Commit c2894cc4 authored by Valerie Aurora's avatar Valerie Aurora
Browse files

Fix typos in risk assessment

parent d9fe96ec
Loading
Loading
Loading
Loading
+15 −15
Original line number Diff line number Diff line
@@ -1816,10 +1816,10 @@ The mitigations that reduce risk by type are:
Attacker may use unknown exploitable vulnerabilities in the product implementation to get unauthorized access to product assets.

| Risk factors                      | Likelihood | Security profiles      |
|------------------------------------|------------|------------------------------|
| max(PHYS, SFT, NET) = 0 or COM = 0 | Low        | WD-1, VI-1                   |
| all others                         | Medium     | WD-2, WD-3, WD-4, WL-1, VI-1 |
| max(PHYS, SFT, NET) = 2 & COM = 2  | High       | WL-2, WL-3, VI-2             |
|-----------------------------------|------------|------------------------|
| max(PHY, SFT, NET) = 0 or COM = 0 | Low        | WD-1, VI-1             |
| all others                        | Medium     | WD-2, WD-3, WD-4, WL-1 |
| max(PHY, SFT, NET) = 2 & COM = 2  | High       | WL-2, WL-3, VI-2       |

| Risk factors                     | Impact | Security profiles                  |
|----------------------------------|--------|------------------------------------|
@@ -1846,10 +1846,10 @@ Mitigations for Impact:
Attacker may use known exploitable vulnerabilities in the product implementation to get unauthorized access to product assets.

| Risk factors                                 | Likelihood | Security profiles            |
|-----------------------------------------------|------------|------------------------------|
| max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low        | WD-1                         |
|----------------------------------------------|------------|------------------------------|
| max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low        | WD-1                         |
| all others                                   | Medium     | WD-2, WD-3, WD-4, WL-1, VI-1 |
| max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2   | High       | WL-2, WL-3, VI-2             |
| max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2   | High       | WL-2, WL-3, VI-2             |

| Risk factors                     | Impact | Security profiles                  |
|----------------------------------|--------|------------------------------------|
@@ -1962,10 +1962,10 @@ Mitigations for Impact:
Attacker may exploit vulnerabilities in the product to reduce availability of product assets.

| Risk factors                                 | Likelihood | Security profiles            |
|-----------------------------------------------|------------|------------------------------|
| max(PHYS, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low        | WD-1                         |
|----------------------------------------------|------------|------------------------------|
| max(PHY, SFT, NET) = 0 or COM = 0 or ADM = 0 | Low        | WD-1                         |
| all others                                   | Medium     | WD-2, WD-3, WD-4, WL-1, VI-1 |
| max(PHYS, SFT, NET) = 2 & COM = 2 & ADM = 2   | High       | WL-2, WL-3, VI-2             |
| max(PHY, SFT, NET) = 2 & COM = 2 & ADM = 2   | High       | WL-2, WL-3, VI-2             |

| Risk factors           | Impact | Security profiles       |
|------------------------|--------|-------------------------|