Threat H.M.HumCHS-iP.3.2

URI: H.M.HumCHS-iP.3.2

Package: Network

< prev | next >

Description: Unauthorised console access to an admin account on host Host in Space: an attacker with physical access to device Host in location Space exploits lax password security by user Human to gain root privileges via the console.

Threat Type: Primary Threat

Matching Pattern:

H.M.HumCHS-iP.3.2
MP-HumCHS-iP

Finds a Human managing a Host located in a space via the console, where the host is not a personal device.

        (empty)

        (empty)

CSG-AccountLockingAtHost

The number of login attempts at device Host is limited, and user accounts locked when there are too many unsuccessful login attempts, or too many login attempts within a short period.

CSG-BiometricAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using biometrics.

CSG-ChipAndPinAccessControlAtHost

Access to device Host is controlled, by authenticating authorised users using a 2-factor system involving possession of a physical key or dongle, such as a chip and PIN card.

CSG-IgnorePhysicalThreatsFromWorld

Indicates that threats from as well as to the space Space can be ignored, i.e. that the risk model intentionally does not consider physical attacks from Space. This is only permitted if Space is the inferred global public space (the World) used when no locations are asserted in the model. This control strategy is a way to specify that physical security is out of scope for devices with no explicitly specified location(s), i.e. that they are considered physically secure.

CSG-PhysicalPatrolsInSpace

The physical space Space is patrolled at frequent intervals to ensure it is free of intruders. Note this does not prevent intrusion, e.g. to steal a device, but it does prevent some types of attacks where the intruder would need uninterrupted access, e.g. use of a device in the space for a significant period.

CSG-UserSecurityTraining

Users in the role Human are trained to avoid most common cyber security errors by using only strong passwords, recognising malicious emails, and the importance of physical security including the use of screen locking for fixed devices that cannot be carried on the person.