Ami-sec risk Assessment & System Requirements



Yüklə 1,35 Mb.
səhifə9/30
tarix28.10.2017
ölçüsü1,35 Mb.
#17655
1   ...   5   6   7   8   9   10   11   12   ...   30

Audit Threats


Audit threats are those threats that involve the AMI audit logs. The specific threats are listed below in Table 6.

Table 6. Audit Threats






Threat Name

Severity

Likelihood

Description

T.Audit.1

Medium

Likely

An entity creates a large number of auditable events in order to cause the AMI audit logs to run out of resource space.

T.Audit.2

Medium

Likely

An AMI entity with proper access to the audit logs fails to clear enough space for the logs, causing the AMI audit logs to run out of resource space.

T.Audit.3

Medium

Likely

An entity causes the AMI auditing function to fail, allowing an entity to perform non-recorded auditable actions.

T.Audit.4

High

Likely

An entity reads AMI audit logs when it does not have authorization to read any audit logs.

T.Audit.5

Medium

Likely

An entity reads AMI audit logs with a security attribute it does not possess.

T.Audit.6

High

Likely

An entity modifies AMI audit logs to hide other actions.

T.Audit.7

High

Likely

An entity deletes AMI audit logs it does not have authorization to delete.

T.Audit.8

Low

Likely

An AMI entity with proper access misinterprets audit data, and thus cannot detect inappropriate actions of other principals.

T.Audit.9

Low

Likely

An AMI entity with proper access cannot find the desired audit data within the AMI audit logs, and thus cannot detect inappropriate actions of other principals.

T.Audit.10

Medium

Unlikely

An AMI entity with proper access is not provided enough information by the AMI audit logs to detect inappropriate actions of other principals.

T.Audit.11

Medium

Unlikely

An AMI entity with proper access is not provided enough information by the AMI audit logs to identify principals who take inappropriate actions.



      1. Crypto Threats


Crypto threats are those threats that directly involve the cryptography of the system. These threats include brute force attacks, mathematical attacks, etc. The specific threats are listed below in Table 7.

Table 7. Crypto Threats






Threat Name

Severity

Likelihood

Description

T.Crypto.Break.1

High

Unusual

An entity breaks the cryptographic mechanisms that protect assets through mathematical means.

T.Crypto.Break.2

High

Unusual

An entity breaks the cryptographic mechanisms that protect assets through brute force computational means.

T.Crypto.Invalid_Keys.1

Medium

Unusual

An AMI entity with access uses invalid cryptographic keys causing the system to enter a non-operational state.

T.Crypto.Invalid_Keys.2

High

Unusual

An AMI entity with access uses invalid cryptographic keys causing the system to enter an insecure state.

T.Crypto.Weak_Keys.1

High

Unlikely

An entity breaks the cryptographic mechanisms that protect assets because of the use of weak keys.




      1. Yüklə 1,35 Mb.

        Dostları ilə paylaş:
1   ...   5   6   7   8   9   10   11   12   ...   30




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin