SlideShare a Scribd company logo
1 of 12
Download to read offline
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
An Introduction to MAC, RBAC and LSM
The theory behind hardening tools
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Before we start…
• each system has its own security requirements
• each system has different overriding security
requirements
• sometimes you need to combine multiple solutions
• showed approaches are build into the system
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Information
Main security requirements
Confidentiality
Availability
Integrity
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Keywords
• roles
• subjects
• objects
• policy
• policy defines behaviour of roles / subjects / objects
as higher abstraction of users
as abstraction of executables
as abstraction of system resources
as a set of rules (usually system-wide)
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Available options
• DAC, Discretionary Access Control
• MAC, Mandatory Access Control
• RBAC, Role-Based Access Control
* DAC and MAC are mutually exclusive. RBAC can coexist with others.
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Discretionary Access Control
• focuses on availability
• user in control
• user can forward privileges
• user can revoke permissions
• can’t be used in hardening tools!
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Mandatory Access Control
• focuses on confidentiality
• acts system-wide
• by design: 1 trusted admin, no roles
• controls access to objects
• subjects can’t change the policy
• neither users at lower level can do
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Role-Based Access Control
• focuses on integrity
• needs authentication
• each role access only data who is allowed to (default is deny)
• not mandatory by design
• can coexist with MAC if the hierarchy is a tree
• policy tied to roles, roles tied to users
• usually implemented via ACL
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Hooking the kernel: LSM
• a framework embedded in the Linux kernel
• designed not to degrade system performance
• hardening tools via modules
• system resources have hooks
• hooks -> pointers to module functions (low-level API, kind of)
• table of (dummy) functions called security_ops
• dummy functions replaced at boot time with (e.g.) SELinux ones
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Hooking the kernel: LSM
Resource request
Sys call
DAC check
LSM hook
complete request
LSM module
engine
SELinux*
kernel space
user space
* as an example
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
LSM hooks
• hooks are divided into categories
• task hooks
• program loading hooks
• IPC hooks
• filesystem hooks
• network hooks
• and more…
Hardening Two June 13, 2016 Francesco Pira (fpira.com)
Questions?
Thank you!

More Related Content

What's hot

Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesDustin Kirkland
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux SecurityMichael Boman
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Slackware Demystified [SELF 2011]
Slackware Demystified [SELF 2011]Slackware Demystified [SELF 2011]
Slackware Demystified [SELF 2011]Vincent Batts
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For BeginnersRamnath Shenoy
 
Lifnaaaaaa e
Lifnaaaaaa eLifnaaaaaa e
Lifnaaaaaa ehenelpj
 
Security, Hack1ng and Hardening on Linux - an Overview
Security, Hack1ng and Hardening on Linux - an OverviewSecurity, Hack1ng and Hardening on Linux - an Overview
Security, Hack1ng and Hardening on Linux - an OverviewKaiwan Billimoria
 
Anıl kurmuş pacsec3
Anıl kurmuş pacsec3Anıl kurmuş pacsec3
Anıl kurmuş pacsec3PacSecJP
 
DigiPinguïns: browsers tips & tricks (Liese De Vos)
DigiPinguïns: browsers tips & tricks (Liese De Vos)DigiPinguïns: browsers tips & tricks (Liese De Vos)
DigiPinguïns: browsers tips & tricks (Liese De Vos)Avansa Mid- en Zuidwest
 
Atom withhandlypackages
Atom withhandlypackagesAtom withhandlypackages
Atom withhandlypackagesSho Ikeda
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 

What's hot (20)

Intro to Exploitation
Intro to ExploitationIntro to Exploitation
Intro to Exploitation
 
Ubuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security FeaturesUbuntu 16.04 LTS Security Features
Ubuntu 16.04 LTS Security Features
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
Linux Security Crash Course
Linux Security Crash CourseLinux Security Crash Course
Linux Security Crash Course
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Slackware Demystified [SELF 2011]
Slackware Demystified [SELF 2011]Slackware Demystified [SELF 2011]
Slackware Demystified [SELF 2011]
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For Beginners
 
Lifnaaaaaa e
Lifnaaaaaa eLifnaaaaaa e
Lifnaaaaaa e
 
Security, Hack1ng and Hardening on Linux - an Overview
Security, Hack1ng and Hardening on Linux - an OverviewSecurity, Hack1ng and Hardening on Linux - an Overview
Security, Hack1ng and Hardening on Linux - an Overview
 
Anıl kurmuş pacsec3
Anıl kurmuş pacsec3Anıl kurmuş pacsec3
Anıl kurmuş pacsec3
 
DigiPinguïns: browsers tips & tricks (Liese De Vos)
DigiPinguïns: browsers tips & tricks (Liese De Vos)DigiPinguïns: browsers tips & tricks (Liese De Vos)
DigiPinguïns: browsers tips & tricks (Liese De Vos)
 
Rust
RustRust
Rust
 
MOSP Walkthrough 2009
MOSP Walkthrough 2009MOSP Walkthrough 2009
MOSP Walkthrough 2009
 
Atom withhandlypackages
Atom withhandlypackagesAtom withhandlypackages
Atom withhandlypackages
 
Linux security
Linux securityLinux security
Linux security
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
IEEE Posix Standards
IEEE Posix StandardsIEEE Posix Standards
IEEE Posix Standards
 
What is Firewall?
What is Firewall?What is Firewall?
What is Firewall?
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 

Viewers also liked

Видатні матемтаики
Видатні матемтаикиВидатні матемтаики
Видатні матемтаикиnatali7441
 
Social Media and Business
Social Media and BusinessSocial Media and Business
Social Media and BusinessRoshan Deniyage
 
Evaluation task 1 pdf- max b
Evaluation task 1 pdf- max bEvaluation task 1 pdf- max b
Evaluation task 1 pdf- max bbertieclarke231
 
Gazette 4. Vendredi 14 Octobre
Gazette 4. Vendredi 14 OctobreGazette 4. Vendredi 14 Octobre
Gazette 4. Vendredi 14 Octobreolivier
 
Senior Research Presentation FINAL
Senior Research Presentation FINALSenior Research Presentation FINAL
Senior Research Presentation FINALErica Gillespie
 
FinalProject_Complete_6
FinalProject_Complete_6FinalProject_Complete_6
FinalProject_Complete_6Farhad Gholami
 
gassim-al-gassim-revision-1-resume
gassim-al-gassim-revision-1-resumegassim-al-gassim-revision-1-resume
gassim-al-gassim-revision-1-resumeGassim Al-gassim
 
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...NHS England
 
Mock interview reflection
Mock interview reflectionMock interview reflection
Mock interview reflectionhannaherl
 
Srinivas Medikonda- Solution Architect
Srinivas Medikonda- Solution ArchitectSrinivas Medikonda- Solution Architect
Srinivas Medikonda- Solution ArchitectSrinivas Medikonda
 
Mock interview v
Mock interview vMock interview v
Mock interview vAngel Coyle
 
Comparative Analysis Of GoLang Testing Frameworks
Comparative Analysis Of GoLang Testing FrameworksComparative Analysis Of GoLang Testing Frameworks
Comparative Analysis Of GoLang Testing FrameworksDushyant Bhalgami
 
CV - Le Thi Dung (Linda Dung)
CV - Le Thi Dung (Linda Dung)CV - Le Thi Dung (Linda Dung)
CV - Le Thi Dung (Linda Dung)Le Thi Dung
 

Viewers also liked (16)

Видатні матемтаики
Видатні матемтаикиВидатні матемтаики
Видатні матемтаики
 
Social Media and Business
Social Media and BusinessSocial Media and Business
Social Media and Business
 
Evaluation task 1 pdf- max b
Evaluation task 1 pdf- max bEvaluation task 1 pdf- max b
Evaluation task 1 pdf- max b
 
Gazette 4. Vendredi 14 Octobre
Gazette 4. Vendredi 14 OctobreGazette 4. Vendredi 14 Octobre
Gazette 4. Vendredi 14 Octobre
 
Doc1
Doc1Doc1
Doc1
 
Senior Research Presentation FINAL
Senior Research Presentation FINALSenior Research Presentation FINAL
Senior Research Presentation FINAL
 
FinalProject_Complete_6
FinalProject_Complete_6FinalProject_Complete_6
FinalProject_Complete_6
 
Up bipin cv
Up bipin cvUp bipin cv
Up bipin cv
 
gassim-al-gassim-revision-1-resume
gassim-al-gassim-revision-1-resumegassim-al-gassim-revision-1-resume
gassim-al-gassim-revision-1-resume
 
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...
Strengthening leadership and building new teams, pop up uni, 1pm, 2 september...
 
Mock interview reflection
Mock interview reflectionMock interview reflection
Mock interview reflection
 
Srinivas Medikonda- Solution Architect
Srinivas Medikonda- Solution ArchitectSrinivas Medikonda- Solution Architect
Srinivas Medikonda- Solution Architect
 
Mock interview v
Mock interview vMock interview v
Mock interview v
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Comparative Analysis Of GoLang Testing Frameworks
Comparative Analysis Of GoLang Testing FrameworksComparative Analysis Of GoLang Testing Frameworks
Comparative Analysis Of GoLang Testing Frameworks
 
CV - Le Thi Dung (Linda Dung)
CV - Le Thi Dung (Linda Dung)CV - Le Thi Dung (Linda Dung)
CV - Le Thi Dung (Linda Dung)
 

Similar to An introduction to MAC RBAC and LSM

Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware LabThreatConnect
 
BACKFiL Finding Files you left on the server
BACKFiL Finding Files you left on the serverBACKFiL Finding Files you left on the server
BACKFiL Finding Files you left on the servertmccurry
 
CS403: Operating System :Lec 2 Function of OS.pptx
CS403: Operating System :Lec 2 Function of OS.pptxCS403: Operating System :Lec 2 Function of OS.pptx
CS403: Operating System :Lec 2 Function of OS.pptxAsst.prof M.Gokilavani
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex eventShawn Wells
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewKalman Graffi
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...Aditya K Sood
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access ControlChandra Sharma
 
Storage Solutions from General Atomics
Storage Solutions from General AtomicsStorage Solutions from General Atomics
Storage Solutions from General AtomicsIgor Sfiligoi
 
Building A New Operating System - Subhajeet Mukherjee @ SfBayACM
Building A New Operating System - Subhajeet Mukherjee @ SfBayACMBuilding A New Operating System - Subhajeet Mukherjee @ SfBayACM
Building A New Operating System - Subhajeet Mukherjee @ SfBayACMSubhajeet Mukherjee
 
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...Denis Kolegov
 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Positive Hack Days
 
Streamlined data sharing and analysis to accelerate cancer research
Streamlined data sharing and analysis to accelerate cancer researchStreamlined data sharing and analysis to accelerate cancer research
Streamlined data sharing and analysis to accelerate cancer researchIan Foster
 
Progressive Provenance Capture Through Re-computation
Progressive Provenance Capture Through Re-computationProgressive Provenance Capture Through Re-computation
Progressive Provenance Capture Through Re-computationPaul Groth
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsMartin Toshev
 
Introduction to Mesos
Introduction to MesosIntroduction to Mesos
Introduction to Mesoskoboltmarky
 
Presentation v1 (1)
Presentation v1 (1)Presentation v1 (1)
Presentation v1 (1)koboltmarky
 

Similar to An introduction to MAC RBAC and LSM (20)

Open Source Malware Lab
Open Source Malware LabOpen Source Malware Lab
Open Source Malware Lab
 
BACKFiL Finding Files you left on the server
BACKFiL Finding Files you left on the serverBACKFiL Finding Files you left on the server
BACKFiL Finding Files you left on the server
 
CS403: Operating System :Lec 2 Function of OS.pptx
CS403: Operating System :Lec 2 Function of OS.pptxCS403: Operating System :Lec 2 Function of OS.pptx
CS403: Operating System :Lec 2 Function of OS.pptx
 
2014 04-03 xyratex event
2014 04-03 xyratex event2014 04-03 xyratex event
2014 04-03 xyratex event
 
LibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - OverviewLibreSocial - P2P Framework for Social Networks - Overview
LibreSocial - P2P Framework for Social Networks - Overview
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
Arakno
AraknoArakno
Arakno
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access Control
 
Storage Solutions from General Atomics
Storage Solutions from General AtomicsStorage Solutions from General Atomics
Storage Solutions from General Atomics
 
Building A New Operating System - Subhajeet Mukherjee @ SfBayACM
Building A New Operating System - Subhajeet Mukherjee @ SfBayACMBuilding A New Operating System - Subhajeet Mukherjee @ SfBayACM
Building A New Operating System - Subhajeet Mukherjee @ SfBayACM
 
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
 
Ppt linux
Ppt linuxPpt linux
Ppt linux
 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
 
Operating System
Operating SystemOperating System
Operating System
 
Streamlined data sharing and analysis to accelerate cancer research
Streamlined data sharing and analysis to accelerate cancer researchStreamlined data sharing and analysis to accelerate cancer research
Streamlined data sharing and analysis to accelerate cancer research
 
Hiding files.pptx
Hiding files.pptxHiding files.pptx
Hiding files.pptx
 
Progressive Provenance Capture Through Re-computation
Progressive Provenance Capture Through Re-computationProgressive Provenance Capture Through Re-computation
Progressive Provenance Capture Through Re-computation
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack Vectors
 
Introduction to Mesos
Introduction to MesosIntroduction to Mesos
Introduction to Mesos
 
Presentation v1 (1)
Presentation v1 (1)Presentation v1 (1)
Presentation v1 (1)
 

Recently uploaded

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfRTS corp
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorTier1 app
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 

Recently uploaded (20)

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdfEnhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
Enhancing Supply Chain Visibility with Cargo Cloud Solutions.pdf
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
Effectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryErrorEffectively Troubleshoot 9 Types of OutOfMemoryError
Effectively Troubleshoot 9 Types of OutOfMemoryError
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 

An introduction to MAC RBAC and LSM

  • 1. Hardening Two June 13, 2016 Francesco Pira (fpira.com) An Introduction to MAC, RBAC and LSM The theory behind hardening tools
  • 2. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Before we start… • each system has its own security requirements • each system has different overriding security requirements • sometimes you need to combine multiple solutions • showed approaches are build into the system
  • 3. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Information Main security requirements Confidentiality Availability Integrity
  • 4. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Keywords • roles • subjects • objects • policy • policy defines behaviour of roles / subjects / objects as higher abstraction of users as abstraction of executables as abstraction of system resources as a set of rules (usually system-wide)
  • 5. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Available options • DAC, Discretionary Access Control • MAC, Mandatory Access Control • RBAC, Role-Based Access Control * DAC and MAC are mutually exclusive. RBAC can coexist with others.
  • 6. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Discretionary Access Control • focuses on availability • user in control • user can forward privileges • user can revoke permissions • can’t be used in hardening tools!
  • 7. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Mandatory Access Control • focuses on confidentiality • acts system-wide • by design: 1 trusted admin, no roles • controls access to objects • subjects can’t change the policy • neither users at lower level can do
  • 8. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Role-Based Access Control • focuses on integrity • needs authentication • each role access only data who is allowed to (default is deny) • not mandatory by design • can coexist with MAC if the hierarchy is a tree • policy tied to roles, roles tied to users • usually implemented via ACL
  • 9. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Hooking the kernel: LSM • a framework embedded in the Linux kernel • designed not to degrade system performance • hardening tools via modules • system resources have hooks • hooks -> pointers to module functions (low-level API, kind of) • table of (dummy) functions called security_ops • dummy functions replaced at boot time with (e.g.) SELinux ones
  • 10. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Hooking the kernel: LSM Resource request Sys call DAC check LSM hook complete request LSM module engine SELinux* kernel space user space * as an example
  • 11. Hardening Two June 13, 2016 Francesco Pira (fpira.com) LSM hooks • hooks are divided into categories • task hooks • program loading hooks • IPC hooks • filesystem hooks • network hooks • and more…
  • 12. Hardening Two June 13, 2016 Francesco Pira (fpira.com) Questions? Thank you!