@@ -478,7 +478,16 @@ See [i.3] for formal definitions of micro, small, and medium-sized enterprises.
* Limited or no full-time IT/network administration
* Seeking secure connections primarily to SaaS products
* Requires managed service for configuration and maintenance
* Does not connect endpoints with other endpoints directly
* Connects endpoints with other endpoints directly
* Not critical for core business operations
***UC-5** Large enterprise
* Full-time IT/network administration
* Connects many endpoints to private network with many hosts
* Requires managed service for configuration and maintenance
* Connects endpoints with other endpoints directly
* Critical for business operations
* Needs to inspect traffic extensively for security
# 5 Requirements specifications
@@ -648,6 +657,16 @@ Rationale: More features mean more code and more interfaces mean attack surface.
***[COM-1]** Foreseeable use requires a few additional features related to tunnelling encrypted traffic
***[COM-2]** Foreseeable use requires many additional features
### C.2.10 RF-CON: Connectivity offered
Description: Whether the VPN connects different endpoints to each other via a private network or simply provides a tunnel from a single endpoint to a public netowrk
Rationale: Different connectivity requirements create different risks and mitigations.
***[CON-0]** Foreseeable use is a single endpoint connecting only to a public network
***[CON-1]** Foreseable use is one or more endpoints connecting to other endpoints or hosts via a private network
***[CON-2]** Foreseeable use is multiple endpoints connecting to each other via a private network, in addition to connecting to a public network
## C.3 Assumptions
### C.3.1 Platform
@@ -1119,12 +1138,13 @@ Mitigations for Impact:
## C.5 Mapping of use cases to risk factors and security profiles
| Use case | Description | CFG | AUT | DAT | FUN | ADM | RDP | DNC | COM | SP |