An access control policy that is uniformly enforced across all subjects and objects within the boundary of an information system. A subject that has been granted access to information is constrained from doing any of the following:
(i) passing the information to unauthorized subjects or objects;
(ii) granting its privileges to other subjects;
(iii) changing one or more security attributes on subjects, objects, the information system, or system components;
(iv) choosing the security attributes to be associated with newly-created or modified objects; or
(v) changing the rules governing access control. Organization-defined subjects may explicitly be granted organization-defined privileges (i.e., they are trusted subjects) such that they are not limited by some or all of the above constraints.
A means of restricting access to objects based on the sensitivity (as represented by a security label) of the information contained in the objects and the formal authorization (i.e., clearance, formal access approvals, and need-to-know) of subjects to access information of such sensitivity. Mandatory Access Control is a type of nondiscretionary access control.
A means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.
A data authenticator generated from the message, usually through cryptographic techniques. In general, a cryptographic key is also required as an input.
See NIST SP 800-15 under message authentication code for more information.
A cryptographic checksum on data that uses a symmetric key to detect both accidental and intentional modifications of the data.
See NISTIR 7711 under Message Authentication Code for more information.