Security pattern


Security patterns can be applied to achieve goals in the area of security. All of the classical design patterns have different instantiations to fulfill some information security goal: such as confidentiality, integrity, and availability. Additionally, one can create a new design pattern to specifically achieve some security goal.

Existing security pattern

The pattern community has provided a collection of security patterns, which were discussed in workshops at Pattern Languages of Programs conferences. They have been unified and published in a joint project.
The Open Group provides a set of documented security patterns.

Available system patterns

These are patterns that are concerned with the availability of the assets. The assets are either services or resources offered to users.
This is a set of patterns concerned with the confidentiality and integrity of information by providing means to manage access and usage of the sensitive data.
The protected system pattern provides some reference monitor or enclave that owns the resources and therefore must be bypassed to get access. The monitor enforces as the single point a policy. The GoF refers to it as "Protection Proxy".
The policy pattern is an architecture to decouple the policy from the normal resource code. An authenticated user owns a security context that is passed to the guard of resource. The guard checks inside the policy whether the context of this user and the rules match and provides or denies access to the resource.
The authenticator pattern is also known as the Pluggable Authentication Modules or Java Authentication and Authorization Service.
This is a set of security patterns evolved by Sun Java Center – Sun Microsystems engineers Ramesh Nagappan and Christopher Steel, which helps building end-to-end security into multi-tier Java EE enterprise applications, XML-based Web services, enabling identity management in Web applications including single sign-on authentication, multi-factor authentication, and enabling Identity provisioning in Web-based applications.