You are on page 1of 1

DAN CISSP NOTES - 2018

Domain 3 Security Engineering bounds; that process runs in isolation. ii. It must be invoked for every access attempt (impossible to
Do you know these already? If no, please refer back to your Any behaviour will affect ONLY the memory and resources circumvent, foolproof)
resources, if yes, march on: associated with the isolated process. iii. It must be small enough to be easily verified
16
Secure system design principles, system capabilities and Fundamental Concepts of Security Models State Machine Model
architecture, security models (BLP, Biba, Clark-Wilson, etc...), WHAT | Explicit set of rules that a computer can follow to State of a machine is captured in order to verify the security of a
TCB, Evaluation models (TCSEC, ITSEC and CC), Certification implement the fundamental security concepts that makes up the system.
and Accreditation Systems, Vulnerabilities, Threats, and security policy. State consists of all current permissions and instances of
Countermeasures, Cryptography (Symmetric, Asymmetric and HOW | provides a way for designers to map abstract subjects accessing the objects.
Hashing), Physical security requirements. statements into a security policy. Always secure no matter what state it is in!
System Engineering is interdisciplinary approach to translating WHY | Developers can be sure their security implementation Finite state machine (FSM) (external input + internal machine
DOMAIN 3 | SECURITY ENGINEERING

users’ needs into the definition of a system, its architecture and supports the security policy. state) = all kinds of complex systems.
design through an iterative process that result in an effective T C B ð Orange Book (a combination of hardware, software, State transition (accepting input or producing output) = new
operational system. Systems engineering applies over the and controls that work together to form a trusted base to state.
entire life cycle, from concept development to final disposal enforce your security policy) This model is the basis for most other security models.
ISO/IEC 15288:2008 An international system engineering It should be as small as possible so that it can be easily Bell-LaPadula Model
standard covering processes and lifecycle stages. It defines a verified. remember these keywords regarding BLP
set of processes divided into four categories: technical, project, TCB’s Security Perimeter is an imaginary boundary that (Confidentiality, DoD, Information flow, Lattice, 1st mathematical
agreement, and enterprise. separates the TCB from the rest of the system. model, Multilevel, Secure state)
System Capabilities Trusted Paths are secure channel that communicates the TCB The BLP model prevents the leaking transfer of classified info.
Confinement (Sandboxing) allows a process to read from and with the rest of the system. It does not address covert channels.
write to only certain memory locations and resources. According to the TCSEC, trusted paths are required for high Two Access Rules:
Can be implemented through: trust level systems such as those at level B2 or higher of Simple Security Property – no read up
-The OS itself (process isolation, memory protection) TCSEC. Security Property (“Star*” Security Property) – no write down
-Confinement applications and services. Reference Monitor (The Law) is part of the TCB that validates Two Object Label Rules:
-Virtualization (VMware) access to every resource prior to granting access requests. -Strong and Weak Tranquillity Property - security labels will
Bounds (Kernel or User?) the bound of a process consist of Security Kernel (The enforcer) is collection of components in not change while the system is operating.
limits set on the memory addresses and resources it can the TCB that work together to implement reference monitor -Weak Tranquillity Property - security labels will not change in
access. functions (H/W and S/W) a way that conflict with defined security properties.
Logical segmentation of memory area for each process to use, The Security Kernel requirements: Exception to BLP: A trusted subject is allowed to violate the *
more secure ð physical bounds (...and more expensive) i. It must provide isolation and the processes must be Security Property and perform a write-down, which is necessary
Isolation when a process is confined through enforcing access tamperproof. when performing valid object declassification or reclassification.
Advance and Protect The Profession

You might also like