Previous Topic: Operating a Multilevel Secure SystemNext Topic: Bibliography


Modifying a Multilevel Secure System

This section contains the following topics:

Introduction

System Integrity

Possible Integrity Exposures

Acceptable Modifications

CATop Secret Features Not Part of a TCB Configuration

Introduction

The trusted computing base (TCB) components of an CA Top Secret MLS system include hardware and software. Changes to the TCB must be authorized to ensure the TCB remains trusted and is protected from unauthorized access. Any authorized programs or site-developed authorized code added to the TCB must adhere to the same or equivalent controls and checking as the TCB performs to maintain integrity. Even though integrity is maintained, the addition of any authorized software outside of the TCB may compromise MLS.

System Integrity

System integrity prevents an unauthorized program from:

z/OS accomplishes this by using hardware and software features.

Software features ensure that only authorized programs can access functions that might compromise integrity. To be authorized, a program must:

If a program satisfies one of these requirements, it can access a restricted supervisor call (SVC), certain exit and I/O appendages, or another system function that could compromise the security and integrity of the system.

Possible Integrity Exposures

In general, a software program does not harm system integrity if it:

System integrity of a secure system might be compromised if a program:

An authorized program could introduce integrity exposures in the following areas:

IBM provides information about guidelines that enable an authorized program to use system and user resources. These guidelines include:

Protection

Ensures the protection of sensitive data owned by authorized programs, the protection of user data from unauthorized users, and the protection of sensitive functions, such as SVCs.

Identification

Ensures that system and user resources are not counterfeited by separating these resources and that authorized programs can identify which program has responsibility for validating user data.

Validation

Ensures the validity of requests to use main storage and system resources by unauthorized programs and the validity of data passed by authorized programs.

Serialization

Ensures that access to system resources is serialized and that a validation process does not alter variables before the operation being validated is complete.

Acceptable Modifications

Any product that runs authorized and is not part of the TCB is not considered part of an MLS TCB system.

Important! This does not mean that software that is not part of the TCB will not run on the system.

CATop Secret Features Not Part of a TCB Configuration

The following CA Top Secret features are not part of a TCB configuration: