Commit 7602f1db authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Add assumptions

parent c3e9dc6b
Loading
Loading
Loading
Loading
+12 −4
Original line number Diff line number Diff line
@@ -1623,13 +1623,21 @@ Optional:

## C.3 Assumptions

> List assumptions that are relevant to the risk analysis for these threats. Everything is hackable if you try hard enough. What kinds of threats are in and out of scope? What are you assuming is the sophistication of attack? Relate to use cases.
### C.3.1 Proper host system

> FIXME more assumptions, associate with risk factors and security requirements
**[AS-PH]:** The host system the product is attached to is trustworthy.

Assume no physical tampering
### C.3.2 Proper administrator

For wireless - operating environment of standard applies
**[AS-PA]:** The product administrator is not intentionally hostile and is engaging in good faith efforts to administer the product properly.

### C.3.3 Attacker has limited physical access to product

**[AS-LP]:** An attacker will have only temporary physical access to the product.

### C.3.4 Attacker has limited resources

**[AS-LR]:** An attacker has the resources available to a small group of skilled individuals, without the backing of large corporations, nation-states, or immense wealth.

## C.4 Risk assessments of threats