Spyderisk / domain-network

Network domain model
Apache License 2.0
1 stars 0 forks source link

Control applicability bugs #55

Closed mike1813 closed 11 months ago

mike1813 commented 1 year ago

In debugging issues with data flow threats, it became apparent that some are missed or found inappropriately because controls are missing. In many cases this is due to a bug in the CASetting, which specifies the control cannot be asserted when it should be possible.

Action: review all CASettings and identify potential errors, which should be listed below:

Action: investigate whether these may be inappropriate, and make adjustments as necessary.

mike1813 commented 11 months ago

Some changes to the above.

DisableNetworkProvision should not be assertible at a Pod, since this is not a host but a composition of Containers providing data storage and network connectivity in a host-like way. However, a Container could run a virtual router to provide a network, and this functionality certainly could be disabled, so the control should apply to a Container.

The change in assertibility of the LowPriority control clashes with a workaround introduced to handle unrealistic secondary effect cascades that start with a process overload. This is discussed in #77.

mike1813 commented 11 months ago

Now addressed in branch 65.