211
Element to protect Risk D/R/E/A/D rating Examples of Causes Mitigation and relevant Design Choices (for the latter see
Section 5.2.10)
content. security
Attacker alters sensor
device so that monitoring
of a Physical Entity fails.L/M/L/L/H
enforce weak securityNot specifically targeted. Sensitive physical values may be monitored by a
large number of sensors, or sensor integrity can be remotely verified.Disclosure of device
configuration informationL/L/L/L/H
enforce weak securityNot specifically targeted. Unlinkability between different actions of the
same device, provided by the Identity Management Functional Component
(see Section 4.2.2.7), will mitigate the criticality of this threat.
DC P.1: use of temporary identity to provide unlinkability
Device identification L/M/M/L/H
enforce medium
securityAttacker bypasses in-place
pseudonymity scheme and
identifies a device as
providing access to certain
data.Adequate protection scheme requiring partial pre-knowledge of each other
before a tag can be read by a reader (the tag will only answer to a "known"
reader).Attacker physically
disables leaf device
(local).L/H/H/L/L
enforce weak securityTag destruction Not specifically targeted. Typically addressable through physical
investigation (identify the attacker through traces left by the physical
attack; e.g. triangulation of a destructive electromagnetic pulse).
Attacker physically
disables leaf device
(remote).M/H/L/H/L
enforce weak securityTag destruction by remote
electromagnetic meansNot specifically targeted. Typically addressable through physical
investigation.Attacker prevents proper
communication to an
actuator.M/H/L/M/L
enforce medium
securityDenial-of-service detection / reaction scheme (security by design).
DC A.16- 17 : autonomous securityIntermediary devices Compromised
intermediary devices alter
data passing through.M/H/M/M/L
enforce medium
securityEnd-to-end security scheme provided by the Key Exchange and
Management Functional Component (see Section 4.2.2.7), and enforced
by the relevant protocol security function.
Remote monitoring of intermediary devices can be another means of