Your company is a well-known security product manufacturer. You are in charge of the Security Information and Event Management (SIEM) product line that receives logs from other security products. To protect the transmission of log between the SIEM server and other security products, which of the following security function should be implemented?
A. Security perimeter
B. Trusted Computing Base (TCB)
C. Trusted path
D. Trusted channel
Kindly be reminded that the suggested answer is for your reference only. It doesn’t matter whether you have the right or wrong answer. What really matters is your reasoning process and justifications.
My suggested answer is D. Trusted channel.
- Trusted Path
A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software. (CNSSI 4009-2015)
- Trusted Channel
A channel where the endpoints are known and data integrity is protected in transit. Depending on the communications protocol used, data privacy may be protected in transit. Examples include transport layer security (TLS), IP security (IPSec), and secure physical connection. (CNSSI 4009-2015)
A BLUEPRINT FOR YOUR SUCCESS IN CISSP
My new book, The Effective CISSP: Security and Risk Management, helps CISSP aspirants build a solid conceptual security model. It is not only a tutorial for information security but also a study guide for the CISSP exam and informative reference for security professionals.
- It is available on Amazon.
- Readers from countries or regions not supported by Amazon can get your copy from the author’s web site.