Enforce mandatory access control policy; subjects; privileges over the set of covered subjects and objects specified in the policy, and where the policy: Is uniformly enforced across the covered subjects and objects within the system; Specifies that a subject that has been granted access to information is constrained from doing any of the following; Passing the information to unauthorized subjects or objects; Granting its privileges to other subjects; Changing one or more security attributes (specified by the policy) on subjects, objects, the system, or system components; Choosing the security attributes and attribute values (specified by the policy) to be associated with newly created or modified objects; and Changing the rules governing access control; and Specifies that subjects may explicitly be granted privileges such that they are not limited by any defined subset (or all) of the above constraints.
Mandatory access control is a type of nondiscretionary access control. Mandatory access control policies constrain what actions subjects can take with information obtained from objects for which they have already been granted access. This prevents the subjects from passing the information to unauthorized subjects and objects. Mandatory access control policies constrain actions that subjects can take with respect to the propagation of access control privileges; that is, a subject with a privilege cannot pass that privilege to other subjects. The policy is uniformly enforced over all subjects and objects to which the system has control. Otherwise, the access control policy can be circumvented. This enforcement is provided by an implementation that meets the reference monitor concept as described in AC-25 . The policy is bounded by the system (i.e., once the information is passed outside of the control of the system, additional means may be required to ensure that the constraints on the information remain in effect).
The trusted subjects described above are granted privileges consistent with the concept of least privilege (see AC-6 ). Trusted subjects are only given the minimum privileges necessary for satisfying organizational mission/business needs relative to the above policy. The control is most applicable when there is a mandate that establishes a policy regarding access to controlled unclassified information or classified information and some users of the system are not authorized access to all such information resident in the system. Mandatory access control can operate in conjunction with discretionary access control as described in AC-3(4) . A subject constrained in its operation by mandatory access control policies can still operate under the less rigorous constraints of AC-3(4), but mandatory access control policies take precedence over the less rigorous constraints of AC-3(4). For example, while a mandatory access control policy imposes a constraint that prevents a subject from passing information to another subject operating at a different impact or classification level, AC-3(4) permits the subject to pass the information to any other subject with the same impact or classification level as the subject. Examples of mandatory access control policies include the Bell-LaPadula policy to protect confidentiality of information and the Biba policy to protect the integrity of information.
mandatory access control policy is enforced over the set of covered subjects specified in the policy; mandatory access control policy is enforced over the set of covered objects specified in the policy; mandatory access control policy is uniformly enforced across the covered subjects within the system; mandatory access control policy is uniformly enforced across the covered objects within the system; mandatory access control policy and mandatory access control policy specifying that a subject that has been granted access to information is constrained from passing the information to unauthorized subjects or objects are enforced; mandatory access control policy and mandatory access control policy specifying that a subject that has been granted access to information is constrained from granting its privileges to other subjects are enforced; mandatory access control policy and mandatory access control policy specifying that a subject that has been granted access to information is constrained from changing one of more security attributes (specified by the policy) on subjects, objects, the system, or system components are enforced; mandatory access control policy and mandatory access control policy specifying that a subject that has been granted access to information is constrained from choosing the security attributes and attribute values (specified by the policy) to be associated with newly created or modified objects are enforced; mandatory access control policy and mandatory access control policy specifying that a subject that has been granted access to information is constrained from changing the rules governing access control are enforced; mandatory access control policy and mandatory access control policy specifying that subjects may explicitly be granted privileges such that they are not limited by any defined subset (or all) of the above constraints are enforced.
No cross-framework mappings available