Integrity-Oriented Control Objectives: Proposed Revisions to the Trusted Computer System Evaluation Criteria (TCSEC), DoD 5200.28-STD
INSTITUTE FOR DEFENSE ANALYSES ALEXANDRIA VA
Pagination or Media Count:
For many years, the security research community has focused on the confidentiality as security, an a solid analytical foundation for addressing confidentiality issues has evolved. Now it is recognized that integrity is at least as important as confidentiality in many computer systems it is also apparent that integrity is not well understood. Control objectives, as they apply to automated information systems, express fundamental computer security requirements and serve as guidance to the development of more specific systems evaluation criteria. Within the department of defense, the control objectives contained in the Trusted Computer System Evaluation Criteria TCSEC, DoD 5200. 28-STD, are of primary concern to the development of product evaluation criteria. The TCSECs scope is currently confined to address only confidentiality protection of information. This document is intended to extend the scope of the TCSEC so that the control objectives, contained therein, will also address the protection of information and computing resource integrity. The document provides new and modified statements of control objective along with discussion and rationale for their inclusion or revision. The basis in Federal law and policy for the revised control objectives is discussed and a summary of each law and policy used in the derivation of the revisions is provided. The document is intended to be used as a strawman to foster further research and debate leading to a new standard for evaluation criteria that encompasses both integrity and confidentiality.
- Computer Systems Management and Standards