Commit 7a5e404c authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Remove COM = 3 and update wireless use cases/security profiles

parent a6dd64c9
Loading
Loading
Loading
Loading
+23 −27
Original line number Diff line number Diff line
@@ -1711,8 +1711,7 @@ Type: Affects likelihood of all attacks.

  * **[COM-L-0]** Product implements minimal features necessary to send/recv packets
  * **[COM-L-1]** Product implements some simple performance features
  * **[COM-L-2]** Product implements encryption functions on interface
  * **[COM-L-3]** Product implements RTOS managing radio, PXE boot, remote management, or similar
  * **[COM-L-2]** Product implements encryption functions, RTOS managing radio, PXE boot, remote management, etc.

**[LIS]** Ease of reading from transmission media of directly attached network by unauthorized agents

@@ -2028,13 +2027,13 @@ Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG

| Use case | LOC | NET | COM | ADM | LIS |SYS | SDS | SDT | FUN | INT | Sec Pro |
|----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------|
| UC-WL-1  |   0 |   0 |   3 |   0 |   0 |   1 |   1 |   1 |   1 |   1 | SP-WL-1 |
| UC-WL-2  |   0 |   1 |   3 |   1 |   1 |   1 |   0 |   0 |   1 |   2 | SP-WL-1 |
| UC-WL-3  |   0 |   2 |   3 |   1 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-1 |
| UC-WL-4  |   1 |   2 |   3 |   0 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-1 |
| UC-WL-5  |   1 |   1 |   3 |   1 |   1 |   1 |   1 |   1 |   1 |   1 | SP-WL-2 |
| UC-WL-6  |   2 |   2 |   3 |   1 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-2 |
| UC-WL-7  |   3 |   2 |   3 |   1 |   2 |   1 |   0 |   0 |   0 |   1 | SP-WL-2 |
| UC-WL-1  |   0 |   0 |   2 |   0 |   0 |   1 |   1 |   1 |   1 |   1 | SP-WL-1 |
| UC-WL-2  |   0 |   1 |   2 |   1 |   1 |   1 |   0 |   0 |   1 |   2 | SP-WL-1 |
| UC-WL-3  |   0 |   2 |   2 |   1 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-1 |
| UC-WL-4  |   1 |   2 |   2 |   0 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-2 |
| UC-WL-5  |   1 |   1 |   2 |   1 |   1 |   1 |   1 |   1 |   1 |   1 | SP-WL-2 |
| UC-WL-6  |   2 |   2 |   2 |   1 |   2 |   1 |   1 |   1 |   1 |   1 | SP-WL-3 |
| UC-WL-7  |   3 |   2 |   2 |   1 |   2 |   1 |   0 |   0 |   0 |   1 | SP-WL-3 |

#### C.5.2.3 Virtual network interface use cases

@@ -2057,9 +2056,6 @@ Security profiles are associated with sets of risk factor levels.

#### C.6.2.1 Wired network interface security profiles

| Use case | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT | Sec Pro |
|----------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|---------|

| Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-WD-1          | 0   | 0   | 1   | 1   | 0   | 1   | 0   | 1   | 1   | 2   |
@@ -2069,11 +2065,11 @@ Security profiles are associated with sets of risk factor levels.

#### C.6.2.2 Wireless network interface security profiles

| Security profile | LOC | NET | COM | ADM | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-WL-1          |   0 |   1 |   3 |   1 |   1 |   1 |   1 |   1 |   2 |
| SP-WL-2          |   1 |   2 |   3 |   1 |   1 |   1 |   1 |   1 |   1 |
| SP-WL-3          |   3 |   2 |   3 |   1 |   1 |   1 |   1 |   1 |   1 |
| Security profile | LOC | NET | COM | ADM | LIS | SYS | SDS | SDT | FUN | INT |
|------------------|-----|-----|-----|-----|-----|-----|-----|-----|-----|-----|
| SP-WL-1          | 0   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-2          | 1   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |
| SP-WL-3          | 3   | 2   | 2   | 1   | 2   | 1   | 1   | 1   | 1   | 1   |

#### C.6.2.3 Virtual network interface security profiles