auti.dev   ≽^._.^≼ ∫

Trusted Computing Base - Mindmap

A Trusted Computing Base (TCB) is the totality of the protection mechanisms within a system or architecture that work together to enforce a security policy.

Definition Simplified

Totality: ALL

Protection Mechanisms:

Figure: Mindmap for TCB

Figure: Mindmap for TCB

A Trusted Computing Base comprises all of the protection mechanisms:

Reference Monitor Concept (RMC)

A reference monitor is an access control concept of an abstract machine that mediates all accesses to objects by subjects.

Definition 20–3. [50]

Figure: Reference Monitor Concept

Figure: Reference Monitor Concept

Reference Monitor Principles

  1. Tamper Proof
    • Isolation: protected from unauthorized alteration
    • Resists subversion and malicious software
  2. Always invoked (non by-passable)
    • Completeness: every access is mediated
  3. Small and simple enough to allow assurance of its correctness
    • Verifiability: verified to perform its functions properly
    • Ability to implement policy with high assurance

Defines what it means for a system to be “secure”. Most system vulnerabilities can be traced to violations of one or more of the RM principles

Security Kernel

security kernel is a combination of hardware & software that implementsreference monitor.

Resources


#Blue-Teaming #Compliance #Cybersecurity #Policy