Security Policy Enforcement
Cynthia E. Irvine, Naval Postgraduate School
Security as a Negative Requirement
Security as a Constructive Effort
Key Definitions for Describing Technical Policies
Mechanisms for Discretionary Policy Enforcement
Mechanisms for Enforcement of Nondiscretionary (Mandatory) Policies
Criticality of Correct Policy Enforcement
Considerations for the Construction of Secure Systems
Essential Elements for System Protection
INTRODUCTION
Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enforcement mechanisms in computer systems. It is intended to focus primarily on fundamental concepts, which remain valid despite their longevity. ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.