Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us
No Result
View All Result
No Result
View All Result
Home Supply Chain Updates

Inherently secure systems mitigate software supply chain attacks — GCN

usscmc by usscmc
March 1, 2021
Inherently secure systems mitigate software supply chain attacks — GCN
Share on FacebookShare on Twitter

layered cybersecurity (PATTYARIYA/Shutterstock.com)

INDUSTRY INSIGHT

Inherently secure systems mitigate software supply chain attacks

  • By Roger R. Schell
  • Mar 01, 2021

The supply chain cybersecurity problem can be solved with inherently secure engineering. Current futile efforts to keep an adversary out of a system can be replaced by a secure architecture that dramatically constrains the ability of an adversary who planted attacks (e.g., Trojan horses) inside a system to compromise sensitive information.  Below is a brief analysis of how a Trusted Computer System Evaluation Criteria (TCSEC) Class A1 operating system would solve the four specific cybersecurity vulnerabilities experts say were exploited in the SolarWinds attack. Even if implemented after such an attack, the properly configured Class A1 OS prevents exfiltration of information.

Vulnerability #1: Lack of a threat model for mitigating software subversion attack.  “I don’t k-now of any organization that incorporates what a supply chain attack would look like in their environment from a threat modeling perspective,” David Kennedy, former National Security Agency (NSA) hacker and founder of security consulting firm TrustedSec, told CSO. “This is not a discussion that’s happening in security today.”

Class A1 OS solves this.  Addressing supply chain attacks is a raison d’etre for TCSEC Class A1. Because commercial OSs were developed by uncleared personnel, NSA created security criteria and evaluation procedures known as TCSEC Class A1. Class A1 is so rigorous that it would enable NSA to buy an OS from even the KGB (now the SVR), according to George Cotter, founding director of the National Computer Security Center. Class A1 substantially addresses subversion (SP 800-160), and TCSEC has at least eight specific requirements unique to Class A1 to defeat software subversion (i.e., supply chain) attacks.

Vulnerability #2: Pervasive impact on deployments due to a failure to keep the adversary out.  “An attacker could literally select any target that has their product deployed,” Kennedy said.

Class A1 OS solves this.  Pervasive mitigation from a single Class A1 device embodies a Class A1 OS with trusted distribution for wide availability.  Failure at a single installation (e.g., swapped Ethernet cables, or modification of hardware) does not invalidate the Class A1 device’s ability to defeat subversion for other deployments. 

Vulnerability #3: No security categorization for which to enforce mandatory access control policy.  “Not every user or device should be able to access any application or server on the network,” Kennedy continued. Exploiting the lack of categorization was key to the SolarWinds attack, however. The vague, mushy advice that “companies should try to put controls in place that would minimize the impact” the article advocates is hardly actionable mitigation.

Class A1 OS solves this.  Class A1 defines mandatory access controls with mathematical precision and is applicable to many specific categorization policies for users and devices such that it is scientifically possible to put in place systematically enforceable controls. A Class A1 device can be configured for the specific categorization policy of an infrastructure or deployment in a trustworthy and inspectable manner. This effort can benefit from the long-recognized need described in FIPS 199 “for categorizing federal information and information systems according to an agency’s level of concern for confidentiality, integrity, and availability and the potential impact on agency assets and operations should their information and information systems be compromised through unauthorized access, use, disclosure, disruption, modification, or destruction.”  The MAC policy has a formal security policy model with a mathematical proof that no Trojan horse (no matter how ingeniously designed and surreptitiously inserted) can cause information flow in violation of the configured Class A1 OS policy.

Vulnerability #4: Cannot verify that no backdoor exists or remains.  “Software supply-chain attacks are some of the hardest type of threats to prevent,” CSO said.  “It’s likely that the number of software supply-chain attacks will increase in the future, especially as other attackers see how successful and wide ranging they can be.” According to security expert and Harvard fellow Bruce Schneier, the only way to be sure a network is clean is “to burn it down to the ground and rebuild it.” Former homeland security adviser Thomas Bossert agreed. “A ‘do over’ is mandatory and entire new networks need to be built,” he wrote in the New York Times. To start over, however, would take decades and many billions, and there would be little basis for confidence that some clever adversary’s attack was not already somewhere in the massive attack surface of the rebuilt software.

Class A1 OS solves this. It renders previously implanted Trojan horses or “backdoors” that remain in application software incapable of exfiltrating data in violation of MAC it verifiably enforces. A Class A1 OS is also specifically designed and constructed so that evaluators can confirm that no backdoor or other malware exists in the OS itself. “The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable,” wrote Mark Heckman, professor of computer science and cyber security at University of San Diego. “Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction . . . repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.” He is specifically talking about Class A1 OS.  Its maturity is demonstrated by at least a half dozen security kernel-based OSs running for years in the face of nation-state adversaries without a single reported security patch.  NIST 800-160 recently highlighted examples of “systems that have been verified to be highly resistant to penetration from determined adversaries.”

“The magnitude of this national security breach is hard to overstate,” Bossert said. But we should not be surprised by this sort of attack, as it is the nearly inevitable consequence of the lack of action for many years.  The concern for this eventuality was clearly stated by former NSA Director Lt. Gen. Lincoln Faurer in 2007 when he provided the following conclusion to seniors at NSA:

“Our team remains convinced that an IC disaster looms (e.g., we discover that an unfriendly state has obtained access to our most sensitive information) unless we proceed post haste to implement what NSA previously defined as a Class A1 Trusted Computing Base (TCB) in our sensitive network components and our electronic credentials. We believe the urgency of this need demands that the first set of solutions directly leverage the designs, architectures and rating maintenance plans which NSA has previously evaluated at the Class A1 level of assurance, as this is the only practical way to be confident the needed solutions can be operationally deployed in the next couple of years.”

About the Author



Roger R. Schell is president of Aesec Corporation, a firm that offers to OEMs and supports the commercial GEMSOS security kernel previously evaluated by NSA at Class A1.



usscmc

usscmc

No Result
View All Result

Recent Posts

  • How Hapag Lloyd captured a major market share in the Container Shipping Industry in USA
  • Why USA’s East Coast is the Favorite Destination for Manufacturing Companies
  • How Trade Relations Between the USA and UK Improved After Keir Starmer Became Prime Minister
  • Tips and Tricks for Procurement Managers to Handle Their Supplier Woes
  • The Crazy Supply Chain of Walmart Spanning Across the Globe

Recent Comments

  • Top 5 Supply Chain Certifications that are in high demand | Top 5 Certifications on Top 5 Globally Recognized Supply Chain Certifications
  • 3 Best Procurement Certifications that are most valuable | Procurement Newz on Top 5 Globally Recognized Supply Chain Certifications

Archives

  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • September 2019

Categories

  • Global News
  • Supply Chain Updates

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Antispam
  • Contact Us
  • Disclaimer
  • Home
  • Privacy Policy
  • Terms of Use

© 2024 www.usscmc.com

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • Supply Chain Updates
  • Global News
  • Contact Us

© 2024 www.usscmc.com