Open networklayer opened 1 year ago
Should be assigned to Cory Clark and Debbie White of the Canadian Scheme
Howdy folks,
Reworded the threat statements using the assets defined in I.2. We tried to stay with the conventions used for the other threat statements in I.3. Throw darts
[Original]
A malfunction of the TSF may cause loss of security if the TOE is permitted to operate.
[Suggested]
A malfunction of the TSF may compromise the device security status if the TOE is permitted to operate.
Breakdown (just showing work, not to be included in PP) Agent: malfunction of the TSF Adverse action: TOE is permitted to operate Asset: TSF Data (Device security status)
[Original]
An attacker may cause the installation of unauthorized firmware/software on the TOE.
[Suggested]
An attacker may install unauthorized firmware/software on the TOE to modify the Device security status.
Breakdown (just showing work, not to be included in PP) Agent: Attacker Adverse Action: Installation of unauthorized firmware/software Asset : TSF Data (Device security status)
[Original]
An attacker may exploit poorly chosen cryptographic algorithms, random bit generators, ciphers or key sizes.
[Suggested]
An attacker may exploit poorly chosen cryptographic algorithms, random bit generators, ciphers or key sizes to access (read, modify, or delete) TSF and User data.
Breakdown (just showing work, not to be included in PP) Agent: Attacker Adverse action: exploit poorly chosen cryptographic algorithms, random bit generators, ciphers or key sizes Asset: User and TSF data
Resolved in errata, line 6115, 6118, 6124
This issue is addressed by the following TD:
The TD above is located at the following location:
As per APE evaluation of the CL and responses from the Canadian Scheme, below observation require HIT's attention:
HDcPP Section I.3 does not define the following threats in terms of an asset (as defined in I.2) in the threat definition. CEM v3.1r5 APE_SPD.1.2C - "All threats shall be described in terms of a threat agent, an asset, and an adverse action."
T.TSF_FAILURE. T.UNAUTHORIZED_UPDATE.
T.WEAK_CRYPTO.