CISSP ch 8 Flashcards
Cascading composition theory
input for one system comes from the output of another system
Feedback composition theory
one system provides input to another system, which reciprocates by reversing those roles
Hookup composition theory
one system sends input to another system, but also sends input to external entities
Noninterference Model
concerned with how the actions of a subject a higher security level affect the system state or the actions of a subject at a lower security level = the actions of a subject at a higher level should not affect, interfere or be noticed by a subject at a lower level
Take-Grant model
employs a directed graph to dictate how rights can be passed from one subject to another or from a subject to an object = subjects can grant rights that they possess, or take rights
Grant rule (Take-Grant model)
allows a subject to grant rights to an object
Take rule (Take-Grant model)
allows a subject to take rights over an object
Create rule (Take-Grant model)
allows a subject to create new rights
Remove rule (Take-Grant model)
allows a subject to remove rights it has
ACL
Access control list, list subjects that can access a given object
Column of an access control matrix
an access control list (ACL) pulled from objects
Row of an access control matrix
each row of the matrix is a capabilities list for each listed subject
Bell-LaPadula Model
developed by the US Department of Defense (DoD) in the 1970’s = multilevel security policy where a subject with any level of clearance can access resources at or below its clearance level = within clearance levels, access to a compartmentalized objects is granted only on a need-to-know basis = prevents the leaking or transfer of classified information to less secure clearance levels = focused on maintaining confidentiality = built on a state machine concept and the information flow model, employs mandatory access controls and is a lattice-based access control concept
Bell-LaPadula Simple Security Property
no read-up = a subject may not read information at a higher sensitivity level
Bell-LaPadula * (star) Security Property
Confinement Property = no write-down = a subject may not write information to an object at a lower sensitivity level
Exception: A “trusted subject” is not constrained by the * Security Property, and is guaranteed not to consummate a security-breaching information transfer even if it is possible, i.e., allowed to write-down, which is necessary when performing valid object declassification or reclassification
Lattice-Based Access Control
subjects are assigned positions in a lattice and can only access those objects that fall into the range between
- the least upper bound (LUB) (the nearest security label or classification higher than their lattice position and
- the greatest lower bound (GLB) (the nearest security label or classification lower than their lattice position) of the labels or classifications of their lattice position
LUB (Lattice-Based Access Control)
least upper bound
GLB (Lattice-Based Access Control)
greatest lower bound
Biba-model
designed after Bell-LaPadula model, but focuses on integrity, also DoD-derived = built on a state machine concept and the information flow model