URI: H.P.PHS-iC.3
Package: Theft
< prev | next >
Description: Theft of device Host from Space: an attacker with access to the physical space Space is able to steal device Host.
Threat Type: Primary Threat
Matching Pattern:
Finds a Physical Host that is not a Cluster located in a Space, and optionally the host manager and interactive user.
(empty)
Theft at Role_Host
CSG-ContinuouslyObservedHost
Physical access to host Host is controlled by being situated where it can be under constant surveillance in a location that is continuously occupied at times when attacks may occur.
CSG-EmbeddedHostSecurity
Host Host is locked or built into the physical environment Space such that neither it nor any of its internal storage media can be removed or altered without destroying them.
CSG-IgnorePhysicalThreatsFromWorld
Indicates that threats from as well as to the space Space can be ignored, i.e. that the risk model intentionally does not consider physical attacks from Space. This is only permitted if Space is the inferred global public space (the World) used when no locations are asserted in the model. This control strategy is a way to specify that physical security is out of scope for devices with no explicitly specified location(s), i.e. that they are considered physically secure.
CSG-PersonalDeviceProtection
Device Host is a personal device dedicated to one user, who will protect it from some types of attacks involving physical access. This particular strategy relates to threats that are blocked, affording slightly less than perfect protection because the user may be overcome by force or become temporarily less than vigilant.
CSG-PersonalDeviceSecurity
Device Host is a personal device dedicated to one user, who has been trained in basic security and will protect it from some types of attacks involving physical access. Similar to personal device protection, but more effective due to the user being able to maintain vigilance and avoid physically uncontrollable situations.