Commit 0573f2ab authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Add physical access case to PDDI and update PHYS risk factor

parent c061c847
Loading
Loading
Loading
Loading
+31 −22
Original line number Diff line number Diff line
@@ -1081,11 +1081,21 @@ All debug and management interfaces on the product shall be documented, and the
  * Verdict: All debug/management interfaces are documented as to how to disable or protect them, and no interfaces are accessible without authorization after following the documentation to protect or disable them => PASS, otherwise => FAIL
  * Evidence: Pictures of the product, list of discovered interfaces, comparison with documentation, notes as to which are documented how to disable/protect, logs of protect/disable actions, logs of attempts to access interfaces after protected or disabled

#### 5.2.8.4 MI-PDDI-2: Protect or disable local software access to debug and management interfaces
#### 5.2.8.4 MI-PDDI-2: Protect or disable physical access to debug and management interfaces

All debug and management interfaces which can be accessed by an agent with physical access to the device the product is installed on shall be protected or disabled by default, unless necessary for backward compatibility. Documentation regarding the removal of such protections by an appropriately sophisticated user may be provided, and shall include information regarding the risks.

  * Reference: TR-SDEF
  * Objective: Secure by default
  * Preparation: Examine the documentation of the network- and localhost-accessible interfaces of the product and follow the instructions to mitigate the risk of any necessary unprotected or enabled interfaces
  * Activities: As an unprivileged process running on the system, attempt to access the system's local debug and management interfaces and make unauthorized changes. Additionally, scan accessible memory and inter-process-communication mechanisms for undocumented debug and management interfaces.
  * Verdict: No undocumented interfaces are found and no interfaces can be accessed without authorization other than those documented as necessary and the instructions to the user are sufficient => PASS, otherwise => FAIL
  * Evidence: List of interfaces, log of attempts to access

#### 5.2.8.4 MI-PDDI-3: Protect or disable local software access to debug and management interfaces

All debug and management interfaces which can be accessed by processes running on the system shall be protected or disabled by default, unless necessary for backward compatibility. Documentation regarding the removal of such protections by an appropriately sophisticated user may be provided, and shall include information regarding the risks.

  * Applicability: This mitigation is for products where the system software may be accessed by an untrusted users or processes. This includes products that execute code from untrusted sources or access untrusted network data, for example when browsing the web.
  * Reference: TR-SDEF
  * Objective: Secure by default
  * Preparation: Examine the documentation of the network- and localhost-accessible interfaces of the product and follow the instructions to mitigate the risk of any necessary unprotected or enabled interfaces
@@ -1093,11 +1103,10 @@ All debug and management interfaces which can be accessed by processes running o
  * Verdict: No undocumented interfaces are found and no interfaces can be accessed without authorization other than those documented as necessary and the instructions to the user are sufficient => PASS, otherwise => FAIL
  * Evidence: List of interfaces, log of attempts to access

#### 5.2.8.5 MI-PDDI-3: Protect or disable network access to debug or management interfaces
#### 5.2.8.5 MI-PDDI-4: Protect or disable network access to debug or management interfaces

All debug and management interfaces accessible via the network shall be protected or disabled by default, unless necessary for backward compatibility. Documentation regarding the removal of such protections by an appropriately sophisticated user may be provided, and shall include information regarding the risks.

  * Applicability: Use cases that include foreseeable network access from untrusted sources.
  * Reference: TR-SDEF
  * Objective: Secure by default
  * Preparation: Examine the documentation of the network accessible interfaces of the product and follow the instructions to mitigate the risk of any necessary unprotected or enabled interfaces
@@ -1668,9 +1677,9 @@ Sensitivity of functions of device, as measured by impact of loss of its integri

Exposure of the device to physical access by users.

* PHYS-0: foreseeable use is only in environments with authorized users
* PHYS-1: foreseeable use includes incidental exposure to untrusted users
* PHYS-2: foreseeable use is primarily by untrusted users, e.g. the general public
* PHYS-0: foreseeable use is only in environments without physical exposure to untrusted users
* PHYS-1: foreseeable use includes incidental physical exposure to untrusted users
* PHYS-2: foreseeable use includes regular physical exposure to untrusted users

### C.2.9 RF-UEIN: Processing of Untrusted External Inputs

@@ -2039,12 +2048,12 @@ Mitigations for Impact:
| Use case     | NUSR | CUSR | DATA | PPII | SNDS | SNDT | SENF | PHYS | UEIN | LOSS | HWMD | SWMD | DVCS | TNET | FNET | CONF | ADMN | SUPP | TOTAL |
|--------------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|-------|
| **UC-LR**    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0     |
| **UC-IoT-1** | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 1    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 2    | 0    | 3     |
| **UC-IoT-2** | 0    | 0    | 1    | 0    | 1    | 1    | 0    | 1    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 12    |
| **UC-IoT-3** | 0    | 0    | 1    | 0    | 1    | 1    | 1    | 1    | 2    | 0    | 1    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 15    |
| **UC-RO-1**  | 0    | 0    | 1    | 0    | 1    | 2    | 2    | 1    | 2    | 0    | 0    | 0    | 0    | 2    | 2    | 2    | 1    | 2    | 18    |
| **UC-IoT-1** | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 2    | 0    | 2     |
| **UC-IoT-2** | 0    | 0    | 1    | 0    | 1    | 1    | 0    | 0    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 11    |
| **UC-IoT-3** | 0    | 0    | 1    | 0    | 1    | 1    | 1    | 0    | 2    | 0    | 1    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 14    |
| **UC-RO-1**  | 0    | 0    | 1    | 0    | 1    | 2    | 2    | 0    | 2    | 0    | 0    | 0    | 0    | 2    | 2    | 2    | 1    | 2    | 17    |
| **UC-OT-1**  | 0    | 0    | 0    | 0    | 1    | 1    | 2    | 2    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 0    | 2    | 12    |
| **UC-MOB-1** | 1    | 1    | 2    | 2    | 2    | 2    | 2    | 1    | 2    | 2    | 0    | 2    | 2    | 2    | 1    | 2    | 2    | 2    | 30    |
| **UC-MOB-1** | 1    | 1    | 2    | 2    | 2    | 2    | 2    | 2    | 2    | 2    | 0    | 2    | 2    | 2    | 1    | 2    | 2    | 2    | 31    |
| **UC-WE-1**  | 0    | 0    | 1    | 1    | 2    | 1    | 0    | 1    | 2    | 1    | 0    | 0    | 0    | 1    | 0    | 0    | 2    | 1    | 13    |
| **UC-PC-1**  | 1    | 1    | 2    | 1    | 2    | 2    | 1    | 0    | 2    | 0    | 2    | 1    | 1    | 2    | 1    | 2    | 2    | 2    | 25    |
| **UC-PC-2**  | 1    | 1    | 2    | 1    | 2    | 2    | 2    | 0    | 2    | 0    | 2    | 1    | 1    | 2    | 1    | 2    | 1    | 2    | 25    |
@@ -2068,12 +2077,12 @@ Security profiles are associated with sets of risk factor levels. Each security
| Sec. Prof.   | NUSR | CUSR | DATA | PPII | SNDS | SNDT | SENF | PHYS | UEIN | LOSS | HWMD | SWMD | DVCS | TNET | FNET | CONF | ADMN | SUPP | TOTAL |
|--------------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|------|-------|
| **SP-LR**    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0     |
| **SP-IoT-1** | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 1    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 2    | 0    | 3     |
| **SP-IoT-2** | 0    | 0    | 1    | 0    | 1    | 1    | 0    | 1    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 12    |
| **SP-IoT-3** | 0    | 0    | 1    | 0    | 1    | 1    | 1    | 1    | 2    | 0    | 1    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 15    |
| **SP-RO-1**  | 0    | 0    | 1    | 0    | 1    | 2    | 2    | 1    | 2    | 0    | 0    | 0    | 0    | 2    | 2    | 2    | 1    | 2    | 18    |
| **SP-IoT-1** | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 0    | 2    | 0    | 2     |
| **SP-IoT-2** | 0    | 0    | 1    | 0    | 1    | 1    | 0    | 0    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 11    |
| **SP-IoT-3** | 0    | 0    | 1    | 0    | 1    | 1    | 1    | 0    | 2    | 0    | 1    | 0    | 0    | 1    | 1    | 1    | 2    | 2    | 14    |
| **SP-RO-1**  | 0    | 0    | 1    | 0    | 1    | 2    | 2    | 0    | 2    | 0    | 0    | 0    | 0    | 2    | 2    | 2    | 1    | 2    | 17    |
| **SP-OT-1**  | 0    | 0    | 0    | 0    | 1    | 1    | 2    | 2    | 1    | 0    | 0    | 0    | 0    | 1    | 1    | 1    | 0    | 2    | 12    |
| **SP-MOB-1** | 1    | 1    | 2    | 2    | 2    | 2    | 2    | 1    | 2    | 2    | 0    | 2    | 2    | 2    | 1    | 2    | 2    | 2    | 30    |
| **SP-MOB-1** | 1    | 1    | 2    | 2    | 2    | 2    | 2    | 2    | 2    | 2    | 0    | 2    | 2    | 2    | 1    | 2    | 2    | 2    | 31    |
| **SP-WE-1**  | 0    | 0    | 1    | 1    | 2    | 1    | 0    | 1    | 2    | 1    | 0    | 0    | 0    | 1    | 0    | 0    | 2    | 1    | 13    |
| **SP-PC-1**  | 1    | 1    | 2    | 1    | 2    | 2    | 1    | 0    | 2    | 0    | 2    | 1    | 1    | 2    | 1    | 2    | 2    | 2    | 25    |
| **SP-PC-2**  | 1    | 1    | 2    | 1    | 2    | 2    | 2    | 0    | 2    | 0    | 2    | 1    | 1    | 2    | 1    | 2    | 1    | 2    | 25    |
@@ -2100,12 +2109,12 @@ Security assurance levels are informed by but not determined by the risk factor
| Security profile | Description                                                            | RF total | SAL  |
|------------------|------------------------------------------------------------------------|----------|------|
| **SP-LR**        | Operating system for learning and research                             | 0        | LOW  |
| **SP-IoT-1**     | Non-internet-connected device such as a bluetooth speaker              | 3        | LOW  |
| **SP-IoT-2**     | Internet-enabled power switch                                          | 12       | MED  |
| **SP-IoT-3**     | Internet-connected "smart home" device                                 | 15       | MED  |
| **SP-RO-1**      | Consumer-grade home wireless router                                    | 18       | MED  |
| **SP-IoT-1**     | Non-internet-connected device such as a bluetooth speaker              | 2        | LOW  |
| **SP-IoT-2**     | Internet-enabled power switch                                          | 11       | MED  |
| **SP-IoT-3**     | Internet-connected "smart home" device                                 | 14       | MED  |
| **SP-RO-1**      | Consumer-grade home wireless router                                    | 17       | MED  |
| **SP-OT-1**      | Business-grade remote door locking system                              | 12       | MED  |
| **SP-MOB-1**     | Personal mobile device                                                 | 30       | HIGH |
| **SP-MOB-1**     | Personal mobile device                                                 | 31       | HIGH |
| **SP-WE-1**      | Wearable health tracker                                                | 13       | MED  |
| **SP-PC-1**      | Personal computer in a fixed and generally safe location               | 25       | MED  |
| **SP-PC-2**      | Enterprise workstation in a fixed and generally safe location          | 25       | MED  |