Threat I.Auth.HWSGSoS.3

URI: I.Auth.HWSGSoS.3

Package: NetworkConnectivity

< prev | next >

Description: Spoofing wired network LogicalSubnet at location Space of router Gateway: at attacker with access to the location Space of a wired router Gateway can physically insert their own device between the router and its wired connection to device Host.

Threat Type: Primary Threat

Matching Pattern:

I.Auth.HWSGSoS.3
MP-HWSGSoS

Finds a host connecting to a wired network it does not provide, a gateway host located in a space that is providing the network, and optionally the gateway host manager, and a service that controls access to the network.

        (empty)

        (empty)

        (empty)

CSG-ContinuouslyObservedGateway

Physical access to host Gateway is controlled by being situated where it can be under constant surveillance in a location that is continuously occupied at times when attacks may occur.

CSG-IgnorePhysicalThreatsFromWorld

Indicates that threats from as well as to the space Space can be ignored, i.e. that the risk model intentionally does not consider physical attacks from Space. This is only permitted if Space is the inferred global public space (the World) used when no locations are asserted in the model. This control strategy is a way to specify that physical security is out of scope for devices with no explicitly specified location(s), i.e. that they are considered physically secure.

CSG-PhysicalChecksOnGateway

Device Gateway is physically monitored to rapidly detect if it has been physically removed, altered or substituted, so its manager HostManager can address any physical compromise. This strategy represents a contingency plan included in the system operating policies and practices, e.g. to repair or replace the affected device. Activation of the plan restores normal service, but if the device was stolen the attacker still has possession of the original which could still be misused.

CSG-PhysicalChecksOnGateway-Implementation-Runtime

Device Gateway having found to be physically removed, altered or substituted, action has been taken by its manager HostManager to restore normal service. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To implement the plan at runtime, signal HostManager that the problem was detected with Gateway which may need repair or replacement.