Prerequisites
Advanced knowledge of hardware capabilities of a manufacturer's product.
Access to the manufacturer's documentation.
Skills Required
Ability to read, interpret, and subsequently alter manufacturer's documentation to cause errors in design specifications.
Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation.
Mitigations
Digitize documents and cryptographically sign them to verify authenticity.
Password protect documents and make them read-only for unauthorized users.
Avoid emailing important documents and configurations.
Ensure deleted files are actually deleted.
Maintain backups of the document for recovery and verification.
Separate need-to-know information from system configuration information depending on the user.
References
REF-439
Supply Chain Attack Framework and Attack Patterns
John F. Miller.
http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf REF-715
How To Secure Your Documents
Marie Prokopets.
https://nira.com/how-to-secure-your-documents/
Submission
Name |
Organization |
Date |
Date release |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Name |
Organization |
Date |
Comment |
CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Related_Attack_Patterns, Typical_Likelihood_of_Exploit |
CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Mitigations, References |