Mervinskiy 533

Page 115

NIST SP 800-66r2 ipd INITIAL PUBLIC DRAFT

IMPLEMENTING THE HIPAA SECURITY RULE: A CYBERSECURITY RESOURCE GUIDE

Threat Events (Characterized by Tactics, Techniques, and Procedures [TTPs])

Description

Coordinate a campaign that spreads attacks across organizational systems from an existing presence.

Adversary uses an existing presence within organizational systems to extend the adversary’s span of control to other organizational systems, including organizational infrastructure. Adversary is, thus, in a position to further undermine the organization’s ability to carry out mission and business functions.

Coordinate a campaign of continuous, adaptive, and changing cyber attacks based on detailed surveillance.

Adversary attacks continually change in response to surveillance and organizational security measures.

Coordinate cyber attacks using external (outsider), internal (insider), and supply chain (supplier) attack vectors.

Adversary employs continuous, coordinated attacks, potentially using all three attack vectors for the purpose of impeding organizational operations.

1431 1432

Table 10 - Representative Examples – Non-Adversarial Threat Events

Threat Event

Description

Spill sensitive information

An authorized user erroneously contaminates a device, information system, or network by placing on it or sending to it information of a classification or sensitivity that it has not been authorized to handle. The information is exposed to access by unauthorized individuals, and as a result, the device, system, or network is unavailable while the spill is investigated and mitigated.

Mishandling of critical and/or sensitive information by authorized users

An authorized privileged user inadvertently exposes critical or sensitive information.

Incorrect privilege settings

An authorized privileged user or administrator erroneously assigns a user excessive privileges or sets privilege requirements on a resource too low.

Communications contention

Communications performance is degraded due to contention.

Unreadable display

The display is unreadable due to aging equipment.

Earthquake at primary facility

An earthquake of an organization-defined magnitude at the primary facility makes that facility inoperable.

Fire at primary facility

A fire (not due to adversarial activity) at the primary facility makes that facility inoperable.

Fire at backup facility

A fire (not due to adversarial activity) at a backup facility makes that facility inoperable or destroys backups of software, configurations, data, and/or logs.

102


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.