The IDPS asset protects Application assets associated with it from certain malicious activities.
The IDPS asset expands the Application asset, therefore it can be compromised in a similar fashion by an attacker. If the attacker is able to gain fullAccess on the IDPS it no longer provides its protective functionality.
Perhaps we wish to expand this in the future to other attack steps, such as deny.
The disabled defence on the IDPS should impact its ability to perform its duties, however this cannot currently be implemented as defences in MAL languages can not lead to triggering attack steps, they can only prevent them.
The
IDPS
asset protectsApplication
assets associated with it from certain malicious activities.The
IDPS
asset expands theApplication
asset, therefore it can be compromised in a similar fashion by an attacker. If the attacker is able to gainfullAccess
on the IDPS it no longer provides its protective functionality.Perhaps we wish to expand this in the future to other attack steps, such as
deny
.The
disabled
defence on the IDPS should impact its ability to perform its duties, however this cannot currently be implemented as defences in MAL languages can not lead to triggering attack steps, they can only prevent them.