Page 247 - CISSO_Prep_ Guide
P. 247

•  Need clearance/privilege labels for
                              subjects (assigned by management
                              but implemented by system
                              administrators).
                   •  Trusted path: a secure login or
                       authentication process that is not easily
                       compromised.
                   •  Clipping: Setting the audit level by deciding
                       what to log or not log.
                   •  Filtering: looking at a subset of the existing
                       logs
                   •  Object reuse protection: protecting against
                       memory leakage and data remanence.
                       (residual data on magnetic media)


               Evaluation criteria
                   •  Certification: the solution meets the
                       requirements.  Certification is the sign off by
                       IT staff that a solution meets the current
                       requirements.
                   •  Accreditation: management approval.  It
                       includes management’s permission to
                       implement and acceptance of risk.
                   •  Trusted Computer System Evaluation Criteria
                       (TCSEC)
                          •  Orange book (part of rainbow series)
                          •  TCSEC only tests confidentiality
                   •  Trusted Network Interpretation (TNI) – the
                       red book of the rainbow series. Applies
                       orange book principles to network systems.
   242   243   244   245   246   247   248   249   250   251   252