Skip to content

The disabled defence on the IDPS asset is not logically coherent #67

Open
@andrewbwm

Description

@andrewbwm

The following issue was discovered when working on #64, #65, and #47.

The IDPS asset uses two important defences:

  • effectiveness, which determines how well the IDPS performs its task of restricting malicious activity from occurring on the associated Applications.
  • disabled, which it inherits from the Application asset which it expands, that is used to represent whether or not an Application is present. The lack of Application in the model is seen as reducing the ability of an attacker to launch attacks as a particular attack vector is not available to them.

However, in the case of an IDPS its absence should actually make it more likely for the attacker to succeed. Given the current MAL framework that lacks a not operator we cannot have a defence lead to enabling an attack step. As such, the current behaviour of the disabled defence on IDPS assets is illogical and should generally be avoided.

If possible the disabled defence should be hidden in visualisation tools, this is why it was tagged with @Override @hidden in b676fe7.

No functional workaround was discovered in the discussions around it and the decision was made to defer a proper solution to a later time.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workinghelp wantedExtra attention is neededquestionFurther information is requested

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions