Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Site Security Policy and Trusted Extensions

    The security administrator must design the Trusted Extensions network based on the site's security policy. The security policy dictates configuration decisions, such as the following:

  • How much auditing is done for all users and for which classes of events

  • How much auditing is done for users in roles and for which classes of events

  • How audit data is managed, archived, and reviewed

  • Which labels are used in the system and whether the ADMIN_LOW and ADMIN_HIGH labels will viewable by regular users

  • Which user clearances are assigned to individuals

  • Which devices (if any) can be allocated by which regular users

  • Which label ranges are defined for systems, printers, and other devices

  • Whether Trusted Extensions is used in an evaluated configuration or not