T.Insider.Aggregation.1
|
Low
|
Unusual
|
An AMI entity with access browses files to collect information (aggregation attack).
|
T.Insider.Confusion.1
|
Medium
|
Likely
|
An AMI entity with access configures the system incorrectly because the system is too complex.
|
T.Insider.Confusion.2
|
Medium
|
Likely
|
An AMI entity with access performs some insecure actions because the system is too complex.
|
T.Insider.Confusion.3
|
Medium
|
Likely
|
A non-English speaking AMI entity performs insecure actions due to confusion about how to use the system securely.
|
T.Insider.Misinfo.1
|
High
|
Unusual
|
An AMI entity with access improperly enters, edits, or imports content resulting in misinformation.
|
T.Insider.Mislabel.1
|
Medium
|
Likely
|
An AMI entity with access creates, enters, edits, or imports content and labels it with incorrect security attributes resulting in unauthorized disclosure.
|
T.Insider.Mislabel.2
|
Medium
|
Likely
|
An entity enters, edits unauthorized values in the information attributes resulting in exfiltration of information assets.
|
T.Insider.Misuse.Info.1
|
Medium
|
Likely
|
An AMI entity with access to an information asset attempts to exfiltrate that information asset to a potential covert channel.
|
T.Insider.Misuse.Info.2
|
Medium
|
Likely
|
An AMI entity with access to an information asset prints that asset and discloses it to an inappropriate individual.
|
T.Insider.Misuse.Res.1
|
Low
|
Unlikely
|
An AMI entity with access to a resource asset attempts to access greater than its quota of that resource asset (e.g., bandwidth quota or data repository quota).
|