Commit 7925abbd authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Add used product threat

parent 5d3c4471
Loading
Loading
Loading
Loading
+31 −0
Original line number Diff line number Diff line
@@ -1023,6 +1023,36 @@ Mitigations for Impact:

* High to Low: TODO

### C.4.15 TH-USED: Access to data via acquisition of used product

Attacker may get unauthorized access to confidential data stored on the product through acquisition of a device containing the used product.

| Risk factors      | Likelihood | Security profiles |
|-------------------|------------|-------------------|
| DAT = 2 & FUN = 2 | High       | SP-3              |
| all others        | Medium     | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low        | SP-1              |

| Risk factors      | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |

Requirements that mitigate this threat: AUTH, CDST, SCDL, SDEF

Mitigations for Likelihood:

* Medium to Low: (RSET or INST or DELE), SDRF, SDTR

* High to Low: (RSET or INST or DELE), SDRF, SDTR

Mitigations for Impact:

* Medium to Low: AUTH-5, CDST

* High to Low: AUTH-3, AUTH-4, AUTH-5, CDST

### C.5 Mapping of use cases to risk factors and security profiles

| Use case | Description                 | CFG | AUT | DAT | FUN | ADM | RDP | DNC | COM | SP   |
@@ -1089,6 +1119,7 @@ This clause describes the methodology followed in the current text.
| CONF   | CONF, EISO, TRAF, IPv6, CDST, DMIN, LOGG |
| META   | TODO                                     |
| RCOM   | TODO                                     |
| USED   | AUTH, CDST, SCDL, SDEF                   |

## D.3 Risk acceptance criteria

+14 −5
Original line number Diff line number Diff line
@@ -1141,6 +1141,7 @@ This clause lists all the mitigations necessary to meet requirements for each se

  1. (KEVD or KEVA)
  1. (KEVM or KEVT or SCAN)
  1. (RSET or INST or DELE)
  1. (SUVP or SUAP or SUOE or SUAO)
  1. (TRAF-1 or (TRAF-2 and TRAF-3 and TRAF-4))
  1. AUTH-1
@@ -1170,6 +1171,8 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. ROUT-2
  1. ROUT-3
  1. SCFS
  1. SDRF
  1. SDTR
  1. SSCA
  1. VULH

@@ -1177,6 +1180,7 @@ This clause lists all the mitigations necessary to meet requirements for each se

  1. (FZ95 or BTIN or IMSL)
  1. (KEVM or KEVT or SCAN)
  1. (RSET or INST or DELE)
  1. (SUAP or SUAO)
  1. AUTH-1
  1. AUTH-2
@@ -1221,15 +1225,17 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. ROUT-2
  1. ROUT-3
  1. SCFS
  1. SDRF
  1. SDTR
  1. SSCA
  1. SUCS
  1. SUAU
  1. SUVH
  1. SURP
  1. SUCS
  1. SUED
  1. SUMV
  1. SURC
  1. SURP
  1. SUSR
  1. SUMV
  1. SUED
  1. SUVH
  1. TRAF-1
  1. VULH

@@ -1237,6 +1243,7 @@ This clause lists all the mitigations necessary to meet requirements for each se

  1. (KEVD or KEVA)
  1. (KEVM or KEVT or SCAN)
  1. (RSET or INST or DELE)
  1. (SUAP or SUAO)
  1. AUTH-1
  1. AUTH-2
@@ -1268,6 +1275,8 @@ This clause lists all the mitigations necessary to meet requirements for each se
  1. ROUT-2
  1. ROUT-3
  1. SCFS
  1. SDRF
  1. SDTR
  1. SSCA
  1. TRAF-1
  1. VULH