Jump to content

Security modes

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by CISSP Researcher (talk | contribs) at 05:25, 29 October 2005. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Generally, Security Modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various levels of security classification. The mode of operation is determined by:

  • The type of users who will be directly or indirectly accessing the system.
  • The type of data, nicluding classification levels, compartments, and categories, that are processed on the system.
  • The type of levels of users, their need to know, and formal access approvals that the users will have.

Dedicated Security Mode

In this mode of operation, all users must have have:

  • Proper clearance for ALL information on the system.
  • Formal access approval for ALL information on the system.
  • Signed NDA for ALL information on the system.
  • A valid need to know for ALL information on the system.

All users can access ALL data.

System High Security Mode

In this mode of operation, all users must have have:

  • Proper clearance for ALL information on the system.
  • Formal access approval for ALL information on the system.
  • Signed NDA for ALL information on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know.

Compartmented Security Mode

In this mode of operation, all users must have have:

  • Proper clearance for THE HIGHEST LEVEL of information on the system.
  • Formal access approval for ALL information they will access on the system.
  • Signed NDA for ALL information on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know and formal access approval.

Multilevel Security Mode

In this mode of operation, all users must have have:

  • Proper clearance for ALL information on the system.
  • Formal access approval for ALL information they will access on the system.
  • Signed NDA for ALL information on the system.
  • A valid need to know for SOME information on the system.

All users can access SOME data, based on their need to know, clearance and formal access approval.

See also


References

  • Krutz, Ronald L. and Vines, Russell Dean, The CISSP Prep Guide; Gold Edition, Wiley Publishing, Inc., Indianapolis, Indiana, 2003.

Template:CISSP=stub