This section contains the following topics:
CATop Secret Features Not Part of a TCB Configuration
The trusted computing base (TCB) components of an CA Top Secret MLS system include hardware and software. Changes to the TCB must be authorized to ensure the TCB remains trusted and is protected from unauthorized access. Any authorized programs or site-developed authorized code added to the TCB must adhere to the same or equivalent controls and checking as the TCB performs to maintain integrity. Even though integrity is maintained, the addition of any authorized software outside of the TCB may compromise MLS.
System integrity prevents an unauthorized program from:
z/OS accomplishes this by using hardware and software features.
Software features ensure that only authorized programs can access functions that might compromise integrity. To be authorized, a program must:
If a program satisfies one of these requirements, it can access a restricted supervisor call (SVC), certain exit and I/O appendages, or another system function that could compromise the security and integrity of the system.
In general, a software program does not harm system integrity if it:
System integrity of a secure system might be compromised if a program:
An authorized program could introduce integrity exposures in the following areas:
IBM provides information about guidelines that enable an authorized program to use system and user resources. These guidelines include:
Ensures the protection of sensitive data owned by authorized programs, the protection of user data from unauthorized users, and the protection of sensitive functions, such as SVCs.
Ensures that system and user resources are not counterfeited by separating these resources and that authorized programs can identify which program has responsibility for validating user data.
Ensures the validity of requests to use main storage and system resources by unauthorized programs and the validity of data passed by authorized programs.
Ensures that access to system resources is serialized and that a validation process does not alter variables before the operation being validated is complete.
Any product that runs authorized and is not part of the TCB is not considered part of an MLS TCB system.
Important! This does not mean that software that is not part of the TCB will not run on the system.
The following CA Top Secret features are not part of a TCB configuration:
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|