Threat P.E-D.HP.8

URI: P.E-D.HP.8

Package: Network

< prev | next >

Description: Vulnerabilities discovered in process Process: one or more software vulnerabilities in process Process become known to attackers. This is a pre-requisite for exploitation of more specific types of vulnerabilities.

Threat Type: Primary Threat

Matching Pattern:

P.E-D.HP.8
MP-HP

Finds a Process and its Host, and optionally the host manager and the interactive user of the process.

        (empty)

        (empty)

        (empty)

CSG-FormalProcessVerification

The software for process Process has been analysed by independent experts using formal methods and shown to be free of bugs. It is therefore guaranteed to work correctly for arbitrary (even malicious) inputs. However, this is only possible for simple processes. Note that it does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations (although in principle no vulnerabilities should ever be found).

CSG-PatchingAtProcess

Use a systematic procedure for regular security patching of software used (including hosted process Process) on device Host, and have a contingency plan included in the system operating policies and practices for HostManager to manually apply patches immediately for Process should the need for them become urgent.

CSG-PenTestingOfProcess

The software for process Process has been tested and certified to be secure by independent experts. The process is unlikely to contain exploitable bugs, though the assessment may become outdated so should be renewed from time to time. Note that this does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations.

CSG-ProcessCertification

The software for process Process has been assessed and certified to be secure by independent experts. The process is unlikely to contain exploitable bugs, though the assessment may become outdated so should be renewed from time to time. Note that this does not prevent bugs that are present being discovered and exploited by attackers, so it is a prior mitigation only which is ignored in current (run-time) risk calculations.

CSG-SoftwareUpdatingAtHost

Use a systematic procedure for updating software used (including hosted processes) on device Host.