Aller au contenu

🛠️ Domain 3 – Security Architecture and Engineering


🔹 D3.1 – Security Models

  • Bell–LaPadula: Focuses on confidentiality

  • Simple Security: No Read Up

  • Star Property (-property): No Write Down

  • Biba: Focuses on integrity

  • Simple Integrity: No Read Down

  • Star Integrity: No Write Up

  • Clark–Wilson:

  • Uses well-formed transactions and separation of duties

  • Enforces integrity via certification rules and enforcement rules

  • Brewer–Nash (“Cognitive Wall”):

  • Enforces dynamic access control based on user’s previous access

🔹 D3.2 – Cryptography

🔐 Asymmetric Cryptography – Confidentiality vs Authenticity

Goal Encryption Key Decryption Key Purpose
Confidentiality Recipient’s public key Recipient’s private key Only the recipient can read
Authenticity Sender’s private key Sender’s public key Confirms sender’s identity

✍️ Digital Signatures & PKI

  • Uses asymmetric key pairs
  • Digital certificates (X.509) signed by Certificate Authorities (CAs)
  • Provides:
  • Authentication
  • Integrity

🔄 IPsec Components

🔐 IPsec – Overview

IPsec (Internet Protocol Security) is a suite of protocols used to secure IP communications by authenticating and encrypting each IP packet in a communication session.

🔁 IPsec Modes

Mode Description Use Case
Transport Encrypts only the payload (not the IP header) Host-to-host, end-to-end
Tunnel Encrypts the entire packet (header + payload) and wraps it in a new IP packet Gateway-to-gateway (VPNs)
  • 🔐 Tunnel mode is most common in VPNs, providing full-packet protection.
  • 📦 Transport mode is often used in end-to-end connections where both ends support IPsec.
Component Primary Role Confidentiality?
AH Header integrity & authentication ❌ No
ESP 🔐 Payload confidentiality, integrity, authentication ✅ Yes
IKE Key exchange negotiation ❌ No
ISAKMP Key mgmt framework for security associations ❌ No

🧠 Key Concepts:

  • Security Association (SA): A one-way logical connection with defined parameters (algorithms, keys).
  • IKE is responsible for setting up SAs between hosts.
  • IPsec uses ESP or AH (or both), depending on the required protection.

🔐 ESP is preferred in most real-world scenarios because it offers confidentiality + integrity.

🧪 Hashing vs HMAC

Function Requires Key? Purpose
Hash ❌ No Basic integrity
HMAC ✅ Yes Integrity + Authentication

🗝️ m-of-n Key Recovery (Key Escrow)

  • m of n control: At least m out of n key holders are needed to recover a key
  • Example: m = 4, n = 8 → 4 required
  • Based on Shamir's Secret Sharing
  • Supports secure recovery and resiliency

🔹 D3.3 – Architecture & Systems

TCB, Security Perimeter, Reference Monitor

  • TCB: Totality of protection mechanisms in a system
  • Security Perimeter: Boundary around the TCB
  • Reference Monitor: Enforces access control and must be:
  • Tamperproof
  • Always invoked
  • Verifiable

CPU Modes

  • User Mode: Restricted, cannot access hardware directly
  • Privileged Mode: Full system access, kernel-level

Assurance vs Verification vs Trust

Concept Definition
Assurance Measurable confidence in the control implementation
Trust Subjective belief
Verification Objective evaluation/test of effectiveness

Certification vs Accreditation

  • Certification: Technical evaluation of controls
  • Accreditation: Formal approval to operate (ATO)

🛑 Maintenance Hooks

  • Developer "shortcuts" left in code (aka backdoors)
  • Risk: If left in production, creates serious vulnerabilities
  • Example: python if user == "dev_admin": return "Access granted"