Security attributes are values associated with data content/structure and source/destination objects. These attributes are bound to the user and data objects and may include information about the data's purpose, creator, origin, access restrictions, access permissions, or classification. Specific security attributes used depend on the application or technology context. However, these attributes are used in information systems to implement security policy for access control and flow control for users, data, and traffic. Security attributes may be explicitly or implicitly associated with the information contained within the information system.
If security attributes are not associated with the information being transmitted between components, then access control policies and information flows which depend on these security attributes will not function and unauthorized access may result. When data is exchanged, the security attributes associated with this data must be validated to ensure the data has not been changed.
The digital signatures used by TSIG/SIG(0) are transmitted security attributes. These signatures must be validated by the receiving server. DNSSEC signatures are validated by the DNS client, not the DNS server. |