Commit 18278fd1 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Split threats by connectivity, add PII specific threat

parent 1bc32e20
Loading
Loading
Loading
Loading
+148 −78
Original line number Diff line number Diff line
@@ -511,8 +511,8 @@ Once the present document is cited in the Official Journal of the European Union
| Data minimisation                               | DMIN                                |
| Availability protection                         | AVAI                                |
| Minimise impact on other devices or services    | NUTI                                |
| Limit attack surface                            | NUTI                                |
| Exploit mitigation by limiting incident impact  | NUTI                                |
| Limit attack surface                            | EISO, NUTI                          |
| Exploit mitigation by limiting incident impact  | EISO, NUTI                          |
| Logging and monitoring mechanisms               | LOGG                                |
| Secure deletion and data transfer               | SCDL, SDTR                          |
| Vulnerability handling                          | VULH                                |
@@ -721,19 +721,19 @@ Attacker may use unknown exploitable vulnerabilities in the product implementati

| Risk factors           | Likelihood | Security profiles |
|------------------------|------------|-------------------|
| max(DAT, FUN, COM) = 2 | High       | SP-3, SP-4        |
| all others             | Medium     | SP-2, SP-1        |
| max(DAT, FUN, COM) = 2 | High       | SP-3, SP-4, SP-5  |
| all others             | Medium     | SP-1, SP-2        |

Table: _Table C.1_

| Risk factors           | Impact | Security profiles |
|------------------------|--------|-------------------|
| max(DAT, FUN, COM) > 0 | High   | SP-2, SP-3, SP-4  |
| all others             | Medium | SP-1              |
| max(DAT, FUN, COM) = 2 | High   | SP-3, SP-4, SP-5  |
| all others             | Medium | SP-1, SP-2        |

Table: _Table C.2_

Requirements that mitigate this threat: SSDD, NUTI, NPII, LOGG
Requirements that mitigate this threat: SSDD, NUTI, LOGG

Mitigations for Likelihood:

@@ -743,29 +743,29 @@ Mitigations for Likelihood:

Mitigations for Impact:

* Medium to Low: NPII-1, LOGG-1, CDST
* Medium to Low: LOGG-1, CDST

* High to Low: NPII-\*, LOGG-\*, CDST
* High to Low: LOGG-\*, CDST

### C.4.4 TH-KEVU: Known exploitable vulnerabilities

Attacker may use known exploitable vulnerabilities in the product implementation to get unauthorised access to product assets.

| Risk factors                     | Likelihood | Security profiles      |
|-----------------------------------|------------|-------------------|
|----------------------------------|------------|------------------------|
| max(DAT, FUN, COM) = 2 & ADM = 2 | High       | SP-4                   |
| all others                        | Medium     | SP-1, SP-2, SP-3  |
| all others                       | Medium     | SP-1, SP-2, SP-3, SP-5 |

Table: _Table C.3_

| Risk factors           | Impact | Security profiles      |
|------------------------|--------|-------------------|
| max(DAT, FUN, COM) > 0 | High   | SP-2, SP-3, SP-4  |
|------------------------|--------|------------------------|
| max(DAT, FUN, COM) > 0 | High   | SP-2, SP-3, SP-4, SP-5 |
| all others             | Medium | SP-1                   |

Table: _Table C.4_

Requirements that mitigate this threat: NKEV, SSDD, SCUD, NPII, LOGG, VULH
Requirements that mitigate this threat: NKEV, SSDD, SCUD, LOGG, VULH

All mitigations from TH-UEVU apply (using that requirement's risk formula), in addition to:

@@ -805,9 +805,9 @@ Mitigations for Likelihood:

Mitigations for Impact:

* Medium to Low: AUTH-3, AUTH-5, NPII-1, CDST
* Medium to Low: AUTH-3, AUTH-5, CDST

* High to Low: AUTH-3, AUTH-4, AUTH-5, NPII-1, NPII-2, NPII-4, CDST
* High to Low: AUTH-3, AUTH-4, AUTH-5, CDST

### C.4.6 TH-RDOS: Denial of service on remote data processing

@@ -863,7 +863,7 @@ Table: _Table C.9_

Table: _Table C.10_

Requirements that mitigate this threat: CRYPT, NPII, LOGG
Requirements that mitigate this threat: CRYPT, LOGG

Mitigations for Likelihood:

@@ -875,7 +875,7 @@ Mitigations for Impact:

* Medium to Low: LOGG-1

* High to Low: LOGG-\*, NPII-2
* High to Low: LOGG-\*

### C.4.8 TH-LEAK: Sensitive data leaks

@@ -906,27 +906,27 @@ Mitigations for Likelihood:

Mitigations for Impact:

* Medium to Low: NPII-1, LOGG-1
* Medium to Low: LOGG-1

* High to Low: NPII-\*, LOGG-\*
* High to Low: LOGG-\*

### C.4.9 TH-PLAN: Transmitting sensitive data in the clear
### C.4.9 TH-PLNS: Transmitting sensitive data in the clear in a single endpoint VPN

Attacker may read sensitive data transmitted without encryption.
Attacker may read sensitive data transmitted without encryption in a single endpoint VPN.

| Risk factors                                         | Likelihood | Security profiles |
|------------------------------------------|------------|-------------------|
| CFG = 2 or (CFG > 0 & ADM = 2 & COM > 1) | High       | SP-3, SP-4        |
|------------------------------------------------------|------------|-------------------|
| CON = 0 & (CFG = 2 or (CFG > 0 & ADM = 2 & COM > 1)) | High       | SP-3              |
| all others                                           | Medium     | SP-1, SP-2        |
| CFG = 0 or (ADM = 0 & COM = 0)           | Low        | none              |
| CON > 0 or CFG = 0 or (ADM = 0 & COM = 0)            | Low        | SP-4, SP-5        |

Table: _Table C.13_

| Risk factors                 | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|------------------------------|--------|-------------------|
| CON = 0 & DAT = 2 & FUN = 2  | High   | SP-3              |
| all others                   | Medium | SP-2              |
| CON > 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-4, SP-5  |

Table: _Table C.14_

@@ -940,9 +940,43 @@ Mitigations for Likelihood:

Mitigations for Impact:

* Medium to Low: NPII-1, LOGG-1
* Medium to Low: LOGG-1

* High to Low: LOGG-\*

### C.4.10 TH-PLNM: Transmitting sensitive data in the clear in multi-endpoint VPN

* High to Low: NPII-\*, LOGG-\*
Attacker may read sensitive data transmitted without encryption in a VPN which connects multiple endpoints to each other.

| Risk factors                                         | Likelihood | Security profiles |
|------------------------------------------------------|------------|-------------------|
| CON > 0 & (CFG = 2 or (CFG > 0 & ADM = 2 & COM > 1)) | High       | SP-4, SP-5        |
| all others                                           | Medium     | none              |
| CON = 0 or CFG = 0 or (ADM = 0 & COM = 0)            | Low        | SP-1, SP-2, SP-3  |

Table: _Table C.13_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON > 0 & DAT = 2 & FUN = 2  | High   | SP-5              |
| all others                   | Medium | SP-4             |
| CON = 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-2, SP-3  |

Table: _Table C.14_

Requirements that mitigate this threat: NUTI, CRYPT, AUTH, ROUT, DNSL

Mitigations for Likelihood:

* Medium to Low: NUTI-1, CRYPT-2, ROUT-1, AUTH-1, AUTH-2

* High to Low: NUTI-\*, DNSL-6, CRYPT-\*, ROUT-\*, AUTH-\*

Mitigations for Impact:

* Medium to Low: LOGG-1

* High to Low: LOGG-\*

### C.4.10 TH-UNAA: Unauthorised authentication

@@ -963,19 +997,19 @@ Table: _Table C.15_

Table: _Table C.16_

Requirements that mitigate this threat: EISO, AUTH, LOGG
Requirements that mitigate this threat: AUTH, LOGG

Mitigations for Likelihood:

* Medium to Low: EISO, AUTH-6
* Medium to Low: AUTH-6

* High to Low: EISO, AUTH-6
* High to Low: AUTH-6

Mitigations for Impact:

* Medium to Low: NPII-1, AUTH-3, LOGG-1
* Medium to Low: AUTH-3, LOGG-1

* High to Low: NPII-\*, AUTH-3, AUTH-4, AUTH-5, LOGG-\*
* High to Low: AUTH-3, AUTH-4, AUTH-5, LOGG-\*

### C.4.11 TH-LDEL: Attacker removes evidence of compromise

@@ -996,7 +1030,7 @@ Table: _Table C.17_

Table: _Table C.18_

Requirements that mitigate this threat: LOGG, NPII
Requirements that mitigate this threat: LOGG

Mitigations for Likelihood:

@@ -1006,43 +1040,77 @@ Mitigations for Likelihood:

Mitigations for Impact:

* Medium to Low: NPII-1
* Medium to Low: CDST

* High to Low: NPII-\*
* High to Low: CDST

### C.4.12 TH-CONF: Access to assets via configuration errors
### C.4.12 TH-CONF: Access to assets via configuration errors in single endpoint VPN

Attacker may use configuration errors to get unauthorised access to product assets.
Attacker may use configuration errors to get unauthorised access to product assets in a single endpoint VPN.

| Risk factors                                                 | Likelihood | Security profiles |
|---------------------------------------------------|------------|-------------------|
| CFG > 0 & max(ADM, COM) = 2 & max(DAT, FUN) = 2   | High       | SP-3, SP-4        |
|--------------------------------------------------------------|------------|-------------------|
| CON = 0 & CFG > 0 & max(ADM, COM) = 2 & max(DAT, FUN) = 2    | High       | SP-3              |
| all others                                                   | Medium     | SP-2              |
| CFG = 0 or max(ADM, COM) = 0 or max(DAT, FUN) = 0 | Low        | SP-1              |
| CON > 0 or CFG = 0 or max(ADM, COM) = 0 or max(DAT, FUN) = 0 | Low        | SP-1, SP-4, SP-5  |

Table: _Table C.19_

| Risk factors                 | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|------------------------------|--------|-------------------|
| CON = 0 & DAT = 2 & FUN = 2  | High   | SP-3              |
| all others                   | Medium | SP-2              |
| CON > 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-4        |

Table: _Table C.20_

Requirements that mitigate this threat: CONF, TRAF, IPv6, CDST, LOGG

Mitigations for Likelihood:

* Medium to Low: CONF-5, (TRAF-1 or (TRAF-2 and TRAF-3 and TRAF-4)), IPv6-\*

* High to Low: TRAF-1, IPv6-\*

Mitigations for Impact:

* Medium to Low: AUTH-3, LOGG-1, CDST

* High to Low: AUTH-3, AUTH-4, AUTH-5, LOGG-\*, CDST

### C.4.12 TH-CONF: Access to assets via configuration errors in a multi-endpoint VPN

Attacker may use configuration errors to get unauthorised access to product assets in a multi-endpoint VPN.

| Risk factors                                                 | Likelihood | Security profiles |
|--------------------------------------------------------------|------------|-------------------|
| CON > 0 & CFG > 0 & max(ADM, COM) = 2 & max(DAT, FUN) = 2    | High       | SP-5              |
| all others                                                   | Medium     | SP-4              |
| CON = 0 or CFG = 0 or max(ADM, COM) = 0 or max(DAT, FUN) = 0 | Low        | SP-1, SP-2, SP-3  |

Table: _Table C.19_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON > 0 & DAT = 2 & FUN = 2  | High   | SP-5              |
| all others                   | Medium | SP-4              |
| CON = 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-2, SP-3  |

Table: _Table C.20_

Requirements that mitigate this threat: CONF, EISO, TRAF, IPv6, CDST, DMIN, LOGG
Requirements that mitigate this threat: CONF, TRAF, IPv6, CDST, DMIN, LOGG

Mitigations for Likelihood:

* Medium to Low: CONF-5, EISO, (TRAF-1 or (TRAF-2 and TRAF-3 and TRAF-4)), IPv6-\*
* Medium to Low: CONF-5, (NUTI-1 or TRAF-1 or (TRAF-2 and TRAF-3 and TRAF-4)), IPv6-\*

* High to Low: EISO, TRAF-1, IPv6-\*
* High to Low: NUTI-\*, IPv6-\*

Mitigations for Impact:

* Medium to Low: NPII-1, AUTH-3, LOGG-1, CDST
* Medium to Low: AUTH-3, LOGG-1, CDST

* High to Low: NPII-\*, AUTH-3, AUTH-4, AUTH-5, LOGG-\*, CDST
* High to Low: AUTH-3, AUTH-4, AUTH-5, LOGG-\*, CDST

### C.4.13 TH-META: Data leaks due to metadata and traffic analysis

@@ -1229,20 +1297,22 @@ This clause describes the methodology followed in the current text.
## D.2 Mapping of risks to requirements

| Threat | Requirements                                                |
|--------|------------------------------------------|
| UEVU   | SSDD, NPII, LOGG, VULH                   |
| KEVU   | NKEV, SSDD, NPII, LOGG, VULH             |
|--------|-------------------------------------------------------------|
| UEVU   | SSDD, LOGG, VULH                                            |
| KEVU   | NKEV, SSDD, LOGG, VULH                                      |
| UEAC   | AUTH, DMIN                                                  |
| RDOS   | AVAI                                                        |
| MITM   | CRYPT, NPII, LOGG                        |
| MITM   | CRYPT, LOGG                                                 |
| LEAK   | ROUT, CONF, DNSL, IPv6, CRYPT                               |
| PLAN   | CRYPT, SCDL, AUTH, ROUT, DNSL            |
| UNAA   | EISO, AUTH, LOGG                         |
| LDEL   | LOGG, NPII                               |
| CONF   | CONF, EISO, TRAF, IPv6, CDST, DMIN, LOGG |
| PLNS   | EISO, CRYPT, AUTH, ROUT, DNSL                               |
| PLNM   | CRYPT, AUTH, ROUT, DNSL                                     |
| UNAA   | AUTH, LOGG                                                  |
| LDEL   | LOGG                                                        |
| CONF   | CONF, TRAF, IPv6, CDST, DMIN, LOGG                          |
| META   | TODO                                                        |
| RCOM   | TODO                                                        |
| USED   | AUTH, CDST, SCDL, SDEF                                      |
| CPII   | AUTH, DMIN, CRYPT, AUTH, ROUT, DNSL, CDST, SCDL, SDEF, LOGG |

Table: _Table D.1 — Map of risks to requirements_

+2 −3
Original line number Diff line number Diff line
@@ -1225,7 +1225,6 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. DNSL-7
  1. DNSL-8
  1. DOST
  1. EISO
  1. FDRP
  1. IPv6-1
  1. IPv6-2
@@ -1233,6 +1232,7 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. LOGG-1
  1. LOGG-2
  1. NPII-1
(NUTI-1 or TRAF-1 or (TRAF-2 and TRAF-3 and TRAF-4))
1. NUTI-1
  1. NUTI-2
  1. ROUT-1
@@ -1242,5 +1242,4 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. SDRF
  1. SDTR
  1. SSCA
  1. TRAF-1
  1. VULH