d3fend / d3fend-ontology

This repository holds the necessary content to produce the D3FEND ontology distribution.
https://d3fend.mitre.org
MIT License
55 stars 26 forks source link

ZTA-inspired countermeasures #166

Open netfl0 opened 1 year ago

netfl0 commented 1 year ago

Remaining decisions:

BlueNTheFaceSSE commented 1 year ago

To the question of mediation or authorization.

In a tutorial and course taught, we've spoken to mediation as having four parts.

Flipping this to capability functions/"countermeasures": Identification -> need means to manage identities - such as for humans account management stuff. Bleeding a bit into authentication is credential issuance, but this is more probably on identification. Both hardware, software, and wetware can/will have credentials if you interpret credential broadly. Hardware, and even software may have embedded unique credentials - such as a hardware MAC address, but then that needs to be registered with the system - like if one uses a fingerprint or faceID for credential on human, that need to be registered with the system.

Authentication -> so an entity claims an identity - must verify that. Logging in is one such example. The various functions for authenticating go here. Anything with credential checking.

Authorization - for the functional context - there is:

Entity to authorization binding - this goes to creating the policy that permits, and the integrity of how that policy (how is the policy file or database protected).

So should authorization be used instead of mediation? That wouldn't be standard language if done, at least not standard in certain circles. But it is just label otherwise so it's a call ...