[Zope3-checkins] SVN: Zope3/trunk/doc/security/SecurityTarget.tex
spelling,
Christian Zagrodnick
cz at gocept.com
Thu Apr 21 07:59:08 EDT 2005
Log message for revision 30074:
spelling,
removed pointles paragraph
Changed:
U Zope3/trunk/doc/security/SecurityTarget.tex
-=-
Modified: Zope3/trunk/doc/security/SecurityTarget.tex
===================================================================
--- Zope3/trunk/doc/security/SecurityTarget.tex 2005-04-21 11:11:48 UTC (rev 30073)
+++ Zope3/trunk/doc/security/SecurityTarget.tex 2005-04-21 11:59:08 UTC (rev 30074)
@@ -642,17 +642,6 @@
\\
- T.Import
- &
- An attacker might try to make the system
- interpret imported security attributes in a
- not intended way to acquire a higher level of
- access to the system.
- &
- Secondary assets
- \\
-
-
T.RIP
&
An attacker might try to make the system use
@@ -2273,23 +2262,23 @@
\begin{longtable}{rRRRRRRRRRRRRRRR}
\toprule
- & T.IA & T.Perm &T.Operation&T.AuditFake&T.Import & T.RIP&T.Transaction&T.Undo &T.Timestamps & T.Host & A.OS & A.Admin & A.Network & A.Client & A.Credential \\
+ & T.IA & T.Perm &T.Operation&T.AuditFake& T.RIP&T.Transaction&T.Undo &T.Timestamps & T.Host & A.OS & A.Admin & A.Network & A.Client & A.Credential \\
\midrule\endhead
-O.IA & \oh & & & & & & & & & & & \\
-O.Delegation & & \oh & & & & & & & & & & \\
-O.Audit & \oh & \oh & \oh & & \oh & & & \oh & & & & \\
-O.Protect & & & & \oh & & & & & & & & \\
-O.Access & & & \oh & & & & \oh & & & \oh & & \\
-O.Integrity & & & & & & \oh & & & & & & \\
-O.Attributes & & & & & \oh & \oh & & \oh & & & & \\
-O.ManageRisk & \oh & & & & & & & & & & & \\
+O.IA & \oh & & & & & & & & & & \\
+O.Delegation & & \oh & & & & & & & & & \\
+O.Audit & \oh & \oh & \oh & & & & \oh & & & & \\
+O.Protect & & & & \oh & & & & & & \oh & \\
+O.Access & & & \oh & & & \oh & & & \oh & & \\
+O.Integrity & & & & & \oh & & & & & & \\
+O.Attributes & & & & & \oh & & \oh & & & & \\
+O.ManageRisk & \oh & & & & & & & & & & \\
\midrule
-OE.OS & & & & & & & & & \oh & & \oh & & & & \\
-OE.Trust & & & & & & & & & & & & \oh & & & \\
-OE.Auditlog & & & & & & & & & & & \oh & & & & \\
-OE.Network & & & & & & & & & & & & & \oh & & \\
-OE.Client & & & & & & & & & & & & & & \oh & \\
-OE.Credential& & & & & & & & & & & & & & & \oh \\
+OE.OS & & & & & & & & \oh & & \oh & & & & \\
+OE.Trust & & & & & & & & & & & \oh & & & \\
+OE.Auditlog & & & & & & & & & & \oh & & & & \\
+OE.Network & & & & & & & & & & & & \oh & & \\
+OE.Client & & & & & & & & & & & & & \oh & \\
+OE.Credential& & & & & & & & & & & & & & \oh \\
\bottomrule
\caption{Mapping of Threats and Assumptions to Security Objectives}
\label{tab-SOR}
@@ -2310,12 +2299,15 @@
permissions.
\item[O.Audit:] This security objective is necessary to detect and recover
- from most threats: \textbf{T.IA, T.Perm, T.Operation, T.Import and T.Undo}
+ from most threats: \textbf{T.IA, T.Perm, T.Operation and T.Undo}
as those events are logged by the audit log.
\item[O.Protect:] This security objective is necessary to counter the threat
\textbf{T.AuditFake} because it protects the audit data generation function
- and thereby prevents logging of false information.
+ and thereby prevents logging of false information. It also covers the
+ assumption \textbf{A.OS} because self-protection mechanisms decrease the
+ risk of compromising the TOE and thereby the risk of compromising the
+ host system.
\item[O.Access:] This security objective is necessary to counter the threat
\textbf{T.Operation} because it prevents performing operations on an object
@@ -2330,7 +2322,7 @@
an unhandled error occurs.
\item[O.Attributes:] This security objective is necessary to counter the
- threats \textbf{T.Undo}, \textbf{T.Import} and \textbf{T.RIP} because it
+ threats \textbf{T.Undo} and \textbf{T.RIP} because it
prevents an attacker form setting inconsistent security attributes from
which he could gain more access than intended.
@@ -2345,9 +2337,6 @@
are physically secure. This means an attacker cannot access the machine
directly, i.e. around Zope.
- \item[OE.Trust:] This security objective covers the assumption
- \textbf{A.Admin}.
-
\item[OE.Auditlog:] This security objective covers the assumption
\textbf{A.OS}. To keep the operating system secure and detect possible
intrusions it is vital to continuously monitor the audit log. It is also
More information about the Zope3-Checkins
mailing list