Network Security - network security models—Bell-LaPadula, Biba, and Clark-Wilson:
1. Bell-LaPadula Model (BLP)
Purpose:
-
Focuses on confidentiality in government and military systems.
-
Ensures that secret information is not leaked to unauthorized users.
Key Concepts:
-
Security Levels:
-
Classified as Top Secret > Secret > Confidential > Unclassified.
-
Users and data are assigned security levels.
-
-
Rules:
-
Simple Security Property (“no read up”):
-
A subject (user) cannot read data at a higher security level.
-
Example: A Secret-level user cannot read Top Secret data.
-
-
Star (*) Property (“no write down”):
-
A subject cannot write information to a lower security level, preventing data leakage.
-
Example: A Top Secret user cannot write Top Secret info to a Secret document.
-
-
Strength:
-
Strongly protects confidentiality.
Limitation:
-
Does not enforce integrity.
-
Cannot prevent authorized users from corrupting data at their level.
Use Case:
-
Military or government systems handling classified information.
2. Biba Model
Purpose:
-
Focuses on integrity rather than confidentiality.
-
Ensures that data is not improperly modified, either intentionally or accidentally.
Key Concepts:
-
Integrity Levels:
-
Data and users are assigned levels like High, Medium, Low based on trustworthiness.
-
-
Rules:
-
Simple Integrity Property (“no read down”):
-
A subject cannot read data at a lower integrity level.
-
Prevents a high-integrity user from reading unreliable data.
-
-
Star (*) Integrity Property (“no write up”):
-
A subject cannot write data to a higher integrity level.
-
Prevents low-integrity users from contaminating high-integrity data.
-
-
Strength:
-
Strongly protects data integrity.
Limitation:
-
Does not protect confidentiality.
Use Case:
-
Financial systems, e.g., banking or accounting software, where data accuracy is critical.
3. Clark-Wilson Model
Purpose:
-
Focuses on integrity through well-formed transactions and controlled access.
-
Designed for commercial applications rather than military systems.
Key Concepts:
-
Well-formed Transactions:
-
Data can only be modified using authorized programs, called Transformation Procedures (TPs).
-
Prevents unauthorized changes to data.
-
-
Separation of Duties:
-
Different users have different roles to prevent fraud or errors.
-
Example: One person can create a transaction, another must approve it.
-
-
Constrained Data Items (CDIs):
-
Critical data that requires controlled access.
-
Can only be accessed through TPs.
-
-
Certification & Enforcement Rules:
-
Rules ensure that only valid transactions occur.
-
Prevents users from bypassing security controls.
-
Strength:
-
Ensures data integrity in commercial systems.
-
Prevents fraud through separation of duties and controlled processes.
Use Case:
-
Banking, payroll, e-commerce, and enterprise systems where data integrity and process control are critical.