CISSP Using Security Principles – Bk1D3T1St4
Using Security Principles we should considering the applicability of security controls, realize not every control is appropriate for every situation. You must also consider that some security principles directly conflict with others, making the appropriate choice of the principle to follow a matter of careful consideration and judgment. For example, Saltzer and Schroeder’s principle of least common mechanism indirectly conflicts with ISO 19249’s principles of centralized parameter validation and of centralized general security services. Does …