Skip to content

Commit 038720a

Browse files
authored
change(threat) fixing issues with RDMS threats and controls (finos#683)
1 parent 745e967 commit 038720a

File tree

3 files changed

+197
-229
lines changed

3 files changed

+197
-229
lines changed

services/common-threats.yaml

Lines changed: 108 additions & 95 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,20 @@ threats:
77
unintended data exposure or unauthorized actions being performed within
88
the system.
99
features:
10-
- CCC.F06 # Identity Based Access Control
11-
mitre_technique:
12-
- T1078 # Valid Accounts
13-
- T1548 # Abuse Elevation Control Mechanism
14-
- T1203 # Exploitation for Credential Access
15-
- T1098 # Account Manipulation
16-
- T1484 # Domain or Tenant Policy Modification
17-
- T1546 # Event Triggered Execution
18-
- T1537 # Transfer Data to Cloud Account
19-
- T1567 # Exfiltration Over Web Services
20-
- T1048 # Exfiltration Over Alternative Protocol
21-
- T1485 # Data Destruction
22-
- T1565 # Data Manipulation
23-
- T1027 # Obfuscated Files or Information
10+
- CCC.F06 # Identity Based Access Control
11+
mitre_technique:
12+
- T1078 # Valid Accounts
13+
- T1548 # Abuse Elevation Control Mechanism
14+
- T1203 # Exploitation for Credential Access
15+
- T1098 # Account Manipulation
16+
- T1484 # Domain or Tenant Policy Modification
17+
- T1546 # Event Triggered Execution
18+
- T1537 # Transfer Data to Cloud Account
19+
- T1567 # Exfiltration Over Web Services
20+
- T1048 # Exfiltration Over Alternative Protocol
21+
- T1485 # Data Destruction
22+
- T1565 # Data Manipulation
23+
- T1027 # Obfuscated Files or Information
2424

2525
- id: CCC.TH02
2626
title: Data is Intercepted in Transit
@@ -30,10 +30,10 @@ threats:
3030
properly implemented. This could result in unauthorized access to
3131
sensitive information or unintended data alterations.
3232
features:
33-
- CCC.F01 # Encryption in Transit Enabled by Default
33+
- CCC.F01 # Encryption in Transit Enabled by Default
3434
mitre_technique:
35-
- T1557 # Adversary-in-the-Middle
36-
- T1040 # Network Sniffing
35+
- T1557 # Adversary-in-the-Middle
36+
- T1040 # Network Sniffing
3737

3838
- id: CCC.TH03
3939
title: Deployment Region Network is Untrusted
@@ -44,13 +44,13 @@ threats:
4444
vulnerabilities. This could result in unintended data disclosure or
4545
compromised system integrity.
4646
features:
47-
- CCC.F08 # Multi-zone Deployment
47+
- CCC.F08 # Multi-zone Deployment
4848
mitre_technique:
49-
- T1040 # Network Sniffing
50-
- T1110 # Brute Force
51-
- T1105 # Ingress Tool Transfer
52-
- T1583 # Acquire Infrastructure
53-
- T1557 # Adversary-in-the-Middle
49+
- T1040 # Network Sniffing
50+
- T1110 # Brute Force
51+
- T1105 # Ingress Tool Transfer
52+
- T1583 # Acquire Infrastructure
53+
- T1557 # Adversary-in-the-Middle
5454

5555
- id: CCC.TH04
5656
title: Data is Replicated to Untrusted or External Locations
@@ -60,9 +60,9 @@ threats:
6060
in unintended data leakage or exposure outside the organization's trusted
6161
perimeter.
6262
features:
63-
- CCC.F21 # Replication
63+
- CCC.F21 # Replication
6464
mitre_technique:
65-
- T1565 # Data Manipulation
65+
- T1565 # Data Manipulation
6666

6767
- id: CCC.TH05
6868
title: Data is Corrupted During Replication
@@ -73,14 +73,14 @@ threats:
7373
and availability, potentially affecting recovery processes and system
7474
reliability.
7575
features:
76-
- CCC.F08 # Multi-zone Deployment
77-
- CCC.F12 # Recovery
78-
- CCC.F21 # Replication
76+
- CCC.F08 # Multi-zone Deployment
77+
- CCC.F12 # Recovery
78+
- CCC.F21 # Replication
7979
mitre_technique:
80-
- T1485 # Data Destruction
81-
- T1565 # Data Manipulation
82-
- T1491 # Defacement
83-
- T1490 # Inhibit System Recovery
80+
- T1485 # Data Destruction
81+
- T1565 # Data Manipulation
82+
- T1491 # Defacement
83+
- T1490 # Inhibit System Recovery
8484

8585
- id: CCC.TH06
8686
title: Data is Lost or Corrupted
@@ -89,13 +89,13 @@ threats:
8989
misconfiguration. This can result in the loss of critical data, service
9090
disruption, or unintended exposure of sensitive information.
9191
features:
92-
- CCC.F11 # Backup
93-
- CCC.F18 # Versioning
92+
- CCC.F11 # Backup
93+
- CCC.F18 # Versioning
9494
mitre_technique:
95-
- T1485 # Data Destruction
96-
- T1565 # Data Manipulation
97-
- T1491 # Defacement
98-
- T1490 # Inhibit System Recovery
95+
- T1485 # Data Destruction
96+
- T1565 # Data Manipulation
97+
- T1491 # Defacement
98+
- T1490 # Inhibit System Recovery
9999

100100
- id: CCC.TH07
101101
title: Logs are Tampered With or Deleted
@@ -105,12 +105,12 @@ threats:
105105
incidents, disrupt forensic investigations, and affect the accuracy of
106106
audit trails.
107107
features:
108-
- CCC.F03 # Access/Activity Logs
109-
- CCC.F10 # Logging
108+
- CCC.F03 # Access/Activity Logs
109+
- CCC.F10 # Logging
110110
mitre_technique:
111-
- T1070 # Indicator Removal on Host
112-
- T1565 # Data Manipulation (for altering log entries)
113-
- T1027 # Obfuscated Files or Information
111+
- T1070 # Indicator Removal on Host
112+
- T1565 # Data Manipulation (for altering log entries)
113+
- T1027 # Obfuscated Files or Information
114114

115115
- id: CCC.TH08
116116
title: Cost Management Data is Manipulated
@@ -120,10 +120,10 @@ threats:
120120
reporting, budget exhaustion, financial losses, and hinder incident
121121
detection.
122122
features:
123-
- CCC.F15 # Cost Management
123+
- CCC.F15 # Cost Management
124124
mitre_technique:
125-
- T1565 # Data Manipulation
126-
- T1070 # Indicator Removal on Host
125+
- T1565 # Data Manipulation
126+
- T1070 # Indicator Removal on Host
127127

128128
- id: CCC.TH09
129129
title: Logs or Monitoring Data are Read by Unauthorized Users
@@ -134,22 +134,22 @@ threats:
134134
enable the planning of attacks, or hinder the detection of ongoing
135135
incidents.
136136
features:
137-
- CCC.F03 # Access/Activity Logs
138-
- CCC.F09 # Monitoring
139-
mitre_technique:
140-
- T1003 # Credential Dumping
141-
- T1007 # System Service Discovery
142-
- T1018 # Remote System Discovery
143-
- T1033 # System Owner/User Discovery
144-
- T1046 # Network Service Discovery
145-
- T1057 # Process Discovery
146-
- T1069 # Permission Groups Discovery
147-
- T1070 # Indicator Removal
148-
- T1082 # System Information Discovery
149-
- T1120 # Peripheral Device Discovery
150-
- T1124 # System Time Discovery
151-
- T1497 # Virtualization/Sandbox Evasion
152-
- T1518 # Software Discovery
137+
- CCC.F03 # Access/Activity Logs
138+
- CCC.F09 # Monitoring
139+
mitre_technique:
140+
- T1003 # Credential Dumping
141+
- T1007 # System Service Discovery
142+
- T1018 # Remote System Discovery
143+
- T1033 # System Owner/User Discovery
144+
- T1046 # Network Service Discovery
145+
- T1057 # Process Discovery
146+
- T1069 # Permission Groups Discovery
147+
- T1070 # Indicator Removal
148+
- T1082 # System Information Discovery
149+
- T1120 # Peripheral Device Discovery
150+
- T1124 # System Time Discovery
151+
- T1497 # Virtualization/Sandbox Evasion
152+
- T1518 # Software Discovery
153153

154154
- id: CCC.TH10
155155
title: Alerts are Intercepted
@@ -159,14 +159,14 @@ threats:
159159
information about sensitive operations or access patterns, potentially
160160
impacting system security and integrity.
161161
features:
162-
- CCC.F03 # Access/Activity Logs
163-
- CCC.F07 # Event Notifications
164-
- CCC.F09 # Monitoring
165-
- CCC.F17 # Alerting
162+
- CCC.F03 # Access/Activity Logs
163+
- CCC.F07 # Event Notifications
164+
- CCC.F09 # Monitoring
165+
- CCC.F17 # Alerting
166166
mitre_technique:
167-
- T1057 # Process Discovery
168-
- T1049 # System Network Connections Discovery
169-
- T1083 # File and Directory Discovery
167+
- T1057 # Process Discovery
168+
- T1049 # System Network Connections Discovery
169+
- T1083 # File and Directory Discovery
170170

171171
- id: CCC.TH11
172172
title: Event Notifications are Incorrectly Triggered
@@ -176,12 +176,12 @@ threats:
176176
triggered unintentionally, obfuscate other issues, or overwhelm the
177177
system, potentially disrupting legitimate operations.
178178
features:
179-
- CCC.F07 # Event Notifications
180-
- CCC.F17 # Alerting
179+
- CCC.F07 # Event Notifications
180+
- CCC.F17 # Alerting
181181
mitre_technique:
182-
- T1205 # Traffic Signaling
183-
- T1001.001 # Data Obfuscation: Junk Data
184-
- T1491.001 # Defacement: Internal Defacement
182+
- T1205 # Traffic Signaling
183+
- T1001.001 # Data Obfuscation: Junk Data
184+
- T1491.001 # Defacement: Internal Defacement
185185

186186
- id: CCC.TH12
187187
title: Resource Constraints are Exhausted
@@ -192,13 +192,13 @@ threats:
192192
systems within the same scope. Exhaustion may occur through repeated
193193
requests, resource-intensive operations, or lowering rate/budget limits.
194194
features:
195-
- CCC.F04 # Transaction Rate Limits
196-
- CCC.F16 # Budgeting
197-
- CCC.F19 # Auto-scaling
195+
- CCC.F04 # Transaction Rate Limits
196+
- CCC.F16 # Budgeting
197+
- CCC.F19 # Auto-scaling
198198
mitre_technique:
199-
- T1496 # Resource Hijacking
200-
- T1499 # Endpoint Denial of Service
201-
- T1498 # Network Denial of Service
199+
- T1496 # Resource Hijacking
200+
- T1499 # Endpoint Denial of Service
201+
- T1498 # Network Denial of Service
202202

203203
- id: CCC.TH13
204204
title: Resource Tags are Manipulated
@@ -208,9 +208,9 @@ threats:
208208
This could result in mismanaged resources, financial misuse, or security
209209
vulnerabilities.
210210
features:
211-
- CCC.F20 # Tagging
211+
- CCC.F20 # Tagging
212212
mitre_technique:
213-
- T1565 # Data Manipulation
213+
- T1565 # Data Manipulation
214214

215215
- id: CCC.TH14
216216
title: Older Resource Versions are Exploited
@@ -220,17 +220,17 @@ threats:
220220
outdated versions could lead to security measures bypass, potentially
221221
leading to security risks or operational disruptions.
222222
features:
223-
- CCC.F18 # Versioning
224-
mitre_technique:
225-
- T1027 # Obfuscated Files or Information
226-
- T1485 # Data Destruction
227-
- T1565 # Data Manipulation
228-
- T1489 # Service Stop
229-
- T1562.01 # Impair Defenses: Downgrade Attack
230-
- T1027 # Obfuscated Files or Information
231-
- T1485 # Data Destruction
232-
- T1565 # Data Manipulation
233-
- T1489 # Service Stop
223+
- CCC.F18 # Versioning
224+
mitre_technique:
225+
- T1027 # Obfuscated Files or Information
226+
- T1485 # Data Destruction
227+
- T1565 # Data Manipulation
228+
- T1489 # Service Stop
229+
- T1562.01 # Impair Defenses: Downgrade Attack
230+
- T1027 # Obfuscated Files or Information
231+
- T1485 # Data Destruction
232+
- T1565 # Data Manipulation
233+
- T1489 # Service Stop
234234

235235
- id: CCC.TH15
236236
title: Automated Enumeration and Reconnaissance by Non-human Entities
@@ -241,6 +241,19 @@ threats:
241241
unsecured resources, which might result in unauthorized access or data
242242
exposure.
243243
features:
244-
- CCC.F14 # API Access
244+
- CCC.F14 # API Access
245+
mitre_technique:
246+
- T1580 # Cloud Infrastructure Discovery
247+
248+
- id: CCC.TH16
249+
title: Logging and Monitoring are Disabled
250+
description: |
251+
Logging and monitoring may be disabled, potentially hindering the
252+
detection of security events and reducing visibility into system
253+
activities. This condition can impact the organization's ability
254+
to investigate incidents and maintain operational integrity.
255+
features:
256+
- CCC.F10 # Logging
257+
- CCC.F09 # Monitoring
245258
mitre_technique:
246-
- T1580 # Cloud Infrastructure Discovery
259+
- T1562 # Impair Defenses

0 commit comments

Comments
 (0)