![]() Source(s): NIST SP 800-44 Version 2 under Mandatory Access Control An access control policy that is uniformly enforced across all subjects and objects within a system. Source(s): NIST SP 800-192 under Mandatory access control (MAC) A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity. ![]() An example of MAC occurs in military security, where an individual data owner does not decide who has a top-secret clearance, nor can the owner change the classification of an object from top-secret to secret. Source(s): NIST SP 800-185 under MAC means that access control policy decisions are made by a central authority, not by the individual owner of an object. Source(s): CNSSI 4009-2015 under non-discretionary access control Message Authentication Code. Source(s): CNSSI 4009-2015 See mandatory access control (MAC). Organization-defined subjects may explicitly be granted organization-defined privileges (i.e., they are trusted subjects) such that they are not limited by some or all of the above constraints. A subject that has been granted access to information is constrained from doing any of the following: (i) passing the information to unauthorized subjects or objects (ii) granting its privileges to other subjects (iii) changing one or more security attributes on subjects, objects, the information system, or system components (iv) choosing the security attributes to be associated with newly-created or modified objects or (v) changing the rules governing access control. ![]() An access control policy that is uniformly enforced across all subjects and objects within the boundary of an information system. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |