Mic security model call rule
Mic security model call rule
call {source : <Sid>, target : <Sid>}
This verifies the permissibility of data streams from the target subject to the source subject.
It returns the "allowed" result in the following cases:
- The integrity level of the
sourcesubject does not exceed the integrity level of thetargetsubject. - The integrity level of the
sourcesubject exceeds the integrity level of thetargetsubject, but the minimum integrity level of subjects and resources from which thesourcesubject can receive data does not exceed the integrity level of thetargetsubject. - The integrity level of the
sourcesubject is incomparable to the integrity level of thetargetsubject, but the minimum integrity level of subjects and resources from which thesourcesubject can receive data does not exceed the integrity level of thetargetsubject.
It returns the "denied" result in the following cases:
- The integrity level of the
sourcesubject exceeds the integrity level of thetargetsubject, and the minimum integrity level of subjects and resources from which thesourcesubject can receive data exceeds the integrity level of thetargetsubject. - The integrity level of the
sourcesubject exceeds the integrity level of thetargetsubject, and the minimum integrity level of subjects and resources from which thesourcesubject can read data is incomparable to the integrity level of thetargetsubject. - The integrity level of the
sourcesubject is incomparable to the integrity level of thetargetsubject, and the minimum integrity level of subjects and resources from which thesourcesubject can receive data exceeds the integrity level of thetargetsubject. - The integrity level of the
sourcesubject is incomparable to the integrity level of thetargetsubject, and the minimum integrity level of subjects and resources from which thesourcesubject can receive data is incomparable to the integrity level of thetargetsubject. - An integrity level was not assigned to the
sourcesubject or to thetargetsubject. - The
sourceortargetvalue is outside of the permissible range.
Example:
/* Any client in the solution is allowed to query
* any server (kernel) if data streams from
* the server (kernel) to the client are permitted by the
* Mic security model. Otherwise any client in the solution
* is prohibited from querying any server (kernel). */
request {
mic.call { source : src_sid
, target : dst_sid
}
}
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.