Insider Attacks
Attacks as performed by adversaries within the organization’s perimeter, often who have elevated access and privileges to resources.
Affected entity: DFS Provider
Risk: Data exposure and modification
Vulnerability: Insufficient internal controls on critical operations (SD: access control)
Risk: Lack of validation of data inputs (SD: data integrity)
Control 7.2: DFS providers should ensure sufficient separation of duties for maker-approver; for example, an administrator may not have access rights to both create and activate a DFS account
Vulnerability: Inadequate privilege management & control (SD: access control)
Risk: Data inaccuracy and inconsistency
Vulnerability: Use of test data & configurations in a production environment (SD: data integrity)
Vulnerability: Insufficient logging, inability to protect logs from alteration. (SD: non-repudiation)
Vulnerability: Inaccurate and unsynchronised clocks (SD: data integrity)
Last updated