• xThreat Vector: Elevation of Privilege
IDNameBaselinesPriorityThreats
LowModerateHigh
AC-2(6)Dynamic Privilege Management   
  • P1
STRIDE-LM
(7)Role-Based Schemes   
  • P1
STRIDE-LM
(9)Restrictions On Use Of Shared / Group Accounts   
  • P1
STRIDE-LM
(10)Shared / Group Account Credential Termination   
  • P1
STRIDE-LM
(11)Usage Conditions  
  • P1
STRIDE-LM
AC-3Access Enforcement
  • P1
STRIDE-LM
(2)Dual Authorization   
  • P1
STRIDE-LM
(7)Role-Based Access Control   
  • P1
STRIDE-LM
(8)Revocation Of Access Authorizations   
  • P1
STRIDE-LM
(10)Audited Override Of Access Control Mechanisms   
  • P1
STRIDE-LM
AC-6Least Privilege 
  • P1
STRIDE-LM
(1)Authorize Access To Security Functions 
  • P1
STRIDE-LM
(2)Non-Privileged Access For Nonsecurity Functions 
  • P1
STRIDE-LM
(3)Network Access To Privileged Commands  
  • P1
STRIDE-LM
(4)Separate Processing Domains   
  • P1
STRIDE-LM
(5)Privileged Accounts 
  • P1
STRIDE-LM
(6)Privileged Access By Non-Organizational Users   
  • P1
STRIDE-LM
(7)Review Of User Privileges   
  • P1
STRIDE-LM
(8)Privilege Levels For Code Execution   
  • P1
STRIDE-LM
(9)Auditing Use Of Privileged Functions 
  • P1
STRIDE-LM
(10)Prohibit Non-Privileged Users From Executing Privileged Functions 
  • P1
STRIDE-LM
AC-17(4)Privileged Commands / Access 
  • P1
STRIDE-LM
AC-24Access Control Decisions   
  • P0
STRIDE-LM
(1)Transmit Access Authorization Information   
  • P0
STRIDE-LM
(2)No User Or Process Identity   
  • P0
STRIDE-LM
AU-6Audit Review, Analysis, And Reporting
  • P1
STRIDE-LM
(3)Correlate Audit Repositories 
  • P1
STRIDE-LM
(5)Integration / Scanning And Monitoring Capabilities  
  • P1
STRIDE-LM
(6)Correlation With Physical Monitoring  
  • P1
STRIDE-LM
(7)Permitted Actions   
  • P1
STRIDE-LM
(8)Full Text Analysis Of Privileged Commands   
  • P1
STRIDE-LM
(9)Correlation With Information From Nontechnical Sources   
  • P1
STRIDE-LM
CM-3Configuration Change Control 
  • P1
STRIDE-LM
(1)Automated Document / Notification / Prohibition Of Changes  
  • P1
STRIDE-LM
(2)Test / Validate / Document Changes 
  • P1
STRIDE-LM
(3)Automated Change Implementation   
  • P1
STRIDE-LM
(4)Security Representative   
  • P1
STRIDE-LM
(5)Automated Security Response   
  • P1
STRIDE-LM
(6)Cryptography Management   
  • P1
STRIDE-LM
CM-5(4)Dual Authorization   
  • P1
STRIDE-LM
(5)Limit Production / Operational Privileges   
  • P1
STRIDE-LM
CM-7Least Functionality
  • P1
STRIDE-LM
(1)Periodic Review 
  • P1
STRIDE-LM
(2)Prevent Program Execution 
  • P1
STRIDE-LM
(3)Registration Compliance   
  • P1
STRIDE-LM
(4)Unauthorized Software / Blacklisting  
  • P1
STRIDE-LM
(5)Authorized Software / Whitelisting  
  • P1
STRIDE-LM
CM-11(2)Prohibit Installation Without Privileged Status   
  • P1
STRIDE-LM
IA-4(2)Supervisor Authorization   
  • P1
STRIDE-LM
SA-17(7)Structure For Least Privilege   
  • P1
STRIDE-LM