Sie sind auf Seite 1von 4

Information Security

Contextual Model
AN INTEGRATIVE PERSPECTIVE

There is a profusion of models that aim to describe the characteristics, properties


and objectives of Information Security. However, all of them all offer incomplete
outlooks which fail to consider the context in which information is utilized.

By PROTEUS YOUNG

BEYOND THE TRIAD

There is nothing fundamentally wrong with the CIA Triad


(confidentiality, integrity, availability), on the contrary: it
is a concise group of objectives that is both useful and
easy to remember. Consecrated in ISO/IEC 27000, it is
present in numerous information security models and
even in information threat models like STRIDE i, whose
name is formed not by the initials of the pursued
properties of the information, but of the threats
corresponding to their subversion.

The deficiency of the CIA Triad and other existing security


models is to ignore the context in which data is created,
recovered and transformed. The Triad make us believe
that all properties relate inherently do Data: the
Contextual Model, on the other hand, takes into account
the existence of other elements besides Data – namely,
User and Access – and introduces the concept of Figure 1 – Elements and Properties of the Information Security
Contextual Model
property levels in which the inherent properties lay on
the first level and while properties of second and third The three elements have a great deal of overlapping:
level arises from the relationship between and among their intersections represent the relationships between
the elements. Additionally, it demonstrates that those
two of them or among them all. From their intersections
properties are expressions of underlying principles that,
arise properties that, while belonging to one of the
when broken, compromise not only their respective
elements (e.g. the one with written in the same color),
properties but their adjacent ones, thus rendering any only exists in the context of the relation.
security expectation unfeasible.
As seen in the diagram, there are nine properties
The Contextual Model represents three fundamental arranged in three triads:
Elements of Information Security – Data, User and Access
– and the relationships between and among them. Each 1) The outer triad of properties inherent to the
one of them has an inherent property (i.e. which relates Elements;
exclusively to it). Other properties arise from the 2) The medium triad of properties arisen from a pair-
relationship between the Elements, pairwise or all wise relation;
together: these are their relational properties. The 3) The inner triad of properties arisen from the three
purpose of Information Security is to preserve all Elements.
Elements’ properties. Elements and its properties are
graphically represented in Figure 1. Those are also called properties of first, second and third
levels.

1
Information Security Contextual Model © Proteus Young

Also, it is important to notice that the diagram depicts They can only be understood in the context of the
relationships, not the data flow. complete process (e.g. data being accessed).

Confidentiality is the characteristic that ensures that


INHERENT PROPERTIES Data is being accessed by Users with the authority to do
so.
Data is the name of the set of recorded entities’
Non-repudiation is the characteristic that guarantees
attributes representation in a given storage system. Its
that the Accesses to the Data were realized by the Users
inherent property is Integrity meaning that the recorded
to whom they are assigned the actions in the designated
representations must be preserved from undue changes
times.
of both physical and logical nature.

User is the agent – not necessarily humanii – which Traceability is the characteristic that allows the
promotes the creation, recovery and transformation of reconstitution of the Accesses to which the Data was
Data. Its inherent property is Identity, meaning that submitted by the Users during a given period of time.
agents’ identification must be unambiguous under the
penalty of ignorance of the access’ actor.

Access is the process that makes the User’s action on the UNDERLYING PRINCIPLES
Data possible. Its inherent property is Inviolability,
meaning that the process must not be intercepted or Data Integrity is connected to two principles:
interrupted. Violations would respectively cause loss of
• Preservation is the principle that data should be
confidentiality and loss of availability.
protected against modifications that cause its
corruption, regardless of storage medium or form
of representation. While accidental corruption is
RELATIONAL PROPERTIES generally cause by physical issues, intentional
corruption stems from a security breach. As for the
The relations between and among the elements Data, breadth of damage, it can range from imperceptible
User, and Access give rise to properties that do not make or irrelevant to total loss.
sense when considered outside the context of the • Consistency is the principle that correlated data
relationship. In pairwise relationships, the missing should be consistent with each other. For example,
element does not affect the property and is not affected if not successfully completed, multiple updates of
by it, as follows. related tables in a database may causes a relational
The relationship between User and Data gives rise to the inconsistencyiii.
property Authority, which reflects the rights of Loss of Integrity impacts the Availability and Authority
individuals or groups over information. This property properties once these can only be verified if the
originates in the real world and needs a corresponding information is true and complete: there is no point in the
mapping to the security implementation. Authority is availability of false or incomplete information, as well as
independent of Access, because the right to access there is no sense in Authority over corrupted data.
certain pieces of information exists even when the user Likewise, the third level properties will be impaired. In
does not exercise it. case of complete data destruction, this condition is more
The relationship between User and Access gives rise to evident.
the property Authenticity, which is the guarantee that Access Inviolability is connected to the principle of
the User is who he/she claims to be, that is, his/her Legitimacy: access to data must be by legitimate means.
identity validation. Authenticity is independent of Data Access violation can be either an interception or
since the User does not have to access it in order to have interruption, making it an illegitimate action which
his/her identity recognized. affects adjacent properties as follows:
The relationship between Data and Access gives rise to • Authenticity is obviously violated as access is
the Availability property, which reflects the readiness of performed by an agent not authorized to do so.
the data to be accessed. This property is independent of • Availability may be affected by illegitimate access
User since the readiness exists even if no access is made. either by competing for processing resources in a
The relationship between Data, Access and User query that results in high data volume, or by a
comprises the Inner Triad of the third level properties.

2
Information Security Contextual Model © Proteus Young

deliberate denial of service action (for example, Access Traceability relates to Accountability principle
by running a resource-intensive query available. whereby each User can only be held responsible for the
• Confidentiality is compromised by improper actions he/she performed (or failed to perform). Lack of
access. traceability prevents imputability and causes accidental
• Non-repudiation and traceability lose meaning impunity. Data Integrity may be affected if it is impossible
when access is illegitimate as the logging to determine how a condition was achieved.
mechanism may incorrectly capture the
User Non-Repudiation is related to the principle of
illegitimate action.
Authorship Accreditation of certain actions. It assures the
Integrity, which in non-adjacent property, may also be user’s Authenticity in such a way that it’s impossible for
affected if illegitimate access results in data the author or any interested party to refute the action.
transformation.

User Identity is related to the principle of Agent


Unambiguity, that is, identification of the user should not
DISCUSSION
possess doubt or uncertainty. The user account must
It is possible that the first contact with a new model may
designate a single agent so that their actions are
raise questions about the new properties and principles,
legitimized through authentication. Clear violations of
and even about the need to consider them. The following
this principle occur when shared user accounts (“group
discussion recognizes such difficulties and provides some
accounts”) are utilized, when a user shares his
reasoning.
credentials, when credentials are leaked, or when access
to data does not require authentication. Ambiguity
• Just as Integrity, Confidentiality and Availability are
implies the impossibility of confirming or denying
not properties of Data?
authorship and leads to unintended anonymityiv. No
All of these properties are Data, but Integrity is its
restrictions exist for multiple user accounts pointing to
only intrinsic property. Confidentiality and
the same individual, as it happens with the assignment of
Availability are relational properties of Data arising
privileged accounts that must be used occasionally.
from the intersection with, respectively, User and
Failure to identify the user - who is the agent of the Access.
process - chain-compromises all other properties.
• Are inviolability and Confidentiality not the same as
User Authenticity is related to Agent Trustworthiness in every Access violation implies a breach of
the sense that evidence has been provided that the user confidentiality?
is who they claim to be. Violation of this principle No, because an access violation does not necessarily
characterizes the imposture of the user. retrieve information: there are attacks aimed solely
at the unavailability or corruption of the Data.
User Authority is associated with the principle of
Sufficient Privilegev whereby the User must be given the • Couldn't traceability and non-returnability be one
necessary authorization — no more, no less — to thing?
perform his/her duties. Violating it causes insufficiency No, since Irresponsibility addresses the issue of
or elevation of privilege. As much as Elevation, acceptance or repudiation in disputes, while
Insufficiency of privileges can compromise Traceability takes care of liability for actions taken.
Confidentiality, Integrity, and Availability since: a) not Note also that non-returnability does not imply
being able to read information you are entitled to is a irreversibility, which is a feature of certain
matter of Confidentiality; b) failure to perform common transactions to reflect business processes.
technical routines or contingency functions may
compromise Integrity and Availability. • Is the Identity property really necessary?
Yes, as the unambiguous identification of the agent
Data Availability relates to the Utility principle once not presupposes Authentication and Authorization,
being availablevi defeats both the purposes of Data's without which Confidentiality, Traceability and Non-
existence and the purpose of Access. Failure to do so Retractability cannot be guaranteed.
characterizes a Denial of Service.

Data Confidentiality is directly associated with the Need • How does the Contextual Model differ from other
to Know principle, which holds that access to data is existing models?
limited by the User’s Authority. Failure to comply with It depends on the model considered. In general, the
this principle results in improper disclosure (“leakage”) of main differences are:
information.

3
Information Security Contextual Model © Proteus Young

1) Integrative approach that puts into perspective CONCLUSION


not only Information, but its purpose: to serve
2) Users in their most varied business, scientific, The job of Information Risk Analysis already naturally
academic, social, cultural, recreational or considers the security aspects discussed here. The
personal needs. purpose of the contextual model is to provide a
3) Introduction of new properties to consider: comprehensive perspective that reflects the usual
Access Tampering, User Identity, Action relationships between the elements involved in
Traceability; information processes, facilitating the understanding of
4) Explanation that the following violations should their dynamics and the identification of vulnerability
be regarded as Information Security issues: Data points for the adoption of protection measures.
Inconsistency, Anonymity or User Ambiguity,
Insufficient Privileges and Impunity. For the reader’s convenience, follows a synoptic chart of
the properties, principles and the consequences of not
observing them.

Information Security Contextual Model Level and Relations


Property Principles Violation Consequences Data Access User
Integrity Preservation, Consistency Corruption, Inconsistency 1
Inviolability Legitimacy Interception, Interruption 1
Identity Unambiguity Anonymity, Ambiguity 1
Availability Utility Denial of Service 2 R
Authority Sufficient Privilege, Segregation of Duties Insufficiency or Escalation of Privileges R 2
Authenticity Trustworthiness Imposture R 2
Confidentiality Need to Know Undue Disclosure (Leakage) 3 R R
Traceability Accountability Impunity R 3 R
Non-Repudiation Authorship Accreditation Repudiation R R 3
Figure 2 – Contextual Model Synoptic Chart.

NOTES
i STRIDE is the acronym for Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privileges.
ii Automated actions always require the provision of credentials - typically service accounts - with sufficient rights.
iii Although major database management systems provide multiple-update transaction as consistency preservation mechanism, they

usually need to be encoded in the applications.


iv
Accidental Anonymity must not be confused with the Intentional Anonymity required by some systems.
v The Least Privilege Principle is probably called this way because privileges in excess are dangerous even though it declares that the

degree of privilege should be sufficient.


vi
Availability does not imply being always available as Service Level Agreements apply.

Das könnte Ihnen auch gefallen