SlideShare a Scribd company logo
1 of 15
Chapter 2
Access Control Fundamentals
Chapter Overview
• Protection Systems
• Mandatory Protection Systems
• Reference Monitors
• Definition of a Secure Operating System
• Assessment criteria to be used against
each operating system.
Protection Systems
• Recall the concepts of subjects, objects and
permissions from the previous chapter.
• The most complete description, at given point in
time, of what is allowed within a given computer
system is given by a function which tells us, for a
given subject and object, what the subject may
do with the object.
• The best way to represent this function is by
means of a matrix called an access matrix.
An access matrix
So, what is a protection system?
• Informally, a protection system is a description of
what is allowed in a computer system, together
with a set of rules that allow us to modify a
description.
• Formally:
– A protection system consists of a protection
state, and a set of protection state
operations which enable modifications to
that state.
More Formal Definitions:
• An access matrix consists of a set of subjects S
a set of objects O a set of operations OP and a
function ops(s,o)⊂OP, which determines the
operations that subject s can perform on object
o.
• A protection domain specifies the set of
resources (objects) that a process can access
and the operations that a process may use to
access such resources.
Alternate representations for the
access matrix
• Instead of storing the whole matrix, which
is usually occupied mostly by empty
permissions, other representations are
often used:
– Each object with its associated column,
called its access control list or ACL.
– By rows, with each subject: called a
capability list or C-List
Mandatory Protection Systems
Mandatory Protection Systems
• A mandatory protection system is a protection system that can
only be modified by trusted administrators via trusted software,
consisting of the following state representations:
– A mandatory protection state is a state where subjects
and objects are represented by labels where the state
describes the operations that subject labels may take
upon object labels.
– A labeling state for mapping processes and system
resource objects to labels.
– A transition state that describes the legal ways that
processes and system resource objects may be
relabeled.
How it works
• The labels are fixed and define the access
relations.
• Subjects and objects are assigned different
labels according to need.
• When circumstances changes, labels may
change also.
• However, permissions are constrained to those
defined by the labels
• In addition, label assignment/reassignment is a
“privileged operation”.
In Pictures....
Reference Monitors
• A reference monitor is the classical access
enforcement mechanism. It takes a
request as input and returns a positive or
negative response (authorization).
• Three components:
– Interface
– Authorization module
– Policy store
What is a Secure Operating
System?
• A secure operating system is an operating
system where its access enforcement
mechanism satisfies the reference monitor
concept:
– Complete mediation: all security security-
sensitive operations are checked.
– Tamper-proof: Cannot be modified by
untrusted processes
– Verifiable.
Assessment Criteria
• Complete Mediation
– Correctness of subjects/objects
– Completeness
– Formal verification
• Tamperproof
– Protection of reference monitor.
– Protection of the Trusted Computing Base
• Verifiable
– Basis for the correctness of the TCB.
– Enforcement of the system's security goals?

More Related Content

Similar to ch02.ppt

access-control-basics-murat-kantarcioglu.pdf
access-control-basics-murat-kantarcioglu.pdfaccess-control-basics-murat-kantarcioglu.pdf
access-control-basics-murat-kantarcioglu.pdfNohaNagy5
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementSorath Asnani
 
Ch18 OS
Ch18 OSCh18 OS
Ch18 OSC.U
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMcscpconf
 
Attribute-Based Access Control in Symfony
Attribute-Based Access Control in SymfonyAttribute-Based Access Control in Symfony
Attribute-Based Access Control in SymfonyAdam Elsodaney
 
Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015AFCEA International
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architectureKarthikeyan Dhayalan
 
Modeling&Simulation_Ch01_lecture 2.pptx
Modeling&Simulation_Ch01_lecture 2.pptxModeling&Simulation_Ch01_lecture 2.pptx
Modeling&Simulation_Ch01_lecture 2.pptxMaiGaafar
 
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptx
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptxARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptx
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptxFred Gordy
 

Similar to ch02.ppt (20)

Protection 80386
Protection 80386Protection 80386
Protection 80386
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
access-control-basics-murat-kantarcioglu.pdf
access-control-basics-murat-kantarcioglu.pdfaccess-control-basics-murat-kantarcioglu.pdf
access-control-basics-murat-kantarcioglu.pdf
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Basic Concepts and Types of Network Management
Basic Concepts and Types of Network ManagementBasic Concepts and Types of Network Management
Basic Concepts and Types of Network Management
 
Ch18 OS
Ch18 OSCh18 OS
Ch18 OS
 
OSCh18
OSCh18OSCh18
OSCh18
 
OS_Ch18
OS_Ch18OS_Ch18
OS_Ch18
 
SELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEMSELF LEARNING REAL TIME EXPERT SYSTEM
SELF LEARNING REAL TIME EXPERT SYSTEM
 
Attribute-Based Access Control in Symfony
Attribute-Based Access Control in SymfonyAttribute-Based Access Control in Symfony
Attribute-Based Access Control in Symfony
 
Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Protection
ProtectionProtection
Protection
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
Chapter24
Chapter24Chapter24
Chapter24
 
Modeling&Simulation_Ch01_lecture 2.pptx
Modeling&Simulation_Ch01_lecture 2.pptxModeling&Simulation_Ch01_lecture 2.pptx
Modeling&Simulation_Ch01_lecture 2.pptx
 
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptx
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptxARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptx
ARE YOU READY FOR A CYBER EVENT - ASK YOURSELF THESE QUESTIONS.pptx
 
Lecture 6 expert systems
Lecture 6   expert systemsLecture 6   expert systems
Lecture 6 expert systems
 

More from BijayKc16

Bikash K.c..pptx. this is the presentation of brochure.
Bikash K.c..pptx. this is the presentation of brochure.Bikash K.c..pptx. this is the presentation of brochure.
Bikash K.c..pptx. this is the presentation of brochure.BijayKc16
 
eDevelopment.ppt
eDevelopment.ppteDevelopment.ppt
eDevelopment.pptBijayKc16
 
androidPramming.ppt
androidPramming.pptandroidPramming.ppt
androidPramming.pptBijayKc16
 
7.1-ProductionManagement.Seals.ppt
7.1-ProductionManagement.Seals.ppt7.1-ProductionManagement.Seals.ppt
7.1-ProductionManagement.Seals.pptBijayKc16
 
OnePageDesigns.ppt
OnePageDesigns.pptOnePageDesigns.ppt
OnePageDesigns.pptBijayKc16
 
social presentation.pptx
social presentation.pptxsocial presentation.pptx
social presentation.pptxBijayKc16
 

More from BijayKc16 (6)

Bikash K.c..pptx. this is the presentation of brochure.
Bikash K.c..pptx. this is the presentation of brochure.Bikash K.c..pptx. this is the presentation of brochure.
Bikash K.c..pptx. this is the presentation of brochure.
 
eDevelopment.ppt
eDevelopment.ppteDevelopment.ppt
eDevelopment.ppt
 
androidPramming.ppt
androidPramming.pptandroidPramming.ppt
androidPramming.ppt
 
7.1-ProductionManagement.Seals.ppt
7.1-ProductionManagement.Seals.ppt7.1-ProductionManagement.Seals.ppt
7.1-ProductionManagement.Seals.ppt
 
OnePageDesigns.ppt
OnePageDesigns.pptOnePageDesigns.ppt
OnePageDesigns.ppt
 
social presentation.pptx
social presentation.pptxsocial presentation.pptx
social presentation.pptx
 

Recently uploaded

Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Narsimha murthy
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Douxkojalkojal131
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightDelhi Call girls
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...ankitnayak356677
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricksabhishekparmar618
 
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...Suhani Kapoor
 
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonCheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonDelhi Call girls
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
PODSCAPE - Brochure 2023_ prefab homes in Bangalore India
PODSCAPE - Brochure 2023_ prefab homes in Bangalore IndiaPODSCAPE - Brochure 2023_ prefab homes in Bangalore India
PODSCAPE - Brochure 2023_ prefab homes in Bangalore IndiaYathish29
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdfSwaraliBorhade
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Sitegalleryaagency
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
 
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...Revit Understanding Reference Planes and Reference lines in Revit for Family ...
Revit Understanding Reference Planes and Reference lines in Revit for Family ...
 
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai DouxDubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
Dubai Call Girls Pro Domain O525547819 Call Girls Dubai Doux
 
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 nightCheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
Cheap Rate Call girls Malviya Nagar 9205541914 shot 1500 night
 
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
Raj Nagar Extension Call Girls 9711199012 WhatsApp No, Delhi Escorts in Raj N...
 
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service AmravatiVIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
VIP Call Girl Amravati Aashi 8250192130 Independent Escort Service Amravati
 
Cosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable BricksCosumer Willingness to Pay for Sustainable Bricks
Cosumer Willingness to Pay for Sustainable Bricks
 
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
 
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk GurgaonCheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Iffco Chowk Gurgaon
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
 
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
Call Girls In Safdarjung Enclave 24/7✡️9711147426✡️ Escorts Service
 
PODSCAPE - Brochure 2023_ prefab homes in Bangalore India
PODSCAPE - Brochure 2023_ prefab homes in Bangalore IndiaPODSCAPE - Brochure 2023_ prefab homes in Bangalore India
PODSCAPE - Brochure 2023_ prefab homes in Bangalore India
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf3D Printing And Designing Final Report.pdf
3D Printing And Designing Final Report.pdf
 
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
 
How to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our SiteHow to Be Famous in your Field just visit our Site
How to Be Famous in your Field just visit our Site
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 

ch02.ppt

  • 2. Chapter Overview • Protection Systems • Mandatory Protection Systems • Reference Monitors • Definition of a Secure Operating System • Assessment criteria to be used against each operating system.
  • 3. Protection Systems • Recall the concepts of subjects, objects and permissions from the previous chapter. • The most complete description, at given point in time, of what is allowed within a given computer system is given by a function which tells us, for a given subject and object, what the subject may do with the object. • The best way to represent this function is by means of a matrix called an access matrix.
  • 5. So, what is a protection system? • Informally, a protection system is a description of what is allowed in a computer system, together with a set of rules that allow us to modify a description. • Formally: – A protection system consists of a protection state, and a set of protection state operations which enable modifications to that state.
  • 6. More Formal Definitions: • An access matrix consists of a set of subjects S a set of objects O a set of operations OP and a function ops(s,o)⊂OP, which determines the operations that subject s can perform on object o. • A protection domain specifies the set of resources (objects) that a process can access and the operations that a process may use to access such resources.
  • 7. Alternate representations for the access matrix • Instead of storing the whole matrix, which is usually occupied mostly by empty permissions, other representations are often used: – Each object with its associated column, called its access control list or ACL. – By rows, with each subject: called a capability list or C-List
  • 9. Mandatory Protection Systems • A mandatory protection system is a protection system that can only be modified by trusted administrators via trusted software, consisting of the following state representations: – A mandatory protection state is a state where subjects and objects are represented by labels where the state describes the operations that subject labels may take upon object labels. – A labeling state for mapping processes and system resource objects to labels. – A transition state that describes the legal ways that processes and system resource objects may be relabeled.
  • 10. How it works • The labels are fixed and define the access relations. • Subjects and objects are assigned different labels according to need. • When circumstances changes, labels may change also. • However, permissions are constrained to those defined by the labels • In addition, label assignment/reassignment is a “privileged operation”.
  • 12. Reference Monitors • A reference monitor is the classical access enforcement mechanism. It takes a request as input and returns a positive or negative response (authorization). • Three components: – Interface – Authorization module – Policy store
  • 13.
  • 14. What is a Secure Operating System? • A secure operating system is an operating system where its access enforcement mechanism satisfies the reference monitor concept: – Complete mediation: all security security- sensitive operations are checked. – Tamper-proof: Cannot be modified by untrusted processes – Verifiable.
  • 15. Assessment Criteria • Complete Mediation – Correctness of subjects/objects – Completeness – Formal verification • Tamperproof – Protection of reference monitor. – Protection of the Trusted Computing Base • Verifiable – Basis for the correctness of the TCB. – Enforcement of the system's security goals?