Commit 9cec9c9a authored by Valerie Aurora's avatar Valerie Aurora
Browse files

First draft of risk assessment, missing risks

parent f3eb0933
Loading
Loading
Loading
Loading
+163 −14
Original line number Diff line number Diff line
@@ -1568,13 +1568,13 @@ Need to specify encryption related stuff that is not covered by ACM.
| Secure by default configuration                 | SDEF                               |
| Secure updates                                  | SCUD                               |
| Authentication and access control mechanisms    | _waiting on cross-vertical_        |
| Confidentiality protection                      | CDST, CDTX, MSAF                   |
| Integrity protection for data and configuration | IDST, IDTX, SSDD, MSAF             |
| Confidentiality protection                      | CDST, CDTX                         |
| Integrity protection for data and configuration | IDST, IDTX                         |
| Data minimization                               | DMIN                               |
| Availability protection                         | AVAI, MSAF                         |
| Minimize impact on other devices or services    | AVAI                               |
| Minimize impact on other devices or services    |                                    |
| Limit attack surface                            | LMAS, SSDD, MSAF                   |
| Exploit mitigation by limiting incident impact  | AVAI, SSDD                         |
| Exploit mitigation by limiting incident impact  | AVAI, SSDD, MSAF                   |
| Logging and monitoring mechanisms               | LOGG                               |
| Secure deletion and data transfer               | SCDL, SDTR                         |

@@ -1663,31 +1663,180 @@ Optional:

The approach to listing threats is to separate them by attack vector so that they may be associated with risk factors more directly.

### C.2.3 List of threats

For the purposes of the list of threats, the product includes:

  * the physical network interface (if any)
  * the device driver (if any)
  * the virtual network interface (if any)

**[TH-NADF]:** Attacker may use network access to get unauthorized access to the functions of or data stored on the product.
The risk factors by type are:

Likelihood: LOC NET COM ADM LIS

Impact: SYS SDS SDT FUN INT DOS

For each threat, a table shows how to use the risk factors to calculate the level of likelihood or impact. The levels are Low, Medium, or High.

### C.2.3 List of threats

**[TH-KEVU]:** Attacker may use known exploitable vulnerabilities in the network interface implementation to get unauthorized access to product assets.

| Risk factors                              | Likelihood |
|-------------------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 & ADM = 1  | High       |
| (LOC = 1 or NET = 1) & COM > 1 & ADM = 1  | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 or ADM = 0 | Low        |

| Risk factors                     | Impact |
|----------------------------------|--------|
| max(SYS, SDS, SDT, FUN, DOS) = 2 | High   |
| max(SYS, SDS, SDT, FUN, DOS) = 1 | Medium |
| max(SYS, SDS, SDT, FUN, DOS) = 0 | Low    |

Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG

**[TH-UEVU]:** Attacker may use unknown exploitable vulnerabilities in the network interface implementation to get unauthorized access to product assets.

| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 | High       |
| (LOC = 1 or NET = 1) & COM > 1 | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 | Low        |

| Risk factors                     | Impact |
|----------------------------------|--------|
| max(SYS, SDS, SDT, FUN, DOS) = 2 | High   |
| max(SYS, SDS, SDT, FUN, DOS) = 1 | Medium |
| max(SYS, SDS, SDT, FUN, DOS) = 0 | Low    |

Requirements: SSDD, MSAF, DMIN, LMAS, LOGG

**[TH-PHYS]:** Attacker may get unauthorized access to confidential data stored on the product through acquisition of a used product.

| Risk factors | Likelihood |
|--------------|------------|
| ADM = 0      | High       |
| ADM = 1      | Medium     |

| Risk factors | Impact |
|--------------|--------|
| SDS = 2      | High   |
| SDS = 1      | Medium |
| SDS = 0      | Low    |

Requirements: SDEL

**[TH-CONF]:** Attacker may use configuration errors to get unauthorized access to the product assets.

**[TH-NADT]:** Attacker may use network access to get unauthorized access to data transmitted by the product.
| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & ADM = 1 | High       |
| (LOC = 1 or NET = 1) & ADM = 0 | Medium     |
| (LOC < 1 & NET < 1)            | Low        |

**[TH-NADS]:** Attacker may use network access for a denial-of-service attack on product functions.
| Risk factors                     | Impact |
|----------------------------------|--------|
| max(SYS, SDS, SDT, FUN, DOS) = 2 | High   |
| max(SYS, SDS, SDT, FUN, DOS) = 1 | Medium |
| max(SYS, SDS, SDT, FUN, DOS) = 0 | Low    |

**[TH-HADF]:** Attacker may use unprivileged host system access to get unauthorized access to the functions of or data stored on the product.
Requirements: SDEF, DMIN, LOGG

**[TH-HADT]:** Attacker may use unprivileged host system access to get unauthorized access to data transmitted by the product.
**[TH-UADT]:** Attacker may use network access to get unauthorized access to confidential data transmitted by the product.

**[TH-HADS]:** Attacker may use unprivileged host system access for a denial-of-service attack on product functions.
| Risk factors | Likelihood |
|--------------|------------|
| LIS = 2      | High       |
| LIS = 1      | Medium     |
| LIS = 0      | Low        |

| Risk factors | Impact |
|--------------|--------|
| SDT = 2      | High   |
| SDT = 1      | Medium |
| SDT = 0      | Low    |

Requirements: CDTX, DMIN, LMAS

**[TH-AVAI]:** Attacker may exploit vulnerabilities in the product to reduce availability of product assets.

| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 | High       |
| (LOC = 1 or NET = 1) & COM > 1 | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 | Low        |

| Risk factors           | Impact |
|------------------------|--------|
| max(SDS, SDT, FUN) = 2 | High   |
| max(SDS, SDT, FUN) = 1 | Medium |
| max(SDS, SDT, FUN) = 0 | Low    |

Requirements: AVAI, MSAF, LMAS, LOGG

**[TH-FDOS]:** Attacker may use host system or network access for a denial-of-service attack on product functions.

| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 | High       |
| (LOC = 1 or NET = 1) & COM > 1 | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 | Low        |

| Risk factors | Impact |
|--------------|--------|
| FUN = 2      | High   |
| FUN = 1      | Medium |
| FUN = 0      | Low    |

Requirements: AVAI, LMAS, LOGG

**[TH-DDOS]:** Attacker may exploit vulnerabilities in the product to attack other products.

| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 | High       |
| (LOC = 1 or NET = 1) & COM > 1 | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 | Low        |

| Risk factors | Impact |
|--------------|--------|
| DOS = 2      | High   |
| DOS = 1      | Medium |
| DOS = 0      | Low    |

Requirements: AVAI, LMAS, LOGG

**[TH-MQSE]:** Attacker may masquerade as an authorized server to get unauthorized access to product assets.

**[TH-HAHH]:** Attacker may use unauthorized access to the product to harm the host system.
| Risk factors        | Likelihood |
|---------------------|------------|
| NET > 1 & COM > 1   | High       |
| NET = 1 or COM = 1  | Medium     |
| NET = 0 and COM = 0 | Low        |

| Risk factors                     | Impact |
|----------------------------------|--------|
| max(SYS, SDS, SDT, FUN, DOS) = 2 | High   |
| max(SYS, SDS, SDT, FUN, DOS) = 1 | Medium |
| max(SYS, SDS, SDT, FUN, DOS) = 0 | Low    |

Requirements: CDTX, IDTX, SCUD, LOGG

**[TH-AHHS]:** Attacker may use unauthorized access to the product to harm the host system.

| Risk factors                   | Likelihood |
|--------------------------------|------------|
| (LOC > 1 or NET > 1) & COM > 1 | High       |
| (LOC = 1 or NET = 1) & COM > 1 | Medium     |
| (LOC < 1 & NET < 1) or COM = 0 | Low        |

| Risk factors | Impact |
|--------------|--------|
| SYS = 2      | High   |
| SYS = 1      | Medium |
| SYS = 0      | Low    |

**[TH-HAHN]:** Attacker may use unauthorized access to the product to harm other products on the attached network.
Requirements: NKEV, SCUD, SSDD, MSAF, LMAS, LOGG

## C.3 Assumptions