Page 1029 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1029

Users have labels assigned to them based on their clearance level,
               which is a form of privilege. Similarly, objects have labels, which

               indicate their level of classification or sensitivity. For example, the
               U.S. military uses the labels of Top Secret, Secret, and Confidential to
               classify data. Administrators can grant access to Top Secret data to
               users with Top Secret clearances. However, administrators cannot
               grant access to Top Secret data to users with lower-level clearances
               such as Secret and Confidential.


               Organizations in the private sector often use labels such as
               confidential (or proprietary), private, sensitive, and public. While
               governments use labels mandated by law, private sector organizations
               are free to use whatever labels they choose.

               The MAC model is often referred to as a lattice-based model. Figure
               14.3 shows an example of a lattice-based MAC model. It is reminiscent
               of a lattice in a garden, such as a rose lattice used to train climbing

               roses. The horizontal lines labeled Confidential, Private, Sensitive, and
               Public mark the upper bounds of the classification levels. For example,
               the area between Public and Sensitive includes objects labeled
               Sensitive (the upper boundary). Users with the Sensitive label can
               access Sensitive data.
































               FIGURE 14.3 A representation of the boundaries provided by lattice-
   1024   1025   1026   1027   1028   1029   1030   1031   1032   1033   1034