Open noloader opened 8 months ago
Agreed. But being prepared for key rotation, on the other side, is an important requirement IMHO. Would you like to submit a PR with better details and mitigation?
What is the policy for changing an SID? Should this get a new SID or can this just be rewritten?
Further I would suggest to extract the Lifetime.HARDCODED
condition and make this a new threat, since this is a design failure, which can not be fixed.
Here a first draft to change AC22:
If credentials (passwords and certificates) have a long lifetime their disclosure can have severe consequences, if the credentials cannot quickly be revoked and/or rotated.
All credentials need a possibility to be revoked immediately and the credentials have to have high enough entropy and length to be future proof. To detect disclosure of the credentials their use should to be monitored for suspicions activity.
@izar should I write a PR?
sure thing!
@noloader could you also look over my PR and give your opinion?
Hi Everyone,
Threatlib has an item for AC22 Credential Aging:
We have learned that continuity is a better security property than rotation. Unexpected changes, like gratuitously changing public keys changing, is bad for security because it breaks pinning controls. And requiring users to rotate their password results in users choosing weaker and weaker passwords over time just to comply with a policy based on reading tea leaves.
The details and mitigation detailed in threatlib are completely wrong nowadays. They run counter to what we have learned from real world incidents and security usability studies. Nowadays we want public keys and passwords written in stone, and only changed if there is suspicion or proof of breach or misuse.
I think AC22 should be either removed from the model or limited in scope.