SSCP Security Model: A Guide to Divided Operations

Divided Operations: Enhancing Security with Different User Roles

Prev Question Next Question

Question

Which security model uses division of operations into different parts and requires different users to perform each part?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The Clark-Wilson model uses separation of duties, which divides an operation into different parts and requires different users to perform each part.

This prevents authorized users from making unauthorized modifications to data, thereby protecting its integrity.

The Clark-Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system.

The model is primarily concerned with formalizing the notion of information integrity.

Information integrity is maintained by preventing corruption of data items in a system due to either error or malicious intent.

An integrity policy describes how the data items in the system should be kept valid from one state of the system to the next and specifies the capabilities of various principals in the system.

The model defines enforcement rules and certification rules.

The models enforcement and certification rules define data items and processes that provide the basis for an integrity policy.

The core of the model is based on the notion of a transaction.

A well-formed transaction is a series of operations that transition a system from one consistent state to another consistent state.

In this model the integrity policy addresses the integrity of the transactions.

The principle of separation of duty requires that the certifier of a transaction and the implementer be different entities.

The model contains a number of basic constructs that represent both data items and processes that operate on those data items.

The key data type in the Clark- Wilson model is a Constrained Data Item (CDI)

An Integrity Verification Procedure (IVP) ensures that all CDIs in the system are valid at a certain state.

Transactions that enforce the integrity policy are represented by Transformation Procedures (TPs)

A TP takes as input a CDI or Unconstrained Data Item (UDI) and produces a CDI.

A TP must transition the system from one valid state to another valid state.

UDIs represent system input (such as that provided by a user or adversary)

A TP must guarantee (via certification) that it transforms all possible values of a UDI to a "safe" CDI.

In general, preservation of data integrity has three goals: Prevent data modification by unauthorized parties Prevent unauthorized data modification by authorized parties Maintain internal and external consistency (i.e.

data reflects the real world) Clark-Wilson addresses all three rules but BIBA addresses only the first rule of intergrity.

References: HARRIS, Shon, All-In-One CISSP Certification Fifth Edition, McGraw-Hill/Osborne, Chapter 5: Security Architecture and Design (Page 341-344)

and http://en.wikipedia.org/wiki/Clark-Wilson_model.

The security model that uses division of operations into different parts and requires different users to perform each part is the Clark-Wilson model, option C.

The Clark-Wilson model is a security model that is designed to maintain the integrity of data in a system by separating the duties of users into different parts. In this model, there are three main components: the user, the transformation procedure, and the constraint.

The user is a person or process that has access to the system and the data within it. The transformation procedure is a set of rules or procedures that define how data can be transformed in the system. The constraint is a set of rules or procedures that define how users can access and modify data in the system.

The Clark-Wilson model separates the duties of users into two different parts: the transactional part and the transformational part. The transactional part involves the creation and modification of data, while the transformational part involves the transformation of data.

In the Clark-Wilson model, different users are responsible for each part. For example, the transactional part may be performed by a clerk or data entry operator, while the transformational part may be performed by a system administrator. This separation of duties helps to prevent conflicts of interest and ensures that data is not tampered with inappropriately.

Overall, the Clark-Wilson model is designed to provide a high level of security for data in a system by using a combination of user separation, data transformation rules, and access constraints.