Commit cd451d48 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Update threat formulas and risk factors for large enterprise use case

parent 18278fd1
Loading
Loading
Loading
Loading
+88 −91
Original line number Diff line number Diff line
@@ -780,18 +780,18 @@ Mitigations for Likelihood:
Attacker may gain unauthorised access to an endpoint in a manner not under control of the product, exposing product assets.

| Risk factors       | Likelihood | Security profiles |
|-------------------|------------|-------------------|
| DAT = 2 & FUN = 2 | High       | SP-3              |
| all others        | Medium     | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low        | SP-1              |
|--------------------|------------|-------------------|
| max(DAT, FUN) = 2  | High       | SP-3, SP-4, SP-5  |
| all others         | Medium     | SP-2              |
| max (DAT, FUN) = 0 | Low        | SP-1              |

Table: _Table C.5_

| Risk factors       | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|--------------------|--------|-------------------|
| max(DAT, FUN) = 2  | High   | SP-3, SP-4, SP-5  |
| all others         | Medium | SP-2              |
| max (DAT, FUN) = 0 | Low    | SP-1              |

Table: _Table C.6_

@@ -815,17 +815,17 @@ Attacker launches denial of service attack on remote data processing solution.

| Risk factors                  | Likelihood | Security profiles |
|-------------------------------|------------|-------------------|
| RDP = 2 & DAT = 2 & FUN = 2   | High       | SP-3              |
| all others                    | Medium     | SP-4              |
| RDP = 0 or DAT = 0 or FUN = 0 | Low        | SP-1, SP-2        |
| RDP = 2 & max(DAT, FUN) = 2   | High       | SP-3, SP-4, SP-5  |
| all others                    | Medium     | SP-2              |
| RDP = 0 or DAT = 0 or FUN = 0 | Low        | SP-1              |

Table: _Table C.7_

| Risk factors       | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|--------------------|--------|-------------------|
| max(DAT, FUN) = 2  | High   | SP-3, SP-4, SP-5  |
| all others         | Medium | SP-2              |
| max (DAT, FUN) = 0 | Low    | SP-1              |

Table: _Table C.8_

@@ -850,16 +850,16 @@ Attacker may read or modify traffic by capturing and relaying activity to and fr
| Risk factors                | Likelihood | Security profiles |
|-----------------------------|------------|-------------------|
| ADM > 0 & max(DAT, FUN) = 2 | High       | SP-3, SP-4        |
| all others                  | Medium     | SP-2              |
| all others                  | Medium     | SP-2, SP-5        |
| DAT = 0 & FUN = 0           | Low        | SP-1              |

Table: _Table C.9_

| Risk factors       | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|--------------------|--------|-------------------|
| max(DAT, FUN) = 2  | High   | SP-3, SP-4, SP-5  |
| all others         | Medium | SP-2              |
| max (DAT, FUN) = 0 | Low    | SP-1              |

Table: _Table C.10_

@@ -883,15 +883,15 @@ Attacker may read sensitive data sent outside the VPN connection by the product.

| Risk factors                 | Likelihood | Security profiles |
|------------------------------|------------|-------------------|
| DNC = 2 & DAT = 2 & FUN = 2  | High       | SP-3              |
| all others                   | Medium     | SP-2, SP-4        |
| DNC = 2 & max(DAT, FUN) = 2  | High       | SP-3, SP-4, SP-5  |
| all others                   | Medium     | SP-2              |
| DNC = 0 or max(DAT, FUN) = 0 | Low        | SP-1              |

Table: _Table C.11_

| Risk factors | Impact | Security profiles      |
|--------------|--------|-------------------|
| DAT > 0      | High   | SP-2, SP-3, SP-4  |
|--------------|--------|------------------------|
| DAT > 0      | High   | SP-2, SP-3, SP-4, SP-5 |
| all others   | Medium | SP-1                   |

Table: _Table C.12_
@@ -915,18 +915,18 @@ Mitigations for Impact:
Attacker may read sensitive data transmitted without encryption in a single endpoint VPN.

| Risk factors                            | Likelihood | Security profiles |
|------------------------------------------------------|------------|-------------------|
| CON = 0 & (CFG = 2 or (CFG > 0 & ADM = 2 & COM > 1)) | High       | SP-3              |
| all others                                           | Medium     | SP-1, SP-2        |
| CON > 0 or CFG = 0 or (ADM = 0 & COM = 0)            | Low        | SP-4, SP-5        |
|-----------------------------------------|------------|-------------------|
| CON = 0 & CFG > 0 & max(DAT, FUN) = 2)  | High       | SP-3              |
| all others                              | Medium     | SP-2              |
| CON > 0 or CFG = 0 or max(DAT, FUN) = 0 | Low        | SP-1, SP-4, SP-5  |

Table: _Table C.13_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON = 0 & DAT = 2 & FUN = 2  | High   | SP-3              |
| CON = 0 & max(DAT, FUN) = 2  | High   | SP-3              |
| all others                   | Medium | SP-2              |
| CON > 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-4, SP-5  |
| CON > 0 or max(DAT, FUN) = 0 | Low    | SP-1, SP-4, SP-5  |

Table: _Table C.14_

@@ -949,18 +949,18 @@ Mitigations for Impact:
Attacker may read sensitive data transmitted without encryption in a VPN which connects multiple endpoints to each other.

| Risk factors                            | Likelihood | Security profiles |
|------------------------------------------------------|------------|-------------------|
| CON > 0 & (CFG = 2 or (CFG > 0 & ADM = 2 & COM > 1)) | High       | SP-4, SP-5        |
|-----------------------------------------|------------|-------------------|
| CON > 0 & CFG > 0 & max(DAT, FUN) = 2)  | High       | SP-4, SP-5        |
| all others                              | Medium     | none              |
| CON = 0 or CFG = 0 or (ADM = 0 & COM = 0)            | Low        | SP-1, SP-2, SP-3  |
| CON = 0 or CFG = 0 or max(DAT, FUN) = 0 | Low        | SP-1, SP-2, SP-3  |

Table: _Table C.13_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON > 0 & DAT = 2 & FUN = 2  | High   | SP-5              |
| all others                   | Medium | SP-4             |
| CON = 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-2, SP-3  |
| CON > 0 & max(DAT, FUN) = 2  | High   | SP-4, SP-5        |
| all others                   | Medium | none              |
| CON = 0 or max(DAT, FUN) = 0 | Low    | SP-1, SP-2, SP-3  |

Table: _Table C.14_

@@ -983,17 +983,17 @@ Mitigations for Impact:
Attacker may attempt to authenticate in an unauthorised manner to get access to product assets.

| Risk factors      | Likelihood | Security profiles |
|-----------------------------------|------------|-------------------|
| max(DAT, FUN, COM) = 2 & ADM = 2  | High       | SP-4              |
| all others                        | Medium     | SP-1, SP-2, SP-3  |
|-------------------|------------|-------------------|
| max(DAT, FUN) = 2 | High       | SP-3, SP-4, SP-5  |
| all others        | Medium     | SP-1, SP-2        |

Table: _Table C.15_

| Risk factors       | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|--------------------|--------|-------------------|
| max(DAT, FUN) = 2  | High   | SP-3, SP-4, SP-5  |
| all others         | Medium | SP-2              |
| max (DAT, FUN) = 0 | Low    | SP-1              |

Table: _Table C.16_

@@ -1017,16 +1017,15 @@ Attacker may remove evidence of compromise from the endpoint.

| Risk factors      | Likelihood | Security profiles |
|-------------------|------------|-------------------|
| max(DAT, FUN) = 2 | High       | SP-3, SP-4        |
| max(DAT, FUN) = 2 | High       | SP-3, SP-4, SP-5  |
| all others        | Low        | SP-1, SP-2        |

Table: _Table C.17_

| Risk factors      | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
| max(DAT, FUN) = 2 | High   | SP-3, SP-4, SP-5  |
| all others        | Low    | SP-1, SP-2        |

Table: _Table C.18_

@@ -1058,9 +1057,9 @@ Table: _Table C.19_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON = 0 & DAT = 2 & FUN = 2  | High   | SP-3              |
| CON = 0 & max(DAT, FUN) = 2  | High   | SP-3              |
| all others                   | Medium | SP-2              |
| CON > 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-4        |
| CON > 0 or max(DAT, FUN) = 0 | Low    | SP-1, SP-4, SP-5  |

Table: _Table C.20_

@@ -1092,9 +1091,9 @@ Table: _Table C.19_

| Risk factors                 | Impact | Security profiles |
|------------------------------|--------|-------------------|
| CON > 0 & DAT = 2 & FUN = 2  | High   | SP-5              |
| all others                   | Medium | SP-4              |
| CON = 0 or DAT = 0 & FUN = 0 | Low    | SP-1, SP-2, SP-3  |
| CON > 0 & max(DAT, FUN) = 2  | High   | SP-4, SP-5        |
| all others                   | Medium | none              |
| CON = 0 or max(DAT, FUN) = 0 | Low    | SP-1, SP-2, SP-3  |

Table: _Table C.20_

@@ -1112,23 +1111,21 @@ Mitigations for Impact:

* High to Low: AUTH-3, AUTH-4, AUTH-5, LOGG-\*, CDST

### C.4.13 TH-META: Data leaks due to metadata and traffic analysis
### C.4.13 TH-META: Compromise of PII due to metadata and traffic analysis

Attacker may use user metadata such as IP addresses and traffic analysis to gain confidential data.
Attacker may use user metadata such as IP addresses and traffic analysis to compromise personally identifiable information.

| Risk factors                 | Likelihood | Security profiles      |
|--------------|------------|-------------------|
| TODO         | High       | SP-3              |
| TODO         | Medium     | SP-2, SP-4        |
| TODO         | Low        | SP-1              |
|------------------------------|------------|------------------------|
| PII = 2 & DATA = 2 & FUN = 2 | High       | SP-3,                  |
| all others                   | Medium     | SP-1, SP-2, SP-4, SP-5 |

Table: _Table C.21_
Table: _Table C.25_

| Risk factors | Impact | Security profiles      |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |
|--------------|--------|------------------------|
| PII = 2      | High   | SP-3                   |
| all others   | Medium | SP-1, SP-2, SP-4, SP-5 |

Table: _Table C.22_

@@ -1136,15 +1133,15 @@ Requirements that mitigate this threat:

Mitigations for Likelihood:

* Medium to Low: TODO
* Medium to Low: TODO - transfer risk to user

* High to Low: TODO
* High to Low: TODO - transfer risk to user

Mitigations for Impact:

* Medium to Low: TODO
* Medium to Low: TODO - transfer risk to user

* High to Low: TODO
* High to Low: TODO - transfer risk to user

### C.4.14 TH-RCOM: RDPS compromise and isolation

@@ -1152,7 +1149,7 @@ Attacker may use compromise or isolation errors in remote data processing system

| Risk factors                  | Likelihood | Security profiles |
|-------------------------------|------------|-------------------|
| RDP = 2 & DAT = 2 & FUN = 2   | High       | SP-3              |
| RDP = 2 & DAT = 2 & FUN = 2   | High       | SP-3, SP-5        |
| all others                    | Medium     | SP-4              |
| RDP = 0 or DAT = 0 or FUN = 0 | Low        | SP-1, SP-2        |

@@ -1160,7 +1157,7 @@ Table: _Table C.23_

| Risk factors      | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| DAT = 2 & FUN = 2 | High   | SP-3, SP-5        |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |

@@ -1185,16 +1182,16 @@ Mitigations for Impact:
Attacker may get unauthorised access to confidential data stored on the product through access to or acquisition of a device containing the used product.

| Risk factors                 | Likelihood | Security profiles |
|-------------------|------------|-------------------|
| DAT = 2 & FUN = 2 | High       | SP-3              |
|------------------------------|------------|-------------------|
| ADM > 0 & DAT = 2 & FUN = 2  | High       | SP-3              |
| all others                   | Medium     | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low        | SP-1              |
| ADM = 0 or DAT = 0 & FUN = 0 | Low        | SP-1, SP-5        |

Table: _Table C.25_

| Risk factors      | Impact | Security profiles |
|-------------------|--------|-------------------|
| DAT = 2 & FUN = 2 | High   | SP-3              |
| DAT = 2 & FUN = 2 | High   | SP-3, SP-5        |
| all others        | Medium | SP-2, SP-4        |
| DAT = 0 & FUN = 0 | Low    | SP-1              |

@@ -1247,10 +1244,10 @@ Mitigations for Impact:
| Use case | Description                 | CFG | AUT | DAT | FUN | ADM | RDP | DNC | COM | CON | PII | SP   |
|----------|-----------------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|------|
| UC-1     | Individual consumer         | 1   | 0   | 0   | 0   | 2   | 2   | 2   | 0   | 0   | 0   | SP-1 |
| UC-2     | Privacy conscious household | 1   | 0   | 1   | 1   | 1   | 0   | 2   | 1   | 0   | 1   | SP-2 |
| UC-2     | Privacy conscious household | 1   | 0   | 1   | 1   | 1   | 1   | 2   | 1   | 0   | 1   | SP-2 |
| UC-3     | Journalist or activist      | 1   | 1   | 2   | 2   | 2   | 2   | 2   | 1   | 0   | 2   | SP-3 |
| UC-4     | Small organisation          | 2   | 2   | 2   | 1   | 1   | 1   | 2   | 2   | 1   | 1   | SP-4 |
| UC-5     | Large enterprise            | 2   | 2   | 2   | 2   | 0   | 1   | 2   | 2   | 2   | 1   | SP-4 |
| UC-4     | Small organisation          | 2   | 2   | 2   | 1   | 1   | 2   | 2   | 2   | 1   | 1   | SP-4 |
| UC-5     | Large enterprise            | 2   | 2   | 2   | 2   | 0   | 2   | 2   | 2   | 2   | 1   | SP-4 |

Table: _Table C.27 — Use cases mapped to risk factors and security profiles_