|
|||||||
Security DomainsIntroductionThis brief document aims to clarify the term security domain. Section 2 lists definitions collected from security related documents. Section 3 relates the terminology to the differentiated security model. DefinitionsBelow are definitions and descriptions cited from security standards and other relevant documents.
It is clear from looking at the very limited number of definitions reproduced above that security domain can be used and applied to whatever constitutes a domain in any given context. DiscussionThe straight forward definition of a security domain is a domain subject to a common security policy. It is possible to define domains such that they are detached from the infrastructure they are using for communication etc., as well as from strict organisational boundaries. In today’s complex network environments it is likely that security policies, for example, will need to be defined for applications or groups of applications that neither conforms to a single ‘network domain’ or ‘owner domain’. A domain can, for example, be defined to include an application or a group of applications. However, since security domains often are assumed to have either physical/technical or organisational boundaries it might be useful to find a different term when different kinds of domains are addressed. Meta-group uses the term trust domain to describe a domain which can be made up from resources belonging to different security domains. A trust domain is (as it appears) related to applications in their model. A complete application can be made up of components located on different networks (and security domains), as illustrated in figure 1. Applications can be very complex and made up of many subsystems as well as having users spread out over several security domains. Figure 1 – Illustrating how a trust domain can be made up of By applying the differentiated security model and its security classification scheme to the various sub-systems, or modules, a complete application can be built, where the application can be classified according to the lowest level of the constituent sub-systems. This application (or system) corresponds to a trust domain in the Meta-group model. If the individual sub-systems comply with a certain (minimal) security level and no sub-system or link (including their interfaces) are classified below this level, the complete system can also be classified to this level. References
Links
|
|
||||||
|