Loading EN-304-626.md +7 −10 Original line number Diff line number Diff line Loading @@ -478,13 +478,17 @@ _The following use cases are provided to assist manafacturers in selecting risk * is frequently connected to untrusted networks * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage * UC-PC-3 An enterprise server in a datacenter * UC-SE-1 An enterprise server in a datacenter with only trusted user accounts * installed in a monitored and secured facility * serviced by trained professionals who may modify both software and hardware * connected to the internet with external mitigations, such as enterprise-grade firewalls * connects to trusted local networks * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage * UC-SE-2 An enterprise server in a datacenter hosting many untrusted user accounts * Same as UC-SE-1 but with more untrusted users Remaining use cases to code: 1. Stateless multi-user terminal Loading Loading @@ -521,14 +525,6 @@ Remaining use cases to code: * Automated management and monitoring by IT professionals * Processes sensitive data 1. Firewalls 1. Corporate server providing services on public internet * Multiple accounts for isolation of services * Automated management and monitoring by IT professionals * Processes sensitive data 1. Corporate server hosting many public users * Many accounts, many users, no mutual trust * Automated management and monitoring by IT professionals * Processes sensitive data ## 4.5 Risk factors Loading Loading @@ -652,7 +648,8 @@ FIXME add SENS |UC-WE-1 | 1 | 1 | 1 | 2 | 1 | 2 | 0 | 0 | 0 | 1 | 1 | 0 | 10 | |UC-PC-1 | 1 | 2 | 2 | 1 | 0 | 0 | 2 | 2 | 1 | 2 | 1 | 2 | 15 | |UC-PC-2 | 1 | 2 | 2 | 1 | 1 | 1 | 1 | 2 | 2 | 2 | 2 | 2 | 19 | |UC-PC-3 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | |UC-SE-1 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | |UC-SE-2 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | **Discussion** Loading Loading
EN-304-626.md +7 −10 Original line number Diff line number Diff line Loading @@ -478,13 +478,17 @@ _The following use cases are provided to assist manafacturers in selecting risk * is frequently connected to untrusted networks * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage * UC-PC-3 An enterprise server in a datacenter * UC-SE-1 An enterprise server in a datacenter with only trusted user accounts * installed in a monitored and secured facility * serviced by trained professionals who may modify both software and hardware * connected to the internet with external mitigations, such as enterprise-grade firewalls * connects to trusted local networks * hardware likely contains tamper-evident indicators and secure elements for cryptographic storage * UC-SE-2 An enterprise server in a datacenter hosting many untrusted user accounts * Same as UC-SE-1 but with more untrusted users Remaining use cases to code: 1. Stateless multi-user terminal Loading Loading @@ -521,14 +525,6 @@ Remaining use cases to code: * Automated management and monitoring by IT professionals * Processes sensitive data 1. Firewalls 1. Corporate server providing services on public internet * Multiple accounts for isolation of services * Automated management and monitoring by IT professionals * Processes sensitive data 1. Corporate server hosting many public users * Many accounts, many users, no mutual trust * Automated management and monitoring by IT professionals * Processes sensitive data ## 4.5 Risk factors Loading Loading @@ -652,7 +648,8 @@ FIXME add SENS |UC-WE-1 | 1 | 1 | 1 | 2 | 1 | 2 | 0 | 0 | 0 | 1 | 1 | 0 | 10 | |UC-PC-1 | 1 | 2 | 2 | 1 | 0 | 0 | 2 | 2 | 1 | 2 | 1 | 2 | 15 | |UC-PC-2 | 1 | 2 | 2 | 1 | 1 | 1 | 1 | 2 | 2 | 2 | 2 | 2 | 19 | |UC-PC-3 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | |UC-SE-1 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | |UC-SE-2 | 2 | 2 | 2 | 0 | 0 | 0 | 1 | 2 | 1 | 1 | 1 | 2 | 15 | **Discussion** Loading