Site Security Policy and Trusted Extensions
The security administrator must design the Trusted Extensions network based on the site's
security policy. The security policy dictates configuration decisions, such as the following:
How much auditing is done for all users and for which classes of events
How much auditing is done for users in roles and for which classes of events
How audit data is managed, archived, and reviewed
Which labels are used in the system and whether the ADMIN_LOW and ADMIN_HIGH labels will viewable by regular users
Which user clearances are assigned to individuals
Which devices (if any) can be allocated by which regular users
Which label ranges are defined for systems, printers, and other devices
Whether Trusted Extensions is used in an evaluated configuration or not