Commit 17468c19 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Update SYS risk factor and ratings

parent 401e9e48
Loading
Loading
Loading
Loading
+25 −22
Original line number Diff line number Diff line
@@ -1735,16 +1735,19 @@ Type: Affects likelihood and impact of all attacks.
  * **[ADM-L-0]** Foreseeable use includes skilled administration, fully resourced
  * **[ADM-L-1]** Foreseeable use includes unskilled and/or under-resourced administration

**[SYS]** Access to host system assets
**[SYS]** Impact of access to host system assets

Description: Measures the degree of access to the host system assets, such as memory, other devices, and system management functions. This is usually a property of the communications bus used to connect to the host system. E.g., a network interface connected by USB versions below 4.0 can only access system resources via the host USB stack software, but a network interface on a PCIe bus (including tunneled over USB 4.0) or a virtual network interface that has privileged access to the host system can write any part of host system memory.
Description: Measures the impact of the product's access to host system assets.

The communications bus used to connect to the host system usually controls the level of access. E.g., a network interface connected by USB versions below 4.0 can only access system resources via the host USB stack software, but a network interface on a PCIe bus (including tunneled over USB 4.0) or a virtual network interface that has privileged access to the host system can write any part of host system memory.

Rationale: Access to host systems assets increases the impact of attacks.

Type: Affects impact of all attacks.

  * **[SYS-L-0]** Limited access or access mediated by host software to host system resources
  * **[SYS-L-1]** Extensive access to host system resources
  * **[SYS-L-0]** Little or no impact
  * **[SYS-L-1]** Moderate impact
  * **[SYS-L-2]** High impact

**[SDS]** Sensitivity of data stored

@@ -2011,37 +2014,37 @@ Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG

| Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro |
|----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------|
| UC-WD-1  | 0   | 0   | 1   | 1   | 0   | 1   | 0   | 0   | 1   | 2   | SP-WD-1 |
| UC-WD-1  | 0   | 0   | 1   | 1   | 0   | 0   | 0   | 0   | 1   | 2   | SP-WD-1 |
| UC-WD-2  | 0   | 0   | 1   | 0   | 0   | 1   | 0   | 1   | 1   | 1   | SP-WD-1 |
| UC-WD-3  | 0   | 1   | 1   | 0   | 1   | 1   | 0   | 1   | 2   | 1   | SP-WD-2 |
| UC-WD-4  | 0   | 2   | 1   | 0   | 2   | 1   | 0   | 1   | 2   | 1   | SP-WD-2 |
| UC-WD-4  | 0   | 2   | 1   | 0   | 2   | 2   | 0   | 1   | 2   | 1   | SP-WD-2 |
| UC-WD-5  | 0   | 2   | 1   | 1   | 2   | 1   | 0   | 1   | 1   | 1   | SP-WD-2 |
| UC-WD-6  | 1   | 1   | 1   | 0   | 1   | 1   | 0   | 1   | 1   | 1   | SP-WD-3 |
| UC-WD-7  | 1   | 1   | 1   | 1   | 0   | 1   | 0   | 1   | 1   | 1   | SP-WD-3 |
| UC-WD-8  | 1   | 2   | 1   | 1   | 2   | 1   | 0   | 1   | 1   | 1   | SP-WD-3 |
| UC-WD-9  | 2   | 2   | 1   | 0   | 2   | 1   | 0   | 1   | 2   | 1   | SP-WD-4 |
| UC-WD-10 | 2   | 2   | 1   | 0   | 2   | 1   | 0   | 0   | 0   | 1   | SP-WD-4 |
| UC-WD-9  | 2   | 1   | 1   | 0   | 2   | 2   | 0   | 1   | 2   | 1   | SP-WD-4 |
| UC-WD-10 | 2   | 1   | 1   | 0   | 2   | 2   | 0   | 0   | 0   | 1   | SP-WD-4 |

#### C.5.2.2 Wireless network interface use cases

| Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro |
|----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------|
| UC-WL-1  | 0   | 0   | 2   | 0   | 0   | 1   | 1   | 1   | 1   | 1   | SP-WL-1 |
| UC-WL-2  | 0   | 1   | 2   | 1   | 1   | 1   | 0   | 0   | 1   | 2   | SP-WL-1 |
| UC-WL-3  | 0   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   | SP-WL-1 |
| UC-WL-4  | 1   | 2   | 2   | 0   | 2   | 1   | 1   | 1   | 1   | 1   | SP-WL-2 |
| UC-WL-2  | 0   | 1   | 2   | 1   | 1   | 0   | 0   | 0   | 1   | 2   | SP-WL-1 |
| UC-WL-3  | 0   | 2   | 2   | 1   | 2   | 2   | 1   | 1   | 1   | 1   | SP-WL-2 |
| UC-WL-4  | 1   | 2   | 2   | 0   | 2   | 2   | 1   | 1   | 1   | 1   | SP-WL-2 |
| UC-WL-5  | 1   | 1   | 2   | 1   | 1   | 1   | 1   | 1   | 1   | 1   | SP-WL-2 |
| UC-WL-6  | 1   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   | SP-WL-3 |
| UC-WL-7  | 2   | 2   | 2   | 1   | 2   | 1   | 0   | 0   | 0   | 1   | SP-WL-3 |
| UC-WL-6  | 1   | 2   | 2   | 1   | 2   | 2   | 1   | 1   | 1   | 1   | SP-WL-3 |
| UC-WL-7  | 2   | 1   | 2   | 1   | 2   | 1   | 0   | 0   | 0   | 1   | SP-WL-3 |

#### C.5.2.3 Virtual network interface use cases

| Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro |
|----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------|
| UC-VI-1  | 1   | 0   | 0   | 1   | 0   | 1   | 1   | 1   | 1   | 0   | SP-VI-1 |
| UC-VI-1  | 1   | 0   | 0   | 1   | 0   | 0   | 1   | 1   | 1   | 0   | SP-VI-1 |
| UC-VI-2  | 1   | 2   | 2   | 1   | 0   | 1   | 1   | 1   | 1   | 0   | SP-VI-2 |
| UC-VI-3  | 1   | 1   | 2   | 0   | 0   | 1   | 2   | 2   | 2   | 0   | SP-VI-2 |
| UC-VI-4  | 2   | 2   | 2   | 0   | 0   | 1   | 2   | 2   | 2   | 0   | SP-VI-2 |
| UC-VI-3  | 1   | 1   | 2   | 0   | 0   | 2   | 2   | 2   | 2   | 0   | SP-VI-2 |
| UC-VI-4  | 2   | 2   | 2   | 0   | 0   | 2   | 2   | 2   | 2   | 0   | SP-VI-2 |

## C.6 Security profiles

@@ -2058,24 +2061,24 @@ Security profiles are associated with sets of risk factor levels.
| Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-WD-1          | 0   | 0   | 1   | 1   | 0   | 1   | 0   | 1   | 1   | 2   |
| SP-WD-2          | 0   | 2   | 1   | 1   | 2   | 1   | 0   | 1   | 2   | 1   |
| SP-WD-2          | 0   | 2   | 1   | 1   | 2   | 2   | 0   | 1   | 2   | 1   |
| SP-WD-3          | 1   | 2   | 1   | 1   | 2   | 1   | 0   | 1   | 1   | 1   |
| SP-WD-4          | 2   | 2   | 1   | 0   | 2   | 1   | 0   | 1   | 2   | 1   |
| SP-WD-4          | 2   | 2   | 1   | 0   | 2   | 2   | 0   | 1   | 2   | 1   |

#### C.6.2.2 Wireless network interface security profiles

| Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-WL-1          | 0   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-2          | 1   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-3          | 2   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-1          | 0   | 1   | 2   | 1   | 1   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-2          | 1   | 2   | 2   | 1   | 2   | 2   | 1   | 1   | 1   | 1   |
| SP-WL-3          | 2   | 2   | 2   | 1   | 2   | 2   | 1   | 1   | 1   | 1   |

#### C.6.2.3 Virtual network interface security profiles

| Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-VI-1          | 1   | 0   | 0   | 1   | 0   | 1   | 1   | 1   | 1   | 0   |
| SP-VI-2          | 2   | 2   | 2   | 1   | 0   | 1   | 2   | 2   | 2   | 0   |
| SP-VI-2          | 2   | 2   | 2   | 1   | 0   | 2   | 2   | 2   | 2   | 0   |

# Annex D (informative): Risk evaluation guidance