Reporte de Threat Modeling Proyecto
Reporte de Threat Modeling Proyecto
Reporte de Threat Modeling Proyecto
Not Started 42
Not Applicable 0
Needs investigation 0
Mitigation Implemented 0
Total 42
Total Migrated 0
Not Started 42
Not Applicable 0
Needs investigation 0
Mitigation Implemented 0
Total 42
Total Migrated 0
1. Spoofing of Destination Data Store File System [State: Not Started]
[Priority: High]
Category: Spoofing
Description: File System may be spoofed by an attacker and this may lead
to data being written to the attacker's target instead of File
System. Consider using a standard authentication
mechanism to identify the destination data store.
Short
Description:
Description: Does Web Server APP1 or File System take explicit steps to
control resource consumption? Resource consumption
attacks can be hard to deal with, and there are times that it
makes sense to let the OS do the job. Be careful that your
resource requests don't deadlock, and that they do timeout.
Short
Description:
3. Spoofing the Web Server APP1 Process [State: Not Started] [Priority:
High]
Category: Spoofing
Description: Web Server APP1 may be spoofed by an attacker and this
may lead to unauthorized access to File System. Consider
using a standard authentication mechanism to identify the
source process.
Short
Description:
4. The File System Data Store Could Be Corrupted [State: Not Started]
[Priority: High]
Category: Tampering
5. Data Store Denies File System Potentially Writing Data [State: Not
Started] [Priority: High]
Category: Repudiation
Description: File System claims that it did not write data received from an
entity on the other side of the trust boundary. Consider
using logging or auditing to record the source, time, and
summary of the received data.
12. Elevation by Changing the Execution Flow in Web Server APP1 [State:
Not Started] [Priority: High]
Category: Elevation Of Privilege
Description: An attacker may pass data into Web Server APP1 in order to
change the flow of program execution within Web Server
APP1 to the attacker's choosing.
14. Data Flow HTTP Is Potentially Interrupted [State: Not Started] [Priority:
High]
Category: Denial Of Service
15. Potential Process Crash or Stop for Web Server APP1 [State: Not
Started] [Priority: High]
Category: Denial Of Service
Description: Web Server APP1 crashes, halts, stops or runs slowly; in all
cases violating an availability metric.
17. Potential Data Repudiation by Web Server APP1 [State: Not Started]
[Priority: High]
Category: Repudiation
Description: Web Server APP1 claims that it did not receive data from a
source outside the trust boundary. Consider using logging or
auditing to record the source, time, and summary of the
received data.
18. Potential Lack of Input Validation for Web Server APP1 [State: Not
Started] [Priority: High]
Category: Tampering
19. Spoofing the Web Server APP1 Process [State: Not Started] [Priority:
High]
Category: Spoofing
Description: Browser claims that it did not receive data from a process on
the other side of the trust boundary. Consider using logging
or auditing to record the source, time, and summary of the
received data.
Description: SQL Database DB1 may be spoofed by an attacker and this may lead to data
being written to the attacker's target instead of SQL Database DB1. Consider
using a standard authentication mechanism to identify the destination data
store.
Short Spoofing is when a process or entity is something other than its claimed
Description: identity. Examples include substituting a process, a file, website or a network
address.
24. Potential SQL Injection Vulnerability for SQL Database DB1 [State: Not Started]
[Priority: High]
Category: Tampering
Description: SQL injection is an attack in which malicious code is inserted into strings that
are later passed to an instance of SQL Server for parsing and execution. Any
procedure that constructs SQL statements should be reviewed for injection
vulnerabilities because SQL Server will execute all syntactically valid queries
that it receives. Even parameterized data can be manipulated by a skilled and
determined attacker.
Short Tampering is the act of altering the bits. Tampering with a process involves
Description: changing bits in the running process. Similarly, Tampering with a data flow
involves changing bits on the wire or between two running processes.
25. Potential Excessive Resource Consumption for Web Server APP1 or SQL Database DB1
[State: Not Started] [Priority: High]
Category: Denial Of Service
Description: Does Web Server APP1 or SQL Database DB1 take explicit steps to control
resource consumption? Resource consumption attacks can be hard to deal
with, and there are times that it makes sense to let the OS do the job. Be
careful that your resource requests don't deadlock, and that they do timeout.
Short Denial of Service happens when the process or a datastore is not able to service
Description: incoming requests or perform up to spec.
26. Spoofing the Web Server APP1 Process [State: Not Started] [Priority: High]
Category: Spoofing
Description: Web Server APP1 may be spoofed by an attacker and this may lead to
unauthorized access to SQL Database DB1. Consider using a standard
authentication mechanism to identify the source process.
Short Spoofing is when a process or entity is something other than its claimed
Description: identity. Examples include substituting a process, a file, website or a network
address.
27. The SQL Database DB1 Data Store Could Be Corrupted [State: Not Started] [Priority:
High]
Category: Tampering
Description: Data flowing across TCP Flow may be tampered with by an attacker. This may
lead to corruption of SQL Database DB1. Ensure the integrity of the data flow
to the data store.
Short Tampering is the act of altering the bits. Tampering with a process involves
Description: changing bits in the running process. Similarly, Tampering with a data flow
involves changing bits on the wire or between two running processes.
28. Data Store Denies SQL Database DB1 Potentially Writing Data [State: Not Started]
[Priority: High]
Category: Repudiation
Description: SQL Database DB1 claims that it did not write data received from an entity on
the other side of the trust boundary. Consider using logging or auditing to
record the source, time, and summary of the received data.
30. Data Flow TCP Flow Is Potentially Interrupted [State: Not Started] [Priority: High]
Category: Denial Of Service
Description: An external agent interrupts data flowing across a trust boundary in either
direction.
Short Denial of Service happens when the process or a datastore is not able to
Description: service incoming requests or perform up to spec.
Description: An external agent prevents access to a data store on the other side of the
trust boundary.
Short Denial of Service happens when the process or a datastore is not able to
Description: service incoming requests or perform up to spec.
32. Spoofing of Source Data Store SQL Database DB1 [State: Not Started] [Priority: High]
Category: Spoofing
Description: SQL Database DB1 may be spoofed by an attacker and this may lead to
incorrect data delivered to Web Server APP1. Consider using a standard
authentication mechanism to identify the source data store.
Justification: <no mitigation provided>
Short Spoofing is when a process or entity is something other than its claimed
Description: identity. Examples include substituting a process, a file, website or a network
address.
Description: The web server 'Web Server APP1' could be a subject to a cross-site scripting
attack because it does not sanitize untrusted input.
Short Tampering is the act of altering the bits. Tampering with a process involves
Description: changing bits in the running process. Similarly, Tampering with a data flow
involves changing bits on the wire or between two running processes.
34. Persistent Cross Site Scripting [State: Not Started] [Priority: High]
Category: Tampering
Description: The web server 'Web Server APP1' could be a subject to a persistent cross-site
scripting attack because it does not sanitize data store 'SQL Database DB1'
inputs and output.
Short Tampering is the act of altering the bits. Tampering with a process involves
Description: changing bits in the running process. Similarly, Tampering with a data flow
involves changing bits on the wire or between two running processes.
35. Weak Access Control for a Resource [State: Not Started] [Priority: High]
Category: Information Disclosure
Description: Improper data protection of SQL Database DB1 can allow an attacker to read
information not intended for disclosure. Review authorization settings.
36. Spoofing the Web Server APP1 Process [State: Not Started] [Priority: High]
Category: Spoofing
Description: Web Server APP1 may be spoofed by an attacker and this may lead to
information disclosure by SQL Database DB1. Consider using a standard
authentication mechanism to identify the destination process.
Short Spoofing is when a process or entity is something other than its claimed
Description: identity. Examples include substituting a process, a file, website or a network
address.
37. Potential Data Repudiation by Web Server APP1 [State: Not Started] [Priority: High]
Category: Repudiation
Description: Web Server APP1 claims that it did not receive data from a source outside the
trust boundary. Consider using logging or auditing to record the source, time,
and summary of the received data.
38. Potential Process Crash or Stop for Web Server APP1 [State: Not Started] [Priority:
High]
Category: Denial Of Service
Description: Web Server APP1 crashes, halts, stops or runs slowly; in all cases violating an
availability metric.
Short Denial of Service happens when the process or a datastore is not able to
Description: service incoming requests or perform up to spec.
39. Data Flow TCP Flow Is Potentially Interrupted [State: Not Started] [Priority: High]
Category: Denial Of Service
Description: An external agent interrupts data flowing across a trust boundary in either
direction.
Short Denial of Service happens when the process or a datastore is not able to
Description: service incoming requests or perform up to spec.
Description: An external agent prevents access to a data store on the other side of the
trust boundary.
Short Denial of Service happens when the process or a datastore is not able to
Description: service incoming requests or perform up to spec.
41. Web Server APP1 May be Subject to Elevation of Privilege Using Remote Code
Execution [State: Not Started] [Priority: High]
Category: Elevation Of Privilege
Description: SQL Database DB1 may be able to remotely execute code for Web Server
APP1.
42. Elevation by Changing the Execution Flow in Web Server APP1 [State: Not Started]
[Priority: High]
Category: Elevation Of Privilege
Description: An attacker may pass data into Web Server APP1 in order to change the flow
of program execution within Web Server APP1 to the attacker's choosing.