Security attribute assignments are representations of the properties or characteristics of an entity. Thus, if a security policy is changed or data is created or changed, the system will dynamically reconfigure and apply security attributes in accordance with the security policy.
Security attributes and labels should be leveraged to protect stored information as well as information flowing to external devices. Information stored and processed by the IDPS includes sensors event logs, local audit logs, and application files. Security attributes and labels must also be leveraged to protect communications between sensors, the management console, non-local management computers, firewalls, routers, and other network elements.
The IDPS must have the capability to dynamically reconfigure security attributes as information is created or combined, thus ensuring the correct attributes are assigned to the resulting data as part of this process. If changes to the security attributes are not reconfigured dynamically to meet security policies, then unauthorized entities may gain access to the information. |