Commit 79955404 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Update secure by default requirement to sync with OS

parent 39b1e918
Loading
Loading
Loading
Loading
+23 −38
Original line number Diff line number Diff line
@@ -898,19 +898,27 @@ FIXME define a security profile for interfaces that are the primary interface

### 5.2.X **TR-SDEF**: Secure by default configuration

#### 5.2.X.x Requirement

The product shall operate in a secure configuration by default.

What are things that can be configured to be insecure? - hardware, software?
#### 5.2.X.x **MI-ADEF**: Authorization required by default to access security-relevant assets

The product shall require appropriate authorization by default to access security-relevant assets, such as product firmware, security-relevant configuration, sensitive data, and sensitive functions.

  * Reference: TR-SDEF

  * Objective: Find any unauthorized access to security relevant assets in default configuration

Debug interfaces
  * Preparation: List all interfaces allowing access to security-relevant assets

 * usable from the host (over the system bus) - not important, the host must protect this - but we do need to specify that this is transferred to the host
  * Activities: For each interface, attempt to access security-relevant assets without appropriate authorization and record whether access was allowed or not

 * usable from the attached network - these do need to be specified as disabled or protected for end users
  * Verdict: If every interface does not allow access without appropriate authorization => PASS, otherwise => FAIL

 * debug interface requires external device (JTAG)
  * Evidence: List of interfaces allowing access to security-relevant assets, record of activities used to attempt unauthorized access to security-relevant assets, log of results of attempts

Remember the integrator - debug enabled is okay there as long as documented
> FIXME: Definition of appropriate authorization is in progress by another group.

#### 5.2.X.x **MI-DPAH**: Documentation of product assets accessible from host

@@ -970,42 +978,19 @@ All debug/remote management interfaces accessible via the network shall be prote
  * Verdict: No interface can be used => PASS, otherwise => FAIL
  * Evidence: List of interfaces, log of attempts to access

#### 5.2.X.x **MI-SDEE**: Generic version

Manufacturer documents all interfaces with sensitivity of function/data

If pre-integration, then documented how to protect and disable

If post-integration, then protected or disabled based on ??? sensitivity/use

Necessary for functions?

Interface to host is always necessary

Interface to do normal network stuff over the network is always necessary

Debug is temporarily disabled for post-integration

FIXME: define disabled in definitions as temporarily/reversibly disabled - leave some room for manufacturer to permanently disable if necessary for security

How to say disable interfaces accessible from the network that provide access to something more than tx/rx stuff?

Remote management?

Depending on the risk factor of who has access to the network => require authorization by default for remote management or debug over the network or disabled

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors | Requires mitigations |
|-------------------|----------------------|
| any               | DPAH                 |
| FIXME risk factor | SDEE-1               |
| FIXME risk factor | SDEE-2               |
|--------------|----------------------|
| FIXME        | ADEF, DPAH           |
| FIXME        | SDEE-1, ADEF, DPAH   |
| FIXME        | SDEE-2, ADEF, DPAH   |

| Security Profile | Requires mitigations |
|------------------|----------------------|
| FIXME integrator | DPAH, SDEE-1         |
| all others       | DPAH, SDEE-2         |
| FIXME            | ADEF, DPAH           |
| FIXME integrator | ADEF, DPAH, SDEE-1   |
| all others       | ADEF, DPAH, SDEE-2   |

### 5.2.X **TR-CONF**: Confidentiality of assets

@@ -1462,7 +1447,7 @@ Suggested type of tests include, but are not limited to:

| CRA requirement                                 | Technical security requirements(s) |
|-------------------------------------------------|------------------------------------|
| No known exploitable vulnerabilities            | KEVD                               |
| No known exploitable vulnerabilities            | NKEV                               |
| Secure design, development, production          | SSDD, MSAF                         |
| Secure by default configuration                 | SDEF                               |
| Secure updates                                  | SCUD                               |