Commit 17b18fb4 authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Update risks to mitigations mapping

parent ee22ceac
Loading
Loading
Loading
Loading
+14 −17
Original line number Diff line number Diff line
@@ -2070,13 +2070,13 @@ Attacker may use user or network access for a denial-of-service attack on produc
| SENF = 1     | Medium | IoT-2, IoT-3, OT-1, WE-1, SE-3              |
| SENF = 2     | High   | RO-1, MOB-1, PC-\*, LA-\*, PS-1, SE-1, SE-2 |

Requirements that mitigate this threat: AUTH, AVAI, LMII, LOGG
Requirements that mitigate this threat: AUTH, AVAI, LMII, LOGG, VULH

Mitigations for Likelihood:

* Medium to Low: DOST

* High to Low: DOST
* High to Low: DOST, VULH

Mitigations for Impact:

@@ -2102,7 +2102,7 @@ Guidance: Traffic amplication attacks and other misuses of product functions are
| TNET = 1     | Medium | IoT-2, IoT-3, OT-\*, SE-\*  |
| TNET = 2     | High   | RO-1, MOB-1, PC-\*, LA-\*   |

Requirements that mitigate this threat: NKEV, LMII, MINI, LMAS, LOGG, VULH
Requirements that mitigate this threat: NKEV, SSDD, MSAF, LMII, MINI, SCUD, LMAS, DMIN, AVAI, LOGG, VULH

All mitigations from TH-KEVU apply (using that requirement's risk formula), plus:

@@ -2280,20 +2280,17 @@ This clause describes the methodology followed in the current text.

## D.2 Mapping of risks to requirements

> TODO-HAS: Update below

| Threat | Requirements                                               |
|--------|------------------------------------------|
| KEVU   | NKEV, SCUD, SSDD, LMII, LMAS, LOGG, VULH |
| UEVU   | SSDD, LMII, DMIN, LMAS, LOGG             |
| PHYS   | SCDL, SDEF                               |
| CONF   | SDEF                                     |
| UADT   | CDTX, DMIN, LMAS                         |
| AVAI   | AVAI, LMII, LMAS, LOGG, VULH             |
| PDOS   | AVAI, LMII, LMAS, LOGG                   |
| DDOS   | MINI, AVAI, LMII, LMAS, LOGG, VULH       |
| MQSE   | CDTX, IDTX, SCUD, LOGG                   |
| AHHS   | NKEV, SCUD, SSDD, LMII, LMAS, LOGG, SDEF |
|--------|------------------------------------------------------------|
| UEVU   | SSDD, MSAF, LMII, LMAS, DMIN, LOGG                         |
| KEVU   | NKEV, SSDD, MSAF, LMII, SCUD, LMAS, DMIN, AVAI, LOGG, VULH |
| CONF   | CDST, SDEF, DMIN, LOGG                                     |
| UADT   | CDTX, DMIN                                                 |
| AVAI   | AUTH, AVAI, LMAS, LOGG, VULH                               |
| PDOS   | AUTH, AVAI, LMAS, LOGG, VULH                               |
| DDOS   | AVAI, LMII, MINI, LMAS, LOGG, VULH                         |
| MQSE   | CDTX, CRYP, IDTX, AUTH, SCUD, LOGG                         |
| LEAK   | MISO, DMIN, VULH                                           |

## D.3 Risk acceptance criteria