Commit 9b78a399 authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Add availability protection

parent 49efef73
Loading
Loading
Loading
Loading
+26 −1
Original line number Diff line number Diff line
@@ -1831,6 +1831,31 @@ The product shall mitigate abuse of network services that amplify network traffi
| IoT-2, IoT-3     | MNET                 |
| all others       | MNET, MAMP           |

5.X.Y **TR-AVAI**:

The product shall protect the availability of essential and core functions.

5.X.Y.Z **MI-AVNT**:

The product shall protect the availability of essential and core network services through mitigation of denial-of-service attacks.

  * Reference: TR-AVAI
  * Objective: Protect availability of network functions
  * Preparation: List all network services and identify essential and core network services
  * Activities: For each essential or core network service, examine the documentation for how the product sufficiently mitigates denial-of-service attacks for its risk assessment
  * Verdict: Every essential or core network service is documented and the mitigations are sufficient => PASS, otherwise FAIL
  * Evidence: All configuration files for network services, documentation of network services and the ways to mitigate a denial-of-service attack on it, internal lists of listening ports, results of an external port scan

| Risk factors        | Requires mitigations |
|---------------------|----------------------|
| TNET < 1 & FNET < 1 | none                 |
| all others          | AVNT                 |

| Security Profile | Requires mitigations |
|------------------|----------------------|
| LR, IoT-1        | none                 |
| all others       | AVNT                 |

### 5.2.X **TR-SCUD**: Secure updates

### 5.2.X.x Requirement
@@ -2172,7 +2197,7 @@ Description: Firewall for enterprise network
| Confidentiality protection                      | MISO, MSAF, CDST, CDTX             |
| Integrity protection for data and configuration | MISO, IDST, IDTX                   |
| Data minimization                               | DMIN                               |
| Availability protection                         |                                    |
| Availability protection                         | AVAI                               |
| Minimize impact on other devices or services    | MIMP                               |
| Limit attack surface                            | MISO, MSAF, LMAS                   |
| Exploit mitigation by limiting incident impact  | MISO, MIME MSAF                    |