Spyderisk / domain-network

Network domain model
Apache License 2.0
1 stars 0 forks source link

IoT Surfacing Threats Overspecified #123

Closed mike1813 closed 5 months ago

mike1813 commented 6 months ago

Surfacing and internal threats for IoT Controllers all use the same pattern CoPDS comprising an IoT Controller, the control input Data and the stored copy of this data on the IoT device. The DataCopy is included because many of these threats are caused by issues at the stored control input. However:

These threats should be modified so the threat pattern refers only to the relevant assets. This change should not affect risk calculation outcomes, but:

The second of these reasons makes it convenient to tackle this as part of #120, which requires changes to the inheritance hierarchy for stored data assets.

mike1813 commented 5 months ago

A test case was created Issue 123 Case 1 - Asserted.nq.gz, which should produce one threat each from the affected classes, allowing verification that the revised threats are generated correctly.

However, this test case fails and produces modelling errors, because the data is not saved on the IoT controller device. This is due to a separate issue #124, whereby the 'stores' relationship is not generated if the control input is asserted. As a result, the threats of concern here are not generated when using the original (baseline) domain model version.

A second test case Issue 123 Case 2 - Asserted.nq.gz works around this problem. Comparison of results between the two models also allows fixes for #124 to be verified.

mike1813 commented 5 months ago

With the second test, the fixes for these three threats were verified and pushed on branch 40.