[Zope3-checkins] SVN: Zope3/trunk/doc/security/SecurityTarget.tex spelling,

Christian Zagrodnick cz at gocept.com
Thu Apr 21 07:59:08 EDT 2005


Log message for revision 30074:
  spelling, 
  
  removed pointles paragraph
  

Changed:
  U   Zope3/trunk/doc/security/SecurityTarget.tex

-=-
Modified: Zope3/trunk/doc/security/SecurityTarget.tex
===================================================================
--- Zope3/trunk/doc/security/SecurityTarget.tex	2005-04-21 11:11:48 UTC (rev 30073)
+++ Zope3/trunk/doc/security/SecurityTarget.tex	2005-04-21 11:59:08 UTC (rev 30074)
@@ -642,17 +642,6 @@
    \\
   
 
-  T.Import
-   & 
-  An attacker might try to make the system
-  interpret imported security attributes in a
-  not intended way to acquire a higher level of
-  access to the system.
-   & 
-  Secondary assets
-   \\
-  
-
   T.RIP
    & 
   An attacker might try to make the system use
@@ -2273,23 +2262,23 @@
 
   \begin{longtable}{rRRRRRRRRRRRRRRR}
     \toprule
-              & T.IA  & T.Perm &T.Operation&T.AuditFake&T.Import & T.RIP&T.Transaction&T.Undo &T.Timestamps & T.Host & A.OS & A.Admin & A.Network & A.Client & A.Credential  \\
+              & T.IA  & T.Perm &T.Operation&T.AuditFake& T.RIP&T.Transaction&T.Undo &T.Timestamps & T.Host & A.OS & A.Admin & A.Network & A.Client & A.Credential  \\
     \midrule\endhead
-O.IA         &  \oh  &       &            &            &         &      &             &       &             &        &      &       \\
-O.Delegation &       &   \oh &            &            &         &      &             &       &             &        &      &        \\
-O.Audit      & \oh   &   \oh &     \oh    &            &  \oh    &      &             &  \oh  &             &        &      &        \\
-O.Protect    &       &       &            &    \oh     &         &      &             &       &             &        &      &        \\
-O.Access     &       &       &      \oh   &            &         &      &    \oh      &       &             &   \oh  &      &        \\
-O.Integrity  &       &       &            &            &         &  \oh &             &       &             &        &      &        \\
-O.Attributes &       &       &            &            &   \oh   &  \oh &             &  \oh  &             &        &      &        \\
-O.ManageRisk &   \oh &       &            &            &         &      &             &       &             &        &      &        \\
+O.IA         &  \oh  &       &            &            &      &             &       &             &        &      &       \\
+O.Delegation &       &   \oh &            &            &      &             &       &             &        &      &        \\
+O.Audit      & \oh   &   \oh &     \oh    &            &      &             &  \oh  &             &        &      &        \\
+O.Protect    &       &       &            &    \oh     &      &             &       &             &        & \oh  &        \\
+O.Access     &       &       &      \oh   &            &      &    \oh      &       &             &   \oh  &      &        \\
+O.Integrity  &       &       &            &            &  \oh &             &       &             &        &      &        \\
+O.Attributes &       &       &            &            &  \oh &             &  \oh  &             &        &      &        \\
+O.ManageRisk &   \oh &       &            &            &      &             &       &             &        &      &        \\
 \midrule
-OE.OS        &       &       &            &            &         &      &             &       &    \oh      &        &  \oh &         &         &            &          \\
-OE.Trust     &       &       &            &            &         &      &             &       &             &        &      &  \oh    &         &            &            \\
-OE.Auditlog  &       &       &            &            &         &      &             &       &             &        & \oh  &         &         &            &                   \\  
-OE.Network   &       &       &            &            &         &      &             &       &             &        &      &         &  \oh    &            &                   \\   
-OE.Client    &       &       &            &            &         &      &             &       &             &        &      &         &         &    \oh     &                   \\
-OE.Credential&       &       &            &            &         &      &             &       &             &        &      &         &         &            &    \oh    \\ 
+OE.OS        &       &       &            &            &      &             &       &    \oh      &        &  \oh &         &         &            &          \\
+OE.Trust     &       &       &            &            &      &             &       &             &        &      &  \oh    &         &            &            \\
+OE.Auditlog  &       &       &            &            &      &             &       &             &        & \oh  &         &         &            &                   \\  
+OE.Network   &       &       &            &            &      &             &       &             &        &      &         &  \oh    &            &                   \\   
+OE.Client    &       &       &            &            &      &             &       &             &        &      &         &         &    \oh     &                   \\
+OE.Credential&       &       &            &            &      &             &       &             &        &      &         &         &            &    \oh    \\ 
 \bottomrule
   \caption{Mapping of Threats and Assumptions to Security Objectives}
   \label{tab-SOR}
@@ -2310,12 +2299,15 @@
   permissions.
   
   \item[O.Audit:] This security objective is necessary to detect and recover
-  from most threats: \textbf{T.IA, T.Perm, T.Operation, T.Import and T.Undo}
+  from most threats: \textbf{T.IA, T.Perm, T.Operation and T.Undo}
   as those events are logged by the audit log.
   
   \item[O.Protect:] This security objective is necessary to counter the threat
   \textbf{T.AuditFake} because it protects the audit data generation function
-  and thereby prevents logging of false information.
+  and thereby prevents logging of false information. It also covers the
+  assumption \textbf{A.OS} because self-protection mechanisms decrease the
+  risk of compromising the TOE and thereby the risk of compromising the
+  host system.
   
   \item[O.Access:] This security objective is necessary to counter the threat
   \textbf{T.Operation} because it prevents performing operations on an object
@@ -2330,7 +2322,7 @@
   an unhandled error occurs.
   
   \item[O.Attributes:] This security objective is necessary to counter the
-  threats \textbf{T.Undo}, \textbf{T.Import} and \textbf{T.RIP} because it
+  threats \textbf{T.Undo} and \textbf{T.RIP} because it
   prevents an attacker form setting inconsistent security attributes from
   which he could gain more access than intended.
 
@@ -2345,9 +2337,6 @@
   are physically secure. This means an attacker cannot access the machine
   directly, i.e. around Zope.
 
-  \item[OE.Trust:] This security objective covers the assumption
-  \textbf{A.Admin}.
-
   \item[OE.Auditlog:] This security objective covers the assumption
   \textbf{A.OS}. To keep the operating system secure and detect possible
   intrusions it is vital to continuously monitor the audit log. It is also



More information about the Zope3-Checkins mailing list