22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 2-7 Access control and subsystem processes<br />

68 Lotus Security Handbook<br />

Information flow control subsystem<br />

The purpose of an information flow control subsystem in an IT solution is to<br />

enforce security policies by gating the flow of information within a computing<br />

solution, affecting the visibility of information within a computing solution, and<br />

ensuring the integrity of information flowing within a computing solution. The<br />

information flow control subsystem may depend upon trusted credentials and<br />

access control mechanisms.<br />

This subsystem may feed event information to the security audit subsystem,<br />

which may provide real-time or forensic analysis of events. The information flow<br />

control subsystem may take corrective action based upon alert notification from<br />

the security audit subsystem. From Common Criteria, an information flow control<br />

subsystem may include the following functional requirements:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!