AN INFORMATION BASED SECURITY MODEL

The Defence Science and Technology Laboratory (Dstl)

The ways we create, store and share information are changing. New ways of keeping this information secure are needed if we want to continue working efficiently in a more open environment.

Currently, when sharing information between secure systems, security is implemented on a system by system basis, partially within the system and partially at the boundary of the system.

Existing boundary controls, whilst the best on offer today, are limited in this scenario. Although they are effective in what they do, they provide a very coarse level of access control with security properties that are managed at the system level.

An information based sharing model imageA much finer grain approach is needed with security managed at the information object level, as defined by the information owner, not the system owner.

An approach to information sharing that matches a modern organisation’s needs for flexibility, security and the ability to respond quickly is essential.

Without it, organisations cannot operate at maximum efficiency, with their effectiveness or security – or both – being compromised.

This case study looks at how we took part in a research project that was awarded Best Research Poster at the Annual Symposium of the UK Information Assurance Advisory Council (IAAC).

An Information Based Sharing model

© CSIIS 2014 – original poster at http://nxr.co/IAACposter

Download Case Study

Please fill in your details below to download this Case Study.

Download An Information Based Security Model Case Study
 
Sending

TALK TO ONE OF OUR EXPERTS

Talk To One Of Our Experts
Sending

We value your privacy

Researching Secure Boot in Linux case study image

FEATURED CASE STUDY

Researching Secure Boot in Linux (Research & Development Department of a European organisation) - When your trusted experts don’t have the answer, you need someone with the understanding to do the research and the expertise to develop and demonstrate the solution. MORE DETAILS

Be the first to know about developments in secure information exchange