Skip to main content

Security Models

Updated Jan 30, 2024 ·

Overview

Security models provide frameworks for protecting information by defining rules and procedures for data access and manipulation. These models ensure that systems operate securely by enforcing confidentiality, integrity, and availability.

Multi-Level Security

Multi-level security (MLS) enforces security policies that segregate access to data based on varying levels of sensitivity. It ensures that users can only access information appropriate to their clearance level.

  • Controls access based on user clearance and data classification
  • Commonly used in military and government settings
  • Prevents unauthorized access to sensitive data

State Machine Model

The State Machine Model ensures that a system remains in a secure state by defining allowable states and transitions between them. This model is critical in maintaining security through structured access controls.

  • Defines specific states for users and data.
  • Transitions between states must follow strict security policies.
  • Helps prevent unauthorized access by maintaining valid state conditions.

The State Machine model works with security levels, classifications, and clearances:

  • Single-state Machine

    • There's a policy in place that dictates the security levels
    • System will only process data from a single security level.
    • No way to separate classifications, all are at the same security level.
    • All users must have full clearance and formal access approval.
  • Multi-state Machine

    • Less secure, but are more flexible.
    • Processing of data at two or more levels without the risk of compromising security.
    • Data can be classified or unclassified and not all users are required full clearance.

Lattice-based Model

The Lattice-based Model provides a framework for access control based on user and data classification levels. It establishes a hierarchical structure for permissions, ensuring that access is determined by both sensitivity and user clearance.

  • Uses a lattice structure to define levels of access.
  • Employs rules to control data flow between different security levels.
  • Facilitates mandatory access control, reducing risks of data leakage.

This model uses a two dimensional matrix that defines which subjectsare permitted to access which objects at what permission level.

  • This model uses pair of elements (subject and object).
  • Each pairs have a set with greatest lower bound and least upper bound of access rights.
  • Bounds can be confidentiality levels (classifications or clearance levels) or integrity levels.
  • Lattice-based access control allows security controls for complex environments.

Non-Interference Model

The Non-Interference Model focuses on preventing actions at one security level from affecting actions at another. This model ensures that high-security operations do not interfere with lower-security operations, maintaining operational integrity.

  • Enforces strict separation between different security levels.
  • Ensures that lower-level users cannot observe higher-level actions.
  • Protects sensitive operations from potential interference or influence.

The theory here is that users are restricted to working in different areas called domains, which is a set of object that a user is allowed to access. The user at one level cannot determine what's happening at a higher security level and users at the higher security level cannot affect or interfere with individuals at levels below them.

Information Flow Model

The Information Flow Model emphasizes the secure transfer of information within a system. It analyzes how information flows between different entities to prevent unauthorized access or data leakage.

  • Monitors paths of information flow between processes and users.
  • Implements policies to ensure information is not improperly shared.
  • Helps in designing systems that maintain confidentiality and integrity during data exchanges.

This model is based on the Lattice model. Everytime there is na input into the system, there's a state transition, and there's a specific output. Instead of access control lists, we use flow rules to restrict the information from flowing in ways that would go against the security policy.

Bell-LaPadula Model

The Bell-LaPadula Model is focused on maintaining data confidentiality. It enforces rules that prevent unauthorized access and disclosure of information.

  • Simple Security Rule

    • "No Read Up"
    • Ensures that users cannot access information at a higher security level
    • Widely used in environments where confidentiality is critical
  • *-Property

    • "No Write Down"
    • A subject on one security level shouldn't be able to write to objects with lower security levels

This model arranges subjects and objects into security levels and defines access specifications, whereby subjects can only access objects at certain levels based on their security level.

  • Employs a State Machine Model with Security Levels and Access Modes.
  • Uses Access Control Lists, Labels, and Clearances.
  • Commonly used in military and government contexts.

Limitations:

  • Primarily addresses confidentiality
  • Can be complex to implement

Biba Integrity Model

The Biba Integrity Model focuses on maintaining data integrity by preventing unauthorized data modification. It enforces rules that ensure only authorized users can alter information.

  • Simple Security Rule

    • "No Read Down"
    • A subject should not be able to read an object at security level lower than the subject's security clearance.
    • Prevents the corruption of integrity of information accessed.
  • *-Integrity Property

    • "No Write Up"
    • A subject should not be able to write an information to an object at security level lower than the subject's security clearance.
    • A user with secret clearance should not be able to write information to a top secret file.
    • Ensures that data cannot be modified by lower integrity levels
    • Often used in environments where data accuracy and reliability are critical

Clark-Wilson Integrity Model

The Clark-Wilson model maintains data integrity through controlled access and well-formed transactions, focusing on integrity verification for constrained items.

  • Enforces proper processes for authorized users.
  • Ensures separation of duties and auditability.
  • Applications control user access to programs.

It uses Transformation Procedures (TPs) and Constrained Data Items (CDIs) to safeguard integrity:

  • Requires "well-formed transactions."
  • Steps must be performed in the correct order.
  • Individuals executing steps must be authenticated.

The model is also considered a Take-Grant Model, which:

  • Grants permissions based on predefined rules.
  • It is up to the subject and object to take, grant, or revoke rights.
  • Adds more layers of security for controlled data access.

The model addresses three key integrity goals:

  • Authentication and authorization (Access Control Lists).
  • Prevents authorized users from making immproper modifications.
  • Maintains internal and external consistency through "well-formed transactions."

Brewer and Nash Model

Also known as the Chinese Wall, the Brewer and Nash Model is designed to prevent conflicts of interest in environments where access to sensitive information from multiple organizations must be controlled.

  • Permissions are dynamically changing based on RBAC.
  • Ensures users cannot access conflicting data sets (e.g., competing companies).
  • Used primarily in financial and consulting sectors.
  • Prevents information flow between competing entities.

In this model, there is a wall to segment data types and develops set of rules that ensure that no subject accesses the objects on the other side of the wall. These dynamic rules can change as the subject accesses different information.

Graham-Denning Model

The Graham-Denning model defines a set of rights for managing interactions between subjects (users) and objects (resources) in a secure system.

  • Controls how subjects create, delete, and manage access to objects.
  • Focuses on secure resource management and access control.
  • Emphasizes rules for assigning and revoking access rights.

The model defines eight specific protection rights:

  1. Create an object
  2. Delete an object
  3. Create a subject
  4. Delete a subject
  5. Read access rights
  6. Grant access rights
  7. Delete access rights
  8. Transfer access rights

Harrison-Ruzzo-Ullman (HRU) Model

Similar to the Graham-Denning Model, the HRU model defines rules for access control and managing rights within a system.

  • Focuses on the creation, deletion, and modification of rights.
  • Allows for dynamic changes in permissions.
  • Analyzes whether unauthorized access can occur.

When configuring the HRU Model, we use a table, or matrix, containing:

  • Current subjects (S).
  • Current objects (O).
  • Access Matrix (P) or Access Control List (ACL).

Sample Matrix:

Object 1Object 2Object 3
S1ReadWriteExecute
S2WriteNoneRead
S3ExecuteWriteNone