Commit 453e0d33 authored by JANSSEN; jeroen's avatar JANSSEN; jeroen
Browse files

Add threats

parent 1d1b520a
Loading
Loading
Loading
Loading
+98 −0
Original line number Diff line number Diff line
@@ -658,6 +658,104 @@ _Table C.1 — Security profiles mapped to risk factors_

_Table C.2 — Security profiles mapped to mitigations_


### C.4.1 General

The approach to listing threats is to separate them by mitigation so that they may be associated with risk factors more directly.

For the purposes of the list of threats, the product includes:


The risk factors by type are:

Likelihood: XXX

Impact: XXX

For each threat, a table shows how to use the risk factors to calculate the level of likelihood or impact. The levels are Low, Medium, or High.

### C.4.3 List of threats and risk assessments

**[TH-XXX]:** Attacker may use known exploitable vulnerabilities in the VPN interface implementation to get unauthorized access to product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may use unknown exploitable vulnerabilities in the network interface implementation to get unauthorized access to product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** **[TH-CONF]:** Attacker may use configuration errors to get unauthorized access to the product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may use network access to get unauthorized access to confidential data transmitted by the product.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may exploit vulnerabilities in the product to reduce availability of product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may exploit vulnerabilities in the product to attack other products.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may masquerade as an authorized server to get unauthorized access to product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

**[TH-XXX]:** Attacker may use unauthorized access to the product to harm the host system.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| XXX                                       | High       |
| XXX                                       | Medium     |
| XXX                                       | Low        |

Requirements: 

# Annex L (informative): Relationship between the present document and the requirements of EU Regulation 2024/2847

DRAFT ANNEX L - DO NOT CONSIDER THE CONTENT