Traditional MAC • Feed security policy models derived from government clearance/classification system
5
Traditional MAC: Gaps • Required trusted subjects that could override the security model • Ladied a mechanism to effectively contine and protect the trusted
6
Type Enforcement (TE)
7
TE vs Traditional MAC
8
Flexible MAC Architecture
9
DTOS Approach to MAC: Benefits • Assurable implementation
10
Flask & Dynamic Security Policies
11
Going Mainstream: SE Linux
12
SELinux Flask in a Monolithic Kernel
13
SELinux Flask in Linux Userspace
14
Branching Out: SE BSD and SE Darwin
15
Android: MAC applied
16
MAC meets Virtualization
17
Hypervisors: Microkernels Revisited
18
SVP: MAC in a system architecture
19
MAC Futures • Advancing usability without sacrificing security . Composing MAC models Distributed MAC enforcement and management
Description:
Explore a comprehensive retrospective on 26 years of Flexible Mandatory Access Control (MAC) development and implementation. Delve into the background, motivation, and evolution of MAC architecture through various research systems. Learn about the process of integrating flexible MAC into mainstream systems, its application to mobile platforms, and its role in secure virtualization. Examine the impact of this work on MAC in mainstream systems and discover ongoing efforts to bring MAC to emerging operating systems. Gain insights into the history, lessons learned, and future directions of MAC technology from Stephen Smalley's extensive experience at the National Security Agency.
Retrospective - 26 Years of Flexible Mandatory Access Control