Consider modifying technical impact to include aspects of (or rename to) Security Posture Change #226
Replies: 6 comments
-
Arguments against doing this are that #35 and #5 might be everything that is necessary to support #14 , and supporting #14 would be the main point of this change. |
Beta Was this translation helpful? Give feedback.
-
I don't really understand what the suggestion here even is. Is it that fixing the vul would require a security posture change? Is it that the status quo security posture is such a big hole that an adversary gains little by exploiting the vul? Is it that the response to the vul would be a security posture change (as opposed to a mitigation or fix)? Whose security posture -- a deployer? a supplier/vendor? both? If we can't come up with something specific to do for this one beyond what #35 and #5 are already doing, this should be closed as either a duplicate or wontfix. |
Beta Was this translation helpful? Give feedback.
-
It is as recommended by https://dale-peterson.com/wp-content/uploads/2020/10/ICS-Patch-0_1.pdf.
That work has technical impact also. My observation is that security posture change takes technical impact and decides the relative technical impact based on the maintenance state of the device. Personally, I think this is part of #35, as you mentioned. But I don't think it's exactly a duplicate of #35. |
Beta Was this translation helpful? Give feedback.
-
In #35 :
If this is the case, then I think "security posture change" is a viable suggestion, and we should make a decision about it. It is possible that the risk of not acting should take into account prior inaction. I am still very nervous about enabling a negative feedback loop where failure to act incentivizes future failure to act. |
Beta Was this translation helpful? Give feedback.
-
I took this off the SSVCv2 project. Although the Dale Peterson piece makes a sensible argument for this change, I think we can safely de-prioritize this issue as something to consider later. |
Beta Was this translation helpful? Give feedback.
-
Moved this from an issue to a discussion as there's still no clear action item after 2.5 years. |
Beta Was this translation helpful? Give feedback.
-
Goal is to address the insecure by design issue in areas like ICS. If I can upload new firmware without authentication or code signing verification, do I really care about any patches? There is a huge percentage of assets in ICS where access = complete compromise regardless of vulns. Possible decision values are trivial / minor / major or trivial / partial / total.
(Note: I pasted this from an internal list of suggested changes. Although I'm the opener of this issue, it's not my idea.)
Beta Was this translation helpful? Give feedback.
All reactions