OSI security functions are concerned only with those visible aspects of a communications path which permit
end systems to achieve the secure transfer of information between them. OSI security is not concerned with security
measures needed in end systems, installations, and organizations, except where these have implications on the choice
and position of security services visible in OSI. These latter aspects of security may be standardized but not within the
scope of OSI Recommendations.
This Recommendation adds to the concepts and principles defined in Recommendation X.200; it does not
modify them. It is not an implementation specification, nor is it a basis for appraising the conformance of actual
implementations.
2 References
Rec. X.200 – Reference Model of open systems interconnection for CCITT applications.
ISO 7498 – Information processing systems – Open systems interconnection – Basic Reference Model (1984).
ISO 7498-4 – Information processing systems – Open systems interconnection – Basic Reference Model –Part
4: Management framework (1989).
ISO 7498/AD1 – Information processing systems – Open systems interconnection – Basic Reference Model –
Addendum 1: Connectionless-mode transmission (1987).
ISO 8648 – Information processing systems – Open systems interconnection – Internal organization of the
network layer (1988).
3 Definitions and abbreviations
3.1 This Recommendation builds on concepts developed in Recommendation X.200 and makes use of the
following terms defined in it:
a) (N)-connection;
b) (N)-data-transmission;
c) (N)-entity;
d) (N)-facility;
e) (N)-layer;
f) Open system;
g) Peer entities;
h) (N)-protocol;
j) (N)-protocol-data-unit;
k) (N)-relay;
l) Routing;
m) Sequencing;
n) (N)-service;
p) (N)-service-data-unit;
q) (N)-user-data;
r) Sub-network;
s) OSI resource; and
t) Transfer syntax.
Recommendation X.800 3
3.2 This Recommendation uses the following terms drawn from the respective Recommendations/International
standards:
Connectionless-mode transmission (ISO 7498/AD1)
End system (Rec. X.200/ISO 7498)
Relaying and routing function (ISO 8648)
Management information base (MIB) (ISO 7498-4)
In addition, the following abbreviations are used:
OSI open systems interconnection;
SDU for service data unit;
SMIB for security management information base; and
MIB for management information base.
3.3 For the purpose of this Recommendation, the following definitions apply:
3.3.1 access control
The prevention of unauthorized use of a resource, including the prevention of use of a resource in an
unauthorized manner.
3.3.2 access control list
A list of entities, together with their access rights, which are authorized to have access to a resource.
3.3.3 accountability
The property that ensures that the actions of an entity may be traced uniquely to the entity.
3.3.4 active threat
The threat of a deliberate unauthorized change to the state of the system.
Note – Examples of security-relevant active threats may be: modification of messages, replay of messages,
insertion of spurious messages, masquerading as an authorized entity and denial of service.
3.3.5 audit
See security audit.
3.3.6 audit trail
See security audit trail.
3.3.7 authentication
See data origin authentication, and peer entity authentication.
Note – In this Recommendation the term “authentication” is not used in connection with data integrity; the
term “data integrity” is used instead.
3.3.8 authentication information
Information used to establish the validity of a claimed identity.
3.3.9 authentication exchange
A mechanism intended to ensure the identity of an entity by means of information exchange.
4 Recommendation X.800
3.3.10 authorization
The granting of rights, which includes the granting of access based on access rights.
3.3.11 availability
The property of being accessible and useable upon demand by an authorized entity.
3.3.12 capability
A token used as an identifier for a resource such that possession of the token confers access rights for the
resource.
3.3.13 channel
An information transfer path.
3.3.14 ciphertext
Data produced through the use of encipherment. The semantic content of the resulting data is not available.
Note – Ciphertext may itself be input to encipherment, such that super-enciphered output is produced.
3.3.15 cleartext
Intelligible data, the semantic content of which is available.
3.3.16 confidentiality
The property that information is not made available or disclosed to unauthorized individuals, entities, or
processes.
3.3.17 credentials
Data that is transferred to establish the claimed identity of an entity.
3.3.18 cryptanalysis
The analysis of a cryptographic system and/or its inputs and outputs to derive confidential variables and/or
sensitive data including cleartext.
3.3.19 cryptographic checkvalue
Information which is derived by performing a cryptographic transformation (see cryptography) on the data
unit.
Note – The derivation of the checkvalue may be performed in one or more steps and is a result of a
mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit.
3.3.20 cryptography
The discipline which embodies principles, means, and methods for the transformation of data in order to hide
its information content, prevent its undetected modification and/or prevent its unauthorized use.
Note – Cryptography determines the methods used in encipherment and decipherment. An attack on a
cryptographic principle, means, or method is cryptanalysis.
3.3.21 data integrity
The property that data has not been altered or destroyed in an unauthorized manner.
3.3.22 data origin authentication
The corroboration that the source of data received is as claimed.
Recommendation X.800 5
3.3.23 decipherment
The reversal of a corresponding reversible encipherment.
3.3.24 decryption
See decipherment.
3.3.25 denial of service
The prevention of authorized access to resources or the delaying of time-critical operations.
3.3.26 digital signature
Data appended to, or a cryptographic transformation (see cryptography) of a data unit that allows a recipient of
the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient.
3.3.27 encipherment
The cryptographic transformation of data (see cryptography) to produce ciphertext.
Note – Encipherment may be irreversible, in which case the corresponding decipherment process cannot
feasibly be performed.
3.3.28 encryption
See encipherment.
3.3.29 end-to-end encipherment
Encipherment of data within or at the source end system, with the corresponding decipherment occurring only
within or at the destination end system. (See also link-by-link encipherment.)
3.3.30 identity-based security policy
A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf
of the users and the resources/objects being accessed.
3.3.31 integrity
See data integrity.
3.3.32 key
A sequence of symbols that controls the operations of encipherment and decipherment.
3.3.33 key management
The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security
policy.
3.3.34 link-by-link encipherment
The individual application of encipherment to data on each link of a communications system. (See also end-toend
encipherment.)
Note – The implication of link-by-link encipherment is that data will be in cleartext form in relay entities.
3.3.35 manipulation detection
A mechanism which is used to detect whether a data unit has been modified (either accidentally or
intentionally).
3.3.36 masquerade
The pretence by an entity to be a different entity.
6 Recommendation X.800
3.3.37 notarization
The registration of data with a trusted third party that allows the later assurance of the accuracy of its
characteristics such as content, origin, time and delivery.
3.3.38 passive threat
The threat of unauthorized disclosure of information without changing the state of the system.
3.3.39 password
Confidential authentication information, usually composed of a string of characters.
3.3.40 peer-entity authentication
The corroboration that a peer entity in an association is the one claimed.
3.3.41 physical security
The measures used to provide physical protection of resources against deliberate and accidental threats.
3.3.42 policy
See security policy.
3.3.43 privacy
The right of individuals to control or influence what information related to them may be collected and stored
and by whom and to whom that information may be disclosed.
Note – Because this term relates to the right of individuals, it cannot be very precise and its use should be
avoided except as a motivation for requiring security.
3.3.44 repudiation
Denial by one of the entities involved in a communication of having participated in all or part of the
communication.
3.3.45 routing control
The application of rules during the process of routing so as to chose or avoid specific networks, links or relays.
3.3.46 rule-based security policy
A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the
sensitivity of the resources being accessed and the possession of corresponding attributes of users, a group of users, or
entities acting on behalf of users.
3.3.47 security audit
An independent review and examination of system records and activities in order to test for adequacy of
system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security,
and to recommend any indicated changes in control, policy and procedures.
3.3.48 security audit trail
Data collected and potentially used to facilitate a security audit.
Recommendation X.800 7
3.3.49 security label
The marking bound to a resource (which may be a data unit) that names or designates the security attributes of
that resource.
Note – The marking and/or binding may be explicit or implicit.
3.3.50 security policy
The set of crit