@@ -566,45 +566,53 @@ A basic overview of VPN functions follows. See clause 4.7 for a detailed overvie
### C.2.3 Estimate risks
#### C.2.3.1 Overview
The risk factors identified by this risk assessment are grouped into risk categories and assigned unique identifiers below. Note that the numeric identifiers are just that—identifiers. They are not intended to implied tiered security needs.
#### C.2.3.2 End-point configuration
**[CFG]** End-point configuration
Description: Affects likelihood of threats involving misconfiguration.
Rationale: The complexity of the end-point configuration can directly affect the likelyhood of threats
***[CFG-L-0]** End-point requires no configuration
***[CFG-L-1]** End-point requires simple configuration, such as choosing a region to connect to
***[CFG-L-2]** End-point requires configuration by a skilled administrator
**[AUT]** Account management and authentication of endpoints
Description: Affects likelihood of threats involving authentication.
Affects likelihood of threats involving misconfiguration.
Rationale: An improper account management and authentication implementation can directly impact with a succesful breach
***CFG-L-0**End-point requires no configuration
***CFG-L-1**End-point requires simple configuration, such as choosing a region to connect to
***CFG-L-2** End-point requires configuration by a skilled administrator
***[AUT-L-0]**Customer uses third party identity and authentication provider
***[AUT-L-1]**Identity and authentication are managed by the customer through a centralized identity system
***[AUT-L-2]** Each system used by the customer involves its own set of account information and secrets
#### C.2.3.3 Account management and authentication of endpoints
**[DAT]** Sensitivity of data
Affects likelihood of threats involving authentication.
Description: Affects impact of threats involving loss of data confidentiality, availability, or integrity.
***AUT-L-0** Customer uses third party identity and authentication provider
***AUT-L-1** Identity and authentication are managed by the customer through a centralized identity system
***AUT-L-2** Each system used by the customer involves its own set of account information and secrets
Rationale: More sensitive data leads to a higher impact with a succesful breach.
#### C.2.3.4 Sensitivity of data
***[DAT-L-0]** User data is generally trivial and unimportant (ie. TV or streaming content, etc)
***[DAT-L-1]** User data is moderately important
***[DAT-L-2]** User data is important for preservation of human rights of user
Affects impact of threats involving loss of data confidentiality, availability, or integrity.
**[FUN]** Sensitivity of functions
***DAT-L-0** User data is generally trivial and unimportant (ie. TV or streaming content, etc)
***DAT-L-1** User data is moderately important
***DAT-L-2** User data is important for preservation of human rights of user
Description: Affects impact of threats involving loss of availability of product functions.
#### C.2.3.5 Sensitivity of functions
Rationale: Loss of product functions' availability can have a major impacton threats.
Affects impact of threats involving loss of availability of product functions.
***[FUN-L-0]** Loss of function would be a minor annoyance (e.g. preventing accessing unimportant web sites)
***[FUN-L-1]** Loss of function would impede daily activities
***[FUN-L-2]** Loss of function would threaten human rights of user
***FUN-L-0** Loss of function would be a minor annoyance (e.g. preventing accessing unimportant web sites)
***FUN-L-1** Loss of function would impede daily activities
***FUN-L-2** Loss of function would threaten human rights of user
**[ADM]** Availability of administration
#### C.2.3.6 Availability of administration
Description: What the availability and skill of administration is for the product.
Affects likelihood and impact of all threats.
Rationale: Skilled, fully resourced administration allows more risk transfer and can reduce the impact of incidents.