be 
handled as carefully as the most sensitive information stored on the 
system.  On such a system, even files that are assumed to be not sensitive 
cannot be readily confirmed as such.  Visual inspection of a file's 
printed image does not really confirm what is physically stored in 
the file space.  Sensitive files, if they must be stored on hard disks, 
should be handled very carefully.  One means of emphasizing which 
files are sensitive is to store them in a separated disk partition.  However, 
such methods, no matter how carefully controlled, do not ensure data 
integrity.



Encryption



Data encryption provides a partial solution to the problem of labeling 
as well as providing access control.  Encryption is a technique for 
rendering information unintelligible to those who don't have access 
to the tools necessary to see it.

Hardware implementations of encryption can provide a higher degree 
of security, since software-based implementations are susceptible 
to penetration by interlopers.  However, take steps to ensure the 
integrity of the device.  Sensitive equipment should be sealed and 
the internal configuration audited.



Securing Data Media



Lock Floppy Disks



Diskettes should be locked in a secure container.  Be sure that the 
keys are unique and not interchangeable with the keys to other locks.



Use Removable Hard Disk Systems



When feasible, use removable hard disk systems instead of fixed disk 
storage.  At a minimum, keep hard disk systems in a secure area.  Also, 
consider installing power-on locks that restrict access to the machine 
to individuals with lock keys.  Again, the keys should be unique.



Backup



Make backup copies of all important software and data files.



Clearing Memory



Clear the micro's memory between users.  Turning most micros off for 
10 seconds is usually enough to accomplish this.



Data Transmission



Microcomputers can enable users to transfer data to or from a mainframe.  Transferring 
sensitive data should be carefully controlled and monitored.  The 
micro user is responsible for ensuring that sensitive or classified 
information is transferred only to other computers designated for 
sensitive data.  The micro user is also responsible for the data transferred 
from mainframe to micro.  Note that such transmissions may include 
information which the user may not have perceived as being transferred.





SOFTWARE CONCERNS





Software Vulnerabilities



The lack of micro hardware security engenders software insecurity.  Because 
modifications cannot be prevented, critical software, including operating 
system routines, can be modified or destroyed.  For example, encryption 
schemes implemented in software can be forced to reveal their decryption 
key.



Operating System Weaknesses



Unlike many mainframe computer operating systems, most micro operating 
systems have not been developed for security considerations.



User Identification and Authentication



User identification is the process by which an individual identifies 
himself to the system as a valid user.  Authentication is the procedure 
by which the user establishes that he is indeed that user, and has 
a right to use the system.  During the login process, the user enters 
name or account number (identification) and password (authentication).  

	*  Add password systems - software or hardware - to micros.

	*  Do not permit employees to use inappropriate passwords that are 
easy to guess (first name, spouse's name, pet's name, birthday, etc.)

	*  Authentication (and, for multi-user micros and LANs, identification) 
should occur whenever the system is powered up or rebooted.



Software Attacks - Trapdoors/Trojan Horses/Viruses



Don't use any software that is not a <169>known quantity<170>.  Isolate 
and test new software on a test system, where Trojan horses and viruses 
can do little damage.

Consider a policy which prohibits users from bringing unapproved software 
into the building. (Rockwell International has had such a written 
policy since 1988.) If a user must bring in software, consider requiring 
that it be tested by your virus test group first.

Follow the advice in the chapter on viruses.



Communication Attacks



Information transmitted over unprotected communications lines can 
be intercepted by someone masquerading as you, actively receiving 
your information, or through passive eavesdropping.  Therefore, sensitive 
information should be protected during transmission.  Masquerading 
can be thwarted through the use of dial-back.  Dial-back is an interactive 
security measure that works like this:  The answering modem requests 
the identification of the caller, then disconnects.  If the caller's 
ID matches an authorized ID in the answering system's user directory, 
the answering system will call back the originating system at a prearranged 
number.  The effectiveness of dial-back as a security measure is questionable 
due to digital PBXs (private branch exchange telephone systems) and 
convenience features like call forwarding.  Also, various methods 
of call-back protection have been broken by hackers.  Encryption is 
one sure method of transmission protection.

Encryption can be adapted as a means of remote user authentication.  A 
user key, entered at the keyboard, authenticates the user.  A second 
encryption key can be stored in encrypted form in the calling system 
firmware that authenticates the calling system as an approved communication 
endpoint.  When dial-back is used in conjunction with two-key encryption, 
data access can be restricted to authorized users (with the user key) 
with authorized systems (those whose modems have the correct second 
key), located at authorized locations (those with phone numbers listed 
in the answering system's phone directory).

Remote connections to other systems make micros susceptible to remote 
attacks.  A micro connected to a network, for example, may be subjected 
to attack by other network users.  The attacker could transmit control 
characters that affect the interrupt logic of the micro in such a 
way as to permit him to obtain full access to the micro and its peripherals, 
even if he is incapable of passing the system's login challenge.  The 
attacker could use other techniques to examine the user's communication 
package for dial-up phone numbers, access codes, passwords, etc.





HUMAN CONCERNS



To create computer security, four basic changes must occur in the 
organization:

	*  <B>senior management must provide strong, overt support of the 
program<D>. They must require personal accountability in their subordinates, 
and they must set good examples.

	*  <B>employees must be educated<D>. Employees would support security 
programs much more if they understood the need and the methods, and 
felt that they were part of the program. Educate and involve them.

	*  <B>all members of the organization must participate in the program<D>. 
Because information is handled by all employees, all must understand 
the value of their contribution to security, and the value of the 
information they access.

	*  <B>staff effort must be rewarded<D>.  Be sure to reward those 
who provide suggestions for improving security, who comply with security 
policy, and who contribute in other ways.

The <169>human factors<170> in computer security are probably far 
more important than the hardware or software you throw at the problem.

Perhaps security would be improved with some world-wide attitude change, 
too.  Ken Thompson, one of the co-developers of UNIX, writes <169>It 
is only the inadequacy of the criminal code that saves the hackers 
from very serious prosecution... There is an explosive situation brewing. 
On the one hand, the press, television, and movies make heroes of 
vandals by calling them whiz kids. On the other hand, the acts performed 
by these kids will soon be punishable by years in prison... The act 
of breaking into a computer system has to have the same social stigma 
as breaking into a neighbor's house. It should not matter that the 
neighbor's door is unlocked. The press must learn that misguided use 
of a computer is no more amazing than drunk driving of an automobile.<170>




Downloaded From P-80 International Information Systems 304-744-2253