linux operating commands and unix operating commands

A Matter of Integrity


 
Thread Tools Search this Thread
# 1  
Old 05-29-2008
A Matter of Integrity

Protecting information confidentiality, integrity, and availability is the mantra of the modern information system security professional. We know this as the CIA Triad. It is surprising to me that we don't seem to fully support all three of these security services. Confidentiality is clearly important. We want to protect our assets from exposures. We exclaim the need for encryption and access control to prevent unauthorized access to sensitive information. We also understand the need for availability. A system which is unplugged, encased in concrete and stored in a vault might be secure, but it is not very useable or available. But, what can we say about integrity? I think insufficient attention is given to this most important service.

The integrity service is apparent in a system when controls are in place which prevents unauthorized changes to information or the system. Unauthorized changes to information include undesired overwriting or deleting of important documents. Changes to system parameters include modification to configuration files, but is that all? I believe we should also consider any processes executing on a system to also be identified as a system parameter. Since most systems rely upon discretionary access control (DAC), processes executing in the context of a user could make any number of changes to the system according to their privileges. Given this line of thought, executing process becomes a factor regarding system integrity.

Weaknesses in integrity can be used to circumvent controls protecting information confidentiality. Similarly, a lack of integrity can quickly lead to a loss of availability. This is frequently experienced in the presence of malware. Confidentiality and availability are voided in the presence of this type of unauthorized software. Spyware can steal keystrokes or files from a system. Trojans open backdoors and allow unauthorized access to a system in the context of an account compromised. Thus, a failure in integrity will, in many cases, cause a breach in confidentiality and availability.

All malware exhibits itself, one way or another, through a thread of execution on a system. However, our tools at detecting malware have limitations. Anti-malware tools are only as good as their signature database or their ability to detect anomalous behavior. Given this position, our first line of defense against breaches to system integrity involves preventing the execution of unauthorized processes. Since we cannot always determine if a given process is malicious or not, we should simply stop those processes which are not authorized from executing at all. This would include all software which is not authorized and validated to run on the system. For instance, individuals should be prohibited from running executables, screensavers, or other tools which have not been previously validated by the security and/or operations staff.

Some may perceive this viewpoint as Draconian. Indeed, it is. The implications are far reaching. Especially, when we consider mobile code and Web 2.0. However, how can we imply that the CIA Triad is supported by a system when it can easily be circumvented by unauthorized processes? If we do not fully enforce system integrity then we have little hope of enabling the other security services as well. Integrity cannot be preserved when unauthorized process are allowed to execute in a DAC environment.

Part of that process involves the testing of new software for the system. Preventing the execution of unauthorized processes supports IT Governance laws and regulations. Thus, this should not be an issue for corporate and government agencies. Smaller organizations might have fewer regulations to worry about, but their operational risk of not enforcing system integrity will most certainly be elevated.

More surprising, I have also encountered security professionals which also feel that allowing the execution of unauthorized processes is an acceptable business practice. Perhaps this is true in some environments. However, it is difficult to conclude that a system allowing the execution of unauthorized software will have sufficient countermeasures in place to guard against the loss of information confidentiality or system availability. Accurately measuring and validating a system's information assurance is problematic when unauthorized processes are allowed to run with little or no constraints.



As security professionals, we should have the integrity to point out the risks involved with allowing the execution of unauthorized processes to system managers. Although they may choose a dangerous path, it is incumbent upon us as to point out the risk involved with allowing this activity and advocate the need to prevent the execution of unauthorized processes.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Code that has to end no matter what

Since this is maxxing out my CPU, is there anything I can add that will make sure stress always ends? echo "CPU Stress Test" >> CPU_Stress_Test.txt echo "stress --cpu 8 --io 4 --vm 2 --vm-bytes 128M --timeout 1m" >> CPU_Stress_Test.txt echo >> CPU_Stress_Test.txt date +"%Y-%m-%d-%H-%M" >>... (9 Replies)
Discussion started by: drew77
9 Replies

2. UNIX for Dummies Questions & Answers

Integrity check for the backup

Hello I thought of different ways of integrity check for the backup and look for the fastest approach to start programming. in all these approaches randomness is used. I would appreciate if someone give more suggestions or correct me. 1- Machine Name Check We can check if the machines were... (5 Replies)
Discussion started by: frhling
5 Replies

3. UNIX for Dummies Questions & Answers

Strange system activity no matter what I try

When I choose to encrypt my drive during a Linux install, it encryps it, but I receive errors in dmesg and in ~/.xsessions-errors during use. The first error is in dmesg where it sometimes shows errors writing to the encypted device. The second error is in ~/.xsessions-errors with an error about... (0 Replies)
Discussion started by: justgoogleit
0 Replies

4. Shell Programming and Scripting

grep matter between braces

#include<header.h> void classname :: pvvd_init ( abcd ,efgh ,ijkl ,mnop ) { rvcl_tabl_name_tabl.pvvd_init ( xxxx ,"tabl_mame" ) ; ... (2 Replies)
Discussion started by: ultimatix
2 Replies

5. Shell Programming and Scripting

Terminal to the front no matter what

Is there a way to bring the terminal script to the front? I am running this script through OMCEdit which is then running it through Terminal. I have some dialog boxes (using osascript) and the dialog boxes are not coming to the front...Terminal bounces and I have to click on Terminal to see the... (1 Reply)
Discussion started by: mainegate
1 Replies

6. Solaris

File Integrity Check

Hi, I have two NFS shares mounted on a solaris system. share1 and share2 , both are from different NFS servers share1 has 500GB of data share 2 is empty. I am copying all the data from share1 to share2. It is like migrating the data from one NFS share to another. Is there... (8 Replies)
Discussion started by: athreyavc
8 Replies

7. Shell Programming and Scripting

How to delete matter in between two lines

help I am having text file like this... ------------------------END OF UPDATION ------------------ xxxxxxxxxxxxxxxxxxxxxxxxx yyyyyyyyyyyyyyyyyyyyy yyyyyyyyyyyyyyyyyyyyy 1 row updated ------------------------END OF UPDATION ------------------ TTTTTTTTTTTTTTTT FFFFFFFFFFFFFFFFF ... (3 Replies)
Discussion started by: suryanarayana
3 Replies

8. Linux

Need help with this matter

I have a PC that was built in Europe pre-installed with Windows 2000. The HDD is 40GB, but, its split up as two 20GB (Taken up by Windows). I want to take over my Mandrake 9.1 CDs and install Linux on that machine. My question is, how would I proceed to install Linux this way??? Now, If... (1 Reply)
Discussion started by: wardialer
1 Replies
Login or Register to Ask a Question