该楼层疑似违规已被系统折叠 隐藏此楼查看此楼

those who are authorized for audit data. The TCB shall be able to record the following types of events: use of identification

and authentication mechanisms, introduction or objects into a user's address space (e.g., file open, program initiation),

deletion of objects, and actions taken by computer operators and system administrators and/or system security officers, and

other security relevant events. For each recorded event, the audit record shall identify: date and time of the event, user,

type of event, and success or failure of the event. For identification/authentication events the origin of request (e.g.,

terminal ID) shall be included in the audit record. For events that introduce an object into a user's address space and for

object deletion events the audit record shall include the name of the object. The ADP system administrator shall be able to

selectively audit the actions of any one or more users based on individual identity.

Assurance

Operational Assurance

System Architecture

The TCB shall maintain a domain for its own execution that protects it from external interference or tampering (e.g., by

modification of its code or data structures). Resources controlled by the TCB may be a defined subset of the subjects and

objects in the ADP system. The TCB shall isolate the resources to be protected so that they are subject to the access control

and auditing requirements.

System Integrity

Hardware and/or software features shall be provided that can be used to periodically validate the correct operation of the

on-site hardware and firmware elements of the TCB.

Life-Cycle Assurance

Security Testing

The security mechanisms of the ADP system shall be tested and found to work as claimed in the system documentation. Testing

shall be done to assure that there are no obvious ways for an unauthorized user to bypass or otherwise defeat the security

protection mechanisms of the TCB. Testing shall also include a search for obvious flaws that would allow violation of

resource isolation, or that would permit unauthorized access to the audit or authentication data. (See the Security Testing

guidelines.)

Documentation

Security Features User's Guide

A single summary, chapter, or manual in user documentation shall describe the protection mechanisms provided by the TCB,

guidelines on their use, and how they interact with one another.

Trusted Facility Manual

A manual addressed to the ADP system administrator shall present cautions about functions and privileges that should be

controlled when running a secure facility. The procedures for examining and maintaining the audit files as well as the

detailed audit record structure for each type of audit event shall be given.

Test Documentation

The system developer shall provide to the evaluators a document that describes the test plan, test procedures that show how

mysql c2_Mysql具有C2级安全性相关推荐

  1. 数据安全审计_使用数据级安全性对InfoSphere Guardium中的审计结果进行细粒度访问控制

    数据安全审计 数据级安全性对职责分离的重要性 处理数据的组织需要关注遵守不同程度的职责分离强制执行情况. 这意味着要确保没有多人参与和审查就无法完成任务,因为欺诈和人为错误的可能性较小. 这就是为什么 ...

  2. visual MySQL 教程_MySql轻松入门系列——第二站 使用visual studio 对mysql进行源码级调试...

    一:背景 1. 讲故事 上一篇说了mysql的架构图,很多同学反馈说不过瘾,毕竟还是听我讲故事,那这篇就来说一说怎么利用visual studio 对 mysql进行源码级调试,毕竟源码面前,不谈隐私 ...

  3. MySQL中的行级锁,表级锁,页级锁

    数据库锁是数据库系统中非常重要的一个概念,本文将深入分析数据库中的锁相关知识,您可点击下方音频收听或直接查看文稿中的文字. 在计算机科学中,锁是在执行多线程时用于强行限制资源访问的同步机制,即用于在并 ...

  4. mysql 重置更新祖级字段

    前言 mysql 5.7 mysql 重置更新祖级字段 我有一个表,如下: CREATE TABLE `sys_area` (`id` int(11) NOT NULL AUTO_INCREMENT, ...

  5. mysql数据库的行级锁有几种_MySQL中的行级锁、表级锁、页级锁

    在计算机科学中,锁是在执行多线程时用于强行限制资源访问的同步机制,即用于在并发控制中保证对互斥要求的满足. 在DBMS中,可以按照锁的粒度把数据库锁分为行级锁(INNODB引擎).表级锁(MYISAM ...

  6. Mysql中的行级锁、表级锁、页级锁

    转载自 Mysql中的行级锁.表级锁.页级锁 在计算机科学中,锁是在执行多线程时用于强行限制资源访问的同步机制,即用于在并发控制中保证对互斥要求的满足. 在数据库的锁机制中介绍过,在DBMS中,可以按 ...

  7. sql 如何设置行级锁_SQL Server 2016中的行级安全性

    sql 如何设置行级锁 With the release of SQL Server 2016 comes many great new features. One of these is the i ...

  8. sql 如何设置行级锁_SQL Server中的行级安全性简介

    sql 如何设置行级锁 In this article, I'm going to discuss Row-Level Security in SQL Server. RLS or Row-Level ...

  9. sql 如何设置行级锁_如何使用SQL Server 2016行级安全性过滤和阻止数据访问

    sql 如何设置行级锁 SQL Server 2016 came with many new features and enhancements for existing ones, that con ...

最新文章

  1. 反弹端口 HTTP代理 HTTP隧道技术
  2. 终聚.net平台开发
  3. 中国二氧化碳激光器行业现状研究与可行性分析报告2022-2028年版
  4. android studio编译慢的问题
  5. IOS和Android音频开发总结
  6. (四)RabbitMQ消息队列-服务详细配置与日常监控管理
  7. zabbix入门之监控MySQL
  8. python-列表包字典的去重
  9. c语言extern_C语言中#if,#if defined ,#ifdef,extern的用法描述
  10. 用C语言编写顺序存储的线性表(含代码实现)
  11. 用crontab、crond在嵌入式系统中添加定时任务
  12. 5 Java NIO Scatter 与Gather-翻译
  13. php冗余,php – 如何使用规范化删除冗余?
  14. Android hardware简易流程
  15. PostgreSQL数据库——Pigsty grafana dashboards
  16. 【小工具】用js自动生成pdf目录索引
  17. 四川农大2020计算机专业录取分数线,四川农业大学2020年美术类本科专业录取分数线...
  18. flex 做的小相册+向上滚动字体
  19. “汉语编程”是解决安全问题的终极之路?
  20. 小程序(一)后端项目搭建

热门文章

  1. 13种重要的云原生工具,让交付过程更快
  2. VMware支持客户构建多云未来
  3. 破解面试难题8个角度带你解读SQL面试技巧!
  4. 我最喜欢的云 IDE 推荐!
  5. 微服务等于Spring Cloud?一文告诉你微服务到底是什么
  6. mysql 常见密码设置_设置mysql用户密码(5.6/5.7)、远程连接数据库、常用命令
  7. data的值 如何初始化vue_Vue原理解析(九):搞懂computed和watch原理,减少使用场景思考时间...
  8. eq linux_音乐家和音乐爱好者的开放硬件 | Linux 中国
  9. java timer schedule_java怎么再次设置Timer的schedule???
  10. java radio 不可选_在Java Swing中取消选择RadioButtons