5. of Repudiation
An attacker can alter log messages on a network because they lack strong integrity controls.
Threat |
|
You are not verifying the source of log information, your network traffic isn’t encrypted, and you aren’t signing log messages, so an attacker can intercept and modify them, and you will never know. |
|
CAPEC |
CAPEC-94 - Adversary in the Middle (AiTM) CAPEC-216 - Communication Channel Manipulation CAPEC-217 - Exploiting Incorrectly Configured SSL/TLS |
ASVS |
1.9.1 - Ensure you’re using TLS everywhere. 9.1.1 - Ensure the TLS version can’t be downgraded. 9.1.3 - Ensure up-to-date versions of the TLS protocol are used. 9.2.1 - Ensure that TLS handshakes are performing certificate verification. 9.2... |