Security Policy Enforcement

Cynthia E. Irvine, Naval Postgraduate School

Introduction

Security as a Negative Requirement

Security as a Constructive Effort

Key Definitions for Describing Technical Policies

Active Entities: Subjects

Passive Entities: Objects

Types of Policies

Confidentiality Policies

Integrity Policies

Availability Policies

Separation Policies

Least Privilege

Control Policies

Supporting Policies

Object Reuse

Policy Languages

Policy Enforcement Mechanisms

Mechanisms for Discretionary Policy Enforcement

Mechanisms for Enforcement of Nondiscretionary (Mandatory) Policies

Criticality of Correct Policy Enforcement

Assurance

Considerations for the Construction of Secure Systems

Essential Elements for System Protection

Constructive Security

Secure System Development

Future Challenges

Conclusion

Glossary

Cross References

References

INTRODUCTION

Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enforcement mechanisms in computer systems. It is intended to focus primarily on fundamental concepts, which remain valid despite their longevity. ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.