Page 1032 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1032
rest of the security domain. A subject must have the correct clearance
and the need to know data within a specific compartment to gain
access to the compartmentalized object. A hybrid MAC environment
provides granular control over access, but becomes increasingly
difficult to manage as it grows. Figure 14.3 is an example of a hybrid
environment.

