SV-222655r508029_rule
V-222655
SRG-APP-000516
APSC-DV-003230
CAT II
10
Establish and maintain threat models and review for each application release and when new threats are discovered. Identify potential mitigations to identified threats. Verify mitigations are implemented to threats based on their risk analysis.
This requirement is meant to apply to developers or organizations that are doing application development work.
If the organization operating the application is not doing the development or is not managing the development of the application, the requirement is not applicable.
Review the threat model document and identify the following sections are present:
- Identified threats
- Potential vulnerabilities
- Counter measures taken
- Potential mitigations
- Mitigations selected based on risk analysis
Review the identified threats, vulnerabilities, and countermeasures.
Countermeasures could include implementing application firewalls or IDS/IPS and configuring certain IDS filters.
Review the application documentation.
Verify the architecture and components of the application match with the components in the threat model document.
Verify identified threats and vulnerabilities are addressed or mitigated and the ISSO and ISSM have reviewed and approved the document.
If the described threat model documentation does not exist, this is a finding.
V-222655
False
APSC-DV-003230
This requirement is meant to apply to developers or organizations that are doing application development work.
If the organization operating the application is not doing the development or is not managing the development of the application, the requirement is not applicable.
Review the threat model document and identify the following sections are present:
- Identified threats
- Potential vulnerabilities
- Counter measures taken
- Potential mitigations
- Mitigations selected based on risk analysis
Review the identified threats, vulnerabilities, and countermeasures.
Countermeasures could include implementing application firewalls or IDS/IPS and configuring certain IDS filters.
Review the application documentation.
Verify the architecture and components of the application match with the components in the threat model document.
Verify identified threats and vulnerabilities are addressed or mitigated and the ISSO and ISSM have reviewed and approved the document.
If the described threat model documentation does not exist, this is a finding.
M
4093