AC-25 Reference Monitor
Implement a reference monitor for ac-25_odp that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.
Parameter ID | Definition |
---|---|
ac-25_odp | access control policies |
Baselines
- L
- M
- H
- P
Guidance
A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects. A reference validation mechanism is always invoked, tamper-proof, and small enough to be subject to analysis and tests, the completeness of which can be assured (i.e., verifiable). Information is represented internally within systems using abstractions known as data structures. Internal data structures can represent different types of entities, both active and passive. Active entities, also known as subjects, are associated with individuals, devices, or processes acting on behalf of individuals. Passive entities, also known as objects, are associated with data structures, such as records, buffers, communications ports, tables, files, and inter-process pipes. Reference monitors enforce access control policies that restrict access to objects based on the identity of subjects or groups to which the subjects belong. The system enforces the access control policy based on the rule set established by the policy. The tamper-proof property of the reference monitor prevents determined adversaries from compromising the functioning of the reference validation mechanism. The always invoked property prevents adversaries from bypassing the mechanism and violating the security policy. The smallness property helps to ensure completeness in the analysis and testing of the mechanism to detect any weaknesses or deficiencies (i.e., latent flaws) that would prevent the enforcement of the security policy.
Related controls 8
- AC-03 Access Enforcement L M H P
- AC-16 Security and Privacy Attributes L M H P
- SA-08 Security and Privacy Engineering Principles L M H P
- SA-17 Developer Security and Privacy Architecture and Design L M H P
- SC-03 Security Function Isolation L M H P
- SC-11 Trusted Path L M H P
- SC-39 Process Isolation L M H P
- SI-13 Predictable Failure Prevention L M H P