Back to Security Pattern Catalog




Policy


Classification Key : Perimeter Security

Problem

Systems often express their requirements as policies. However, the policy has to be enforced to check conformance. The policy enforcement functions have to be invoked in a correct sequence. How can the policy decisions be effectively evaluated?

Solution

Isolate the part that makes policy enforcement decision in a discrete component of the system. Ensure that policy enforcement activities are performed in proper sequence.

Known Uses

Client Secure Invocation Policy and Server Secure Invocation Policy in CORBA.

Related Patterns

Role Based Access Control, Policy Enforcement Point

Source

Open Group Catalog

Tags

Access Control, Policy


 

Last modified: May 05, 2012

Conceived and Maintained by: Munawar Hafiz