Figure 2: The MILS architecture distinguishes three security zones
The lowest level is the hardware with further platform and security modules. Level 2 contains the separation kernel, which controls all communication in the system and allocates computing time and memory access to the individual applications. Only it is privileged for hardware management access and is considered trustworthy with regard to security. All other modules of the second level system software are also trustworthy, but not privileged for direct hardware management access. They are used to configure and organize the overall system and monitor its functionality. All applications running in user mode are considered untrustworthy and are assigned to the third level.
The MILS concept formulates the consistent and uniform implementation of several security policies for the separation kernel in order to secure and maintain the trustworthiness of the system. The separation kernel is the element, which enables compositional security certification. The separation kernel itself shall be certified to be able to enforce these security policies with the required assurance (e.g. Evaluation Assurance Levels of ISO/IEC 15408). These security policies of the separation kernel are enforced by security functions whose implementation is reduced to an absolute minimum so that their evaluation and certification remains possible. They include, but are not limited to
- Information flow: The separation kernel must enable and control the information flow between hardware, system software and applications;
- Data isolation: The separation kernel isolates the memory areas and resources allocated to each application;
- Clean CPU registers: The separation kernel deletes all entries in the CPU registers before another application is allowed to use the CPU;
- Limitation of damage: The separation kernel limits malfunctions of an application to its partition. All other applications, the system software and the separation kernel itself are not affected.
A MILS platform has to be non-bypassable, evaluable, always invoked, and tamperproof (NEAT) in order to provide the required high level of security.
MILS in Railway Applications
In railway applications, communication systems usually follow the CENELEC EN 50159 standard which defines safety-related communication in transmission systems. It also contains some security elements by defining cryptographic techniques as well as cryptographic architectures required for open network communication. Currently, the CENELEC EN 50129 standard, defining mostly safety-related electronic systems for signaling, does not explicitly contain security elements or quality metrics but still, the integrity of system is paramount due to safety requirements. In this sense, security can be interpreted equivalently through ensuring the integrity of the system.
However, there exist relevant emerging standards on security in railway: such as VDE 0831-102 and VDE 0831-104 both being still in pre-phase, as well as the emerging IEC 62443. Still, up to now customers have to provide their own security requirements which are usually formulated at a high level. This effect generates very heterogeneous security requirements throughout the railway market, which can be burdensome for suppliers as well as certification authorities.
While originally developed and applied in military and avionic applications, the MILS concept is also entirely suitable to ease that pain in the railway industry. One of the main targets of certMILS is to apply relevant security standards in the railway domain to foster homogenization of security requirements and help customers provide a conformant level of security in their products. Just like in the safety domain, the goal is to provide guidance for security building blocks, which can be integrated into complex systems using secure gateways for communication. In this way, the integrity of the system can be ensured from a security point of view. Furthermore, security gateways based on certified MILS Platforms will demonstrate modular security and reach high security levels.
certMILS and Subways
Subway management today is based on a three-level model per the EN 62290 standard (Figure 3).