What is Mandatory Access Control (MAC)?
An access control model where the system enforces policies based on labels and clearances.
How does MAC differ from DAC?
MAC is system-controlled; DAC is user-controlled.
Where is MAC commonly used?
Government and military environments.
What are sensitivity labels in MAC?
Classifications assigned to resources (e.g., Secret, Top Secret).
What are security clearances in MAC?
Authorization levels assigned to users.
When is access granted in MAC?
When clearance meets or exceeds sensitivity.
What is centralized policy management in MAC?
Policies are managed and enforced by the system.
What is a major advantage of MAC security?
Provides strong protection for sensitive data.
Why does MAC support compliance?
It enforces strict standardized policies.
What is a major disadvantage of MAC inflexibility?
Permissions are difficult to change dynamically.
Why is MAC hard to administer?
Clearances and labels are complex to manage.
Why is user autonomy limited in MAC?
Users cannot change permissions.
What is the Bell-LaPadula (BLP) model?
A confidentiality-focused security model.
What is the main goal of BLP?
Prevent unauthorized disclosure of information.
What do security levels represent in BLP?
Data classification and user clearance.
What is a subject in BLP?
An active entity (user or process).
What is an object in BLP?
A passive data container.
What is the Simple Security Property?
No Read Up (NRU).
What does No Read Up mean?
Lower-level users cannot read higher-level data.
What is the Star (*) Property in BLP?
No Write Down (NWD).
What does No Write Down mean?
Higher-level users cannot write to lower-level data.
Why does BLP prevent write down?
To stop data leakage to lower levels.
What is the Discretionary Security Property (DSP)?
Allows limited DAC within MAC.
What is a main advantage of BLP?
Strong confidentiality guarantees.