Loading EN-304-625.md +23 −27 Original line number Diff line number Diff line Loading @@ -1711,8 +1711,7 @@ Type: Affects likelihood of all attacks. * **[COM-L-0]** Product implements minimal features necessary to send/recv packets * **[COM-L-1]** Product implements some simple performance features * **[COM-L-2]** Product implements encryption functions on interface * **[COM-L-3]** Product implements RTOS managing radio, PXE boot, remote management, or similar * **[COM-L-2]** Product implements encryption functions, RTOS managing radio, PXE boot, remote management, etc. **[LIS]** Ease of reading from transmission media of directly attached network by unauthorized agents Loading Loading @@ -2028,13 +2027,13 @@ Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG | Use case | LOC | NET | COM | ADM | LIS |SYS | SDS | SDT | FUN | INT | Sec Pro | |----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------| | UC-WL-1 | 0 | 0 | 3 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-2 | 0 | 1 | 3 | 1 | 1 | 1 | 0 | 0 | 1 | 2 | SP-WL-1 | | UC-WL-3 | 0 | 2 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-4 | 1 | 2 | 3 | 0 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-5 | 1 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-6 | 2 | 2 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-7 | 3 | 2 | 3 | 1 | 2 | 1 | 0 | 0 | 0 | 1 | SP-WL-2 | | UC-WL-1 | 0 | 0 | 2 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-2 | 0 | 1 | 2 | 1 | 1 | 1 | 0 | 0 | 1 | 2 | SP-WL-1 | | UC-WL-3 | 0 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-4 | 1 | 2 | 2 | 0 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-5 | 1 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-6 | 2 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-3 | | UC-WL-7 | 3 | 2 | 2 | 1 | 2 | 1 | 0 | 0 | 0 | 1 | SP-WL-3 | #### C.5.2.3 Virtual network interface use cases Loading @@ -2057,9 +2056,6 @@ Security profiles are associated with sets of risk factor levels. #### C.6.2.1 Wired network interface security profiles | Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro | |----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------| | Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WD-1 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 1 | 1 | 2 | Loading @@ -2069,11 +2065,11 @@ Security profiles are associated with sets of risk factor levels. #### C.6.2.2 Wireless network interface security profiles | Security profile | LOC | NET | COM | ADM | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WL-1 | 0 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 2 | | SP-WL-2 | 1 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | | SP-WL-3 | 3 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | | Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WL-1 | 0 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | | SP-WL-2 | 1 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | | SP-WL-3 | 3 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | #### C.6.2.3 Virtual network interface security profiles Loading Loading
EN-304-625.md +23 −27 Original line number Diff line number Diff line Loading @@ -1711,8 +1711,7 @@ Type: Affects likelihood of all attacks. * **[COM-L-0]** Product implements minimal features necessary to send/recv packets * **[COM-L-1]** Product implements some simple performance features * **[COM-L-2]** Product implements encryption functions on interface * **[COM-L-3]** Product implements RTOS managing radio, PXE boot, remote management, or similar * **[COM-L-2]** Product implements encryption functions, RTOS managing radio, PXE boot, remote management, etc. **[LIS]** Ease of reading from transmission media of directly attached network by unauthorized agents Loading Loading @@ -2028,13 +2027,13 @@ Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG | Use case | LOC | NET | COM | ADM | LIS |SYS | SDS | SDT | FUN | INT | Sec Pro | |----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------| | UC-WL-1 | 0 | 0 | 3 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-2 | 0 | 1 | 3 | 1 | 1 | 1 | 0 | 0 | 1 | 2 | SP-WL-1 | | UC-WL-3 | 0 | 2 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-4 | 1 | 2 | 3 | 0 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-5 | 1 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-6 | 2 | 2 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-7 | 3 | 2 | 3 | 1 | 2 | 1 | 0 | 0 | 0 | 1 | SP-WL-2 | | UC-WL-1 | 0 | 0 | 2 | 0 | 0 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-2 | 0 | 1 | 2 | 1 | 1 | 1 | 0 | 0 | 1 | 2 | SP-WL-1 | | UC-WL-3 | 0 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-1 | | UC-WL-4 | 1 | 2 | 2 | 0 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-5 | 1 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | SP-WL-2 | | UC-WL-6 | 2 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | SP-WL-3 | | UC-WL-7 | 3 | 2 | 2 | 1 | 2 | 1 | 0 | 0 | 0 | 1 | SP-WL-3 | #### C.5.2.3 Virtual network interface use cases Loading @@ -2057,9 +2056,6 @@ Security profiles are associated with sets of risk factor levels. #### C.6.2.1 Wired network interface security profiles | Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro | |----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------| | Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WD-1 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 1 | 1 | 2 | Loading @@ -2069,11 +2065,11 @@ Security profiles are associated with sets of risk factor levels. #### C.6.2.2 Wireless network interface security profiles | Security profile | LOC | NET | COM | ADM | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WL-1 | 0 | 1 | 3 | 1 | 1 | 1 | 1 | 1 | 2 | | SP-WL-2 | 1 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | | SP-WL-3 | 3 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 1 | | Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | |------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----| | SP-WL-1 | 0 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | | SP-WL-2 | 1 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | | SP-WL-3 | 3 | 2 | 2 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | #### C.6.2.3 Virtual network interface security profiles Loading