NIST 800-53 REV 5 • SYSTEM AND SERVICES ACQUISITION
SA-8(10) — Hierarchical Trust
Implement the security design principle of hierarchical trust in {{ insert: param, sa-08.10_odp }}.
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Supplemental Guidance
The principle of hierarchical trust for components builds on the principle of trusted components and states that the security dependencies in a system will form a partial ordering if they preserve the principle of trusted components. The partial ordering provides the basis for trustworthiness reasoning or an assurance case (assurance argument) when composing a secure system from heterogeneously trustworthy components. To analyze a system composed of heterogeneously trustworthy components for its trustworthiness, it is essential to eliminate circular dependencies with regard to the trustworthiness. If a more trustworthy component located in a lower layer of the system were to depend on a less trustworthy component in a higher layer, this would, in effect, put the components in the same "less trustworthy" equivalence class per the principle of trusted components. Trust relationships, or chains of trust, can have various manifestations. For example, the root certificate of a certificate hierarchy is the most trusted node in the hierarchy, whereas the leaves in the hierarchy may be the least trustworthy nodes. Another example occurs in a layered high-assurance system where the security kernel (including the hardware base), which is located at the lowest layer of the system, is the most trustworthy component. The principle of hierarchical trust, however, does not prohibit the use of overly trustworthy components. There may be cases in a system of low trustworthiness where it is reasonable to employ a highly trustworthy component rather than one that is less trustworthy (e.g., due to availability or other cost-benefit driver). For such a case, any dependency of the highly trustworthy component upon a less trustworthy component does not degrade the trustworthiness of the resulting low-trust system.
Practitioner Notes
Hierarchical trust means organizing trust relationships in a layered structure where higher layers depend on the trustworthiness of lower layers. Your most secure components form the foundation everything else relies on.
Example 1: Design your infrastructure so that the most critical security components (domain controllers, certificate authorities, key management systems) are the most protected and form the trust foundation. If Active Directory is compromised, everything that depends on it is compromised — so AD gets the strongest protection.
Example 2: Implement a PKI hierarchy with offline root CAs that sign intermediate CAs, which in turn issue certificates. The root CA sits at the top of the trust hierarchy and is stored offline. If an intermediate CA is compromised, it can be revoked without affecting the root.