SlideShare a Scribd company logo
1 of 26
Security Architecture
and Design
Security architecture is a unified security design that addresses the necessities and
potential risks involved in a certain scenario or environment. It also specifies when and
where to apply security controls.
As described in the CISSP Study Guide, Security Architecture and Design describes
fundamental logical hardware, operating system, and software security components,
and how to use those components to design, architect, and evaluate secure computer
systems.
It is further divided into 3 domains and each of them cover:
1. The hardware and software requirements to have a secure computer system.
2. The logical models required to keep the system secure
3. The evaluation models that quantify how secure the system really is.
2
How can businesses benefit by having a
strong Security Architecture?
 Fewer Breaches of Your Systems Architecture
 Compliance with Key Data Security Standards
 Being a Strong Security Architecture Example Helps to Earn Trust
 Preventing a Loss of Business
3
How to design a Secure System?
4
Security
Domains
Layering Abstraction
 The Ring
Model
1. Layering
Layering separates hardware and software functionality into modular
tiers.
A generic list of security architecture layers is as follows:
1. Hardware
2. Kernel and device drivers
3. Operating System
4. Applications
5
2. Abstraction
Abstraction hides unnecessary details from the user.
Complexity is the enemy of security. That said, computers are
tremendously complex machines and Abstraction provides a way to
manage that complexity.
6
3. Security Domains
A security domain is the list of objects a subject is allowed to access.
More broadly defined, domains are groups of subjects and objects
with similar security requirements.
7
4. The Ring Model
The ring model is a form of CPU
hardware layering that
separates and protects
domains (such as kernel mode
and user mode) from each
other.
8
Domain #1
The hardware and software
requirements to have a secure
computer system.
9
SECURE HARDWARE ARCHITECTURE
10
Secure Hardware Architecture focuses on the physical computer
hardware required to have a secure system. The hardware must
provide confidentiality, integrity, and availability for processes, data,
and users.
It is further divided into the following components:
 The System Unit and Motherboard
 The Computer Bus
 Northbridge and southbridge
Computer Bus:
11
Northbridge and Southbridge:
SECURE OPERATING SYSTEM AND
SOFTWARE ARCHITECTURE
12
Secure Operating System and Software Architecture builds upon the
secure hardware described in the previous slide, providing a secure
interface between hardware and the applications (and users) which
access the hardware. Operating systems provide memory, resource,
and process management.
The most sensitive components in which security is required are:
 The Kernel
 Virtualization
The Kernel
13
The Kernel is the heart of the Operating
System and they run closest to the hardware
in ring 0, which makes them more vulnerable.
There are two basic Kernel designs:
Monolithic and Microkernel.
A monolithic kernel is compiled into one
static executable and the entire kernel runs in
supervisor mode. All functionality required by
a monolithic kernel must be precompiled in.
Microkernels are modular kernels. A
microkernel is usually smaller and has less
native functionality than a typical monolithic
kernel (hence the term “micro”), but can add
functionality via loadable kernel modules.
Virtualization
14
Virtualization adds a software layer between an operating system and the underlying
computer hardware. This allows multiple operating systems to run simultaneously on
one physical computer.
Example: VMware
There are two basic virtualization types: Transparent virtualization (sometimes
called full virtualization) and Paravirtualization.
Transparent virtualization runs stock operating systems, such as Windows 7 or
Ubuntu Linux 9.10, as virtual guests. No changes to the guest OS are required.
Paravirtualization runs specially modified operating systems, with modified kernel
system calls.
Traditional vs Virtual Architecture
15
Domain #2
The logical models required to
keep the system secure.
16
Security Models
17
 Bell-LaPadula
 Biba
 Clark & Wilson
 Non-interference
 State machine
 Access Matrix
 Information flow
Reading Down:
18
Writing Up:
Subject:
A Personnel
19
Object:
A Document
US’ Department of Defense’s Clearance Labels
Bell-LaPadula Model
20
 This model was developed by David Elliott Bell and Leonard J. LaPadula on behalf
of the MITRE Corporation for the US’ Department of Defense.
 It follows the Reading down and Writing up method.
 It is focused on maintaining the confidentiality of objects.
It is no longer used because the model does not maintain integrity in any way.
A low-clearance operative can submit false data which moves up to high clearance
levels. Nothing to prevent unauthorized alteration of data.
Multi-level access Control in Bell-LaPadula Model:
21
 Reading Down
 Writing Up
Biba Model
22
 This model was developed by Kenneth Biba at the MITRE Corporation.
 It follows the Reading up and Writing down method.
 While many governments are primarily concerned with confidentiality, most
businesses desire to ensure that the integrity of the information is protected at
the highest level. Biba is the model of choice when integrity protection is vital.
 If a high-ranking subject issues data, everyone can trust that data. If a low-
ranking subject issues some sort of data, no one above that subject has
permission to trust it.
Multi-level access Control in Biba Model:
23
 Reading Up
 Writing Down
Domain #3
The evaluation models that
quantify how secure the
system really is.
24
Evaluation methods
25
Evaluation criteria provide a standard for qualifying the security of a
computer system or network.
 The Trusted Computer System Evaluation Criteria (TCSEC).
 The Trusted Network Interpretation (TNI).
 The European Information Technology Security Evaluation
Criteria (ITSEC).
 The Common Criteria.
26
Thank you
srishtiahuja16@gmail.com
slashsrishti
srishtiahuja16

More Related Content

What's hot

8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standardsWilson Musyoka
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilitiesMayur Mehta
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxUrjaDhabarde
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Design of security architecture in Information Technology
Design of security architecture in Information TechnologyDesign of security architecture in Information Technology
Design of security architecture in Information Technologytrainersenthil14
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 

What's hot (20)

8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
Security policy and standards
Security policy and standardsSecurity policy and standards
Security policy and standards
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Classification of vulnerabilities
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilities
 
Information Security
Information SecurityInformation Security
Information Security
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Topic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptxTopic20 The RC4 Algorithm.pptx
Topic20 The RC4 Algorithm.pptx
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Design of security architecture in Information Technology
Design of security architecture in Information TechnologyDesign of security architecture in Information Technology
Design of security architecture in Information Technology
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 

Similar to Security Architecture and Design - CISSP

Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEDATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEijdms
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiSHIVA101531
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17LennartF
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11Irsandi Hasan
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security vSYYULIANISKOMMT
 
Chapter 11Database Control Issues Security, Backup an.docx
Chapter 11Database Control Issues Security, Backup an.docxChapter 11Database Control Issues Security, Backup an.docx
Chapter 11Database Control Issues Security, Backup an.docxketurahhazelhurst
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxSamatarHussein
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 

Similar to Security Architecture and Design - CISSP (20)

Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Security models
Security models Security models
Security models
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLEDATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17Confidential compute with hyperledger fabric .v17
Confidential compute with hyperledger fabric .v17
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
 
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 11
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Chapter 11Database Control Issues Security, Backup an.docx
Chapter 11Database Control Issues Security, Backup an.docxChapter 11Database Control Issues Security, Backup an.docx
Chapter 11Database Control Issues Security, Backup an.docx
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Security Architecture and Design - CISSP

  • 2. Security architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. As described in the CISSP Study Guide, Security Architecture and Design describes fundamental logical hardware, operating system, and software security components, and how to use those components to design, architect, and evaluate secure computer systems. It is further divided into 3 domains and each of them cover: 1. The hardware and software requirements to have a secure computer system. 2. The logical models required to keep the system secure 3. The evaluation models that quantify how secure the system really is. 2
  • 3. How can businesses benefit by having a strong Security Architecture?  Fewer Breaches of Your Systems Architecture  Compliance with Key Data Security Standards  Being a Strong Security Architecture Example Helps to Earn Trust  Preventing a Loss of Business 3
  • 4. How to design a Secure System? 4 Security Domains Layering Abstraction  The Ring Model
  • 5. 1. Layering Layering separates hardware and software functionality into modular tiers. A generic list of security architecture layers is as follows: 1. Hardware 2. Kernel and device drivers 3. Operating System 4. Applications 5
  • 6. 2. Abstraction Abstraction hides unnecessary details from the user. Complexity is the enemy of security. That said, computers are tremendously complex machines and Abstraction provides a way to manage that complexity. 6
  • 7. 3. Security Domains A security domain is the list of objects a subject is allowed to access. More broadly defined, domains are groups of subjects and objects with similar security requirements. 7
  • 8. 4. The Ring Model The ring model is a form of CPU hardware layering that separates and protects domains (such as kernel mode and user mode) from each other. 8
  • 9. Domain #1 The hardware and software requirements to have a secure computer system. 9
  • 10. SECURE HARDWARE ARCHITECTURE 10 Secure Hardware Architecture focuses on the physical computer hardware required to have a secure system. The hardware must provide confidentiality, integrity, and availability for processes, data, and users. It is further divided into the following components:  The System Unit and Motherboard  The Computer Bus  Northbridge and southbridge
  • 12. SECURE OPERATING SYSTEM AND SOFTWARE ARCHITECTURE 12 Secure Operating System and Software Architecture builds upon the secure hardware described in the previous slide, providing a secure interface between hardware and the applications (and users) which access the hardware. Operating systems provide memory, resource, and process management. The most sensitive components in which security is required are:  The Kernel  Virtualization
  • 13. The Kernel 13 The Kernel is the heart of the Operating System and they run closest to the hardware in ring 0, which makes them more vulnerable. There are two basic Kernel designs: Monolithic and Microkernel. A monolithic kernel is compiled into one static executable and the entire kernel runs in supervisor mode. All functionality required by a monolithic kernel must be precompiled in. Microkernels are modular kernels. A microkernel is usually smaller and has less native functionality than a typical monolithic kernel (hence the term “micro”), but can add functionality via loadable kernel modules.
  • 14. Virtualization 14 Virtualization adds a software layer between an operating system and the underlying computer hardware. This allows multiple operating systems to run simultaneously on one physical computer. Example: VMware There are two basic virtualization types: Transparent virtualization (sometimes called full virtualization) and Paravirtualization. Transparent virtualization runs stock operating systems, such as Windows 7 or Ubuntu Linux 9.10, as virtual guests. No changes to the guest OS are required. Paravirtualization runs specially modified operating systems, with modified kernel system calls.
  • 15. Traditional vs Virtual Architecture 15
  • 16. Domain #2 The logical models required to keep the system secure. 16
  • 17. Security Models 17  Bell-LaPadula  Biba  Clark & Wilson  Non-interference  State machine  Access Matrix  Information flow
  • 19. Subject: A Personnel 19 Object: A Document US’ Department of Defense’s Clearance Labels
  • 20. Bell-LaPadula Model 20  This model was developed by David Elliott Bell and Leonard J. LaPadula on behalf of the MITRE Corporation for the US’ Department of Defense.  It follows the Reading down and Writing up method.  It is focused on maintaining the confidentiality of objects. It is no longer used because the model does not maintain integrity in any way. A low-clearance operative can submit false data which moves up to high clearance levels. Nothing to prevent unauthorized alteration of data.
  • 21. Multi-level access Control in Bell-LaPadula Model: 21  Reading Down  Writing Up
  • 22. Biba Model 22  This model was developed by Kenneth Biba at the MITRE Corporation.  It follows the Reading up and Writing down method.  While many governments are primarily concerned with confidentiality, most businesses desire to ensure that the integrity of the information is protected at the highest level. Biba is the model of choice when integrity protection is vital.  If a high-ranking subject issues data, everyone can trust that data. If a low- ranking subject issues some sort of data, no one above that subject has permission to trust it.
  • 23. Multi-level access Control in Biba Model: 23  Reading Up  Writing Down
  • 24. Domain #3 The evaluation models that quantify how secure the system really is. 24
  • 25. Evaluation methods 25 Evaluation criteria provide a standard for qualifying the security of a computer system or network.  The Trusted Computer System Evaluation Criteria (TCSEC).  The Trusted Network Interpretation (TNI).  The European Information Technology Security Evaluation Criteria (ITSEC).  The Common Criteria.