Commit bddfcc4e authored by Valerie Aurora (Bow Shock)'s avatar Valerie Aurora (Bow Shock)
Browse files

Edit and merge mapping tables for data confidentiality requirements

parent 4ee01ed4
Loading
Loading
Loading
Loading
+16 −18
Original line number Diff line number Diff line
@@ -1471,7 +1471,7 @@ The product shall operate in a secure configuration by default.

#### 5.2.X.x **MI-ADEF**: Authorization required by default to access security-relevant assets

The product shall require authorization by default to access security-relevant assets, such as product firmware, security-relevant configuration, sensitive data, and sensitive functions.
The product shall require appropriate authorization by default to access security-relevant assets, such as product firmware, security-relevant configuration, sensitive data, and sensitive functions.

  * Reference: TR-SDEF

@@ -1479,12 +1479,14 @@ The product shall require authorization by default to access security-relevant a

  * Preparation: List all interfaces allowing access to security-relevant assets

  * Activities: For each interface, attempt to access security-relevant assets without authorization and record whether access was allowed or not
  * Activities: For each interface, attempt to access security-relevant assets without appropriate authorization and record whether access was allowed or not

  * Verdict: If every interface does not allow access without authorization => PASS, otherwise => FAIL
  * Verdict: If every interface does not allow access without appropriate authorization => PASS, otherwise => FAIL

  * Evidence: List of interfaces allowing access to security-relevant assets, record of activities used to attempt unauthorized access to security-relevant assets, log of results of attempts

> FIXME: Definition of appropriate authorization is in progress by another group.

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors        | Requires mitigations |
@@ -1513,15 +1515,7 @@ The product shall protect confidential data stored on the product from unauthori

  * Evidence: Logs of attempts to read confidential data with indication of success or failure

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors        | Requires mitigations |
|---------------------|----------------------|
| any                 | SCNF                 |

| Security Profile    | Requires mitigations |
|---------------------|----------------------|
| any                 | SCNF                 |
> TODO: Specify which types of data should be protected by the environment, permissons, encryption, salted hashes, offline storage, or hardware-backed secrets.

#### 5.2.X.x **MI-TCNF**: Confidentiality of data transmitted by product

@@ -1539,15 +1533,19 @@ The product shall protect data transmitted by the product from unauthorized acce

  * Evidence: Logs of attempts to read data transmitted with indication of success or failure

> TODO: Specify which types of transmitted data should be protected by the environment or encryption.

#### 5.2.X.x Mapping of mitigations to risk factors and security profiles

| Risk factors | Requires mitigations |
|---------------------|----------------------|
| any                 | TCNF                 |
|--------------|----------------------|
| any          | SCNF, TCNF           |
|              |                      |

| Security Profile | Requires mitigations |
|---------------------|----------------------|
| any                 | TCNF                 |
|------------------|----------------------|
| any              | SCNF, TCNF           |
|                  |                      |

### 5.2.X **TR-LMAS**: Minimize exposed interfaces