Formal security models are mathematical or conceptual frameworks that define how security properties (confidentiality, integrity) are enforced in a system. For the CISSP exam, security models are tested in Domain 3 at the level of: what property does each model protect, what are its rules, and in what context is each model most appropriately applied? The exam will present scenarios and ask you to identify which model is being described or which model is most appropriate.

Why Formal Security Models Matter

Formal security models emerged from the need to provide provable security guarantees for government and military information systems. Rather than relying on informal design decisions, formal models specify precise rules about information flow and access. These rules can be mathematically verified to ensure that the model achieves its intended security property.

For the CISSP, the practical importance is context mapping: government environments primarily need confidentiality (military information must not reach unauthorised parties), while commercial environments primarily need integrity (financial records must be accurate and unmodified). Different models address different properties and are appropriate in different contexts.

Bell-LaPadula Model: Confidentiality for Government

The Bell-LaPadula (BLP) model was developed in the early 1970s by David Bell and Leonard LaPadula for the US Department of Defense. Its purpose is to protect confidentiality in multi-level security systems — systems where users have different clearance levels and data has different classification levels.

Bell-LaPadula defines two primary rules:

The Simple Security Property (no read up, or "ss-property") states that a subject cannot read data at a higher classification level than their clearance. A user with Secret clearance cannot read Top Secret data. This prevents lower-cleared users from accessing sensitive information they are not authorised to see.

The Star Property (no write down, or "*-property") states that a subject cannot write data to a lower classification level than their clearance. A user with Top Secret clearance cannot write data to a Secret or Confidential file. This prevents the covert downgrading of sensitive information — a user could not copy Top Secret content into an Unclassified document.