Strategic control objective: To improve authentication and authorization processes to avoid spoofing identity.

Main security threat [STRIDE]: Spoofing Identity

ID

Specific threat

Insecurity channel

Automation

metrics

Standard

mitigation

Escalation

procedures

S001

Camouflage e-mail to originate from imaginary body

· Systems Users

­ Inactive user accounts

­ Unattended computer logins

­ Social-engineering

· Systems Admin, Network Admin and Database Admin

­ Inadequate control for removable devices in critical systems

­ Poor access rights

· Check frequently

­ Inactive accounts

­ Unsuccessful password trials

­ Password safety and handling

· Configure appropriately

­ USB ports

­ Audit Trail

· Appropriate authentication and authorization process

· Secure credentials appropriately

SA»SO»ITM

S002

Camouflage MAC or IP address to originated from trust source

· Web and Internet

­ Inadequate firewalls

­ Poor policy configurations

­ Lack of mechanisms for TCP/IP protocols to authenticating the source or destination of message

· Check frequently

­ The status of ARP log

­ The status Authentication proxy

Install proxy and packet Filtering Tools

SA»SO»ITM»CEO

Strategic control objective: To prevent data modification, deletion and insertion without appropriate permission.

Main security threat [STRIDE]: Tempering with Data

ID

Specific threat

Insecurity channel

Automation

metrics

Standard

mitigation

Escalation

procedures

T001

Back door Malware and Trojans

· Web and Internet

­ Inadequate firewalls

­ Poor port configurations

· Check frequently

­ Services running

­ Port scanners

· Appropriate Anti-virus and message authentication process

SA»SO»ITM»CEO

T002

Unsecured Data sharing

· Emails and Chatting

­ Inadequate mail filters

­ Lack of security awareness

· Appropriate mail attachments filtering

· No of security seminars and workshops

· Digital signature and encryptions

· Frequent security training

· Prohibit unsecured data sharing

SA»SO»ITM