Research Into the Possibility of Integrating the Compartmentalization Method Into the Protection of Information in Open Sources

2025;
: pp. 71 - 83
1
Lviv Polytechnic National University, Department of information protection, Ukraine
2
Lviv Polytechnic National University, Department of information protection, Ukraine

The article examines the integration of the compartmentalization method as a fundamental cybersecurity principle in the strategy of protecting information in open sources, in particular to counter OSINT technologies. The authors emphasize that modern cyber threats, enhanced by the massive use of open sources, create risks of leakage of personal data and confidential information, especially through social networks and other platforms where the human factor is a key element of vulnerability.

A review of scientific and applied sources is conducted, highlighting the application of compartmentalization in various contexts: from military models of “Need-to-know” to technical implementations in the Android OS, network microsegmentation, hardware-software solutions (CHERI, Morello, CheriBSD). It is shown that the compartmentalization method allows to isolate digital environments at the operating system, browser and network levels, thereby reducing the possibilities for correlation of digital traces and construction of a full profile of the object by the attacker.

Particular attention is paid to personal and organizational scenarios: creating isolated accounts and aliases, using virtual machines and containers for separate tasks, setting up individual network channels for each “identity”, controlling and deleting metadata from publications.

The article proposes a multi-layered methodology that combines technical isolation and digital hygiene, emphasizing proactive management of digital “identities”.

At the same time, the authors emphasize the challenges: complexity of implementation, impact on performance, scalability problems and human factor risks. Despite this, compartmentalization is considered a promising and necessary direction in the development of modern information security systems, especially in the context of hybrid threats and martial law.

  1. Денисенко Б. А. Методологічні засади OSINT / Актуальні питання та перспективи розвитку кримінального аналізу в правоохоронній системі України : матеріали міжвідом. наук.-практ. конф. URL: https://elar.navs.edu.ua/server/api/core/bitstreams/b993bb75-5950-4259-9....
  2. Дрижакова Д., Волинець Р. Використання відкритих джерел інформації (OSINT) у сфері безпеки держави: технології та перспективи : матеріали конференцій МЦНД, (28.02.2025; Дніпро, Україна). 2025. 138– 141. DOI: https://doi.org/10.62731/mcnd-28.02.2025.005.
  3. Конституція України Закон України №254к/96-ВР (1996) в редакції від 01.01.2020 (Україна). URL: https://zakon.rada.gov.ua/laws/show/254%D0%BA/96-%D0%B2%D1%80#Text.
  4. Nasir Safwan. Deconstructing Modern Cyber Threats: A Practical Perspective on Privacy, Isolation, and Threat Mitigation for Personal Systems (July 16, 2025). DOI: http://doi.org/10.2139/ssrn.5353661.
  5. Javorsek D., Rose J., Marshall C., Leitner P. A Formal Risk-Effectiveness Analysis Proposal for the Compartmentalized Intelligence Security Structure. International Journal of Intelligence and CounterIntelligence. 2015. 28(4). 734–761. DOI: https://doi.org/10.1080/08850607.2015.1051830.
  6. Suarez-Tangil G., Tapiador J. E., Peris-Lopez P. Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. In: Qiu, M., Xu, S., Yung, M., Zhang, H. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science. 2015. Vol 9408. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319- 25645-0_5.
  7. Konieczny M. Legal aspects of using anti-OSINT as a tool to protect internet users against identity theft. RAIP. 2024. 4(XXIV). 105-123. DOI: https://doi.org/10.5604/01.3001.0054.9821.
  8. Konieczny M. Anti-OSINT methods ensuring protection of personal data in the context of cybercrime. RAIP. 2025. 1(XXV). 127-144. DOI: https://doi.org/10.5604/01.3001.0055.1100.
  9. Кібератаки на бізнес України 2025: Нові Вектори Загроз та Захист. Synchron. URL: https://synchron.ua/cyberattacks-on-ukrainian-business-2025-uk/.
  10. Івкова В., Опірський І. OSINT-технології як загроза кібербезпецi держави. Електронне фахове наукове     видання     “Кібербезпека:     освіта,     наука,     техніка”.     2025.                                  3(27). 165–179. DOI: https://doi.org/10.28925/2663-4023.2025.27.749.
  11. General Data Protection Regulation (GDPR). 2016. URL: https://gdpr-text.com/uk/.
  12. Khan R., Ghanem K., Coffele F. Digital Security by Design: A Review of Combined Hardware-Software-Based CyberSecurity with Compartmentalization. 2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense), Rome, Italy, 2023. Pp. 181-186. DOI: https://doi.org/10.1109/TechDefense59795.2023.10380808.
  13. Gudka K., Watson R. N., Anderson J., Chisnall D., Davis B., Laurie B., Marinos I., Neumann P. G., Richardson A. Clean application compartmentalization with soaap (extended version). University of Cambridge, Computer Laboratory, Tech. Rep., 2015.