Security Models and Architecture

Rabi raj
2 min readSep 2, 2023

Security models and architecture refer to the design and implementation of secure systems, networks, and applications. These models and architectures provide a framework for ensuring the confidentiality, integrity, and availability of information and systems. Here are some common security models and architectures:

  1. Bell-LaPadula Model: This model is based on the concept of a hierarchical classification system, where objects are classified into different levels of sensitivity. Access control decisions are made based on the level of sensitivity of the object and the clearance level of the user.
  2. Biba Model: This model is based on the principle of least privilege, where users are granted only the minimum privileges necessary to perform their jobs. It also incorporates the concept of fail-safe default permissions, where access is denied by default unless explicitly granted.
  3. Clark-Wilson Model: This model is based on the concept of an open environment, where subjects (users or processes) interact with objects (data or resources). Access control decisions are made based on a set of rules that define the relationships between subjects and objects.
  4. Non-Interference Model: This model is based on the concept of separation of duties, where multiple subjects are required to perform different tasks in order to enforce a security policy. It ensures that no single subject can compromise the security of the system.
  5. Chinese Wall Model: This model is based on the concept of compartmentalization, where subjects are divided into different compartments based on their security clearance levels. Subjects within a compartment have access to all objects within that compartment, but not to objects in other compartments.
  6. Role-Based Access Control (RBAC): This model assigns roles to users based on their job responsibilities, and grants access to resources based on those roles. Users can be assigned multiple roles, and access control decisions are made based on the intersection of the user’s roles and the resource’s access control list.
  7. Attribute-Based Access Control (ABAC): This model uses attributes such as user location, time of day, and device being used to grant or deny access to resources. Access control decisions are made based on a combination of attributes associated with the user and the resource.
  8. Identity-Based Access Control (IBAC): This model uses digital identities to authenticate users and grant access to resources. Digital identities are based on user credentials, biometric data, or other unique characteristics.
  9. Access Control Matrix: This model uses a matrix to represent the access control policy, where rows represent users or groups and columns represent resources or objects. The cells in the matrix indicate whether a user or group has read, write, or execute permission for a particular resource.
  10. Hierarchical Access Control (HAC): This model is based on a hierarchical structure, where access control decisions are made at multiple levels. It allows for more granular access control, where policies can be defined for specific departments, projects, or teams.

--

--