Strategic control objective: To improve authentication and authorization processes to avoid spoofing identity. | |||||||
Main security threat [STRIDE]: Spoofing Identity | |||||||
ID | Specific threat | Insecurity channel | Automation metrics | Standard mitigation | Escalation procedures | ||
S001 | Camouflage e-mail to originate from imaginary body | · Systems Users Inactive user accounts Unattended computer logins Social-engineering · Systems Admin, Network Admin and Database Admin Inadequate control for removable devices in critical systems Poor access rights | · Check frequently Inactive accounts Unsuccessful password trials Password safety and handling | · Configure appropriately USB ports Audit Trail · Appropriate authentication and authorization process · Secure credentials appropriately | SA»SO»ITM | ||
S002 | Camouflage MAC or IP address to originated from trust source | · Web and Internet Inadequate firewalls Poor policy configurations Lack of mechanisms for TCP/IP protocols to authenticating the source or destination of message | · Check frequently The status of ARP log The status Authentication proxy | Install proxy and packet Filtering Tools | SA»SO»ITM»CEO | ||
Strategic control objective: To prevent data modification, deletion and insertion without appropriate permission. | |||||||
Main security threat [STRIDE]: Tempering with Data | |||||||
ID | Specific threat | Insecurity channel | Automation metrics | Standard mitigation | Escalation procedures | ||
T001 | Back door Malware and Trojans | · Web and Internet Inadequate firewalls Poor port configurations | · Check frequently Services running Port scanners | · Appropriate Anti-virus and message authentication process | SA»SO»ITM»CEO | ||
T002 | Unsecured Data sharing | · Emails and Chatting Inadequate mail filters Lack of security awareness | · Appropriate mail attachments filtering · No of security seminars and workshops | · Digital signature and encryptions · Frequent security training · Prohibit unsecured data sharing | SA»SO»ITM | ||