If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.Ĭonfigure the network device to enforce organization-defined mandatory access control policies over all subjects and objects. If it does not use mandatory access control, this is not a finding. Network Device Management Security Requirements GuideĬheck the network device to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. ![]() An example of where mandatory access control may be needed is to prevent administrators from tampering with audit objects. The mandatory access control policies are defined uniquely for each network device, so they cannot be specified in the requirement. The reference monitor enforces (mediates) access relationships between all subjects and objects based on privilege and need to know. This class of mandatory access control policies also constrains what actions subjects can take with respect to the propagation of access control privileges that is, a subject with a privilege cannot pass that privilege to other subjects.Įnforcement of mandatory access control is typically provided via an implementation that meets the reference monitor concept. ![]() You will learn what these methods are, how they differ from each other, and the pros and cons of each. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. Mandatory access control policies constrain what actions subjects can take with information obtained from data objects for which they have already been granted access, thus preventing the subjects from passing the information to unauthorized subjects and objects. This article presents an overview of RBAC vs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |