Page 1439 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1439

not readable at a lower classification level.




                          Errors in storage access controls become particularly

                  dangerous in cloud computing environments, where a single
                  misconfiguration can publicly expose sensitive information on the
                  web. Organizations leveraging cloud storage systems, such as

                  Amazon’s Simple Storage Service (S3), should take particular care
                  to set strong default security settings that restrict public access and
                  then to carefully monitor any changes to that policy that allow
                  public access.



               Covert channel attacks pose the second primary threat against data
               storage resources. Covert storage channels allow the transmission of
               sensitive data between classification levels through the direct or
               indirect manipulation of shared storage media. This may be as simple

               as writing sensitive data to an inadvertently shared portion of memory
               or physical storage. More complex covert storage channels might be
               used to manipulate the amount of free space available on a disk or the
               size of a file to covertly convey information between security levels.
               For more information on covert channel analysis, see Chapter 8,
               “Principles of Security Models, Design, and Capabilities.”
   1434   1435   1436   1437   1438   1439   1440   1441   1442   1443   1444