exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ir4976.txt

ir4976.txt
Posted Aug 17, 1999

"Assessing Federal and Commercial Information Security Needs", 1995

tags | paper
SHA-256 | e64f1336bb3555b3fce0a22cf7fffcd92063787dd9dc40508978b7a34846ad98

ir4976.txt

Change Mirror Download








ASSESSING FEDERAL AND COMMERCIAL
INFORMATION SECURITY NEEDS






NISTIR 4976
November 1992








David F. Ferraiolo Dennis M. Gilbert





Nickilyn Lynch






Computer Security Division
Computer Systems Laboratory
National Institute of Standards and Technology
Gaithersburg, MD

ABSTRACT


In a cooperative effort with government and industry, the National
Institute of Standards and Technology (NIST) conducted a study to
assess the current and future information technology (IT) security
needs of the commercial, civil, and military sectors.

The primary objectives of the study were to:

o determine a basic set of information protection policies
and control objectives that pertain to the secure
processing needs of organizations within all sectors; and


o identify protection requirements and technical approaches
that are used, desired or sought so they can be
considered for future federal standards and guidelines.

The findings of this study address the basic security needs of IT
product users, including system developers, end users,
administrators, and evaluators. Security needs have been
identified based on actual existing and well-understood security
organizational practices.

EXECUTIVE SUMMARY

The federal government and private industry rely heavily on
information processing systems to meet their individual
operational, financial, and information technology requirements.
Corruption, unauthorized disclosure, or theft of resources have the
potential to disrupt operations and could have financial, legal,
human safety, personal privacy, and public confidence impact.

Each organization interviewed exhibited unique security
characteristics described in terms of the organization's missions
and goals. Security needs were further characterized from system
to system within an organization.

System and organizational security requirements were found to be
based on a higher set of environmental and policy factors and
conditions. Computer security technology is applied uniquely in
each situation even though there are common concerns.

Because each organization has unique security needs, security
products have been applied on a case by case basis to meet
individual security threats and concerns. Products should be
flexible enough to serve a broad spectrum of security needs at the
operating system level, the application level, the organizational
level, and the site level. Organizational security requirements
also change over time and cannot be totally specified at the time
of product acquisition.

For organizations that process unclassified sensitive information,
the availability of a greater variety of trusted products that go
beyond C2 in terms of functionality and flexibility is needed.
There is a demand to address data integrity in a more direct and
user friendly manner. Vendors should consider new mechanisms that
directly address discretionary and non-discretionary controls, such
as role-based access controls, separation of duties, separation of
transactions, and user-oriented least privilege.

Most organizations felt security standards should include a wide
range of assurances including a "generally accepted commercial
practice" level. This new level should minimize the cost of
developing new systems or retro-fitting new security functionality
in existing systems.

Nearly all of those interviewed expressed the desire to have an
independent third party give a "stamp of approval" with regard to
the trustworthiness of the systems they were buying. However, the
current evaluation and certification process (i.e., with respect to
a TCSEC class) was not perceived by users as meeting their needs
for a variety of reasons.

Those interviewed felt that security standards have not emerged
that will allow integrating security across a multi-vendor
environment. A system should provide a single user view of
security services across a wide range of operating systems.
Security features should inter-operate with other security services
on both local and remote machines, without the need to train users
in new security products. Security technology must support users
working effectively together, sharing information, resources and
network applications from whatever desktop device they choose
within their authority, while providing a common set of security
services.

This study has attempted to identify basic security needs of
information technology product users, administrators, developers,
and evaluators based on actual organizational practices. Although
the findings of this study should not be considered conclusive, it
is hoped that they will be considered in the development of future
protection requirements, standards, guidelines and evaluation
programs.
TABLE OF CONTENTS

PAGE

ABSTRACT . . . . . . . . . . . . . . . . . . . . . .i

EXECUTIVE SUMMARY . . . . . . . . . . . . . . . . . . . . . ii

LIST OF APPENDICES . . . . . . . . . . . . . . . . . . . . . .v

1 INTRODUCTION

1.1 Development of Security Technology. . . . . . . . . .1-1
1.2 Notions of Trust. . . . . . . . . . . . . . . . . . .1-2
1.3 Conventions Used in this Document . . . . . . . . . .1-2
1.4 Document Overview . . . . . . . . . . . . . . . . . .1-2

2 PROJECT APPROACH

2.1 Overview . . . . . . . . . . . . . . . . . . . . .2-1
2.2 Profile of the Organizations . . . . . . . . . . . .2-1
2.3 Topics Covered. . . . . . . . . . . . . . . . . . . .2-2

3 FINDINGS

3.1 Basis for Protection. . . . . . . . . . . . . . . . .3-1
3.1.1 Driving Requirements . . . . . . . . . . . . .3-1
3.1.2 Types of Information . . . . . . . . . . . . .3-3
3.2 Sector Protection Requirements. . . . . . . . . . . .3-3
3.2.1 Common Notions of Protection . . . . . . . . .3-3
3.2.2 Distinguishing Protection Characteristics. . .3-5
3.3 Organizational Security Approach. . . . . . . . . . .3-6
3.3.1 Identification and Authentication. . . . . . .3-6
3.3.2 Access Control . . . . . . . . . . . . . . . .3-7
3.3.2.1 Discretionary Access Control . . . . .3-7
3.3.2.2 Role-Based Controls . . . . . . . . . .3-8
3.3.2.3 Separation of Transactions. . . . . . .3-9
3.3.2.4 Separation of Related Duties. . . . . 3-10
3.3.2.5 Principle of Least Privilege. . . . . 3-10
3.3.2.6 Label-Based Mandatory Access
Controls . . . . . . . . . . . . . 3-11
3.3.2.7 Object-Label Association. . . . . . . 3-12
3.3.3 User Accountability. . . . . . . . . . . . . 3-12
3.4 Electronic Data Interchange (EDI) . . . . . . . . . 3-13
3.5 Assurance and Quality . . . . . . . . . . . . . . . 3-13
3.6 Evaluation . . . . . . . . . . . . . . . . . 3-14
3.7 Current Criteria Not Keeping Pace . . . . . . . . . 3-15
3.8 Need for Security in Open Systems . . . . . . . . . 3-16
3.9 Owner-Custodian Relations . . . . . . . . . . . . . 3-16
3.10 Security Policies and Environments Can
Change Over Time . . . . . . . . . . . . . . . 3-17 PAGE

4 CONCLUSIONS

4.1 Minimum Security Requirements . . . . . . . . . . . .4-1
4.1.1 Baseline Capabilities. . . . . . . . . . . . .4-1
4.2 Computer Security Features Enabled by Default . . . .4-2
4.3 Assurance . . . . . . . . . . . . . . . . . . . . .4-2
4.4 Evaluation . . . . . . . . . . . . . . . . . . . . .4-2
4.5 Administration . . . . . . . . . . . . . . . . . . .4-3
4.5.1 Password Management. . . . . . . . . . . . . .4-3
4.5.2 EDI Capabilities . . . . . . . . . . . . . . .4-3
4.6 Add-On Packages . . . . . . . . . . . . . . . . . .4-3
4.7 Current Criteria. . . . . . . . . . . . . . . . . . .4-4
4.8 Security Standards for Multi-Vendor Systems . . . . .4-4
4.9 Closing Thoughts. . . . . . . . . . . . . . . . . . .4-5



LIST OF APPENDICES

APPENDIX A: LIST OF ORGANIZATIONS . . . . . . . . . APPENDIX A-1

APPENDIX B: SAMPLING OF JOB TITLES. . . . . . . . . APPENDIX B-1

APPENDIX C: SAMPLE QUESTIONS. . . . . . . . . . . . APPENDIX C-1

APPENDIX D: RELATED NIST ACTIVITIES AND SOURCES
OF INFORMATION . . . . . . . . . . . . APPENDIX D-1
1. INTRODUCTION

In a cooperative effort with government and industry, the National
Institute of Standards and Technology (NIST) conducted a study to assess
the current and future security needs of the commercial, civil, and
military sectors.

The primary objectives of the study were to:

o determine a basic set of information protection policies, and
control objectives that pertain to the secure processing needs
within all sectors; and

o identify protection requirements and technical approaches that
are used, desired or sought so they can be considered for
future federal standards and guidelines.

The findings of this study address the basic security needs of
information technology (IT) product users. This includes application
developers, end users, and administrators. As such, security
requirements can be identified based on actual existing and well
understood security organizational practices.

The NIST study team used a set of topics as guidance when meeting with
the various organizations. The topics are discussed in Section 2.
Appendix C contains a sample of the questions asked and the issues
explored during the interviews.

1.1 Development of Security Technology

The U.S. government has been involved in developing security technology
for computer and communications security for some time.

Although advances have been great, it is generally perceived that the
current set of security technology has, to some extent, failed to address
the needs of all. This is especially true of organizations outside the
Department of Defense (DoD).

The current set of security criteria, criteria interpretation, and
guidelines has grown out of research and development efforts of the DoD
over a period of twenty plus years. There exists one U.S. computer
security standard, the Trusted Computer System Evaluation Criteria
(TCSEC). It consists of security features and assurances, exclusively
based on DoD security policy. The TCSEC concentrates particularly on
those policies created to prevent the unauthorized disclosure of
classified information. The result is a collection of security products
built to TCSEC requirements that do not fully address unclassified
sensitive security issues. This study indicates that these security
products can be useful in providing computer security in non-DoD sectors,
but they provide a partial solution at best and are used in lieu of a
more appropriate set of controls.

Until recently, the government has paid little comparable attention to
researching and addressing IT security needs of the government and
commercial sectors that do not process classified information. During
the past few years, however, managers and security officers of commercial
and government organizations have paid increasing attention to IT
security needs.

To help address these protection issues, NIST publishes standards and
guidelines for the unclassified community. The Computer Security Act of
1987 (Public Law 100-235) assigned NIST the responsibility of developing
security standards and guidelines for sensitive (non-classified) federal
computer systems. The law gave NIST responsibility for developing
validation procedures for cost-effective security and privacy of
sensitive information in federal computer systems. The law also gave
NIST the authority to perform research, conduct studies, and devise
techniques appropriate to a computer system's security and privacy. To
gain a better understanding of the needs of our constituents, NIST
conducted this study.


1.2 Notions of Trust

As commercial and civil sectors have become increasingly dependent on
complex and interconnected computer systems, trust in these systems has
become an increasing concern. Examples of trust issues include:
maintaining the privacy of employees, ensuring the correctness and
accuracy of medical and credit records, and protecting national secrets
from unauthorized disclosure or modification. The term "trusted systems"
refers to systems supporting substantially increased safety, reliability,
and, in particular, security mechanisms. "Security" refers to protection
against unwanted disclosure, modification, or destruction of data.

To be effective, however, security must also address safeguarding system
security features themselves. Security, safety, and reliability are
elements of system "trustworthiness" - a level of confidence that a
system will do what it is expected to do.


1.3 Conventions Used in this Document

"Federal government" refers to all government agencies, military and non-
military. The "civil sector" refers to the civil "federal government"
(and in some instances "state government"). DoD and military are used
interchangeably, unless otherwise stated, and cover both classified and
sensitive (non-classified) activities.


1.4 Document Overview

The sections following this introduction detail the study project.

Section 2, Project Approach, gives an overview of the project, discusses
the project approach, profiles the organizations that were interviewed,
and reviews the topics covered in the interview.

Sections 3, Findings, presents the study findings in terms of required
protection policies, security, feature needs, security assurance needs,
and product and application assessment.

Section 4, Conclusions, contains the study conclusions.

Appendices A - D present information not covered in the main body of the
paper, including sample questions, study participants, and additional
resources.
2. PROJECT APPROACH

2.1 Overview

The NIST study team conducted in-person discussions with key persons in
28 commercial and civil organizations between March and June 1991.
Organizations were represented by 1 to 12 people. The participants came
from a wide variety of perspectives, environments, applications, and
system architectures. They included users and systems management,
systems operations, computer security, and information resources
management personnel. The study especially sought to reach people with
major organizational mission responsibilities, who must react to breaches
in information accuracy, availability, or privacy.

An invitational workshop was held at the beginning of the project.
Numerous discussions at the workshop provided valuable input and
direction. Participation in the study was strictly voluntary. The study
was not part of any audit or Computer Security Act security and privacy
plans review effort.

In order to encourage candor and to respect individual and organizational
privacy, details are not attributed to individuals or organizations in
this report without permission. NIST sent copies of the report to study
participants for comment.


2.2 Profile of the Organizations

The NIST study team met with 28 organizations - 17 federal agencies, 10
commercial organizations, and 1 state government. Fourteen of the
organizations were in the Washington/Baltimore area and 14 were outside
of this area, and included Arizona, California, New Jersey, New York,
Pennsylvania, and Texas. Companies representing energy, financial,
communications, insurance, manufacturing, computers, and service were
included. Of the federal organizations, both the executive and judicial
branches were represented. Activities included law enforcement, benefits
delivery, nuclear/energy, space exploration, defense, tax system,
information collection and dissemination, air traffic, and service center
operations. Contractors participated in a number of the federal agency
meetings. State functions represented included justice, transportation,
lottery, franchise tax, health and welfare, motor vehicles, controllers
office, and data center operations.

Appendix A provides a detailed list of the organizations. A sampling of
job titles of the approximately 120 people interviewed can be found in
Appendix B.


2.3 Topics Covered

The following topics were addressed at each meeting:

o Key, significant information protection requirements - those
elements that were the driving force in establishing the
protection requirements, e.g. legal or regulatory, business
practices, organization policy regarding customer and employee
privacy, fear of litigation, etc.

o Organizational information processing environment - in general
terms, such things as centralization vs. distribution of
resources, management and administration, and issues regarding
networking, connectivity, interoperability, and homogeneity.

o Organizational information protection objectives - the
concerns regarding system trustworthiness including
confidentiality, integrity, availability, safety, and
reliability.

o Important information protection features and assurances -
what type of computer security products, features, and
mechanisms were used, desired, or sought? This included
discussion of the organization's baseline protections
including design, development, and operational controls for
providing confidence that the security features exist and work
as intended.

o Needed confidence level in protection mechanisms - the degree
of confidence in the protection mechanisms required by the
organization.

o Methods to achieve confidence - what methods the organization
uses, would like to use, or have available to achieve the
desired confidence.

o Addressing evolving protection requirements of the 1990s -how
the organization sees its situation and environment changing
over the next few years and how that impacts its protection
requirements.

Each organization was also invited to make additional comments or ask
additional questions. Because of the free-form "discovery" nature of the
meetings not all of the topics were covered in the same level of detail
at every meeting.

The questions used at each meeting are in Appendix C. They served as
background as well as guidance to the team during the meetings with the
organizations. The questions represent the types of information sought,
but were not necessarily asked during the sessions.
3. FINDINGS

Each organization interviewed exhibited unique security characteristics.
Security was often described in terms of the organization's missions and
goals. Security objectives were also different from system to system
within an organization. For example, the requirements (security features
and types of assurance) for the financial and administrative system
within a hospital were drastically different from those for the computer
resources devoted to the clinical treatment of patients within that
hospital.

System and organizational security requirements are based on a higher set
of environmental and policy factors and conditions. These factors and
conditions are referred to in this document as "basis for protection" and
discussed below.

At the system level, representatives from each organization generally
described their security requirements in terms of the following control
objectives:

o identification and authentication,
o access control, and
o user accountability.

The emphasis and specifics of each area were largely different. This was
particularly true for the control objective access control. The TCSEC C2
class was often cited as a practical baseline for referencing applicable
requirements. While C2 does provide many baseline requirements, it falls
short in both security features, (e.g., password complexity, resource
access control, and system access control) and assurances.

In addition, the need for a variety of access controls was noted. The
TCSEC label-based mandatory policy was commonly viewed as inappropriate
for the protection of commercial and civil sector data.

Specifics of these computer security approaches are described in
Subsection 3.3, Organizational Security Approach.


3.1 Basis for Protection

Significant and broadly sweeping security requirements were found to
exist within all organizations. Such requirements included protecting
the integrity, availability, and confidentiality of key software systems,
databases, and data networks.

3.1.1 Driving Requirements

Both federal government and corporations were found to rely heavily on
information processing systems to meet their individual operational,
financial, and information technology requirements. The corruption,
unauthorized disclosure, or theft of resources could disrupt operations
and have immediate serious financial, legal, human safety, personal
privacy and public confidence impacts. Computers must also be protected
against misuse by an individual committing such acts as data interchange
fraud, harassment or personal terrorism, and pornography.

Organizations processing and storing classified information focus on
preventing unauthorized observation/disclosure of data as the basis for
protection. For these organizations, the unauthorized flow of
information from a high level to a low level was the principal concern.

For the federal government, requirements exist for protecting the privacy
of personal information. These requirements come from the Privacy Act of
1974. The Act provides privacy safeguards by requiring federal agencies
to protect the personal information it collects, maintains, uses, and
disseminates. Additionally, when an agency contracts for services, the
contractor must protect the information subject to the Act's
requirements.

Protecting the privacy of personal information was also relevant to
commercial sector organizations. The need to protect sensitive data from
unauthorized access resulted from operational environment (including
threats) and data sensitivity factors. These factors include legal
obligations and self-imposed requirements including confidentiality of
salary, performance, and health (mental, drug, and alcohol related
illness), as well as data involving legal incidents.

Privacy issues were perceived as particularly critical in medical and
insurance applications. Educational, employment and personnel, banking
and financial institutions, and credit bureaus also acknowledged
protecting the privacy of individuals as a high organizational priority.

The need to preserve customer, insurer, and stockholder confidence was
also cited as a basic security objective for many organizations. The
vice president of a major bank described the need to "provide a good
service at a reasonable cost" as an important capability of most savings
and financial institutions but described the need for "maintaining a
general sense of customer confidence" as critical.

The basis for protection takes on a specific meaning for those
organizations, such as banks, credit companies, and insurance companies,
concerned with preventing unauthorized distribution of financial assets.
These businesses are subject to federal regulatory requirements of the
Federal Trade Commission and the Federal Reserve Board under the Fair
Credit Billing Act, Equal Credit Opportunity Act, and Truth-in-Lending
Act.

Security issues can also be unique to a specific industry. Of all the
organizations interviewed, only PACBELL and BELLCORE were concerned with
preventing unauthorized use of long-distance telephone circuits. Only
hospitals and those who develop hospital systems were concerned with
preventing unauthorized distribution of prescription drugs.

Professional standards, health and safety, prevention of embezzlement,
good business practices, and profit were also stated as key factors in an
organization's basis for protection.

3.1.2 Types of Information

In general, the interviews focused on the protection of information that
a user may entrust to a system. During the course of the interviews, two
other types of information were noted as requiring protection. These two
types were:

o system-operating information (software, tables, etc.); and

o system-generated information (user activity data, general
traffic data, audit information, etc.).

Each type of information was found to have its own security policy
requirements. In the case of system-operating information and system-
generated information, the system itself was perceived as the owner and
primary custodian of the information. The system owner/operator sets the
policy requirements for protecting information. The owner of system-
generated information is the system owner/administrator, who also sets
its policy.


3.2 Sector Protection Requirements

Some similarities and differences of security needs within the
commercial, civil, and military sectors were noted. Security objectives
were specified and governed by many independent levels of authority, from
general legislation, to organizational rules of operation, to rights and
needs of the individual. Standards of due care were different in each
environment, just as controlling laws differ in each state. Each
organization had its own objectives and rules for computer access
privileges. The U.S. DoD confidentiality policy was unique in applying
a single set of security services across a large number of applications.

3.2.1 Common Notions of Protection

"Conventional wisdom" holds that the military is concerned only with
protecting the confidentiality of classified information. Similarly, a
policy of integrity and reliability is associated primarily with
commercial and civil sectors. The study team found those view points to
be over-simplified.

Integrity issues are critical to the commercial and civil sectors, as
well as the military sector. For example, integrity takes on a critical
meaning within a military Nuclear Command and Control (NC2) system. The
NC2 system may disseminate a critical message from a top command tier of
a tactical network down to a field terminal associated with a weapon.
This dissemination must occur in a timely and unaltered manner. The
knowledge of the contents of such a message during a nuclear exchange
would have little or no value to an adversary. However, the ability of
an adversary to alter the contents of, or to deny or delay the delivery
of, such a message could alter the course of a war.

The study team found that a computerized hospital support system, whether
in a VA or commercial hospital, also imposes stringent integrity
controls. The integrity controls of such a system must provide for the
ethics and laws associated with the clinical treatment of patients.
Prior diagnoses can never be destroyed or altered; only doctors can
perform a diagnosis and prescribe medicine. Protecting the accuracy of
patients medical records may be critical if there is an accident where
the patent becomes unconscious. The correctness of information including
the patient's reaction to medications, pre-existing ailments, blood type,
or medication currently being prescribed can all prove to be health-
threatening or even life-threatening.

Integrity issues, in general, were found to address a richer and more
dynamic facet of security than confidentiality. These issues often
pertained not only to who can access what data (which is common to most
confidentiality access control models) but also how and when the data is
accessed. The more commonly agreed upon objectives of integrity include:

o Ensuring the consistency of data values within a computer
system;

o Recovering to a known consistent state in the event of a
system failure;

o Ensuring that data is modified only in authorized ways,
whether by users or by the system;

o Maintaining consistency between information internal to the
computer system and the realities of the outside world.

Integrity issues were particularly relevant to applications such as funds
transfer, clinical medicine, environmental research, air traffic control,
and avionics, as well as many classified and sensitive (non-classified)
DoD applications. For some systems, integrity was closely related to the
issue of system safety. Two examples are maintaining the safe operation
of a manned space vehicle and a doctor relying on the correct results of
a medical diagnostic machine.

While usually associated with the military sector, the commercial and
civil sectors are also concerned with protecting the confidentiality of
their information. Examples include the protection of personnel data,
marketing plans, product announcements, formulas, and manufacturing and
development techniques.

Commercial and civil sector organizations are obligated to protect the
results of mandatory medical exams and substance abuse tests from
unauthorized disclosure. The compromise of a preliminary agricultural
report could provide an unfair advantage within the futures market. The
knowledge of the thresholds used by IRS computers to flag tax returns for
subsequent audits could have great financial benefits.

3.2.2 Distinguishing Protection Characteristics

Although a common core of high-level security needs have been found to
exist across all sectors, some basic differences exist. These
differences are in the way information is handled and where the emphasis
is placed on security within the commercial, civil, and military sectors.

The military emphasizes strong access controls placed between users and
classified information. These controls must be highly resistant to
bypass and alteration. To achieve this and other requirements, the
operating environment is designed around a requisite security
architecture.

Because of the potential consequences, organizations that process
classified information are willing to go through greater expense than the
rest of the federal government in terms of dollars, system development
time, and computer performance, to mitigate risk. Where add-on security
products are not available, the military has designed and developed
secure systems from the ground up to meet its security needs. Such
expenses are normally not justified in the commercial and civil sectors.

On the other hand, the commercial and civil sectors have traditionally
emphasized auditing techniques, along with basic access control methods.
This was based on (1) the belief that a user who knows he or she is being
watched is less likely to violate security and (2) the average user
knowing little about computers. In contrast, the military has always
placed less emphasis on auditing since it is concerned with threats from
malicious software, such as Trojan Horses and trap doors, that can be
designed to bypass ordinary auditing mechanisms. However, since the
average person is more knowledgeable and comfortable with computers, the
threat to commercial systems has increased. Consequently, the difference
between the security threats to commercial computer systems and those of
the military is becoming less extreme.

The study team found that most commercial organizations take a carefully
measured and cost-effective approach to computer and communications
security issues. Each commercial organization interviewed described
computer security as an important and necessary capability of their
computer systems. However, such statements were quickly caveated with
the reality that a business case is also presented regarding the merits
of such capabilities. This business case was described as balancing the:

o cost to implement, maintain, and administer security;

o benefits gained by imposing security; and

o impact on the user.

The costs associated with security are absorbed as part of overhead,
resulting in reduced profits and a potential loss of competitiveness. On
the other hand, by neglecting security, an organization becomes more
vulnerable to attack. An attack could result in an unexpected and direct
cost to the company through a loss of confidence in the organization by
its customers, or legal actions. These factors can affect profits.

Another consideration is how security effects the user. The goal is to
make security features as transparent as possible to the user. If a
user's ability to utilize the system is impeded due to security
constraints, then the organization is that much less efficient. An
organization risks becoming less competitive due to higher overhead cost
or absorbing the added operational cost through lower profits.

A great deal of importance is placed on being in-step with other
organizations of like size and function in terms of a security program.
This provides confidence that the organization is staying within the norm
of generally accepted business practices, thereby reducing risk in terms
of incurred liability. Such considerations, along with more traditional
risk analysis, are used as the basis for determining requirements and
implementing safeguards. Within the commercial sector, there is a trade-
off between the cost associated with potential loss and the cost
associated with implementing security mechanisms.

Computer security programs of the federal government, in general, look at
different cost factors than those of the commercial sector. The concerns
in federal government, like the commercial sector, are budgetary,
"regulatory," and reputation. The difference is that the federal
government is not profit-oriented, nor does it worry about market share.
Of more concern is maintaining public confidence, complying with new
regulations, and keeping a good reputation with the public. A major
security incident can impact all three factors.


3.3 Organizational Security Approach

The NIST study team discussed with each organization the type of computer
security products, features, and mechanisms that were used, desired, or
sought. This included the organization's approach to providing
confidence that the security features exist and work as intended. These
include design, development, and operational control aspects. These
approaches will only consider information technology and not discuss
other safeguards, such as physical and procedural controls.

3.3.1 Identification and Authentication

Identification and authentication were critical to every system the NIST
study team reviewed. The most common method of authentication was
passwords. Passwords can also be required at the data file level.

Passwords are considered by many to be a relatively weak security
mechanism. Users tend to use easily guess passwords (e.g., spouse's
name, birth date, sport team, etc.). A randomly generated password is
difficult to remember, causing the user to write it down and creating the
possibility of loss or disclosure. Other vulnerabilities include
spoofing users, users stealing passwords through observing key strokes,
and users sharing passwords. The unauthorized use of passwords by
hackers or insiders is a primary concern.

Those interviewed felt that NIST should encourage vendors to provide a
strong password management capability at the operating system level that
would be tailorable to specific environmental needs.

Along with the availability of a strong password management capability,
they felt NIST should continue to promote research on improving the
integrity of the identification and authentication process. Technologies
such as smart cards, signature verification, and voice authentication
were mentioned as having a potential place in an overall approach to
security. However, for organizations with large numbers of users, only
a low-cost solution would be practical.

3.3.2 Access Control

The access control needs and control policies of each organization
interviewed varied. Many of these policies consider site,
organizational, industry, or agency-unique factors.

Access control policies are context-dependent; it is not possible to know
the environment in which such control will be applied. Not all stated
access control policies can be easily mapped and implemented using the
existing access control framework of the TCSEC. The TCSEC specifies two
types of controls: Discretionary Access Controls (DAC) and Mandatory
Access Controls (MAC). Since the TCSEC's appearance in December of 1983,
DAC requirements have been perceived as being technically correct for
commercial and civil security needs, as well as for single-level military
systems. MAC is used for multi-level secure military systems, but its
use in other applications is rare. The need for access controls more
appropriate to the commercial and civil sector, than that of DAC, was
found to exist. There is a need for DAC, but DAC falls short when
implemented alone in solving the wide breath of security problems facing
sensitive processing environments.

The remainder of this section describes the applicability of DAC and MAC,
as well as other access control approaches, to the policy needs of those
organization interviewed.

3.3.2.1 Discretionary Access Control

DAC plays an important role in supporting security requirements of many
organizations, especially within engineering and research environments
where the discretionary sharing of access and exchange of information is
important. For many organizations, users must be able to specify what
access other users have to resources that they control, without the
intercession of an administrator. This makes the controls discretionary.
Within a true DAC environment, the ability for a user to access
information is dynamic and changes rapidly over short periods.

Organizations expressed concerns about relying solely on DAC as the
primary means of protection. Specifically, they were concerned with the
propagation of access rights, reliance on the cooperation of users, and,
to a lesser extent, DAC's vulnerabilities to a Trojan Horse.

Some organizations expressed concern over exactly who has the capability
to specify group membership. By granting membership to a group, user
access rights to protected data can dynamically change without the
knowledge of the owner of that data. For some organizations, the ability
to specify group membership was described as appropriately placed at the
project level, while for other organizations, group membership was more
appropriately placed at the security officer level. The organizations
were concerned with this capability and would like the option of
specifying control over group ownership within their computer systems.
In addition, the ability to list group membership before granting access
privileges to that group was considered by some as a necessary part of
this capability.

The most common approach to implementing DAC is through access control
lists (ACLs). The TCSEC encouraged ACLs as appropriate for user-
controlled access rights. However, when centrally administered, ACLs can
become clumsy and difficult to maintain. In centrally administrating DAC,
the system administrator assumes responsibility for ownership of all
resources, determining what resources and modes of access are needed for
the performance of each user's function within the organization. For
each new user or every change in responsibility, the central
administrator establishes the appropriate access rights within the
system. Additionally, when a person leaves the organization, the central
administrator deletes the person from all ACLs within the system. Many
of the organizations felt ACLs were difficult for the central control and
management of access rights.

3.3.2.2 Role-Based Controls

Many organizations preferred a centrally administered, non-discretionary
set of controls to meet their security policies and objectives. During
the course of this study, organizational policies and objectives have
included maintaining and enforcing the rules and ethics associated with
a judge's chambers, and the laws and respect for privacy of diagnosing
ailments, treating of disease, and administering of medicine within a VA
hospital. To support such policies, a capability to centrally control
and maintain access rights is needed. The security administrator is
responsible for enforcing policy and represents the organization as the
"owner" of system objects. Access control decisions were found to be
based on the roles individual users take on as part of an organization.
This includes the specification of duties, responsibilities, obligations,
and qualifications. For example, the roles included doctor, nurse,
clinician, or pharmacist associated with a VA hospital; or teller or loan
officer associated with a banking system. The doctor's role includes
privileges to perform diagnoses, prescribe medication, or add a entry to
(not simply modify) a record of treatments performed on a patient. The
privileges defined for the role of pharmacist include those to dispense
(not prescribe) prescription drugs.

The determination of membership and the allocation of privileges to a
role is not so much in accordance with discretionary decisions on the
part of a system administrator, but rather in compliance with
organization-specific protection guidelines. These guidelines derive
from existing laws, ethics, regulations, or generally accepted practices.
The guidelines are non-discretionary in the sense that they are
unavoidably imposed on users. For example, a doctor can prescribe
medication, but cannot pass that privilege on to a nurse.

Once roles are established within the system, the privileges associated
with these roles remain relatively constant or change slowly over time.
The administrative task is then to grant and revoke user membership to
the set of specified roles within the system. The capability of an
administrator to simply grant and delete membership to existing roles has
been described as desirable. When a user's function changes within the
organization, the user's membership to existing roles should be easily
deleted and new ones granted. Finally, when a person leaves the
organization, all of that person's memberships to all roles are deleted.
For an organization that experiences a large turnover of personnel, a
role-based implementation security policy is the only logical choice.

The NIST study team talked with several organizations that felt role-
based access or access based on function was a control more suited to
their needs than DAC or MAC. While add-on packages will give an
organization access based on function for their systems, role-based
access control should be generally promoted as are DAC and MAC.
Currently no standard exists to promote the wide availability of role-
based access control.

3.3.2.3 Separation of Transactions

Separation of transactions is a design and implementation approach which
partitions a task-oriented set of programs and data. This set is
available to a specific user who is allowed access only to these
resources. A group of available transactions define a particular task
that can be assumed by a user. Although similar, separation of
transactions differs from role-based control in that creation of roles
and the granting of membership to roles are an administrative function
while the underlying access control rules enforced through separation of
transactions is achieved through a combination of administrative and
transaction-design decisions.

Because of the stable functionality and the deterministic characteristics
of transactions within some organizations, security engineers or those
knowledgeable of security issues facing an organization (i.e., privacy,
data integrity, etc.) play an important role in specifying access-control
decisions during the design and development of the system. For example,
for one organization, transactions were designed to retrieve an entire
customer record minus the customer's social security number. In
addition, design-time access control decisions can consider aggregation
problems that are difficult to address within conventional run-time
access control environments. Security guidelines are addressed by the
designer and developers of a transaction or by direct involvement in the
design and development effort of proposed transactions.

Once a transaction has been developed and introduced into the operational
environment, a security administrator may assign the named transaction to
specific users or user groups. The importance of control over
transactions, as opposed to simple read and write access, can be seen by
considering a simple banking transaction. Tellers may execute a savings
deposit transaction, requiring read and write access to specific fields
within a savings file and a transaction log file. An accounting
supervisor may be able to execute correction transactions, requiring
exactly the same read and write access to the same files as the teller.
The difference is the process executed and the values written to the
transaction log file.

A major insurance company enforces its corporate policy through the use
of separation of transactions. Within the organization, each unit
(performing a specified task) is assigned a collection of transactions to
perform an assigned task or function. A unit security administrator
determines "what users get access to what transactions," within that
unit. The security administer can add and delete users to the unit, but
cannot assign transactions to individuals outside the unit.

3.3.2.4 Separation of Related Duties

Although more of a policy than a mechanism, separation of related duties
is used in deterring fraud within financial systems. Such duties can
include authorizing, approving, and recording transactions, issuing or
receiving assets, and making payments. Separation of related duties
refers to the situation where different users are given distinct, but
often interrelated tasks such that a failure of one user to perform as
expected will be detected by another. For separation of related duties
to be effective, computer capabilities must be partitioned. These
capabilities must be accessible only to users or processes associated
with specific tasks.

Several organizations described the need for an add-on capability of
separation of related duties. One example would be a program or device
to separate users who authorize or commit the expenditure of funds from
those authorized to place orders for services and equipment. The IRS has
used this policy as a requirement from the outset and a system with this
capability was developed especially for them.

3.3.2.5 Principle of Least Privilege

The principle of least privilege was described by some of those
interviewed as an important control approach in meeting security policies
and objectives. This principle gives the user no more privilege then is
necessary to perform a job. Implementing least privilege requires
identifying what the user's job is, determining the minimum set of
privileges required to perform that job, and restricting the user to a
domain with those privileges. Least privilege allows a user to have
different levels of privilege at different times, depending on what task
is being performed. By denying access to transactions and privileges
that are not necessary for the performance of their duties, those
privileges cannot be used to circumvent the organizational protection
policy. Least privilege is particularly important for those systems
where there is a "privileged user" or "superuser" capability that would
otherwise grant a wide set of privileges to users that need only a subset
of those privileges.

The principle of least privilege is similar to separation of
transactions. It differs in that separation of transactions restricts
the set of programs that can access data and places restrictions on which
users can execute what programs. Least privilege restricts a user's
access to data by denying users privileges that are not necessary to do
their job.

Several organizations would like an operating system capability that
supports the principle of least privilege. This capability is currently
supported in upper end secure systems (B2 and above), but many
organizations expressed the desire to see this capability at a more basic
level.

3.3.2.6 Label-Based Mandatory Access Controls

The other form of access control specified in the Orange Book is label-
based mandatory access control. MAC is a non-discretionary access
control, restricting users in their access to data on levels implemented
through labels. These are (1) the level associated with the trust of the
user, i.e., clearance, and (2) the level associated with the sensitivity
of the data.

Forming an alliance among companies that are otherwise competitors was
cited as a reason to enforce a confidentiality policy. For such an
alliance to exist, the ability to isolate and share information on a non-
discretionary, formal "need-to-know" basis is required.

The formal "need-to-know" has primary emphasis on categories and, to a
lesser extent, on hierarchical levels. The term "category" is used to
describe non-hierarchical separation. Outside the DoD, few organizations
operate using hierarchical levels. Most non-DoD organizations have
employees and users belonging to one level, but with different
responsibilities, i. e., in different categories.

For example, a commercial organization recently formed strategic
alliances with some of its competitors. Although this organization has
always allowed access to some of its most sensitive proprietary
information by outside consultants, this access was narrow and limited.
Because of the frequency and scope of past access requirements, physical
and procedural measures could provide the necessary isolation. However,
the physical and procedural controls of the past have become impractical
with current information needs. The only practical solution is label-
based mandatory categorization. This type of access would allow limited
partnership between competitors.

As business alliances become a corporate reality for many U.S. companies,
label-based mandatory access controls will become more important.
Currently, label-based MAC is not generally available as part of an
operating system, but it can be added.

3.3.2.7 Object-Label Association

The ability to associate a label (not necessarily used in access
decisions) with an object was described as a needed capability by several
organizations interviewed. These labels would carry warning, advisory,
and other information associated with an object and would not be used for
making mandatory access control decisions. For example, within a
hospital system, a label would associate a warning with a prescription
drug, i.e., "not for use if person has high blood pressure". The
association between a drug and a warning is an important relationship.
For medical systems in general, the capability to associate an
information label describing the quality of an x-ray, CATscan, sonogram,
or any other image shared among medical professionals, can be a vital
capability. Currently, object-label association is neither a capability
available within most systems nor encouraged through security standards.

3.3.3 User Accountability

User accountability means holding individual users responsible for their
actions. Imposing a policy of accountability on system users was
described by organizations as both a detection and deterrent mechanism.
This implies that an individual is knowledgeable of some standard of
conduct and answerable to a higher authority who may impose penalties on
those who fail to adhere to this standard. Also, making users aware that
their actions are being monitored is thought to prevent a would-be
violator from committing a breach of security.

Individual accountability is accomplished through:

o uniquely identifying and authenticating the individual user;

o authorizing access to the system;

o generating an audit trail of security relevant events; and

o reviewing the database of security relevant events for
deviations from some specified standard of conduct.

Although acknowledging vulnerabilities with the process of identifying
and authenticating an individual, organizations are aware that
technological solutions are available, but not yet affordable. In
addition, they recognize that existing administrative interfaces are
inadequate for an effective review of the database of security-relevant
events. This was especially true for environments doing distributed
processing.

A related issue raised in a few interviews was intrusive employee
monitoring/surveillance. A few organizations indicated employees or
their representatives had expressed concern about potential misuses of
increasingly sophisticated data gathering and analysis tools.

NIST should promote incorporating computer security auditing standards in
products. Those interviewed expressed frustration with various aspects
of auditing computer security events. Current auditing features,
although sufficient in meeting evaluation criteria, are of limited
practical use in distributed and networked environments. There was
limited understanding of what events should be audited, what information
should be collected, what form that information should be in, and how to
compare and consolidate the information from one system to another.
Interoperability and a common format for auditing security-relevant
events is needed. Common formats would facilitate the central collection
and reduction of security-relevant events. This is integral to achieving
security in the heterogeneous, distributed environment many organizations
are facing.


3.4 Electronic Data Interchange (EDI)

EDI is the computer-to-computer interchange of messages representing
business documents. Most organizations expect EDI to become a common
part of their business practices. They recognize that while EDI can
provide an opportunity for improved efficiency, it has the potential for
additional risk.

Some expressed concern that by using EDI technology, original hard-copy
evidence of obligation and commitment by concerned parties would not be
available. For EDI to be a practical alternative to paper, specific
assurances must be provided that EDI messages are authentic and properly
authorized. The goal of EDI technology is to provide the same
capabilities as traditional paper-based administrative functions with
more efficiently and the same level of trust.


3.5 Assurance and Quality

Assurance gives a user or system owner a degree of reliability that
claims of security functionality and policy support can be relied on with
confidence. Assurance is gained through various methods using evaluation
criteria as a metric. Some people felt that part of confidence was an
effective user interface, with quality equating to ease of use.

Security assurance is an important factor in any secure system
development effort and an important element of an existing or emerging
security standard. The desired level and types of specific assurance
requirements are, at best, difficult to assess. Most of those
interviewed felt that, at a minimum, security features should be
implemented with the same level of confidence, quality, and robustness as
other non-security-related operating environment system features.

Some interviewees said that they saw a general increase in the level of
quality in computer products and felt a higher degree of confidence in
those products. However, they could not report comparable improvements
in the security features associated with new system releases or versions
of systems, or the confidence they had in them. One aspect of quality
notably missing from security features is a friendly user and
administrator interface. This is particularly apparent when managing
ACLs, reviewing audit reports, and administering passwords. Several
interviewees felt that resolving such problems would enhance the
effectiveness of security.

A sizable segment of those interviewed felt that the current assurance
and evaluation process is not cost-effective. The security associated
with many systems and applications should not be viewed any differently
than any other aspect of the system. It should be subject to the same
cost-benefit analysis as other features. In regard to assurance levels,
a basic level needs to accommodate the notion of generally accepted
commercial practices.

For the majority of organizations interviewed, a moderate level of
assurance was described as appropriate. However, there is a class of
software/hardware systems where it is necessary that the system be shown
to be probably correct with respect to some aspects of its trusted
operation. As noted, maintaining the confidentiality of classified data
within a military system may warrant such a confidence level. However,
critical systems exist outside the military. Security functionality is
critical to electronic funds transfer systems, as is safety within
avionic and transportation control systems. In addition, with the
increased use of embedded computers in medical systems, improved methods
of assuring their correct operation becomes increasingly important.


3.6 Evaluation

The process of security evaluation validates the functionality of the
features as well as assurances of a system.

The current process of evaluation was described to those interviewed by
the NIST study team as being an adjunct to the assurance process. The
evaluation process is not without its costs in terms of product
development costs, development delays, and its availability. The
development costs included the production of evaluation evidence (which
in many cases is not necessarily a byproduct of normal system
development), additional phases and activities added to the system design
and development, and enhanced architectural requirements. The
availability and development delays included evaluation time and evidence
preparation time.

Those interviewed were almost uniformly concerned with the cost. Some
interviewees expressed concerns about vendors passing along the added
design and development cost to the customer. Another concern was the
availability of evaluated products. Most noted that the products they
were currently using were not the same version as the product that was
evaluated.

Even with the visibility and concern over the costs associated with
evaluation, most organizations recognized a need for an independent and
faster evaluation. Surprisingly, there was not strong support for vendor
self-assertion with respect to evaluations. Most organizations possessed
a basic distrust for vendors based on past experiences.

Many organizations also took exception with the current format of
evaluations and viewed them as limited in scope. It was suggested that
evaluations include other security-related aspects such as performance,
ease of use, compatibility with existing applications and hardware, and
interoperability issues. Some even suggested that a "Consumer Report"-
style product assessment would be useful. Such a report would support
their procurement needs as well as provide incentives for vendors to
develop a quality set of user and administrator interfaces rather than
meeting minimum requirements.

Most organization representatives viewed the performance of evaluations
in a stand-alone laboratory environment as unrealistic for their actual
operating environments. Of all the organizations interviewed, not one
processed in a stand-alone environment. Almost all organizations had
intelligent workstations directly or remotely connected through a local-
area network.


3.7 Current Criteria Not Keeping Pace

Although advances have been great, several organizations stressed that
the current state of security technology has failed to address the needs
of all. This is especially true of organizations outside the DoD who
felt little attention has been paid to current criteria in addressing
their security requirements.

Trusted technology has also failed to keep pace with technological
advances in information processing. Existing security theory and
criteria are founded on the multi-user stand-alone computing environment,
such as the mainframe computer. However, the trend is toward distributed
storage, processing, and communication functions, on low-cost specialized
machines on a network. The network is becoming the computer. Current
product evaluations exclude general network facilities, while many
computers are installed in networks.

The Trusted Network Interpretation (TNI) of the TCSEC was developed to
address the security network issue. It provides security evaluation and
design criteria for networks of systems that are developed, installed,
and administered as though they were a single time-sharing system.
However, most organizations procure systems in an evolutionary fashion
with new computer resources added, replaced, deleted, and added again.
The system may be connected to another network which may be connected to
still another network. The TNI does not address this evolution.

3.8 Need for Security in Open Systems

Those interviewed felt that security standards which allow the
comprehensive implementation to integrate security across a multi-vendor
environment have failed to emerge. It should be possible to:

o interface many systems, both present and future;

o provide a single user view of security services across a wide
range of operating systems; and

o have security features interoperate with other security
services on both local and remote machines, without the need
to train users in new security products.

The need to implement security should not limit an organization in
choosing the best solution and integrating it into their existing system.
Security technology must support users working effectively together.


3.9 Owner-Custodian Relations

Organizations assume a certain risk when they permit their information to
be transmitted over a commercial or public network and used by computer
systems they do not control. They are aware that simply connecting to a
network can increase the vulnerability of their own computer system to
hackers or malicious software. Some users conclude that, in addition to
providing mechanisms to protect information on their own systems, they
need to consider the security implications of sharing resources with
subscribers on other systems. When an information owner passes
information to another system for use on that system, the user wants
assurance that information is protected in accordance with the owner's
protection criteria.

In an owner-custodian relationship, there is a transfer of responsibility
for safeguarding information from one party to another. In practical
terms, the owner of the information defines what protection it requires;
any system that processes the information must ensure that the system
security policy satisfies the owner's protection policy.

An example is a military contractor who protects classified information
using DoD policy. Another example is the Financial Intelligence Center
(FINCEN) of the Department of the Treasury. To be effective in its
counter-narcotic efforts, FINCEN must interact and share information with
other law enforcement organizations, such as the Coast Guard, IRS, Secret
Service, postal inspection, gambling commissions, banks, etc. FINCEN, as
a custodian of information belonging to a large number of organizations,
must provide security services that can be demonstrated effective at
meeting a variety of security policies.


3.10 Security Policies and Environments Can Change Over Time

For many organizations, security requirements cannot always be considered
at the outset of system procurement, or service or custodial
establishment. For these organizations, the ability to integrate
security into existing processing environments in an evolutionary fashion
is critical. All of the organizations interviewed reported significant
changes in their environments, as new computer and information
technologies are acquired. In some cases, the changes are new customers
or new alliances with other organizations. Some of the organizations
interviewed became custodians of others' data, in some instances data of
their competitors, as well as their own data. In some situations,
organizations faced changing requirements regarding with whom they
exchange data.

In addition, threats can change over time. For example, attackers can
devise new techniques. Hidden vulnerabilities can be discovered after
system deployment. Vulnerabilities can also be missed during system
evaluation and discovered in operational use.
4 CONCLUSIONS

The NIST study team concluded that computer security is applied uniquely
in each situation even though there are common concerns in all sectors.
Because each organization has unique security needs, security products
have been applied on a case-by-case basis to meet individual computer
security threats. Security at the operating system level, the
application level, the organizational level, and the site level must be
considered. Products need to be flexible enough to serve a broad
spectrum of security needs.

Considerations must be made for the reality that security requirements
evolve and cannot be totally specified at the time of product
acquisition. Security capabilities need to include new system and
network connections. Security managers need to be aware of changing laws
and regulations.

At the operating system level, basic capabilities need to be adaptable to
a variety of organizational policies and applications. These
capabilities should include security extensions that allow more security
to be added at a later date. These extensions can include trivial
password checkers, system built options, and enhanced system
administrative capabilities, such as setting minimum-length password,
creating roles, granting and revoking access and capabilities).

More classes of operating systems beyond C2 with more flexibility within
the classes are needed. Users are concerned with computer security
issues beyond confidentiality and disclosure. There is a need to address
data integrity in a more direct and user-friendly manner. Vendors should
consider new mechanisms that more directly address such things as role-
based access controls, separation of duties, separation of transactions,
and user-oriented least privilege.


4.1 Minimum Security Requirements

A majority of those interviewed wanted a baseline of computer security
controls in the systems they purchase. These would include a more
flexible DAC, role-based non-discretionary access controls, and principle
of least privilege. While acknowledging their responsibility in
determining security requirements, they saw value in knowing that their
systems met a pre-existing computer security baseline.

4.1.1 Baseline Capabilities

While DAC was considered useful, that capability was not flexible enough
for group membership. A number of organizations were administering
access control policies based on the roles or job functions of its staff.
However, these policies were implemented by mechanisms, such as access
control lists, that were not designed to facilitate a role-based world
view.

Organizations felt that role-based or access-based functions were
controls more suited to their needs than DAC or MAC. While there are
add-on packages that provide this function, this type of access control
should be as widely promoted as are DAC and MAC. Lack of standards for
role-based access control contributes to the problem.

Within DAC environments, organizations need control over group ownership
within their computer systems. In addition, the ability to list group
membership before granting access privileges to that group was considered
to be necessary.

Several organizations described the need for an operating system
capability that supports the principle of least privilege. This
capability is currently supported in upper-end secure systems (B2 and
above), but many organizations expressed the desire to see this
capability at a more basic level.


4.2 Computer Security Features Enabled by Default

Vendors should deliver computer security systems with the security
features turned on or enabled. This would provide an initial security
state and enforce a disciplined consideration of those features to be
disabled. A very small minority wanted computer systems delivered with
the security features turned off. They wanted the choice of turning on
only those features they needed in order to not excessively inhibit
system performance.


4.3 Assurance

Most organizations felt evaluation criteria should include a wide range
of assurance levels. This includes a "generally accepted commercial
practice" level which minimizes the cost of developing systems and the
length of time associated with evaluation. Evidence used in the
assurance process should be founded on a sound base of experience and
observations. Evidence should be limited to that which has shown to be
beneficial in the past, not that which, in theory, should be beneficial.


4.4 Evaluation

The current evaluation and certification process (i.e., with respect to
TCSEC) is not perceived by users as meeting their needs for a variety of
reasons. One reason cited was the time lag between new product releases
and formal certification. Another reason was that the existing
certification process does not address other issues associated with
operational environments, such as effectiveness of mechanism,
performance, version compatibility, adaptability, and ease of
integration.

Each organization felt that the products they acquired needed to be
evaluated regarding security features and assurances. None felt that
vendor self-certification or vendor representation were adequate. While
a few wanted to do a portion of the evaluation themselves, the vast
majority wanted an independent third party evaluation. A federal
government-operated or commercial government-accredited process was the
most desirable. Many factors contributed to each organization's attitude
toward certification, including sensitivity of the applications,
corporate culture, time and cost considerations, mission criticality,
past experience with vendors, and availability of assessment sources.


4.5 Administration

The vast majority of the organizations interviewed felt that
administering computer security, particularly access control, was
burdensome in a heterogeneous, distributed environment. Given their
other responsibilities, this function took more time and effort than they
felt was appropriate.

Interviewees wanted computer security-related products that would easily
implement organization security policy and manage security functions.
These functions included centralized network security administration and
single logon for network data and services. Organizations felt that
improved security administrator interfaces were essential to balance the
increasing need for protection and limitations on the staff resources
devoted to it.

4.5.1 Password Management

Most organizations felt that vendors should provide a strong password
management capability at the operating system level and it should be
tailorable to specific environmental needs. Along with that, most felt
NIST should continue to promote research on improving the integrity of
the identification and authentication process. Technologies such as
smart cards, signature verification, and voice authentication have a
potential place in an overall approach to security. However, for most
organizations, only a low-cost solution would be practical due to a large
number of users.

4.5.2 EDI Capabilities

For EDI to be a practical alternative to the exchange of paper,
organizations want specific assurances that EDI messages are authentic
and properly authorized. The goal of EDI technology is to provide the
same capabilities as traditional paper-based administrative functions
with more efficiently and the same level of trust. This requires EDI
standards that are part of the baseline operating system.


4.6 Add-on Packages

Several organizations described the need for a variety of add-on
products. In some cases, these products are available, but do not
interface with the already-purchased computer systems. In those cases,
organizations felt that the add-on packages should be capable of working
with a wider variety of machines.

An add-on package that provides separation of related duties is needed.
Currently, this feature must be contracted out. Object-label association
is neither a capability available within most systems nor is it
encouraged through security standards. Organizations were interested in
add-on products that would meet this need. They also felt that security
standards for object-label association should be developed.

Currently, label-based mandatory access controls are not generally
available as part of the operating system, but as an add-on. Since this
type of access control will be used more and more by companies forming
alliances with competitors, the capability to isolate and share
information on a non-discretionary, formal "need-to-know" basis will be
required.


4.7 Current Criteria

Although advances have been great, several organizations stressed that
the current state of security technology criteria has failed to keep pace
with technological advances in information processing. Computer security
criteria needs to be kept current. In addition, criteria which addresses
the evolving technology of networked computers is needed.

Current criteria also does not address procurement in an evolutionary
fashion with computers interconnected to networks.


4.8 Security Standards for Multi-Vendor Systems

Those interviewed felt that security standards that allow comprehensive
implementation of security across a multi-vendor environment have failed
to emerge. The possible standards would provide for:

o interfacing many systems, both present and future;

o a single user view of security services across a wide range of
operating systems; and

o security features inter-operating with other security services
on both local and remote machines, without the need to train
users in new security products.

The need to implement security should not limit an organization in
choosing the best solution and integrating it into their existing system.
Security technology must support users working effectively together.


4.9 Closing Thoughts

Because each organization has unique security needs, security products
have been applied on a case-by-case basis in meeting individual computer
security threats. Security at the operating system level, the
application level, the organizational level, and the site level must be
considered. Products need to flexible enough to consider a broad
spectrum of security needs.

At the operating system level, basic capabilities that are adaptable to
a variety of organizational policies and applications need to be part of
a computer security baseline. These capabilities would be extensions so
that more security can be inserted, such as a trivial password checker,
or system build-in options, as well as enhanced system administrative
capabilities, such as setting minimum-length password, creating roles,
granting and revoking access and capabilities.

Security requirements evolve and cannot be totally specified at the time
of product acquisition. Security capabilities need to include new system
and network connections, while security managers need to be aware of
changing laws and regulations.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close