From 45f15433afa56e300d7f3bbaa17e334354a8d96e Mon Sep 17 00:00:00 2001 From: Tom Rhodes Date: Thu, 27 Apr 2006 07:31:52 +0000 Subject: Instead of paragraphs, use one of the various list tags. Submitted by: keramida --- en_US.ISO8859-1/books/handbook/mac/chapter.sgml | 41 ++++++++++++++++++------- 1 file changed, 30 insertions(+), 11 deletions(-) (limited to 'en_US.ISO8859-1/books/handbook/mac') diff --git a/en_US.ISO8859-1/books/handbook/mac/chapter.sgml b/en_US.ISO8859-1/books/handbook/mac/chapter.sgml index 97fe1fc223..c2ca29bdc9 100644 --- a/en_US.ISO8859-1/books/handbook/mac/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/mac/chapter.sgml @@ -835,21 +835,40 @@ test: biba/high Planning the Security Configuration - As with implementing any technology, there must be a planning - phase. During this time is it best an administrator looks at - their plight as a whole and defines exactly what is needed. - Examine thoroughly what requirements exist, how to accomplish - the final goal. How must information be classified or restricted, - what users should be given access and which MAC - module or modules will be required to achieve this goal. - - Although it is always possible to reconfigure and change the - system resources and security settings, it is inconvenient to + Whenever a new technology is implemented, a planning phase is + always a good idea. During the planning stages, an administrator + should in general look at the big picture, trying + to keep in view at least the following: + + + The implementation requirements + + The implementation goals + + + For MAC installations, these include: + + + How to classify information and resources available on + the target systems. + + What sorts of information or resources to restrict + access to and the type of restrictions that should be + applied. + + Which MAC module or modules will be + required to achieve this goal. + + + It is always possible to reconfigure and change the + system resources and security settings, it is quite often very inconvenient to search through the system and fix existing files and user accounts. Planning helps to ensure a trouble-free and efficient trusted system implementation. A trial run of the trusted system, including the configuration, is often vital and definitely - beneficial before. The idea of just letting loose on a system + beneficial before a MAC + implementation is used on production systems. The idea of just + letting loose on a system with MAC is like setting up for failure. Different environments may have explicit needs and -- cgit v1.2.3