Multiple Independent Levels of Security explained

Multiple Independent Levels of Security/Safety (MILS) is a high-assurance security architecture based on the concepts of separation[1] and controlled information flow. It is implemented by separation mechanisms that support both untrusted and trustworthy components; ensuring that the total security solution is non-bypassable, evaluatable, always invoked, and tamperproof.

Overview

A MILS solution allows for independent evaluation of security components and trusted composition.[2] [3] MILS builds on the older Bell and La Padula theories on secure systems that represent the foundational theories of the DoD Orange Book.

A MILS system employs one or more separation mechanisms (e.g., Separation kernel, Partitioning Communication System, physical separation) to maintain assured data and process separation. A MILS system supports enforcement of one or more application/system specific security policies by authorizing information flow only between components in the same security domain or through trustworthy security monitors (e.g., access control guards, downgraders, crypto devices, etc.).

NEAT

Properties:

A convenient acronym for these characteristics is NEAT.

Trustworthiness

'Trustworthy' means that the component have been certified to satisfy well defined security policies to a level of assurance commensurate with the level of risk for that component (e.g., we can have single level access control guards evaluated at CC EAL4; separation mechanisms evaluated at High Robustness; two-level separation guards at EAL 5; and TYPE I crypto all in the same MILS system).

'Untrusted' means that we have no confidence that the system meets its specification with respect to the security policy.

Companies

The following companies have MILS separation kernel products:

Companies with other separation methods creating MILS products:

MILS Research and Technology

The MILS Community
Research Projects

See also

References

Notes and References

  1. John Rushby. Design and Verification of Secure Systems. 1981. Proc. 8th ACM Symposium on Operating System Principles. 12 - 21.
  2. W. S. Harrison . N. Hanebutte . P. Oman . J. Alves-Foss . The MILS Architecture for a Secure Global Information Grid. October 2005. CrossTalk. 18. 10. 20 - 24. https://web.archive.org/web/20121203172008/http://www.crosstalkonline.org/storage/issue-archives/2005/200510/200510-Harrison.pdf . 2012-12-03 .
  3. Alves-Foss, W. S. Harrison, P. Oman and C. Taylor. The MILS Architecture for High Assurance Embedded Systems. 2007. International Journal of Embedded Systems. 2. 3/4. 239–247. 10.1504/IJES.2006.014859. 10.1.1.76.6810.
  4. http://wiki.ok-labs.com/DevelopOKLinuxApp?highlight=%28oklinux%29
  5. Web site: SeL4 (Secure Embedded L4) | SSRG | NICTA . 2014-05-17 . 2014-04-10 . https://web.archive.org/web/20140410023153/http://ssrg.nicta.com.au/projects/seL4/ . dead .
  6. Web site: Martello.