Threat DS.C.HPsACr-pDS-V.4

URI: DS.C.HPsACr-pDS-V.4

Package: VulnerabilityCVSS

< prev | next >

Description: Attacker exploit at Process accesses Data: the attacker is able to exploit a vulnerability in process Process and gains access to the stored copy of Data on device Host which is served by the process.

Threat Type: Primary Threat

Matching Pattern:

DS.C.HPsACr-pDS-V.4
MP-HPsACr-pDS-V

Finds a host running a Process with read access (crudr) to a locally stored data copy not controlled by a key vault, which it does not process (i.e., it serves the data), plus the data access asset representing the data deserialization, the access contexts for the process on this host, any data fields included in the stored data, and optionally the host manager.

        (empty)

        (empty)

CSG-DataStorageEncryption

The copy of Data stored on Host is encrypted.

CSG-SuspendVulnerableProcess

Process Process may be temporarily disabled by the manager of its host HostManager to prevent vulnerabilities being exploited by potential attackers. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it may triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-SuspendVulnerableProcess-Implementation-Runtime

Process Process has been disabled by the manager of its host HostManager to prevent a known vulnerability being exploited by an attacker. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user HostManager who is responsible for managing device Host where Process is running. The Disabled Process control should be deselected only when the process has been restarted.