URI: H.IS.PHS-iP.1
Package: Network
< prev | next >
Description: Switching on device Host in Space: an attacker with access to Space can physically access disabled device Host and switch it back on.
Threat Type: Primary Threat
Matching Pattern:
Finds a Physical Host that is not a Personal Device located in a Space, and optionally the host manager and interactive user.
        (empty)
Unreliable host Host affects Process: if there is a loss of reliability at device Host, it causes a loss of reliability in process Process running on that device.
        CSG-DisableHost-Trigger
CSG-IgnorePhysicalThreatsFromWorld
Indicates that threats from as well as to the space Space can be ignored, i.e. that the risk model intentionally does not consider physical attacks from Space. This is only permitted if Space is the inferred global public space (the World) used when no locations are asserted in the model. This control strategy is a way to specify that physical security is out of scope for devices with no explicitly specified location(s), i.e. that they are considered physically secure.
CSG-PersonalDeviceProtection
Device Host is a personal device dedicated to one user, who will protect it from some types of attacks involving physical access. This particular strategy relates to threats that are blocked, affording slightly less than perfect protection because the user may be overcome by force or become temporarily less than vigilant.
CSG-PersonalDeviceSecurity
Device Host is a personal device dedicated to one user, who has been trained in basic security and will protect it from some types of attacks involving physical access. Similar to personal device protection, but more effective due to the user being able to maintain vigilance and avoid physically uncontrollable situations.
CSG-PhysicalChecksOnHost
Device Host is physically monitored to rapidly detect if it has been physically removed, altered or substituted, so its manager HostManager can address any physical compromise. This strategy represents a contingency plan included in the system operating policies and practices, e.g. to repair or replace the affected device. Activation of the plan restores normal service, but if the device was stolen the attacker still has possession of the original which could still be misused.
CSG-PhysicalChecksOnHost-Implementation-Runtime
Device Host having found to be physically removed, altered or substituted, action has been taken by its manager HostManager to restore normal service. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To implement the plan at runtime, signal HostManager that the problem was detected with Host which may need repair or replacement.