Meri Leeworthy

The OSI security architecture

Securing a computing system from an attacker is not a simple task given the nature of computing systems and the number of ways an attacker can take towards compromising a system. Compounding this further is when we introduce a host of computing systems that reside within a single or multiple networks.

The scale of securing these devices can prove to be a mammoth task. As such, in order to ensure that no aspects are overlooked or missed out on when securing these systems, it is vital for organisations to have a plan that clearly outlines the various aspects that need to be addressed as part of a larger plan.

The Open System Interconnect (OSI) Security Architecture, recommendation X.800 (The international telegraph and telephone consultative committee Geneva, 1991), provides a systematic way towards securing computing systems within a corporate environment. This is an internationally recognised standard that has been adopted by industry with various vendors providing products that comply with these standards for security. The OSI security architecture outlines three main aspects that an administrator needs to focus on in order to secure a computing system. These include:

Security services

The OSI security architecture divides security services into six main categories, which are outlined below.

Authentication

This service provides the assurance that the communication occurring between two systems is authentic. For single messages, the service must ensure the receiver is confident that the sender of the message is authentic. For ongoing communications, the service must first ensure that both sender and receiver are authentic prior to initiating the communications, and during the communication process must ensure that no interference can occur. The OSI security architecture further outlines two authentication services:

Access control

This service aims to control the access to systems and resources that a system could try to connect to during a communication. In order to enforce access control, the requesting system must be identified to be who they say they are, and then provide the required authentication to access the resource.

Data confidentiality

This service aims to protect the communication from being passively sniffed or replayed. The service ensures that no listener should be able to identify any aspect of the communication, such as the source, destination, frequency, etc.

Data integrity

This service aims to protect the data stream between peers during a communication. The service ensures that the data transmitted is received as intended without any modifications, duplications, replays, or reordering.

Non-repudiation

This service aims to ensure accountability to both peers without either peer being able to deny the sending of a message.

Availability

This service aims to protect the system to ensure the system is always available when required. However, this service does require the use of other services in conjunction to ensure availability.

Security mechanisms

The OSI security architecture defines security mechanisms into two main categories.

Specific security mechanisms

These are mechanisms that are protocol-specific and must be implemented within a specific protocol layer. Some of the mechanisms that fall under this category are:

Pervasive security mechanisms

These are mechanisms that are not protocol-specific and do not need to be implemented within a specific protocol layer. Some of the mechanisms that fall under this category are:

It is imperative for anyone new to security to understand the basics of the OSI architecture. While we will explore OSI architecture in further detail, our main focus will be on one underlying commonality among some of the mechanisms outlined above—cryptography.

Next: Security - Functional requirements and design principles

I live and work on the land of the Wurundjeri people of the Kulin Nation. I pay respect to their elders past and present and acknowledge that sovereignty was never ceded. Always was, always will be Aboriginal land.

This site uses open source typefaces, including Sligoil by Ariel Martín Pérez, and Vercetti by Filippos Fragkogiannis