Biba Integrity Model
Biba Integrity Model
Student Name
Course
Institution
Date
BIBA INTEGRITY MODEL 2
Abstract
Kenneth J. Biba developed the Biba integrity model in 1975 to supplement the Bell-
LaPadula model, which was only concerned with ensuring data confidentiality. The Biba
developers wanted to provide information integrity which was not part of the Bell-LaPadula
model's purpose. Biba is defined on a mathematical basis which is critical in allowing Bell-
LaPadula's security levels and integrity. The Biba Integrity security model has been implemented
in British Aerospace (BAE) Systems (XTS-400 operating systems), General Dynamics Mission
Systems (Linux), and MacBook (FreeBSD). Several benefits and advantages can be linked to the
use of the Biba model, such as being simple and easy to implement and providing several
policies which are selectable as demand arises. However, its drawbacks include; it is hard to
choose the appropriate procedures to be implemented since it allows for various policies to be
used across different situations. It does not enforce information confidentiality. Lastly, it does
not support authorization revocation. Biba Integrity model can be used for access control and
BIBA INTEGRITY MODEL 3
Introduction
Kenneth J. Biba developed the Biba integrity model in 1975 to supplement the Bell-
LaPadula model, which was only concerned with ensuring data confidentiality (FinJan Team,
2016). The Biba developers wanted to provide information integrity which was not part of the
Bell-LaPadula model's purpose. This paper seeks to identify the advantages and disadvantages of
Biba and recommend two practical situations for this model's applicability.
Kenneth J. Biba developed the Biba integrity model in 1975. The model was developed
in the Mitre Corporation (FinJan Team, 2016). Officially released in 1977, the Biba integrity
model, often referred to as Biba77, was created to be used as a supplement to the already existing
Bell-LaPadula model. The Bell-LaPadula model was hugely concerned with securing data
confidentiality. Bell-LaPadula model was only focused on ensuring confidentiality and was
never concerned with the other CIA triad elements of integrity and availability. Besides, the
previous security models developed a long time ago during the mainframe computing era.
Therefore, they lacked the flexibility to adapt to the emerging computer technologies effectively.
This necessitated the need for new security models such as Biba Integrity Model.
The Biba Integrity model was developed to supplement the Bell-LaPadula model, which
was only concerned with ensuring data confidentiality. Biba was amongst the first security
models built with the primary intentions of addressing the major concerns concerning
information systems and integrity. Currently, the Biba security policies have been aligned and
are running parallel with the Bell-LaPadula model's policies. Therefore, they prove critical in
BIBA INTEGRITY MODEL 4
providing an all-around data security assurance needed by almost all companies. Biba is defined
levels and integrity. According to FinJan Team (2016), Biba utilizes the same principle used by
The Biba Integrity model's original purpose was to supplement the Bell-LaPadula model,
which only offered confidentiality. The Biba developers wanted to ensure information integrity
which was not part of the Bell-LaPadula model's purpose, making it necessary to develop a new
model to address integrity challenges. Integrity ensures that unauthorized parties' data
modification is limited, ensuring that information is transmitted accurately, and ensures that both
internal and external database consistencies are preserved. Therefore, the developers wanted to
ensure that systems are transformed from being untrusted to slightly trusted, trusted, and highly
trusted and to become unimpeachable. With both confidentiality and integrity, information
within the system will tend to flow from high-security levels. The development of Biba ensured
that all the isolated subsystems are confined with their own sets of rights and privileges. Lastly,
Biba leverages simple integrity, invocation, and star integrity policies to define properties aimed
The Biba Integrity security model has been implemented in British Aerospace (BAE)
Systems, General Dynamics Mission Systems, and MacBook. BAE Systems plays a huge role in
assisting its customers in staying ahead of the current security-challenged world. BAE Systems is
critical in offering both national security and people security protection. BAE Systems has
BIBA INTEGRITY MODEL 5
implemented the Biba model to develop its XTS-400 operating systems which is essential in
General Dynamics Mission Systems is another company that uses the model in the development
of its systems. The company provides essential solutions to its clients in leading, serving, and
protecting the world we are currently living in (General Dynamics Mission Systems, 2021). Biba
Integrity model has been implemented in the Linux Pit Bull product.
Lastly, Apple implements the Biba policy within its MacBook operating systems
(FreeBSD), which is essential in protecting its system objects and subjects' integrity through a
strict information flow policy (Free BSD, 2020). Using the Biba integrity model ensures that all
the security system objects are assigned integrity labels consisting of hierarchical and non-
hierarchical components. All these are critical in permitting all the security labels to be placed in
Several benefits and advantages can be linked to the use of the Biba model. First of all,
Biba is relatively simple and easy to implement. In contrast with the Bell-LaPadula model,
implementing Biba's strict integrity policy is not hard. Besides, the Biba Integrity model provides
several guidelines which are selectable as demand arises. Therefore, where strict integrity
properties are too restrictive, then either the dynamic policies can effectively be used in place.
However, the Biba Integrity model has disadvantages too. First of all, it is hard to choose
the appropriate policies to be implemented since it provides various approaches to be used across
different situations. Even though it allows for flexibility, finding one perfect policy to address a
specific scenario might be difficult. Secondly, the Biba Integrity model does not do anything in
with other models like Bell-LaPadula. Besides, this model does not support authorization
revocation. Lastly, it only supports integrity labeling, where currently, no protocols are
The two best situations are suitable for this model. Biba Integrity model can be used for
access control and enforcing data integrity. According to Wright (2008), Biba was designed with
data security policies for an express set of access control rules that enhances integrity. Their
Conclusion
The motivation behind the Biba Integrity development was to supplement the Bell-
LaPadula model, which was only concerned with information confidentiality. It was
integrity of the organization's information requires organizations to embrace the Biba model.
BIBA INTEGRITY MODEL 7
References
FinJan Team. (2016). A Closer Look at Data Security and the Biba Integrity Model. Finjan Blog.
%20in%201977%2C%20the%20Biba,a%20supplement%20to%20Bell%2DLaPadula.
https://www.freebsd.org/cgi/man.cgi?mac_biba.