The AS must isolate security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to, and protecting the integrity of, the hardware, software, and firmware that perform those security functions. The information system maintains a separate execution domain (e.g., address space) for each executing process.
Separation and isolation is met through application virtualization. This requirement will apply to applications residing on top of the AS, but not to the AS itself. Requirement is NA. |