Title : Security Assurance Requirements for Linux Application
نویسنده
چکیده
80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline the security assurance requirements they must satisfy to meet their intended objectives. 85 This is the contribution of this document. The focus is on application containers on a Linux 86 platform. 87
منابع مشابه
Draft NISTIR 8176, Security Assurance Requirements for Linux Application Container Deployments
80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...
متن کاملAssurance Evaluation for OSS Adoption in a Telco Context
Software Assurance (SwA) is a complex concept that involves different stages of a software development process and may be defined differently depending on its focus, as for instance software quality, security, or dependability. In Computer Science, the term assurance is referred to all activities necessary to provide enough confidence that a software product will satisfy its users’ functional a...
متن کاملAssurance Case Driven Design based on the Harmonized Framework of Safety and Security Requirements
Assurance (Security and Safety) Case is an approach to prove critical systems and software compliance with security and safety requirements. We propose an advanced framework named as Assurance Case Driven Design (AC DD) to improve cost-effectiveness of certification and licensing processes. AC DD is based on Claim-Argument-Evidence-Criteria (CAEC) notation and Development-Verification&Validatio...
متن کاملA Security Design for a Wide-Area Distributed System
Designing security of wide-area distributed systems is a highly complicated task. The complexity of underlying distribution and replica-tion infrastructures together with the diversity of application scenarios increases the number of security requirements that must be addressed. High assurance requires the security enforcement to be isolated from non-security relevant functions and limited in t...
متن کاملMeeting Critical Security Objectives with Security-Enhanced Linux
Security-enhanced Linux incorporates a strong, flex ible mandatory access control architecture into Linux. It provides a mechanism to enforce the sep aration of information based on confidentiality and integrity requirements. This allows threats of tam pering and bypassing of application security mech anisms to be addressed and enables the confine ment of damage that can be caused by malic...
متن کامل