𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Enterprise level security 2 advanced topics in an uncertain world

✍ Scribed by Foltz, Kevin E.; Simpson, William Randolph


Publisher
CRC Press
Year
2020
Tongue
English
Leaves
339
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Chapter 1. The First 16 Years.

1.1 The Beginning of Enterprise Level Security (ELS).

1.2 Design Principles.

1.3 Key Concepts.

1.4 Implementation.

Chapter 2. A Brief Review of the Initial Book.

2.1 Security Principles.

2.2 ELS Framework.

Chapter 3. Minimal Requirements for the Advanced Topics.

3.1 Needed Capabilities.

3.2 Creating an Attribute Store.

3.3 Registering a Service.

3.4 Computing Claims.

3.5 User Convenience Services.

3.6 The Enterprise Attribute Ecosystem.

3.7 Summary.

Identity and Access Advanced Topics.

Chapter 4. Identity Claims in High Assurance.

4.1 Who Are You?.

4.2 Entity Vetting.

4.3 Naming.

4.4 Key and Credential Generation.

4.5 Key and Credential Access Control.

4.6 Key and Credential Management.

4.7 Key and Credential Uses.

4.8 Some Other Considerations.

Chapter 5. Cloud Key Management.

5.1 Clouds.

5.2 ELS in a Private Cloud.

5.3 The Public Cloud Challenge.

5.4 Potential Hybrid Cloud Solutions.

5.5 Proposed Secure Solutions.

5.6 Implementation.

5.7 Cloud Key Management Summary.

Chapter 6. Enhanced Assurance Needs.

6.1 Enhanced Identity Issues.

6.2 Scale of Identity Assurance.

6.3 Implementing the Identity Assurance Requirement.

6.4 Additional Requirements.

6.5 Enhanced Assurance Summary.

Chapter 7. Temporary Certificates.

7.1 Users That Do Not Have a PIV..

7.2 Non-PIV STS/CA-Issued Certificate.

7.3 Required Additional Elements.

7.4 Precluding the Use of Temporary Certificates.

7.5 Temporary Certificate Summary.

Chapter 8. Derived Certificates on Mobile Devices.

8.1 Derived Credentials.

8.2 Authentication with the Derived Credential.

8.3 Encryption with the Derived Credential.

8.4 Security Considerations.

8.5 Certificate Management.

Chapter 9. Veracity and Counter Claims.

9.1 The Insider Threat.

9.2 Integrity, Reputation, and Veracity.

9.3 Measuring Veracity.

9.4 Creating a Model & Counter-Claims.

9.5 Veracity and Counter-Claims Summary.

Chapter 10. Delegation of Access and Privilege.

10.1 Access and Privilege.

10.2 Delegation Principles.

10.3 ELS Delegation.

10.4 Delegation Summary.

Chapter 11. Escalation of Privilege.

11.1 Context for Escalation.

11.2 Access and Privilege Escalation.

11.3 Planning for Escalation.

11.4 Invoking Escalation.

11.5 Escalation Implementation within ELS.

11.6 Accountability.

11.7 Escalation Summary.

Chapter 12. Federation.

12.1 Federation Technical Considerations.

12.2 Federation Trust Considerations.

12.3 Federation Conclusions.

ELS Extensions - Content Management.

Chapter 13. &n;Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

✦ Table of Contents


Cover......Page 1
Half Title......Page 2
Title Page......Page 4
Copyright Page......Page 5
Dedication......Page 6
Table of Contents......Page 8
Preface......Page 14
Acknowledgments......Page 16
About the Authors......Page 18
List of Figures......Page 20
List of Tables......Page 24
1.2 Design Principles......Page 26
1.3 Key Concepts......Page 29
1.4 Implementation......Page 32
2.1.2 Maintain Confidentiality......Page 34
2.1.4 Maintain Integrity......Page 36
2.2 ELS Framework......Page 38
Chapter 3 Minimal Requirements for the Advanced Topics......Page 42
3.1 Needed Capabilities......Page 43
3.3 Registering a Service......Page 44
3.4 Computing Claims......Page 45
3.5 User Convenience Services......Page 47
3.6 The Enterprise Attribute Ecosystem......Page 48
3.7 Summary......Page 51
Identity and Access Advanced Topics......Page 54
4.1 Who Are You?......Page 56
4.2 Entity Vetting......Page 57
4.4 Key and Credential Generation......Page 58
4.5 Key and Credential Access Control......Page 60
4.6 Key and Credential Management......Page 61
4.7 Key and Credential Use......Page 62
4.8 Some Other Considerations......Page 64
5.1 Clouds......Page 66
5.2 ELS in a Private Cloud......Page 67
5.3 The Public Cloud Challenge......Page 68
5.3.1 Using the Same Design......Page 69
5.3.3 HSM Site Inspection, Direct Connection to HSM......Page 70
5.3.4 HSM Site Inspection, Preconfigured Direct Connections to HSM......Page 72
5.4.2 HSM in Private Cloud......Page 73
5.5.1 Server in HSM......Page 74
5.5.2 Homomorphic Encryption......Page 75
5.6.2 HSM Vendor Support......Page 76
5.6.3 Leveraging Mobile Device Management (MDM) for Cloud Assets......Page 77
5.7 Cloud Key Management Summary......Page 78
6.2 Scale of Identity Assurance......Page 80
6.4 Additional Requirements......Page 83
6.5 Enhanced Assurance Summary......Page 84
7.1 Users That Do Not Have a PIV......Page 86
7.2 Non-PIV STS/CA-Issued Certificate......Page 87
7.3 Required Additional Elements......Page 89
7.5 Temporary Certificate Summary......Page 90
8.3 Encryption with the Derived Credential......Page 92
8.5 Certificate Management......Page 93
9.1 The Insider Threat......Page 96
9.3 Measuring Veracity......Page 97
9.3.1 Person Entities......Page 103
9.3.2.1 Non-Person Veracity......Page 105
9.4.3 Computing Veracities......Page 106
9.5 Veracity and Counter Claims Summary......Page 107
10.2 Delegation Principles......Page 110
10.3.1 Standard ELS Delegation......Page 116
10.4 Delegation Summary......Page 119
11.1 Context for Escalation......Page 120
11.2 Access and Privilege Escalation......Page 121
11.3 Planning for Escalation......Page 123
11.4 Invoking Escalation......Page 125
11.5 Escalation Implementation within ELS......Page 127
11.6 Accountability......Page 130
11.7 Escalation Summary......Page 131
12.1.1 ELS Federation......Page 132
12.1.2 ELS-like Federation......Page 134
12.1.3 Identity Credential Federation......Page 135
12.1.4 Weak Identity Federation......Page 137
12.1.6 Person-to-Person Sharing......Page 138
12.1.7 Evaluating Options......Page 139
12.2 Federation Trust Considerations......Page 140
12.2.2 Infrastructure Trust......Page 141
12.2.4 No Trust......Page 142
12.3 Federation Conclusions......Page 143
ELS Extensions – Content Management......Page 144
13.2 Product Identifiers......Page 146
13.4.1 Access Control......Page 147
13.4.3 Components of an Electronic Object......Page 148
13.4.4 Responsibilities of the AppliquΓ©......Page 150
13.4.5.2 Forensics......Page 151
13.5 Content Object Summary......Page 153
14.1 Full Homomorphic Encryption (FHE)......Page 154
14.1.1 Homomorphic Encryption......Page 155
14.1.2.1 Non-Homomorphic Encryption......Page 156
14.1.2.2 FHE with Full Application in Cloud......Page 157
14.1.2.3 FHE with Only Data in Cloud......Page 158
14.1.3 Performance Considerations......Page 159
14.2 Partial Homomorphic Encryption (PHE)......Page 160
14.2.4 HR Database Schema......Page 162
14.2.5 Encryption Schemes......Page 163
14.2.7 SQL Translation Schemes......Page 165
14.2.10 Lab Setup......Page 166
14.2.11.2 Enhancements......Page 167
14.3 PHE Performance Evaluation......Page 168
14.3.1.2 Encrypted Queries......Page 169
14.3.2 Setup Considerations......Page 170
14.3.3 Evaluation Method......Page 171
14.3.4.1 Bulk Encryption Test Results......Page 173
14.3.4.2 Single Queries......Page 174
14.3.4.3 Combining Two Queries......Page 175
14.3.4.5 Initialization and Randomization......Page 177
14.4 Homomorphic Encryption Conclusions......Page 179
ELS Extensions – Data Aggregation......Page 180
15.1 Big Data Access......Page 182
15.2 Big Data Related Work......Page 183
15.3.2 Big Data Analysis with ELS......Page 184
15.3.3 Data-Driven Access Controls......Page 185
15.3.5 Big Data Analysis Using Federation Data......Page 187
15.3.6 Data Leakage......Page 188
15.4 Big Data Summary......Page 189
16.2 The Mediation Issue......Page 190
16.3.2 Mediation Service......Page 192
16.3.3 Mediation Tool Service......Page 193
16.3.4 Homomorphic-Encryption MITM......Page 194
16.3.5 Comparison of Solutions......Page 195
16.4 Choosing a Solution......Page 197
16.5 Mediation Summary......Page 198
ELS Extensions – Mobile Devices......Page 200
17.1.1 Network Overview......Page 202
17.1.2 Mobile Ad Hoc Networking......Page 203
17.1.4 Nexus Elements in the Ad Hoc Network......Page 204
17.2.1 Detection of Hardware Capabilities......Page 206
17.2.3 Selection of Waveforms and Protocols......Page 208
17.2.4 Service Discovery......Page 209
17.2.6 Network Broadcast......Page 210
17.2.8 Joining a Network......Page 211
17.3.2 Device Requirements......Page 212
17.4 Mobile Ad Hoc Summary......Page 213
18.1.1 Devices to Be Considered......Page 216
18.1.3 The Issue......Page 217
18.1.4 Device Evaluation Factors......Page 218
18.1.5 Enterprise Device Requirements......Page 219
18.1.6 Evaluation Matrix......Page 220
18.1.7 Protecting the Enterprise from BYOD......Page 222
18.2.1 Device Registry......Page 223
18.2.2 IoT Devices......Page 227
18.2.3.1 Monitoring and Reporting......Page 229
18.2.3.3 Fulfilling Requests for Data......Page 230
18.2.4 Endpoint Device Management Summary......Page 231
ELS Extensions – Other Topics......Page 232
19.2 Related Work......Page 234
19.3 ELS Agent Methods......Page 235
19.4.1 Mobile Device Management (MDM) Agents......Page 236
19.4.2 Monitoring Agents......Page 240
19.4.3 Log Aggregation Agents......Page 241
19.4.5 Import and Mediation Agents......Page 242
19.6 Endpoint Agent Extensions......Page 243
20.1 Introduction......Page 244
20.2 Communication Models......Page 246
20.3.1 The Transmission Control Protocol......Page 247
20.4 Threats Considered......Page 248
20.5 Assigning Ports and Protocols......Page 249
20.7 Firewalls and Port Blocking......Page 250
20.8 Application Firewalls......Page 251
20.10 Endpoint Protection in ELS......Page 252
20.12 Additional Security Hardening......Page 256
21.1.2 Disadvantages of Asynchronous Communication......Page 258
21.2.4 Emerging Standard......Page 259
21.3.1 Security for Server Brokered Invocation......Page 261
21.3.2 Security for Publish-Subscribe Systems (PSS)......Page 262
21.4.1 Claims for Targeted Content (PSS)......Page 263
21.4.3 Retrieving Content for Unknown Claimants......Page 265
21.4.4 Adjusting Publishing Targets (Untrusted PSS)......Page 266
21.4.5 Distribution of Burdens......Page 267
21.5 Summary......Page 268
22.1 Introduction......Page 270
22.2 Enterprise Level Security and VADC Concepts......Page 271
22.3 VADC Implementation......Page 273
22.4 Resource Utilization......Page 276
22.5 Distributed Benefits and Challenges......Page 280
22.6 Virtual Application Data Center Conclusions......Page 282
23.2.1 The Expert......Page 284
23.2.3 The Vendor......Page 285
23.3 The Vision......Page 286
23.4 Realizing the Vision......Page 289
23.6 Managing Information Technology Changes......Page 293
24.2 The Model is Important......Page 294
24.4.1 Need for Speed......Page 295
24.6 Future Directions......Page 297
References......Page 300
Acronyms......Page 322
Index......Page 326

✦ Subjects


Computer networks--Security measures;COMPUTERS / Cryptography;COMPUTERS / Groupware;Industries--Security measures;Electronic books;Computer networks -- Security measures;Industries -- Security measures


πŸ“œ SIMILAR VOLUMES


Enterprise Level Security 2: Advanced Te
✍ Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a di

Food Security in an Uncertain World: An
✍ Andrew Schmitz, P. Lynn Kennedy, Troy G. Schmitz πŸ“‚ Library πŸ“… 2015 πŸ› Emerald Group Publishing 🌐 English

International trade agreements are central to food security. The links between trade and the four dimensions in food security (availability, access, utilization, and stability) are examined. Freer trade in agricultural products provides additional food security. This is bolstered by factors such as

Enterprise Level Security
✍ Simpson, William Randolph πŸ“‚ Library πŸ“… 2016 πŸ› CRC Press, Auerbach Publications 🌐 English

<P><STRONG>Enterprise Level Security: Securing Information Systems in an Uncertain World</STRONG> provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses

Beyond fear: thinking sensibility about
✍ Schneier, Bruce πŸ“‚ Library πŸ“… 2006;2003 πŸ› Copernicus Books 🌐 English

In "Beyond Fear," Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes