Brewer-Nash Model
The Brewer-Nash Model, also known as the 'Cinderella' or 'Cinderella-Time' Model, focuses on data confidentiality while maintaining a balance between data availability and temporal access restrictions. Developed by Roger Brewer and Michael Nash in the early 1980s, it is primarily designed for commercial applications. The model prevents potential conflicts of interest by limiting the length of time a user has access to certain information. Once granted access, the user can only access the data for a limited period, preventing prolonged exposure to sensitive data. It's suitable in situations where timely and temporary access to information is crucial.
Guide to the Brewer-Nash Model
What is the Brewer-Nash Model?
The Brewer-Nash model, also known as the 'cinderella' model, is a security architecture model utilized to maintain data privacy in databases. It is often used in scenarios where sensitive information, like financial or personal data, should be hidden from unauthorized users.
Why is it important?
The significance of the Brewer-Nash model lies in its effectiveness to prevent misuse or abuse of sensitive data. It applies strict limitations on user's data access to avoid potential data leaks.
How does it work?
The Brewer-Nash model works on a dynamic data masking principle. Users can only access the information if they have not observed certain other data subsets that could potentially allow them to infer sensitive information. It consequently restricts users from viewing sensitive data that they are not authorized to see.
Exam Tips: Answering Questions on Brewer-Nash Model
For taking exams covering the Brewer-Nash model, keep the following points in mind:
1. Remember the main purpose of the Brewer-Nash model: to prevent indirect data inference for unauthorized viewers.
2. In case of any scenario-based question, focus on identifying data subsets that could potentially lead to a significant data leak.
3. Be familiar with how containment and complier directives are applied in Brewer-Nash.
4. Understand how conflict of interest can be resolved using the Brewer-Nash model.
CISSP - Security Architecture Models Example Questions
Test your knowledge of Amazon Simple Storage Service (S3)
Question 1
A financial company implements the Brewer-Nash Model for customer data privacy. A loan officer is reviewing the credit report of a client for a mortgage application. Which action violates the Brewer-Nash Model?
Question 2
You are the CISO of a leading online retail company implementing the Brewer-Nash Model to protect customer data. Which additional protocol should you include to comply with the Brewer-Nash Model?
Question 3
Which aspect of the Brewer-Nash Model is primarily responsible for managing information flow between different organizational units?
Go Premium
CISSP Preparation Package (2024)
- 4537 Superior-grade CISSP practice questions.
- Accelerated Mastery: Deep dive into critical topics to fast-track your mastery.
- Unlock Effortless CISSP preparation: 5 full exams.
- 100% Satisfaction Guaranteed: Full refund with no questions if unsatisfied.
- Bonus: If you upgrade now you get upgraded access to all courses
- Risk-Free Decision: Start with a 7-day free trial - get premium features at no cost!