Requirements that mitigate this threat: AUTH, DMIN, CRYPT, AUTH, ROUT, DNSL, CDST, SCDL, SDEF, LOGG
All mitigations from TH-UEAC, TH-MITM, TH-LEAK, TH-PLNS, TH-PLNM, TH-UNAA, TH-CONF, TH-META, TH-RCOM, TH-USED apply (using those requirement's risk formula), in addition to:
Mitigations for Impact:
* Medium to Low: NPII-1
* High to Low: NPII-\*
## C.5 Mapping of use cases to risk factors and security profiles
| Use case | Description | CFG | AUT | DAT | FUN | ADM | RDP | DNC | COM | CON | SP |