{"id":20384,"date":"2022-11-23T17:09:40","date_gmt":"2022-11-23T13:09:40","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/20384\/"},"modified":"2022-11-23T17:09:53","modified_gmt":"2022-11-23T13:09:53","slug":"how-to-create-cyberimmune-system","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/20384\/","title":{"rendered":"How to create a cyber immune system?"},"content":{"rendered":"<p>A new approach to protecting information systems is currently gaining popularity in the cybersecurity world: cyber immunity. Systems based on this approach need no antivirus since they\u2019re so well-protected that any hacking attempt would be too hard and prohibitively expensive to successfully carry out.<\/p>\n<p>Sounds too good to be true? Believe it or not, it\u2019s already becoming a reality. Let\u2019s explain in simple terms how exactly cyber immunity works in practice.<\/p>\n<p>We\u2019ll start with the concept of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Trusted_computing_base\" target=\"_blank\" rel=\"nofollow noopener\">trusted computing base<\/a> (TCB), which every information system must have. This is code that developers have no choice but to trust since it\u2019s used to implement security-critical components of the system. Since this code is so vital, to safeguard a system we must first ensure the security of its TCB. How? We suggest using the three following principles:\n<\/p>\n<ol>\n<li>Minimizing the TCB<\/li>\n<li>Isolating components from each other<\/li>\n<li>Maintaining strict control over all interactions of those components<\/li>\n<\/ol>\n<p>\nLet\u2019s look at these three principles in more detail.<\/p>\n<h2>1. Minimize the TCB<\/h2>\n<p>\nThe TCB should contain as few lines of code as possible. After all, the less code \u2013 the smaller the attack surface and the fewer vulnerabilities in it. For this reason, a cyber immune operating system needs a microkernel architecture.<\/p>\n<p>The most popular modern operating systems such as Windows and Linux were originally built with functionality and ease-of-development in mind, meaning they use a monolithic kernel, which is a major disadvantage. That\u2019s because such kernels contain all sorts of stuff \u2013 from interrupt control code to drivers. The result is millions of lines of code, with their number only growing from version to version.<\/p>\n<p>A microkernel, on the other hand, is limited to the mechanisms critical for operation, amounting to no more than a few tens of thousands of lines of code. Everything else (drivers, file systems, etc.) runs as services in user mode.<\/p>\n<p>According to a relevant <a href=\"https:\/\/trustworthy.systems\/publications\/csiro_full_text\/Biggs_LH_18.pdf\" target=\"_blank\" rel=\"nofollow noopener\">study<\/a>:\n<\/p>\n<ul>\n<li>96% of critical vulnerabilities in traditional operating systems would not be critical in a microkernel OS.<\/li>\n<li>Up to 40% of critical vulnerabilities would not be possible at all.<\/li>\n<li>57% of all vulnerabilities would be low severity.<\/li>\n<\/ul>\n<p>\nThus, microkernel implementation renders entire classes of cyberattacks obsolete by default.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170730\/how-to-create-cyberimmune-system-minimization-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170730\/how-to-create-cyberimmune-system-minimization-EN.jpg\" alt=\"Minimizing the TCB \" width=\"519\" height=\"465\" class=\"aligncenter size-full wp-image-46317\"><\/a><\/p>\n<h2>2. Isolate components from each other<\/h2>\n<p>\nA cyber immune system is heterogeneous. It\u2019s divided into specific security domains according to the code\u2019s level of trust, with all components isolated from each other by means of these domains. If any system component is hacked, the intruder won\u2019t be able to access neighboring ones and expand the attack through them. This makes it possible to use third-party components (for example, open-source code) without compromising the security of the system.<\/p>\n<p>Isolation significantly reduces both the cyber-risks involved and the labor costs required to create a secure system due to use of third-party code.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170746\/how-to-create-cyberimmune-system-isolation-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170746\/how-to-create-cyberimmune-system-isolation-EN.jpg\" alt=\"Isolating components from each other\" width=\"787\" height=\"750\" class=\"aligncenter size-full wp-image-46319\"><\/a><\/p>\n<h2>3. Control all interactions<\/h2>\n<p>\nAll interactions among system components are carefully controlled by a special module: the security monitor. The security monitor checks every interaction between components for compliance with the security policies. If an interaction is valid \u2013 it\u2019s allowed; if not \u2013 it\u2019s blocked. The potential attacker\u2019s capabilities are significantly reduced as a result.<\/p>\n<p>The security monitor concept is based on the widely-used <a href=\"https:\/\/en.wikipedia.org\/wiki\/FLASK\" target=\"_blank\" rel=\"nofollow noopener\">FLASK<\/a> architecture, which entails the separation of Policy Decision Points and Policy Enforcement Points.<\/p>\n<p>Using a security monitor eliminates the risk of entire classes of cyberattacks by ruling out any interactions that are not explicitly stated in the security policies.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170838\/how-to-create-cyberimmune-system-control-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170838\/how-to-create-cyberimmune-system-control-EN.jpg\" alt=\"Maintaining strict control over all interactions of components\" width=\"816\" height=\"297\" class=\"aligncenter size-full wp-image-46320\"><\/a><\/p>\n<p>Putting all three principles together, we get the following scheme:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170923\/how-to-create-cyberimmune-system-scheme-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2022\/11\/23170923\/how-to-create-cyberimmune-system-scheme-EN.jpg\" alt=\"Complete scheme\" width=\"409\" height=\"463\" class=\"aligncenter size-full wp-image-46321\"><\/a><\/p>\n<p>All entities are isolated, and they communicate with each other only through the microkernel \u2013 with such communication always checked for compliance with the security policies.<\/p>\n<p>It is these three principles that form the basis of our operating system \u2013 <a href=\"https:\/\/os.kaspersky.com\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=ae_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=ae_kdaily_organic_svfgv92uamkzgs1\" target=\"_blank\" rel=\"noopener nofollow\">KasperskyOS<\/a>. KasperskyOS is built upon its own microkernel (not Linux) with around 100,000 lines of code, and employs the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Multiple_Independent_Levels_of_Security\" target=\"_blank\" rel=\"nofollow noopener\">MILS<\/a> and FLASK architectural approaches to provide isolation and control of interactions. This makes KasperskyOS the perfect tool for creating cyber immune products.<\/p>\n<p>Cyber Immunity is no longer a sci-fi concept. The concept already underpins various products, such as cyber immune IoT gateways and cyber immune thin clients. And the list is only set to grow. Thus, the rapidly approaching future will become overall more secure. In the <a href=\"https:\/\/www.arcweb.com\/sites\/default\/files\/Documents\/client-sponsored\/best-practice-cyber-immunity-2022.pdf\" target=\"_blank\" rel=\"nofollow noopener\">words<\/a> of ARC Advisory Group: \u201cCyber Immunity can be the new foundation for how digital transformation can be implemented more securely.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is it possible to make a hack-proof system? <\/p>\n","protected":false},"author":2720,"featured_media":20386,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2178,1487],"class_list":{"0":"post-20384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-cyberimmunity","10":"tag-kasperskyos"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/20384\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-create-cyberimmune-system\/24882\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/27437\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-create-cyberimmune-system\/25223\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-create-cyberimmune-system\/34254\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-create-cyberimmune-system\/46314\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-create-cyberimmune-system\/25610\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-create-cyberimmune-system\/31268\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-create-cyberimmune-system\/30976\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cyberimmunity\/","name":"cyberimmunity"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2720"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20384"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20384\/revisions"}],"predecessor-version":[{"id":20385,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20384\/revisions\/20385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20386"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}