README.md

June 26, 2016 ยท View on GitHub

#External Surface External

This document contains top-level taxonomy for targets, attacks and mitigations that have been classified as external.

Choosing an external target in this section means that you have chosen a path that begins with an external target. This path then gets enumerated by following your target to uncover attacks, weaknesses and mitigations that can be added to your ATTACKS.md file. You can also arrive at an attack path through one of the other means: Assets, Attacks, or Mitigations. We'll continue to enumerate and evolve External targets and attack maps in this section.

External Maps

External maps begin with targets. Targets are then enriched with attacks and mitigations to help with implementation.

Common External Targets

#TargetReferencesNotes
E0OrganizationR0Brand, Identity, Reputation, etc.
E1PhysicalR1Locations, Assets, etc.
E2EmployeesR2Full-time Employees, Contractors, Partners, etc.
E3NetworksR3DMZ, Open Wifi, Public, etc.
E4ComputeR4Servers, Proxies, etc.
E5ProductsR5Hard Goods, Services, Software, etc.
E6ApplicationsR6Marketing, Portal, Blog, etc.
E7PartnersR7Business, Technology, Support, etc.
E8CustomersR8B2C, B2B, etc.
E9DataR9Public, Web, Shared, etc.

Common External Attacks

#AttackCommon TargetsPotential MitigationsReferences
A1Unauthorized Physical AccessPhysical Locations(E1)Guards(M1), Badges(M2),
A2TheftPhysical Assets(E1)Encryption(M3)
A3ReconnaissanceAll
A4Social EngineeringEmployees(E2), Partners(E7), Customers(E8)
A5Denial of ServiceNetworks(E3), Systems(E4), Web Applications(E6)
A6

Common Mitigations

#MitigationReferencesNotes
M1Guard Force
M2Employee Badge
M3Encryption
M4

Resources

ISO-27002:8.1