CISSP - Security Architecture & Models Slide: 1
CISSP - Security Architecture & Models Slide: 1
Models
2 Access Control
2.1 The TOE shall be able to distinguish and
administer access rights between each user and
the objects which are subject to the administration
of rights, on the basis of an individual user, or on
the basis of membership of a group of users, or
both.
It shall be possible to completely deny users or
user groups access to an object.
It shall not be possible for anyone who is not an
authorised user to grant or revoke access rights
to an object.
• Policy
The security policy must be explicit, well-defined
and enforced by the computer system.
Mandatory Security Policy (MAC type)
~ Enforces access control rules based directly on an
individual's clearance, authorization for the information
and the confidentiality level of the information being
sought.
Discretionary Security Policy (DAC type)
~ Enforces rules for controlling and limiting access based
on identified individuals who have been determined to
have a need-to-know for the information.
• Assurance
The computer system must contain
hardware/software/firmware mechanisms that
can be independently evaluated to provide
sufficient assurance that the system enforces
the above requirements.
Life Cycle Assurance - Software, hardware, and
firmware must be able to be tested individually
to ensure that each component enforces the
security policy in an effective manner
throughout its lifetime.
Continuous Protection Assurance - The security
mechanisms and the system as a whole must
continuously perform predictably and acceptably
in different situations.
• Documentation
Includes test, design, and specification
documents, and user guides and manuals.
Objective
• Class F-C1 is derived from the functionality
requirements of the US TCSEC class C1. It
provides discretionary (need-to-know)
access control.
Level E0
• This level represents inadequate assurance.
Level E1
• At this level there shall be a security target and an
informal description of the architectural design of
the TOE. Functional testing shall indicate that the
TOE satisfies its security target.
Level E2
• In addition to the requirements for level E1, there
shall be an informal description of the detailed
design. Evidence of functional testing shall be
evaluated. There shall be a configuration control
system and an approved distribution procedure.
Level E3
• In addition to the requirements for level E2,
the source code and/or hardware drawings
corresponding to the security mechanisms
shall be evaluated. Evidence of testing of
those mechanisms shall be evaluated.
Level E4
• In addition to the requirements for level E3,
there shall be an underlying formal model
of security policy supporting the security
target. The security enforcing functions,
the architectural design and the detailed
design shall be specified in a semiformal
style.
Level E5
• In addition to the requirements for level E4,
there shall be a close correspondence
between the detailed design and the source
code and/or hardware drawings.
Level E6
• In addition to the requirements for level E5,
the security enforcing functions and the
architectural design shall be specified in a
formal style, consistent with the specified
underlying formal model of security policy.
• Certification
Technical evaluation of the security components
and their compliance perhaps to a predefined
standard for the purpose of accreditation.
Techniques used:
~ risk analysis, verification, testing, auditing
Indicate the good and bad points of security in a
system to be evaluated.
The evaluation for a system for a desired
EAL/Target Evaluation Level could be an
example of certification.
• Accreditation
Formal acceptance of a system’s overall security
by management
When the certification information (document) is
presented to management (perhaps by an
auditor), it is up to management to ask the
proper security related questions, review reports
and findings, and decide upon the acceptance of
the safeguards and if any corrective actions are
required.
• Change Control
Major changes to the system being evaluated
should initiate recertification and
reaccreditation.
Secret
Unclassified