This control requires the support and maintenance of organizationally defined attribute association (marking). These attributes are bound to the files and data stored on the components of the network device. The association of security attributes to data objects stored on the network device is referred to as binding. Binding typically includes setting the attribute value and the attribute type for the stored objects. Once bound to the data, these security attributes may be used in various applications within the network device to enable access control, flow control, information handling, and other information security policies. Types of attributes include classification level. An example of a value for this attribute type is Top Secret.
Typically, the security attributes used for data stored on the network device is not granular. While the data is in storage, the system will limit access based on account permissions. If the security attributes become disassociated from the information being stored, then access control policies and information flows which depend on these security attributes will not function and unauthorized access may result.
|