Mandatory Integrity Control (MIC) is a core
security feature of Windows Vista and later that adds
mandatory access control to running
processes
A process is a series or set of activities that interact to produce a result; it may occur once-only or be recurrent or periodic.
Things called a process include:
Business and management
*Business process, activities that produce a specific se ...
based on their Integrity Level (IL). The IL represents the level of trustworthiness of an object. This mechanism's goal is to restrict the access permissions for potentially less trustworthy contexts (processes, files, and other securable objects), compared with other contexts running under the same user account that are more trusted.
Implementation
Mandatory Integrity Control is defined using a new access control entry (ACE) type to represent the object's IL in its
security descriptor. In Windows,
Access Control Lists (ACLs) are used to grant access rights (read, write, and execute permissions) and privileges to users or groups. An IL is assigned to a subject's
access token when initialized. When the subject tries to access an object (for example, a file), the Security Reference Monitor compares the integrity level in the subject's
access token against the integrity level in the object's
security descriptor. Windows restricts the allowed access rights depending on whether the subject's IL is higher or lower than the object, and depending on the integrity policy flags in the new access control entry (ACE). The security subsystem implements the integrity level as a mandatory label to distinguish it from the discretionary access under user control that ACLs provide.
Windows Vista defines four integrity levels: ''Low'' (''
SID:'' S-1-16-4096), ''Medium'' (''SID:'' S-1-16-8192), ''High'' (''SID:'' S-1-16-12288), and ''System'' (''SID:'' S-1-16-16384).
By default, processes started by a regular user gain a ''Medium'' IL and
elevated processes have ''High'' IL.
By introducing integrity levels, MIC allows classes of applications to be isolated, enabling scenarios like sandboxing potentially-vulnerable applications (such as
Internet-facing applications). Processes with ''Low'' IL are called low-integrity processes, which have less access than processes with higher ILs where the Access control enforcement is in Windows.
Objects with Access control lists, such as Named
objects, including
files
File or filing may refer to:
Mechanical tools and processes
* File (tool), a tool used to ''remove'' fine amounts of material from a workpiece
**Filing (metalworking), a material removal process in manufacturing
** Nail file, a tool used to gent ...
,
registry keys or even other
processes
A process is a series or set of activities that interact to produce a result; it may occur once-only or be recurrent or periodic.
Things called a process include:
Business and management
*Business process, activities that produce a specific se ...
and
threads
Thread may refer to:
Objects
* Thread (yarn), a kind of thin yarn used for sewing
** Thread (unit of measurement), a cotton yarn measure
* Screw thread, a helical ridge on a cylindrical fastener
Arts and entertainment
* ''Thread'' (film), 2016 ...
, have an entry in the
System Access Control List governing access to them, that defines the minimum integrity level of the process that can use the object. Windows makes sure that a process can ''write to'' or ''delete'' an object only when its integrity level is equal to or higher than the requested integrity level specified by the object.
Additionally, for privacy reasons
process objects with higher IL are out-of-bounds for even ''read'' access from processes with lower IL.
Consequently, a process cannot interact with another process that has a higher IL. So a process cannot perform functions such as inject a
DLL into a higher IL process by using the
CreateRemoteThread()
function of the Windows API or send data to a different process by using the
WriteProcessMemory()
function.
Application
While processes inherit the integrity level of the process that spawned it, the integrity level can be customized at the time of process creation. As well as for defining the boundary for window messages in the
User Interface Privilege Isolation (UIPI) technology, Mandatory Integrity Control is used by applications like
Adobe Reader,
Google Chrome
Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS ...
,
Internet Explorer, and
Windows Explorer to isolate documents from vulnerable objects in the system.
Internet Explorer 7 introduces a MIC-based "Protected Mode" setting to control whether a web page is opened as a low-integrity process or not (provided the operating system supports MIC), based on security zone settings, thereby preventing some classes of security vulnerabilities. Since Internet Explorer in this case runs as a Low IL process, it cannot modify system level objects—file and registry operations are instead virtualized.
Adobe Reader 10 and
Google Chrome
Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS ...
are two other notable applications that are introducing the technology in order to reduce their vulnerability to malware.
Microsoft Office 2010 introduced the "Protected View" isolated sandbox environment for Excel, PowerPoint, and Word that prohibits potentially unsafe documents from modifying components, files, and other resources on a system.
Protected View operates as a low-integrity process and, in Windows Vista and later versions of Windows, uses MIC and UIPI to further restrict the sandbox.
However, in some cases a higher IL process do need to execute certain functions against the lower IL process, or a lower IL process need to access resources that only a higher IL process can access (for example, when viewing a webpage in protected mode, save a file downloaded from the internet to a folder specified by the user).
High IL and Low IL processes can still communicate with each other by using files,
Named pipes,
LPC
LPC may refer to:
Science and technology
* Linear predictive coding, a method used in audio signal processing and speech processing
* Leaf protein concentrate, a concentrated form of the proteins found in the leaves of plants
* Long period comet, ...
or other shared objects. The shared object must have an integrity level as low as the Low IL process and should be shared by both the Low IL and High IL processes.
Since MIC does not prevent a Low IL process from sharing objects with a higher IL process, it can trigger flaws in the higher IL process and have it work on behalf of the low IL process, thereby causing a
Squatting attack.
Shatter attacks, however, can be prevented by using
User Interface Privilege Isolation which takes advantage of MIC.
See also
*
icacls
In Microsoft Windows, cacls and its replacement, icacls, native command-line utilities capable of displaying and modifying the security descriptors on folders and files. An access-control list is a list of permissions for securable object, s ...
*
Security Identifier
*
Mandatory access control
References
Further reading
*
*
External links
Introduction to Windows Integrity Control: Security Focus articleEscaping from Microsoft’s Protected Mode Internet Explorer
{{Windows Components
Microsoft Windows security technology