Integrated Management of Security Policies

نویسنده

  • Stefano Paraboschi
چکیده

The design of an integrated approach for security management represents a difficult challenge, but the requirements of modern information systems make extremely urgent to dedicate research efforts in this direction. Three perspectives for integration can be identified. 1 Challenges to Security Policy Management The management of security policies is well known to be a hard problem. Significant attention has been paid in the past to the design of flexible and powerful solutions for the high-level representation of a security policy and its translation to a concrete configuration, but the impact on real systems has been limited. Indeed, most information systems today present an extremely partial support of security policies. Network security is typically the portion of the security domain that exhibits the greater support by tools, with the possibility to define high-level requirements and to get support on mapping them to concrete configuration. The other components of the system are instead managed with labor intensive processes. When automation is used, it relies on configuration scripts and ad hoc solutions. In general, the security policy is documented at the lowest level, as a concrete set of configurations of devices and system modules. The analysis of long-term trends in the evolution of the ICT scenario makes very clear that the importance and complexity of security policy management is going to increase. Information systems are becoming more extensive, integrate resources of different owners, and offer access to a larger variety of users. Service oriented architectures are an instance of these trends, supporting the realization of large systems that implement functions with the integration of a variety of services executing under the responsibility of potentially independent providers. In addition, modern systems have often to demonstrate compliance with regulations to other parties. For instance, HIPAA, PCI-DSS, and Sarbanes-Oxley Act are leading in their specific domain to an urgent need for better security management solutions. 2 Conceptual, Vertical, and Horizontal Integration A crucial aspect to consider for the evolution of security management is the need to offer a better integration in the management of security policies. The configuration of the concrete security policy of a specific system in isolation is not trivial, but it is not the main obstacle, since it can benefit from sophisticated access control models that have been developed for a variety of systems, from relational database management systems to application servers. The significant obstacles emerge when the need arises to integrate and harmonize the security policies specified in different systems at different levels. Three clear integration perspectives can be identified: – Conceptual integration: security policies have to be described at different levels of abstraction, from the business level to the concrete configuration of modules and devices. Separate models are required for the different levels, as testified by software engineering practice in many areas. Also, some support for translating the policy at a high level to a more concrete policy has to be provided. Describing the correspondence between the policies at different levels, compliance of the concrete policy with the high-level security requirements can be verified in a more effective and efficient way. In addition, a structure with different abstraction levels greatly facilitates the maintenance of the security policy. – Vertical integration: the structure of a modern information system presents several components that can be represented in a vertical stack: physical hardware, virtual hardware, operating system, network, DBMS, application server, application. Security policies can be supported at each of these layers. The security policies at the different layers are typically defined independently, but a clear opportunity exists for their integration. The advantage of a careful integration is both a greater level of security and a greater level of flexibility. – Horizontal integration: Compared to the classical scenarios considered in access control, where a policy is assumed to be enforced by a specific reference monitor, modern information systems present a variety of computational devices cooperating in the execution of a specific user request. The computational infrastructure can be owned by independent parties. In these scenarios, the management of security policies requires to carefully define models and mechanisms able to map a security requirement to a coordinated policy enforced by the different parties. This aspect is particularly difficult when few hypotheses can be made about the specific security management functionality supported by the service providers. The PoSecCo project [1] plans to investigate these three aspects. Conceptual integration will rely on the design of metamodels structured at three levels: Business, IT, and Landscape. Vertical integration will specifically consider the harmonization between access control and network configuration. Horizontal integration will be considered in a Future Internet scenario, where applications are realized integrating the services of a variety of providers. A shared motif will be the detection and resolution of conflicts in the policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposed policies for integrated watershed management in order to combat desertification in Euphrates and Tigris basin

Desertification of the arid and semi-arid lands of the world has been proceeding for more than a thousand years.Human-induced degradation in these areas is regularly cited as one of the principal causes of desertification.Euphrates and Tigris Basin as the case study of this research in some aspects is almost unique in the world. But thisbasin has been confronted to progressive desertification. ...

متن کامل

Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach

Security awareness and its implementation within an organisation is crucial for preventing deliberate attacks or/and minimise system failures on organisation’s system especially where critical infrastructure is involved including energy, water, gas and etc. This study is based on Integrated System Theory (IST) and focuses on measuring and assessing security goals including policies, risk manage...

متن کامل

Trust Management in Databases

Definition Trust management in databases refers to access control models that support the characteristic features of trust management – notably, decentralization of security policies and information used by the policies – and are seamlessly integrated with a database management system.

متن کامل

Towards an Integrated Formal Analysis for Security and Trust

We aim at defining an integrated framework for the specification and (automated) analysis for security and trust in complex and dynamic scenarios. In particular, we show how the same machinery used for the formal verification of security protocols may be used to analyze access control policies based on trust management.

متن کامل

حاکمیت شبکه‌ای در نهادهای پژوهشی امنیت ‌سایبری

Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...

متن کامل

Explaining the Integrated Approach to Border Management and Control: A Case Study of Iranian Land Borders

Borders are known as places where government institutions implement their own law in a variety of ways and forms. Given the different approaches to border control and management, it can be seen that this issue is still viewed as a security issue in developing countries, including Iran, and most of the approaches related to this are from a purely security perspective. The boundary view must be m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011