Security modes
Appearance
Generally, Security Modes refer to information systems security modes of operations
Dedicated Security Mode
In this mode of operation, all users must have have:
- Proper clearance for ALL information on the system.
- Formal access approval for ALL information on the system.
- Signed NDA for ALL information on the system.
- A valid need to know for ALL information on the system.
All users can access ALL data.
System High Security Mode
In this mode of operation, all users must have have:
- Proper clearance for ALL information on the system.
- Formal access approval for ALL information on the system.
- Signed NDA for ALL information on the system.
- A valid need to know for SOME information on the system.
All users can access SOME data, based on their need to know.
Compartmented Security Mode
In this mode of operation, all users must have have:
- Proper clearance for THE HIGHEST LEVEL of information on the system.
- Formal access approval for ALL information they will access on the system.
- Signed NDA for ALL information on the system.
- A valid need to know for SOME information on the system.
All users can access SOME data, based on their need to know and formal access approval.
Multilevel Security Mode
In this mode of operation, all users must have have:
- Proper clearance for "ALL information on the system.
- Formal access approval for ALL information they will access on the system.
- Signed NDA for ALL information on the system.
- A valid need to know for SOME information on the system.
All users can access SOME data, based on their need to know, clearance and formal access approval.
See also
- Bell-La Padula security model
- Multi-Level Security - MLS
- Mandatory Access Control - MAC
- Discretionary Access Control - DAC
- Biba Integrity Model
- Take-Grant Model
- The Clark-Wilson Integrity Model
- Graham-Denning Model
- Take-Grant Model
References
- Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.