Version: 1, Published: 2024-02-06
Impacted Documents
CPP_HCD_V1.0
References
Appendix I.3 Threat Definitions
Issue Description
HDcPP Section I.3 does not define the following threats in terms of an asset (as defined in I.2) in the threat definition. CEM v3.1r5 APE_SPD.1.2C - "All threats shall be described in terms of a threat agent, an asset, and an adverse action."
-
T.TSF_FAILURE.
-
T.UNAUTHORIZED_UPDATE.
-
T.WEAK_CRYPTO.
Resolution
Update Threat Definitions.
cPP_HCD_V1.0
The cPP is updated as follows (yellow highlights for additions, strikethrough for deletions) per section that is being updated:
I.3 Threat Definitions
Threats are defined by a threat agent that performs an action resulting in an outcome that has the potential to violate TOE security policies.
Table 15. Threats
Designation | Definition |
---|---|
T.UNAUTHORIZED_ACCESS |
An attacker may access (read, modify, or delete) User Document Data or change (modify or delete) User Job Data in the TOE through one of the TOE’s interfaces or the physical Nonvolatile Storage component. |
T.TSF_COMPROMISE |
An attacker may gain Unauthorized Access to TSF Data in the TOE through one of the TOE’s interfaces or the physical Nonvolatile Storage component. |
T.TSF_FAILURE |
A malfunction of the TSF may compromise the device |
T.UNAUTHORIZED_UPDATE |
An attacker may |
T.NET_COMPROMISE |
An attacker may access data in transit or otherwise compromise the security of the TOE by monitoring or manipulating network communication. |
T.WEAK_CRYPTO |
An attacker may exploit poorly chosen cryptographic algorithms, random bit generators, ciphers or key sizes to access (read, modify, or delete) TSF and User data. |