¨If it cannot be enforced, it’s a fantasy, not a
policy!
¨Unenforceable:
–Prevent disclosure of sensitive information to
unauthorized users
¨(Possibly) Enforceable:
–Ensure that all information flows only to (or from)
authorized programs.
–Ensure that all disclosure of information to entities
outside the control of the system
(including users and their agents) is via trusted software.
–Ensure that when information crosses a multiplexed
protection boundary, it does so via trusted software
–Where “trusted software” means: “has been verified to
comply with the applicable provisions of
the security policy.”