Domain 3 Flashcards
(101 cards)
what is the point of threat modeling
identify, categorize, and analyze potential threats.
What are some threat models that are used in industry
STRIDE
DREAD
OCTAVE
TRIKE
What are the pillars of privacy by design
Proactive
Embedded in design
Privacy as default setting
Positive sum
end 2 end fully lifecycle data protection
Visibility and transparency
whats the purpose of a security model
A formal representation of a security policy.
Provide framework for analyzing and implementing sec controls.
What is used to determine how controls are intended to be put into place?
Security models. Intended to assist in determining what subjects can access the system and what objects they have access to
Describe the State Machine Model
Protects: Confidentiality
Used for Specifying and enforcing policies
Defines states and transitions between them to model allowable actions in a system.
Describe the information flow model
Protects: Confidentiality
Used for: Tracking Information Flows between subjects and objects
Labels subjects and objects with Sec level and ensures no flow from higher to lower levels
Describe Lattice models
Protects: Confidentiality
Used for: multilevel sec policies with heirachical structure.
Defines partially ordered set of sec levels
What are the two Integrity Focused Sec Models
Biba
Clark-Wilson
What is the simple property used for
Simple - Read - Protects Confidentiality - No Low to High Read
What is the start property used for
Preventing subjects from writing at lower security levels - protects confidentiality
Describe the Bell Lapadula Model
Type: Info flow
Protects Conf
Levels: Classification + Categories
Uses: MAC
Rules: No read up, no write down
Descirbe the Biba model
Based on: Info flow
protects: Integrity
Lattice based model
No read down no write up
Describe the Clark Wilson
*Integrity Model
*Used in: DB\TX systems
*Rules: Well formed TX transform valid states
*Based on access control triplet
Uses sec labels to grant access to objects
Describe the components to Clark-Wilson
CDI - Constrained Data Item - Any object protected by the model
UDI - Any object not protected by the model
IVP - Integrity Verification Process - Scan data items and confirms their identity
TP - Transformation procedure, only procedure that can transition UDI and CDI
What are the access control triplets in the Clark Wilson Model
Authenticated Principle (user)
Programs (TP)
Data Items (UDI+CDI)
Describe the Brewer and Nash model
Chinesse Wall,
Type: Information Flow
Protects Confidentiality and Information Flow
Levels: COI classes
Rules: Subjects can only access data in one class per dataset
Used in: Finance Legal, auditing sytems
Describe the Take-grant Model
Information Flow Model
Protects: Conf
Lvls: Objects + privileges
Rules: Transfer privileges between objects and subjects
Used to specify access control policies
Whare are the four rules to the Take Grant Model
Take - sibject take rights over an object
Grant - Grant rights to an object
Create - new rights
Remove - Remove rights
What is a critical item to correctly select security controls based on requirements
That data is classified correctly
What are the steps to selecting a control based the sec requirements of a system
1 Identify the requirements
2 analyze system function
3 Data sensitivity
4 Consider compliance
What is a good way to select controls for assets
Make use of an established framework
What are some items to consider when selecting security controls
Integration
Cost/benefit,
scalability,
Maintenance
The cost of the control should never be greater than the value of what it is protecting.
What is the common Criteria, how many levels are there
A standardized assurance recognition guideline.
7