CISSP 2024
Silicon Root of Trust (SRoT) Core Concept
Security Governance Through Principles and Policies
WHAT IS IT?
An immutable, hardware-based security anchor etched into the silicon chip during manufacturing.
ITS GOAL
To start a “Chain of Trust” by verifying the integrity of the first piece of code (firmware) that runs at boot time.
CISSP Keywords
Integrity
Authenticity
Immutability
Chain of Trust
Hardware-based Security
Secure Boot
Supply Chain Security
Security Governance Through Principles and Policies
CISSP 2024
Due Diligence Core Concept
Security Governance Through Principles and Policies
WHAT IT IS
The preparatory, investigative step. It’s the process of understanding risks and establishing the necessary policies, standards, and controls BEFORE an incident occurs.
ANALOGY
“Doing your homework”. It is the research and planning phase.
Security Governance Through Principles and Policies
CISSP 2024
Due Care Core Concept
Security Governance Through Principles and Policies
WHAT IT IS
The operational, ongoing action. It’s the act of implementing and maintaining the controls and policies that were established during due diligence.
ANALOGY
“Following the rules you set”. It’s the execution and maintenance phase.
Security Governance Through Principles and Policies
CISSP 2024
Due Diligence vs Due Care
Security Governance Through Principles and Policies
Due Diligence = Planning & Policy
(e.g., Researching and writing a backup policy)
Due Care = Doing & Practice
(e.g., Actually performing the backup according to the backup policy)
Diligence always comes before Care.
Security Governance Through Principles and Policies
CISSP 2024
Due Care & Due Diligence
CISSP Mindset: Why Care?
Security Governance Through Principles and Policies
THESE CONCEPTS DEFINE a “prudent person” standard and are crucial for legal and regulatory compliance.
Due Diligence shows you PLANNED to be secure.
Due Care proves you ACTED to be secured.
Lack of either can be considered negligence.
Security Governance
CISSP 2024
Unilateral NDA Core Concept
Personnel Security and Risk Management Concept
WHAT IT IS
A one-way agreement where only ONE part discloses confidential information. The other party’s only obligation is to keep it secret.
ANALOGY
A one-way street.
CLASSIC EXAMPLE
Company disclosing trade secrets to a new employee.
CISSP 2024
Bilateral NDA (Mutual NDA) Core Concept
Personnel Security and Risk Management Concept
WHAT IT IS
A two-way agreement where BOTH parties exchange confidential information. Each party is both a discloser and receiver.
ANALOGY
Two-way street.
CLASSIFC EXAMPLE
Two companies exploring a partnership or merger.
Personnel Security and Risk Management Concept
CISSP 2024
Multilateral NDA Core Concept
Personnel Security and Risk Management Concept
WHAT IS IS
An agreement involving THREE or MORE parties. It simplifies situations where one party needs to disclose information to multiple other parties, avoiding the need for separate NDAs.
CLASSIC EXAMPLE
A startup pitching its business plan to a group of different venture capitalists.
Personnel Security and Risk Management Concept
CISSP 2024
Physically Uncloneable Function (PUF) Core Concept
Security Governance Through Principles and Policies
WHAT IT IS
A “digital fingerprint” for a specific hardware chip, derived from its unique, random microscopic variation from the manufacturing process.
ANALOGY
Human fingerprint or iris scan for a chip
HOW IT WORKS
It use a Challenge-Response mechanism:
1. Input a “Challenge” (a specific data pattern)
2. The PUF’s unique physical structure process it
3. It outputs a unique and repeatable “Response”
Same challenge on the same chip = Same response, every time.
Security Governance Through Principles and Policies
CISSP 2024
User Behavior Analytics (UBA) Core Concept
Personnel Security and Risk Management Concept
WHAT IT IS
A security process that analyzes user activity data to detect anomalies and potential threats, particularly insider threats and compromised accounts.
ANALOGY
A credit card fraud detection system. It knows your normal spending habits and flags unsual transactions.
Personnel Security and Risk Management Concept
CISSP 2024
Bell-LaPadula Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS:
A mandatory access control (MAC) model focused exclusively on enforcing CONFIDENTIALITY.
RULES
Rule 1: Simple Security Property - “No Read Up”
Rule 2: Star Security Property - “No Write Down”
Principles of Security Models, Design, and Capabilities
CISSP 2024
Bipa Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A mandatory access control (MAC) model focused exclusively on enforcing INTEGRITY.
RULE
Rule 1: Simple Integrity Axiom - “No Read Down”
Rule 2: Star Integrity Axiom - “No Write Up”
Principles of Security Models, Design, and Capabilities
CISSP 2024
Trusted Computing Base (TCB) Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
The totality of all hardware, software, and firmware components within a system that are responsible for enforcing its security policy
ANALOGY
The security guards, locked door, and reinforced walls within a secure facility. It’s the collection of ALL components that enforce security.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Trusted Computing Base (TCB)
Security Perimeter
Principles of Security Models, Design, and Capabilities
The Security Perimeter is the imaginary boundary that separates the components of the TCB from the rest of the system.
Inside boundary: Trusted components (the TCB)
Outside boundary: Untrusted components.
Communications across this boundary must be strictly controlled (mediated) by the TCB.
The main goal in secure system design is to make the TCB as SMALL as possible.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Trusted Computing Base (TCB)
Reference Monitor & Security Kernel
Principles of Security Models, Design, and Capabilities
Reference Monitor: An abstract security concept. It is a theoretical gatekeeper that mediates ALL access requests between objects and subjects.
Security Kernel: The physical implementation of the Reference Monitor concept. It is the core of the TCB, responsible for the access control rules.
Principles of Security Models, Design, and Capabilities
CISSP 2024
State Machine Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A formal, abstract model that defines a system as always being in a specific “state”. The model ensures that all transition from one state to another are secure.
ANALOGY
A traffic light system. It can only be in a secure state (Red, Green, or Yellow). The transition from Green to Red is secure because it goes through the Yellow state. It can never transition from Green directly to a state where all lights are off (an insecure state).
Principles of Security Models, Design, and Capabilities
CISSP 2024
State Machine Model Relation to Other Models
Principles of Security Models, Design, and Capabilities
The State Machine Model is a generic framework. Other famous models are specific implementation of it:
1. Bell-LaPadula
2. BIPA
Principles of Security Models, Design, and Capabilities
CISSP 2024
Information Flow Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A model that tracks the movement of information between subjects and objects of different security levels, regardless of the specific access control rules.
ANALOGY
A plumping system designed with one-way valves to ensure high-security water doesn’t leak into low-security pipes, and vice versa.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Non-interference Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A strict security model ensuring that actions performed by high-level subjects have NO observable effect on low-level subjects.
ANALOGY
Two users are in a separate, soundproof rooms. The lower-level user cannot even know if the high-level user is present, let alone what they are doing. Total isolation.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Non-interference Model Goal & Purpose
Principles of Security Models, Design, and Capabilities
ITS PRIMARY GOAL
To completely ELIMINATE covert channels
HOW IT WORKS
It ensures that the “view” of the system for a low-level user is identical, regardless of any actions taken by a high-level user. It prevents any form of signaling or side effects.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Clark-Wilson Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A model focuses on INTERGRITY in commercial environments.
KEY GOALS
To ensure data integrity through well-formed transaction. It prevents user from modifying data directly; they must use trusted program.
ANALOGY
A bank funds transfer system
Principles of Security Models, Design, and Capabilities
CISSP 2024
Clark-Wilson Model Key Players
Principles of Security Models, Design, and Capabilities
Constrained Data Item (CDI): The data being protected (e.g., account balance);
Transformation Procedure (TP): The ONLY certified program allowed to modify a CDI (e.g., the “transfer fund” program).
Integrity Verification Procedure (IVP): A procedure that checks the system for a valid state (e.g., an end-of-day audit).
Principles of Security Models, Design, and Capabilities
CISSP 2024
Brewer-Nash Model Core Concept
Principles of Security Models, Design, and Capabilities
WHAT IT IS
A model designed to prevent “Conflict of Interest” (Col) in commercial models. It’s also known as Chinese Wall Model.
ANALOGY
A consultant who works for competing clients (e.g., Coca-Cola and Pepsi). The model prevents them from accessing data from both sides.
Principles of Security Models, Design, and Capabilities
CISSP 2024
Brewer-Nash Model Core Rules
Principles of Security Models, Design, and Capabilities
THE RULE
Once a subject (user) accesses data from one company dataset, they are blocked from accessing data of any competing company in the same Conflict of Interest (Col) Class.
DYNAMIC ACCESS:
Access rights are not static, they change dynamically based on the user’s previous actions (history-based access control).
Principles of Security Models, Design, and Capabilities