The Orange Book states that the trusted computing base should uniquely identifyeach user for accountability purposes and __________.
A.
Require the user to perform object reuse operations
B.
Associate this identity with all auditable actions taken by that individual
C.
Associate this identity with all processes the user initiates
D.
Require that only that user have access to his specific audit information
Explanation:
Proper security implementations include tracking individuals and their actions. The users need to be identified uniquely to be able to track their individual activities. If all users logged in and authenticated to a system asuser001, the system could never be able to distinguish which user actually carried out specific actions.