22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

elonging to a decision subsystem or an enforcement subsystem. The five<br />

interrelated security subsystems proposed here and depicted in Figure 2-4 on<br />

page 63, expand the operating system-based concept and suggest that function<br />

and interdependency of security-related functions, beyond centralized access<br />

control, can be modeled as well.<br />

Figure 2-4 IT Security processes and subsystems<br />

A brief description of each of the five security subsystems, along with further<br />

detail of the aggregation of CC component-level criteria within each subsystem,<br />

is now provided. The subsystem diagrams are represented as parts of a<br />

closed-loop control system showing the internal processes that each performs,<br />

along with its external interfaces. In this representation, each subsystem consists<br />

of a managing process with a default idle state and several execution paths that<br />

can be invoked either by an asynchronous request signaled by another security<br />

subsystem or by a synchronized request from a non-security process.<br />

Complementary representations composed of component views and interaction<br />

diagrams for the subsystems are being developed.<br />

Chapter 2. Security methodologies 63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!