• xThreat Vector: Tampering
IDNameThreats
AIS-01Application SecuritySTRIDE-LM
AIS-03Data IntegritySTRIDE-LM
AIS-04Data Security / IntegritySTRIDE-LM
CCC-04Unauthorized Software InstallationsSTRIDE-LM
CCC-05Production ChangesSTRIDE-LM
DSI-03Ecommerce TransactionsSTRIDE-LM
DCS-07Secure Area AuthorizationSTRIDE-LM
DCS-08Unauthorized Persons EntrySTRIDE-LM
DCS-09User AccessSTRIDE-LM
EKM-02Key GenerationSTRIDE-LM
EKM-03Sensitive Data ProtectionSTRIDE-LM
IAM-01Audit Tools AccessSTRIDE-LM
IAM-06Source Code Access RestrictionSTRIDE-LM
IAM-07Third Party AccessSTRIDE-LM
IAM-13Utility Programs AccessSTRIDE-LM
IVS-01Audit Logging / Intrusion DetectionSTRIDE-LM
IVS-02Change DetectionSTRIDE-LM
IVS-07OS Hardening and Base ControlsSTRIDE-LM
IVS-08Production / Non-Production EnvironmentsSTRIDE-LM
IVS-09SegmentationSTRIDE-LM
IVS-10VM Security - Data ProtectionSTRIDE-LM
IVS-11Hypervisor HardeningSTRIDE-LM
MOS-02Application StoresSTRIDE-LM
MOS-03Approved ApplicationsSTRIDE-LM
MOS-04Approved Software for BYODSTRIDE-LM
MOS-11EncryptionSTRIDE-LM
MOS-12Jailbreaking and RootingSTRIDE-LM
MOS-14Lockout ScreenSTRIDE-LM
MOS-16PasswordsSTRIDE-LM
STA-01Data Quality and IntegritySTRIDE-LM
TVM-01Anti-Virus / Malicious SoftwareSTRIDE-LM
TVM-03Mobile CodeSTRIDE-LM