Commit 2beda2ab authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Replace "the internet" with "a public network"

parent b3cb0641
Loading
Loading
Loading
Loading
+13 −13
Original line number Diff line number Diff line
@@ -450,7 +450,7 @@ _The following use cases are provided to assist manufacturers in selecting risk

* **UC-IoT-1** A non-internet-connected device such as a bluetooth speaker
  * does not store any user-specific data
  * has no means to connect directly to the internet
  * has no means to connect directly to a public network
  * not intended to support hardware, software, or operating system changes

* **UC-IoT-2** An internet-enabled power switch
@@ -501,7 +501,7 @@ _The following use cases are provided to assist manufacturers in selecting risk
  * does not have accessible I/O ports and is not user-modifiable
  * connects to a central service, operated by the device manufacturer, for remote data processing
  * connections are proxied by a trusted device, such as a mobile phone
  * is not exposed to the internet
  * is not exposed to a public network

* **UC-ST-1** Stateless multi-user terminal
  * effectively a keyboard, mouse, and display connected to remote server
@@ -514,13 +514,13 @@ _The following use cases are provided to assist manufacturers in selecting risk
* **UC-PC-1** A personal computer in a fixed and generally safe location
  * hardware, software and operating system may be configured and modified by the end-user
  * the user may not be either highly skilled or an authorized representative of the manufacturer
  * foreseeably connects to the internet and to low-trust local networks, but is not reachable from the open internet
  * foreseeably connects to a public network and to low-trust local networks, but is not reachable from the open internet
  * stores personal information and arbitrary files

* **UC-PC-2** An enterprise workstation in a fixed and generally safe location
  * installed in an access-controlled workspace
  * serviced by trained professionals who may modify both software and hardware
  * connected to the internet with external mitigations, such as enterprise-grade firewalls
  * connected to a public network with external mitigations, such as enterprise-grade firewalls
  * connects to trusted local networks
  * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage
  * used for web browsing
@@ -530,7 +530,7 @@ _The following use cases are provided to assist manufacturers in selecting risk
  * hardware, software and operating system may be configured and modified by the end-user
  * device is a foreseeable target of theft and tampering by untrusted 3rd parties
  * stores personal information and arbitrary files
  * unrestricted connection to the internet
  * unrestricted connection to a public network
  * is frequently connected to untrusted networks
  * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage

@@ -539,23 +539,23 @@ _The following use cases are provided to assist manufacturers in selecting risk
  * serviced by trained professionals who may modify both software and hardware
  * device is a foreseeable target of theft and tampering by untrusted 3rd parties
  * stores business data, personal information and arbitrary files
  * unrestricted connection to the internet
  * unrestricted connection to a public network
  * is frequently connected to untrusted networks
  * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage

* **UC-PS-1** Personal server
   * one or a small number of trusted users
   * installed in a fixed location at home or in a cohosting facility
   * connected to the internet with a firewall
   * connected to a public network with a firewall
   * connects to trusted local network
   * limited access permitted from the internet for specific services
   * limited access permitted from a public network for specific services
   * semi-professional semi-automated management by one or a few people
   * always stationary, access to hardware interfaces unlikely

* **UC-SE-1** An enterprise server in a datacenter with no user accounts
  * installed in a monitored and secured facility
  * serviced by trained professionals who may modify both software and hardware
  * connected to the internet with external mitigations, such as enterprise-grade firewalls
  * connected to a public network with external mitigations, such as enterprise-grade firewalls
  * connects to trusted local networks
  * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage

@@ -702,15 +702,15 @@ FIXME add the separate concept of users apart from accounts
* DVCS-1: foreseeable use includes only trusted and safe peripheral devices
* DVCS-2: foreseeable use allows for arbitrary peripheral device attachment

#### 4.5.1.13 Access To The Internet
#### 4.5.1.13 Access to a Public Network

**[RF-TNET]:** Likelihood that the device will initiate connections to public networks.

* TNET-0: foreseeable use has no mechanism to reasonably connect to the internet
* TNET-0: foreseeable use has no mechanism to reasonably connect to a public network
* TNET-1: foreseeable use allows internet access for only highly restricted functions, such as retrieving security updates
* TNET-2: foreseeable use allows for arbitrary access to the internet, such as by browsing the web
* TNET-2: foreseeable use allows for arbitrary access to a public network, such as by browsing the web

#### 4.5.1.14 Accessed From Untrusted Networks Including The Internet
#### 4.5.1.14 Accessed From Untrusted Networks Including a Public Network

**[RF-FNET]:** Likelihood that the device will be exposed to incoming traffic from public networks.