1.. _secure code: 2 3Secure Coding 4############# 5 6Traditionally, microcontroller-based systems have not placed much 7emphasis on security. 8They have usually been thought of as isolated, disconnected 9from the world, and not very vulnerable, just because of the 10difficulty in accessing them. The Internet of Things has changed 11this. Now, code running on small microcontrollers often has access to 12the internet, or at least to other devices (that may themselves have 13vulnerabilities). Given the volume they are often deployed at, 14uncontrolled access can be devastating [#attackf]_. 15 16This document describes the requirements and process for ensuring 17security is addressed within the Zephyr project. All code submitted 18should comply with these principles. 19 20Much of this document comes from [CIIBPB]_. 21 22Introduction and Scope 23********************** 24 25This document covers guidelines for the `Zephyr Project`_, from a 26security perspective. Many of the ideas contained herein are captured 27from other open source efforts. 28 29.. todo: Reference main document here 30 31.. _Zephyr Project: https://www.zephyrproject.org/ 32 33We begin with an overview of secure design as it relates to 34Zephyr. This is followed by 35a section on `Secure development knowledge`_, which 36gives basic requirements that a developer working on the project will 37need to have. This section gives references to other security 38documents, and full details of how to write secure software are beyond 39the scope of this document. This section also describes 40vulnerability knowledge that at least one of the primary developers 41should have. This knowledge will be necessary for the review process 42described below this. 43 44Following this is a description of the review process used to 45incorporate changes into the Zephyr codebase. This is followed by 46documentation about how security-sensitive issues are handled by the 47project. 48 49Finally, the document covers how changes are to be made to this 50document. 51 52Secure Coding 53************* 54 55Designing an open software system such as Zephyr to be secure requires 56adhering to a defined set of design standards. In [SALT75]_, the following, 57widely accepted principles for protection mechanisms are defined to 58help prevent security violations and limit their impact: 59 60- **Open design** as a design guideline incorporates the maxim that 61 protection mechanisms cannot be kept secret on any system in 62 widespread use. Instead of relying on secret, custom-tailored 63 security measures, publicly accepted cryptographic algorithms and 64 well established cryptographic libraries shall be used. 65 66- **Economy of mechanism** specifies that the underlying design of a 67 system shall be kept as simple and small as possible. In the context 68 of the Zephyr project, this can be realized, e.g., by modular code 69 [PAUL09]_ and abstracted APIs. 70 71- **Complete mediation** requires that each access to every object and 72 process needs to be authenticated first. Mechanisms to store access 73 conditions shall be avoided if possible. 74 75- **Fail-safe defaults** defines that access is restricted by default 76 and permitted only in specific conditions defined by the system 77 protection scheme, e.g., after successful authentication. 78 Furthermore, default settings for services shall be chosen in a way 79 to provide maximum security. This corresponds to the "Secure by 80 Default" paradigm [MS12]_. 81 82- **Separation of privilege** is the principle that two conditions or 83 more need to be satisfied before access is granted. In the context 84 of the Zephyr project, this could encompass split keys [PAUL09]_. 85 86- **Least privilege** describes an access model in which each user, 87 program, and thread, shall have the smallest possible subset 88 of permissions in the system required to perform their task. This 89 positive security model aims to minimize the attack surface of the 90 system. 91 92- **Least common mechanism** specifies that mechanisms common to more 93 than one user or process shall not be shared if not strictly 94 required. The example given in [SALT75]_ is a function that should be 95 implemented as a shared library executed by each user and not as a 96 supervisor procedure shared by all users. 97 98- **Psychological acceptability** requires that security features are 99 easy to use by the developers in order to ensure their usage and the 100 correctness of its application. 101 102In addition to these general principles, the following points are 103specific to the development of a secure RTOS: 104 105- **Complementary Security/Defense in Depth**: do not rely on a single 106 threat mitigation approach. In case of the complementary security 107 approach, parts of the threat mitigation are performed by the 108 underlying platform. In case such mechanisms are not provided by the 109 platform, or are not trusted, a defense in depth [MS12]_ paradigm 110 shall be used. 111 112- **Less commonly used services off by default**: to reduce the 113 exposure of the system to potential attacks, features or services 114 shall not be enabled by default if they are only rarely used (a 115 threshold of 80% is given in [MS12]_). For the Zephyr project, this can 116 be realized using the configuration management. Each functionality 117 and module shall be represented as a configuration option and needs 118 to be explicitly enabled. Then, all features, protocols, and drivers 119 not required for a particular use case can be disabled. The user 120 shall be notified if low-level options and APIs are enabled but not 121 used by the application. 122 123- **Change management**: to guarantee a traceability of changes to the 124 system, each change shall follow a specified process including a 125 change request, impact analysis, ratification, implementation, and 126 validation phase. In each stage, appropriate documentation shall be 127 provided. All commits shall be related to a bug report or change 128 request in the issue tracker. Commits without a valid reference 129 shall be denied. 130 131Secure development knowledge 132**************************** 133 134Secure designer 135=============== 136 137The Zephyr project must have at least one primary developer who knows 138how to design secure software. 139 140This requires understanding the following design principles, 141including the 8 principles from [SALT75]_: 142 143- economy of mechanism (keep the design as simple and small as 144 practical, e.g., by adopting sweeping simplifications) 145 146- fail-safe defaults (access decisions shall deny by default, and 147 projects' installation shall be secure by default) 148 149- complete mediation (every access that might be limited must be 150 checked for authority and be non-bypassable) 151 152.. todo: Explain better the constraints of embedded devices, and that 153 we typically do edge detection, not at each function. Perhaps 154 relate this to input validation below. 155 156- open design (security mechanisms should not depend on attacker 157 ignorance of its design, but instead on more easily protected and 158 changed information like keys and passwords) 159 160- separation of privilege (ideally, access to important objects should 161 depend on more than one condition, so that defeating one protection 162 system won't enable complete access. For example, multi-factor 163 authentication, such as requiring both a password and a hardware 164 token, is stronger than single-factor authentication) 165 166- least privilege (processes should operate with the least privilege 167 necessary) 168 169- least common mechanism (the design should minimize the mechanisms 170 common to more than one user and depended on by all users, e.g., 171 directories for temporary files) 172 173- psychological acceptability (the human interface must be designed 174 for ease of use - designing for "least astonishment" can help) 175 176- limited attack surface (the set of the 177 different points where an attacker can try to enter or extract data) 178 179- input validation with whitelists (inputs should typically be checked 180 to determine if they are valid before they are accepted; this 181 validation should use whitelists (which only accept known-good 182 values), not blacklists (which attempt to list known-bad values)). 183 184Vulnerability Knowledge 185======================= 186 187A "primary developer" in a project is anyone who is familiar with the 188project's code base, is comfortable making changes to it, and is 189acknowledged as such by most other participants in the project. A 190primary developer would typically make a number of contributions over 191the past year (via code, documentation, or answering questions). 192Developers would typically be considered primary developers if they 193initiated the project (and have not left the project more than three 194years ago), have the option of receiving information on a private 195vulnerability reporting channel (if there is one), can accept commits 196on behalf of the project, or perform final releases of the project 197software. If there is only one developer, that individual is the 198primary developer. 199 200At least one of the primary developers **must** know of common kinds of 201errors that lead to vulnerabilities in this kind of software, as well 202as at least one method to counter or mitigate each of them. 203 204Examples (depending on the type of software) include SQL 205injection, OS injection, classic buffer overflow, cross-site 206scripting, missing authentication, and missing authorization. See the 207`CWE/SANS top 25`_ or `OWASP Top 10`_ for commonly used lists. 208 209.. Turn this into something specific. Can we find examples of 210 mistakes. Perhaps an example of things Coverity has sent us. 211 212.. _CWE/SANS top 25: http://cwe.mitre.org/top25/ 213 214.. _OWASP Top 10: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project 215 216Zephyr Security Subcommittee 217============================ 218 219There shall be a "Zephyr Security Subcommittee", responsible for 220enforcing this guideline, monitoring reviews, and improving these 221guidelines. 222 223This team will be established according to the Zephyr Project charter. 224 225Code Review 226*********** 227 228The Zephyr project shall use a code review system that all changes are 229required to go through. Each change shall be reviewed by at least one 230primary developer that is not the author of the change. This 231developer shall determine if this change affects the security of the 232system (based on their general understanding of security), and if so, 233shall request the developer with vulnerability knowledge, or the 234secure designer to also review the code. Any of these individuals 235shall have the ability to block the change from being merged into the 236mainline code until the security issues have been addressed. 237 238Issues and Bug Tracking 239*********************** 240 241The Zephyr project shall have an issue tracking system (such as JIRA_) 242that can be used to record and track defects that are found in the 243system. 244 245.. _JIRA: https://www.atlassian.com/software/jira 246 247Because security issues are often sensitive, this issue tracking 248system shall have a field to indicate a security issue. Setting this 249field shall result in the issue only being visible to the Zephyr Security 250Subcommittee. In addition, there shall be a 251field to allow the Zephyr Security Subcommittee to add additional users that will 252have visibility to a given issue. 253 254This embargo, or limited visibility, shall only be for a fixed 255duration, with a default being a project-decided value. However, 256because security considerations are often external to the Zephyr 257project itself, it may be necessary to increase this embargo time. 258The time necessary shall be clearly annotated in the issue itself. 259 260The list of issues shall be reviewed at least once a month by the 261Zephyr Security Subcommittee. This review should focus on 262tracking the fixes, determining if any external parties need to be 263notified or involved, and determining when to lift the embargo on the 264issue. The embargo should **not** be lifted via an automated means, but 265the review team should avoid unnecessary delay in lifting issues that 266have been resolved. 267 268Modifications to This Document 269****************************** 270 271Changes to this document shall be reviewed by the Zephyr Security Subcommittee, 272and approved by consensus. 273 274.. [#attackf] An attack_ resulted in a significant portion of DNS 275 infrastructure being taken down. 276 277.. _attack: http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained 278