Brewer and Nash Model: Complete Guide for CISSP Candidates

The Brewer and Nash Model, also known as the Chinese Wall Model, is a security framework designed to prevent conflicts of interest in environments where access to competing organizations' data could create ethical or legal problems. Unlike models that focus on confidentiality or integrity, this model dynamically restricts access based on a user's access history to ensure information from direct competitors never ends up in the same hands.

This model is particularly critical in consulting, legal, and financial services where professionals routinely work with multiple clients in the same industry. Understanding how the Brewer and Nash Model prevents information leakage between competitors is essential for CISSP candidates, especially when exam scenarios involve professional services, investment banking, or any environment requiring ethical walls between competing interests.

Watch the complete explanation of the Brewer and Nash Model with practical examples and CISSP exam tips.

Brewer and Nash Model overview diagram showing conflict of interest classes and the Chinese Wall access control mechanism
Brewer and Nash Model: Preventing Conflicts of Interest Through Dynamic Access Controls

What is the Brewer and Nash Model?

The Brewer and Nash Model is a security framework with one primary goal: ensuring that users who access information from one company cannot access sensitive data from its direct competitors. The model creates dynamic barriers—invisible walls—that form based on access decisions, preventing the same person from holding confidential information about competing organizations.

Core Purpose: Conflict of Interest Prevention

While Bell-LaPadula protects confidentiality and Biba protects integrity, the Brewer and Nash Model addresses a unique security concern: preventing competitive intelligence from crossing ethical boundaries. In professional services environments, having access to one company's strategic plans while also viewing a competitor's financial data creates an inherent conflict that could lead to insider trading, unfair business practices, or breach of fiduciary duty.

Key Concept: Dynamic vs. Static Access Control

Unlike traditional models that assign fixed clearance levels, the Brewer and Nash Model creates access restrictions dynamically based on user behavior. Your access permissions change over time depending on which companies' data you have previously accessed. This history-dependent approach is what makes the model unique among access control frameworks.

The model is sometimes called the "Chinese Wall" because once you access one company's data, an invisible wall goes up between you and their competitors—just like a physical barrier separating parties who should not communicate or share information.

How Conflict of Interest Develops

Before understanding how the model works, it's essential to grasp the problem it solves. Conflicts of interest arise when one person has access to confidential information from multiple competing entities, creating opportunities for that information to influence decisions inappropriately.

The Core Problem

Imagine a financial analyst at a consulting firm. They review confidential financial data from Company A, a major smartphone manufacturer. If they can then access similar data from Company B, a competing smartphone manufacturer, they could use insights from one to benefit the other, create unfair advantages, or leak competitive intelligence. This creates a conflict of interest that could violate professional ethics, securities laws, or contractual obligations.

CISSP Exam Note

The Brewer and Nash Model is frequently tested in scenarios involving consulting firms, law practices, investment banks, and auditing companies—any environment where professionals serve multiple clients in the same industry. Look for keywords like "competitor," "conflict of interest," or "ethical wall" to identify when this model applies.

Three-Level Information Organization

The model organizes information into three hierarchical levels that determine how access restrictions are applied:

Level Description Examples
Objects Individual files or data items Financial reports, strategy documents, contracts
Company Datasets All data belonging to one organization All of Company A's files grouped together
Conflict of Interest Classes Groups of competing companies in the same industry All smartphone manufacturers, all major banks
Brewer and Nash Model information hierarchy showing objects, company datasets, and conflict of interest classes
Information Hierarchy: Objects belong to Company Datasets, which are grouped into Conflict of Interest Classes

At the bottom level, objects are individual files or data items like financial reports and strategy documents. These objects belong to company datasets, which contain all data from one specific organization. Finally, company datasets are grouped into conflict of interest classes, which bring together all competing companies in the same industry. Once you access data from one company in a class, you're blocked from all competitors in that same class.

Understanding Conflict of Interest Classes

A conflict of interest class groups companies that compete directly with each other. For example, a "Smartphone Manufacturers" class might include Apple, Samsung, and Google. A "Major Airlines" class might include United, Delta, and American. Companies in different classes (like a smartphone maker and an airline) don't conflict—a consultant could work with both without ethical issues.

The Chinese Wall Rule

The Brewer and Nash Model enforces its protection through one dynamic rule that adapts based on your access history. This is called the Chinese Wall Rule because once you access one company's data, an invisible wall goes up between you and their competitors.

The Access Control Rule

A user can access an object only if that object belongs to the same company dataset they've already accessed, OR if the object belongs to a completely different conflict of interest class that they haven't accessed yet.

How the Wall Builds Over Time
  1. First Access is Unrestricted: Your first access in any conflict class is completely free—you can choose any company you want
  2. Competitors Become Blocked: After accessing one company's data, all competitors in that class are permanently blocked
  3. Other Classes Remain Open: You can still access companies in different conflict classes you haven't touched yet
  4. Wall Grows Dynamically: The wall builds over time, creating a unique access pattern based on your choices
Chinese Wall Rule diagram showing how access to one company blocks access to competitors in the same conflict of interest class
The Chinese Wall Rule: Access to Company A blocks all competitors in the same conflict class

The key insight is that restrictions are user-specific and history-dependent. Another consultant at the same firm might have accessed Company B instead of Company A, creating a completely different wall. The model doesn't use static clearance levels—your access history determines what you can and cannot see, and once you cross into a company's dataset, that decision is irreversible for that conflict class.

The Write Restriction (Preventing Leakage)

Most CISSP candidates focus solely on the read restriction, but the Brewer and Nash Model includes a critical write rule to prevent indirect information leakage. This rule is similar to the *-property in other models but adapted for conflicts of interest.

The Write Rule

A subject can write information to an object only if they cannot read any object contained in a different company dataset.

This rule ensures that a consultant cannot read confidential secrets from "Company A" and then—accidentally or maliciously—write those secrets into a report or file accessible to "Company B." Without this restriction, the "wall" could be bypassed by simply copying data from one side to the other.

Summary of Rules
  • Read Rule: You can read data if it doesn't conflict with your past access history.
  • Write Rule: You cannot write to a dataset if you have read access to any other company's dataset (this prevents cross-contamination).
Real-World Example: Investment Banking

Consider an investment bank advising on mergers and acquisitions. An analyst working on Company A's acquisition strategy cannot then advise Company B, a direct competitor, on their defensive measures. The Chinese Wall ensures that confidential strategic information cannot flow between competing interests through the same person, protecting both clients and maintaining market integrity.

Practical Example: A Day in the Life

Let's see how these rules work in practice through a detailed scenario involving a consultant at a multi-industry advisory firm.

Morning: Automotive Industry Work

A consultant opens files from Company A, an automotive manufacturer. The system records that they've accessed the automotive conflict class through Company A. At this moment, they're permanently blocked from Company B and Company C, Company A's direct competitors in the automotive conflict class. They can continue accessing any of Company A's files, but the competing automotive manufacturers are now off-limits forever.

Afternoon: Telecommunications Project

Later that day, the consultant needs to work on a telecommunications project. Since they haven't accessed the telecommunications conflict class yet, they can freely choose to work with Company X, a major telecom provider. Once they open Company X files, they're blocked from Company Y and Company Z, Company X's competitors. The wall now exists in two industries for this consultant.

Practical example showing how a consultant builds walls in multiple conflict of interest classes throughout the day
Building Walls: The consultant can work with Company A and Company X, but their competitors are permanently blocked

The Result

After these access decisions, the consultant can work with Company A (automotive) and Company X (telecommunications), but all competitors in both classes are permanently blocked. If another consultant at the same firm had made different initial choices—say, Company B in automotive and Company Y in telecommunications—they would have a completely different set of access permissions.

CISSP Exam Note

Remember that the Brewer and Nash Model is fundamentally about history-dependent, dynamic access control. Unlike Bell-LaPadula or Biba, which assign static clearance or integrity levels, this model's restrictions change based on user behavior. Questions often test whether you understand that access decisions are irreversible and that different users can have completely different access patterns.

Practical Limitations

While the Brewer and Nash Model effectively prevents conflicts of interest, it has significant challenges when implemented in real-world environments.

Progressive Access Restriction

As users access more companies across different industries, they build more walls and progressively lose access to more competitors. This can severely restrict user access over time. Eventually, a long-term employee might be blocked from large portions of the organization's client base simply because of the clients they've worked with historically.

Limitation Impact Mitigation
Cumulative Restrictions Users lose access over time Strategic assignment planning
Staffing Complexity May require multiple users for coverage Maintain pool of "clean" consultants
Irreversible Decisions No mechanism to reset walls New user accounts (loses institutional knowledge)
Single Focus Only addresses conflict of interest Combine with other security models

Operational Complexity

Organizations may need multiple users to cover all clients because individual consultants become restricted over time. They must carefully plan which consultants work with which clients, considering both immediate needs and long-term strategic implications. Once assigned, those decisions are permanent—there's no mechanism to reset or modify historical walls without creating a new user account, which means losing institutional knowledge and continuity.

Critical Understanding

The Brewer and Nash Model only addresses conflict of interest prevention. It provides no protection for confidentiality (information could still be disclosed to unauthorized parties who don't have conflicting access), integrity (data could still be modified), or availability. Organizations must combine this model with other access controls and monitoring systems to address these gaps.

No Security Level Hierarchy

Unlike Bell-LaPadula or Biba, the Brewer and Nash Model doesn't establish any hierarchy of sensitivity or trust. All companies within a conflict class are treated equally—there's no concept of one company's data being more confidential or trustworthy than another's. This means organizations need additional controls if they want to implement different access requirements for different types of information within each company's dataset.

The Chinese Wall model is designed specifically to prevent conflicts of interest, not to provide general-purpose access control. Its dynamic, history-based approach is powerful for its intended purpose but must be supplemented with other controls for comprehensive security.

CISSP Official Study Guide, 9th Edition

Conclusion

The Brewer and Nash Model provides a unique approach to access control by dynamically building restrictions based on user behavior rather than static clearance levels. Through its conflict of interest classes and the Chinese Wall Rule, it ensures that professionals working with multiple clients cannot access competing organizations' sensitive information.

Understanding the three-level information hierarchy—objects, company datasets, and conflict of interest classes—is essential for CISSP candidates. The model's key characteristic is that access decisions are irreversible and user-specific: once you access one company's data, their competitors are permanently blocked for you, even though another user might have completely different restrictions.

For CISSP exam success, remember that the Brewer and Nash Model addresses a specific problem—conflicts of interest—and provides no protection for confidentiality, integrity, or availability. When exam scenarios involve consulting firms, law practices, investment banks, or any environment with competing clients in the same industry, the Brewer and Nash (Chinese Wall) Model is your answer.

CISSP Practice Tests

Challenge yourself with tough, realistic CISSP scenarios that expose gaps before exam day does.

Take the Challenge
Quick Reference for CISSP Exam

The Brewer and Nash Model (Chinese Wall Model) is a security framework that prevents conflicts of interest by dynamically restricting access based on user history. It ensures users who access one company's data cannot access data from direct competitors.

Three-Level Information Hierarchy

  • Objects: Individual files or data items (financial reports, strategy documents)
  • Company Datasets: All data belonging to one organization
  • Conflict of Interest Classes: Groups of competing companies in the same industry

The Chinese Wall Rule

  • First Access: Unrestricted choice within any conflict class
  • After Access: All competitors in that class become permanently blocked
  • Other Classes: Remain accessible until you make a choice in each
  • Irreversible: Access decisions cannot be undone

Key Characteristics

  • Dynamic Access Control: Restrictions change based on user behavior, not static clearance levels
  • User-Specific: Each user builds their own unique wall based on their access history
  • History-Dependent: Past access decisions determine future permissions

Practical Limitations

  • Progressive Restriction: Users lose access over time as they work with more clients
  • No Reset Mechanism: Cannot undo access history without creating new accounts
  • Single Focus: Only addresses conflicts of interest—no confidentiality, integrity, or availability protection

Common Exam Scenarios

  • Consulting firms working with multiple clients in the same industry
  • Law firms representing competing companies
  • Investment banks advising on mergers and acquisitions
  • Auditing firms with clients who are competitors
Exam Focus: Model Comparison

To instantly identify the correct model on the exam:

  • If the threat is Unauthorized Disclosure (espionage, leaking secrets), the solution is Bell-LaPadula.
  • If the threat is Data Corruption (sabotage, integrity violations), the solution is Biba.
  • If the threat is Conflict of Interest (competing clients, ethical walls), the solution is Brewer and Nash.

Managerial Takeaway: Bell-LaPadula hides secrets, Biba protects truth, Brewer and Nash prevents ethical violations.

Gagan Singh - CISSP, CCSP, PMP
Gagan Singh
CISSP®, CCSP®, PMP®

Cybersecurity professional specializing in Critical National Infrastructure protection with expertise in security architecture and risk governance.