Information Technology Reference
In-Depth Information
n
n
n
Shutdown
Clean shutdown versus abrupt (i.e., power off); ); permissions to shutdown
Unexpected; fail-state parameters
User access/interface
Privilege modes
User management
Access
Logon permissions
Password management: storage/encryption; user modification
rules
File management
File system, files, directories, file locking
File security hierarchies with read-up and write-down rules
Process/service management
Processes
Overhead processes
Services
Providing services to executing applications, users
Buffer management
Application execution
Interprocess communication (IPC)
hread management
Hardware interface
Initial recognition and handshaking
I/O: requests, permissions
Network connectivity
Access from network to computer
Access to network from computer
Error handling
Faults
Traps
n
n
n
n
n
n
n
n
n
n
n
9.11.2
Commentary
he IA 2 Framework does provide a guideline with respect to determining IA archi-
tecture; however, the IA architect must still be aware of technology details, in this
case the complexities of operating systems and secure operating system configura-
tion. The IA 2 Framework may provide direction for a novice security architect,
but even a novice security architect must have breadth and depth in technology
experience. If your knowledge of current operating systems is weak, engage the
appropriate expertise to ask the right questions and find the relevant answers to
securing the OS.
Search WWH ::




Custom Search