The information in this article applies to:
SUMMARY
C2 refers to a set of security policies that define how a secure system
operates. The C2 evaluation process is separate from the C2 certification
process. As of August 1995, National Security Agency (NSA) granted the C2
security rating for Windows NT Server and Workstation version 3.5. As a
result these operating systems are on the Evaluated Products List (EPL).
MORE INFORMATION
The requirements for A-, B-, C-, and D-level secure products are outlined
in the Trusted Computer System Evaluation Criteria (TCSEC) published by the
National Computer Security Center (NCSC). This publication is referred to
as the "Orange Book," and is part of NSA's security "rainbow series."
Security level requirements are open to interpretations that change over
time. When undergoing evaluation, each vendor negotiates with the NSA about
whether or not the details of its particular system implementation conform
with the abstract security policy concepts in the NSA's books. The vendor
must provide evidence that the requirements are being met.
C2 OverviewThe security policy in C2 is known as Discretionary Access Control (DAC). In the Windows NT implementation, the basic idea is that users of the system:
For example, in Windows NT, every object (file, Clipboard, window, and so on) has an owner; any owner can give or not give other users access to its objects. The system tracks (audits) your actions for the administrators (that is, the system administrator can track the objects you accessed, both successes and failures). The key distinction between C-level and B-level security is in the notion of access control. In a C2 (DAC) system, owners have absolute discretion about whether or not others have access to their objects. In a B-level, or Mandatory Access Control (MAC) system, objects have a security level defined independently from the owner's discretion. For example, if you receive a copy of an object marketed "secret," you can't give permission to other users to see this object unless they have "secret" clearance. This is defined by the system independent of your discretion. MAC involves the concept of "data labeling," which is the creation and maintenance by the system of security "labels" on data objects, unalterable by users (except in certain cases under system control and auditing). An administrator can get access to anyone's objects, although it may require some programming to do so (that is, the user interface won't expose this power). You can obtain more information on this process, including frequently asked questions, a copy of the evaluated products list, and copies of TCSEC and other documentation at the NCSC's web site at http://www.radium.ncsc.mil. Additional query words:
Keywords : ntsecurity |
Last Reviewed: January 25, 2000 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |