|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
¨ |
Compare:
|
|
|
|
– |
Prevent
disclosure to unauthorized users
|
|
|
|
– |
Ensure
that disclosure occurs only to authorized users, and only
|
|
|
in a
fashion consistent with the security policy.
|
|
|
¨ |
The
second can be tested:
|
|
|
|
1. |
Show
that there exists no communication path to any
|
|
|
|
unauthorized
user agent.
|
|
|
|
2. |
Show
that the last link in each remaining path is trusted
|
|
|
software.
|
|
|
|
3. |
Verify
that each piece of trusted software enforces the
|
|
|
|
appropriate
security policy.
|
|
|
– |
The
first cannot!
|
|