- Security Patterns
Design pattern (computer science) can be applied to achieve goals in the area of security. Every classical design pattern has different instantiations to fulfill some of theInformation security goals as confidentiality, integrity or availability. Additionally one can add new design pattern specifically to achieve some security goals.= Existing Security Pattern =
The Open Group provides a set of documented security pattern.Available System Patterns
This are pattern that are concerned with the availability of the assets. The assets are either services or resources offered to users.
"Check pointed System" pattern describes a design to use
Replication (computer science) and recover when a component fails."Standby pattern" has the goal to provide a fall back component able to resume the service of the failing component.
"Comparator-checked fault tolerant system" pattern provides a way to monitor the failure free behavior of a component.
"Replicated system" pattern describes a design of redundant components and a mean of load balancing and redirection in between to decrease the chance of non availability of the service.
"Error detection/correction" pattern has the goal to deduce errors and possibly correct them to guarantee correct information exchange or storage.
Protected System Patterns
This is a set of patterns concerned with the confidentiality and integrity of information by providing means to manage access and usage of the sensitive data.
The "protected system" pattern provides some reference monitor or enclave that owns the resources and therefor must be bypassed to get access. The monitor enforces as the single point a policy. The GoF refers to it as "Protection Proxy".
The "policy pattern" is an architecture to decouple the policy from the the normal resource code. An authenticated user owns a security context (erg. a role) that is passed to the guard of resource. The guard checks inside the policy whether the context of this user and the rules match and provides or denies access to the resource.
The "authenticator" pattern is also known as the
Pluggable Authentication Modules or Java Authentication and Authorization Service (JAAS)."Subject descriptor" pattern
"Secure Communication" is similar to Single sign-on, RBAC
"Security Context" is a combination of the communication protection proxy, security context and subject descriptor pattern.
"Security Association" is an extension of the secure communication pattern.
"Secure Proxy" pattern can be used for defense in depth.
= External links =
* [http://www.opengroup.org/publications/catalog/g031.htm The Open Group Security Pattern Guide]
* [http://www.modsecurity.org/archive/securitypatterns/ The Modsecurity Patterns for Web Applications]References
Wikimedia Foundation. 2010.