Commit 2bcbdf26 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

More work on security levels

parent 5bda84d4
Loading
Loading
Loading
Loading
+43 −24
Original line number Diff line number Diff line
@@ -11,11 +11,7 @@
<br />
<br />

Title;<br />

Part #: Part element of title;<br />

Sub-part #: Sub-part element of title<br />
CRA; Essential cybersecurity requirements for physical and virtual network interfaces<br />

Release #<br />

@@ -257,6 +253,8 @@ Wired interfaces in use in a:

Low:

Stationary device inside a filtered network

1. Enterprise device in internal data center
   * professional physical security
   * professional administration
@@ -297,41 +295,62 @@ Very high:

Wireless interfaces:

Low:
All the same security level
Except maybe by type???

1. Enterprise use in a restricted area
Virtual interfaces

Medium:
Local communication inside an OS or hypervisor

1. Home personal device (IoT, stationary personal computer)
1. Workplace
1. Communication between host OS and hypervisor/container
1. Software development
1. Provide a tunnel to an application or driver

High:
External communication

1. Public infrastructure (public wifi hubs)
1. Provide a tunnel to an external host
1. Filtering/firewalls

Very high:
### Discussion

1. Mobile personal device (laptop, watch, phone)
Much of this will move to risk assessment.

Virtual interfaces
Attack vectors that are the responsiblity of the network interface:

Low:
* Arbitrary packets from outside the system
* OS-validated packets from unprivileged users inside the system
* Any unprivileged user-accessible device driver API

1. Communication between host OS and hypervisor/container
1. Software development
Out of scope attack vectors:

Medium:
* Anything the OS is responsible for
  * Firmware updates
  * Direct bit twiddling of registers

1. Provide a tunnel to an application or driver
Refer to normative standards:

High:
* Device driver attack vectors
* Physical interface specific attack vectors?

1. Provide a tunnel to an external host
Factors

Very high:
Virtual

1. Filtering/firewalls
* complexity of device driver interface and thus device driver
* data layer attacks
* tcp session layer or other offload-related attacks
* intended environment of use (direct to internet or filtered)

Wired

* physical link layer attacks (refer to external standards?)
* complexity of physical interface implementation (firmware)

Wireless

* All of above plus:
  * data layer level encryption?
  * added complexity of managing RF transmitters

## 4.4 Security levels