Mapping security measures to threats
88
Copyright © 2010 Open Geospatial Consortium, Inc.
Security Measure\Threat
Data destruction Unauthorized
creation of malicious
subscriptions Unauthorized
modification and corruption of data
Non-repudiation
Yes
Provide a proof that certain operations
related to data deletion actually
happened e.g. secure log, notarization,
signatures....
Yes
Provide a proof that certain operation
related to subscription creation
actually happened e.g. secure log,
notarization, signatures....
Yes
Provide a proof that certain operation
related to data modification and
corruption actually happened e.g.
secure log, notarization,
signatures....
Data confidentiality
No
Encrypted data can be deleted.
No
Encryption is not applicable here.
No
Certain encryption algorithms allow
modification of data without
actually decrypting data.
Data integrity
Yes
The Event Service can provide a proof that
data or part of the data has been deleted e.g.
storage, processing and transmission of
data by applying certain cryptographic
techniques.
NA
Integrity of subscriptions is
ensured by authorization.
Yes
The Event Service can provide a proof
that data or part of the data has been
modified e.g. storage, processing
and transmission of data by applying
certain cryptographic
techniques.
Availability
No No
No
Privacy
No No
No
Copyright © 2010 Open Geospatial Consortium, Inc.
89
Security Measure\Threat
Data destruction Unauthorized
creation of malicious
subscriptions Unauthorized
modification and corruption of data
Communication security
Yes
Ensure data transported between
endpoints is not deleted.
Yes
Ensure data transported between
endpoints is not modified.
Yes
Ensure data transported
between endpoints is not modified.
Table 36: Mapping security measures to threats – part two
Security Measure\Threat
Theft and loss of data
Unauthorized disclosure of data
Service disruptions
affecting SLA
Authentication
Yes
Verify the identity of the entity attempting
to view data.
Yes
Verify the identity of the entity attempting
to receive data.
Yes
Verify the identity of the entity
attempting to perform certain
operations affecting
availability of service.
Authorization
Yes
Ensure that only authorized entities can
access data.
Yes
Ensure that only authorized entities
can receive data.
Yes
Ensure that only authorized entities
can perform certain operations
affecting availability of
service e.g. creating a number
of subscriptions with complex
filter....
90
Copyright © 2010 Open Geospatial Consortium, Inc.
Security Measure\Threat
Theft and loss of data
Unauthorized disclosure of data
Service disruptions
affecting SLA
Non- repudiation
Yes
Provide a proof that certain operation
related to theft and loss of data actually
happened e.g. secure log, notarization,
signatures.
Yes
Provide a proof that certain operation
related to access and disclosure of data
actually happened. e.g. secure log,
notarization, signatures.
Yes
Provide a proof that certain
operation related to service interruption
actually happened.
Data confidentiality
Yes
Every entity in the system can protect
data flow, data processing and data
storage against unauthorized access or
viewing by applying certain cryptographic
techniques e.g. encryption
decryption.
Yes
Every entity in the system can protect
data flow, data processing and data
storage against unauthorized access
or viewing by applying certain
cryptographic techniques e.g.
encryption decryption.
No
Encrypted data does not affect
availability.
Data integrity
No
Signed data can be viewed.
No
Signed data can be stolen and viewed.
No
Signed data can be viewed by
unauthorized third party.
Availability
No No
Yes
Ensure that access to the Event
Service by authorized entities
cannot be denied.
Copyright © 2010 Open Geospatial Consortium, Inc.
91
Security Measure\Threat
Theft and loss of data
Unauthorized disclosure of data
Service disruptions
affecting SLA
Privacy
No Yes
Privacy measure may allow data
publishers and subscribers to
determine what information the
Event Service may collect, store and
disclose related to those entities. For
example, the Event Service might not be
able to collect IP address and
geographic location of subscribers or
statistics about various entities.
No
Communication security
Yes
Ensure data transported between
endpoints is not intercepted.
Yes
Ensure data transported between
endpoints is not diverted.
No
Availability is not affected by using
secure communication.