Conditions préalables
Advanced knowledge of hardware capabilities of a manufacturer's product.
Access to the manufacturer's documentation.
Compétences requises
Ability to read, interpret, and subsequently alter manufacturer's documentation to cause errors in design specifications.
Ability to stealthly gain access via remote compromise or physical access to the manufacturer's documentation.
Atténuations
Digitize documents and cryptographically sign them to verify authenticity.
Password protect documents and make them read-only for unauthorized users.
Avoid emailing important documents and configurations.
Ensure deleted files are actually deleted.
Maintain backups of the document for recovery and verification.
Separate need-to-know information from system configuration information depending on the user.
Références
REF-439
Supply Chain Attack Framework and Attack Patterns
John F. Miller.
http://www.mitre.org/sites/default/files/publications/supply-chain-attack-framework-14-0228.pdf REF-715
How To Secure Your Documents
Marie Prokopets.
https://nira.com/how-to-secure-your-documents/
Soumission
Nom |
Organisation |
Date |
Date de publication |
CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
Nom |
Organisation |
Date |
Commentaire |
CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Related_Attack_Patterns, Typical_Likelihood_of_Exploit |
CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Mitigations, References |