Global Information Lookup Global Information

Mandatory access control information


In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.[1] In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices, etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object is tested against the set of authorization rules (aka policy) to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions and/or assign security attributes. (The traditional Unix system of users, groups, and read-write-execute permissions is an example of DAC.) MAC-enabled systems allow policy administrators to implement organization-wide security policies. Under MAC (and unlike DAC), users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users.

Historically and traditionally, MAC has been closely associated with multilevel security (MLS) and specialized military systems. In this context, MAC implies a high degree of rigor to satisfy the constraints of MLS systems. More recently, however, MAC has deviated out of the MLS niche and has started to become more mainstream. The more recent MAC implementations, such as SELinux and AppArmor for Linux and Mandatory Integrity Control for Windows, allow administrators to focus on issues such as network attacks and malware without the rigor or constraints of MLS.

  1. ^ Belim, S. V.; Belim, S. Yu. (December 2018). "Implementation of Mandatory Access Control in Distributed Systems". Automatic Control and Computer Sciences. 52 (8): 1124–1126. doi:10.3103/S0146411618080357. ISSN 0146-4116. S2CID 73725128.

and 22 Related for: Mandatory access control information

Request time (Page generated in 1.0492 seconds.)

Mandatory access control

Last Update:

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability...

Word Count : 2553

Discretionary access control

Last Update:

(unless restrained by mandatory access control). Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally...

Word Count : 563

Access control

Last Update:

and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the...

Word Count : 6064

Computer access control

Last Update:

general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would...

Word Count : 2529

Mandatory Integrity Control

Last Update:

Mandatory Integrity Control (MIC) is a core security feature of Windows Vista and later that adds mandatory access control to running processes based on...

Word Count : 1020

User Account Control

Last Update:

User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating...

Word Count : 3490

Tomoyo Linux

Last Update:

TOMOYO Linux) is a Linux kernel security module which implements mandatory access control (MAC). Tomoyo Linux is a MAC implementation for Linux that can...

Word Count : 472

AppArmor

Last Update:

supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included in the...

Word Count : 966

Security modes

Last Update:

refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various...

Word Count : 383

Astra Linux

Last Update:

featuring mandatory access control. It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal...

Word Count : 1338

Trusted Solaris

Last Update:

Microsystems, featuring a mandatory access control model. Accounting Role-Based Access Control Auditing Device allocation Mandatory access control (MAC) labeling...

Word Count : 342

Need to know

Last Update:

whether another person should have access. Need to know is often concurrently applied with mandatory access control schemes, in which the lack of an official...

Word Count : 732

Computer security

Last Update:

more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). A further approach, capability-based...

Word Count : 22140

RSBAC

Last Update:

new security models, e.g. mandatory access control (MAC), access control list (ACL), and role compatibility (RC) On-access virus scanning with Dazuko...

Word Count : 697

Linux Security Modules

Last Update:

to answer all the requirements for successfully implementing a mandatory access control module, while imposing the fewest possible changes to the Linux...

Word Count : 759

Solaris Trusted Extensions

Last Update:

the Solaris 10 operating system by Sun Microsystems, featuring a mandatory access control model. It succeeds Trusted Solaris, a family of security-evaluated...

Word Count : 416

Multilevel security

Last Update:

strong logical controls must exist to ensure that access to information is strictly controlled. Typically this involves mandatory access control that uses...

Word Count : 4178

Biba Model

Last Update:

Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...

Word Count : 577

Netfilter

Last Update:

general-purpose filtering (firewalling). security_filter module Used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK and...

Word Count : 2724

Type enforcement

Last Update:

technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary...

Word Count : 610

Military Message Handling System

Last Update:

standard X.400 email support for military requirements such as mandatory access control (i.e. Classified/Secret/Top Secret messages and users, etc.). In...

Word Count : 153

Trusted operating system

Last Update:

Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control (MAC). The Common Criteria is the result of a multi-year effort...

Word Count : 406

PDF Search Engine © AllGlobal.net