Commit 3326d2a3 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Updated to tests and risk factors from meeting

parent 0f22a238
Loading
Loading
Loading
Loading
+26 −18
Original line number Diff line number Diff line
@@ -914,7 +914,11 @@ FIXME make more specific

The manufacturer shall ensure that all security-relevant firmware and software are compiled with secure compilation flags and options appropriate to the target platform and language.

Secure compilation flags may include, but are not limited to:
Secure compilation flags shall include, but are not limited to:

FIXME add documentation

FIXME describe the concepts behind these in a language indepedent way

* Stack protection (e.g., -fstack-protector, -fstack-protector-strong)
* Buffer overflow protection (e.g., -D_FORTIFY_SOURCE=2)
@@ -934,16 +938,16 @@ The manufacturer shall document the compilation flags used, their rationale, and
Mitigations satisfy technical requirements only under when they mitigate the relevant risks appropriately. Risk factors are used to determine this. The below table shows which mitigations are appropriate to which use cases or security profiles based on the risk factors determined in the risk assessment.

| Risk factors        | Requires mitigations           |
|---------------------|----------------------|
| NET = 0             | None                 |
| NET <= 0 or COM = 0 | SSCA                 |
| NET > 0 and COM > 0 | FZ95 or ETIN or IMSL |
|---------------------|--------------------------------|
| NET = 0             | SCF                            |
| NET <= 0 or COM = 0 | SSCA and SCF                   |
| NET > 0 and COM > 0 | SCF and (FZ95 or ETIN or IMSL) |

| Security Profile    | Requires mitigations           |
|---------------------|----------------------|
| VI-1                | None                 |
| WD-2                | SSCA                 |
| all others          | FZ95 or ETIN or IMSL |
|---------------------|--------------------------------|
| VI-1                | SCF                            |
| WD-2                | SSCA and SCF                   |
| all others          | SCF and (FZ95 or ETIN or IMSL) |

### 5.2.X TR-MDNF: Mitigate disabling of network functions

@@ -955,7 +959,7 @@ The network interface shall implement mechanisms to observe when the firmware an

The network interface shall implement a watchdog mechanism that observes whether the network interface is capable of performing its functions. If the watchdog observes that the interfaces is not capable of performing its functions for a significant period of time, it will reset the network interface to a functioning state using a hardware-based mechanism.

  * Applicabilty: only applies to physical network interfaces
  * Applicability: only applies to physical network interfaces
  * Test: use a testing interface to halt the firmware or software, wait for the watchdog to reset the firmware, and then attempt to use a network interface function after any necessary initialization or configuration
  * Result: after a specific time period has elapsed, the interface restarts, any initialization or configuration succeeds, and the use of the network interface function succeeded
  * Output: error, log message, statistics update, or other information from card indicating reset has occurred, log message or statistic showing the post-reset test function succeeded
@@ -964,14 +968,18 @@ The network interface shall implement a watchdog mechanism that observes whether

The network interface shall implement a notification mechanism to inform the host whether the network interface is not capable of performing its functions.

* Test: use a testing interface to inject errors and verify the related notification to host
* Result: after a specific fault the related notification is received by the host
* Output: error, log message, statistics update, or other information from card indicating error notification
FIXME finish test

FIXME update mitigation mapping below for MI-NTFY
* Test: produce ? the notification condition
* Result: the notification is received by the host
* Output: error, log message, statistics update, or other information from card indicating error notification was received

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

FIXME update mitigation mapping below for MI-NTFY

FIXME define a security profile for interfaces that are the primary interface

| Risk factors        | Requires mitigations |
|---------------------|----------------------|
| REM == 0 & FUN <= 1 | None                 |
@@ -979,9 +987,9 @@ FIXME update mitigation mapping below for MI-NTFY

| Security Profile    | Requires mitigations |
|---------------------|----------------------|
| VI-1, VI-2          | N/A                  |
| VI-1, VI-2          | NTFY                 |
| WD-1, WL-1          | None FIXME           |
| WD-2, WL-2          | WDOG FIXME           |
| WD-2, WL-2          | WDOG or NTFY         |

FIXME security profiles aren't rated for REM or FUN yet