Skip to content

Commit 165cf07

Browse files
Copilotpethers
andcommitted
Address review comments: clarify classification note, fix Repudiation control mapping, correct Kill Chain average label
Co-authored-by: pethers <1726836+pethers@users.noreply.github.com>
1 parent 2325431 commit 165cf07

2 files changed

Lines changed: 4 additions & 2 deletions

File tree

FUTURE_THREAT_MODEL.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ Aligned with [Hack23 AB Threat Modeling Policy](https://github.com/Hack23/ISMS-P
5454
| **🔒 Integrity** | High | **Critical** | Real-time voting data + expanded AI content increases integrity requirements |
5555
| **⚡ Availability** | High | **Critical** | Real-time dashboards require higher availability during parliamentary sessions |
5656

57+
> **Note:** This table describes the **future Riksdagsmonitor system security classification**. The CIA classification badges in the Document Control section represent the **classification of this document itself**, not the future system, and may therefore differ from the future system's target classification.
58+
5759
---
5860

5961
## 🏗️ Future Architecture Threat Analysis

THREAT_MODEL.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -664,7 +664,7 @@ Per [Hack23 Threat Modeling Policy § 4.1.4](https://github.com/Hack23/ISMS-PUBL
664664
- **Strongest disruption:** Phase 3 (Delivery) at 95% and Phase 7 (Actions on Objectives) at 97% — multi-layer preventive and corrective controls
665665
- **Weakest disruption:** Phase 2 (Weaponization) at 30% — attacker-side activity, mitigated by threat intelligence
666666
- **Architecture advantage:** Static website + no server-side code eliminates Phases 5-6 attack surface almost entirely
667-
- **Overall Kill Chain Disruption Score:** **76%** (weighted average across all phases)
667+
- **Overall Kill Chain Disruption Score:** **76%** (simple average across all phases)
668668

669669
---
670670

@@ -1508,7 +1508,7 @@ Consolidated mapping of each STRIDE category to primary, secondary, and monitori
15081508
|-----------------|---------------|-----------------|-------------------|------------|
15091509
| **🎭 Spoofing** | Account compromise, commit forgery | GitHub MFA enforcement (PREV-001), OIDC auth (PREV-006) | GPG commit signing (PREV-003), CODEOWNERS (PREV-004) | GitHub audit logs (DET-001), failed login monitoring |
15101510
| **🔧 Tampering** | Malicious commits, CDN supply chain, data manipulation | Branch protection (PREV-002), SRI hashes (PREV-012) | CodeQL (PREV-014), Dependabot (PREV-013), SHA-pinned Actions (PREV-015) | CloudTrail (DET-002), SRI validation (DET-006), CSP reports (DET-005) |
1511-
| **❌ Repudiation** | Commit authorship denial, action denial | GPG signing (PREV-003), immutable Git history | GitHub audit logs, structured logging | Audit trail analysis, commit verification |
1511+
| **❌ Repudiation** | Commit authorship denial, action denial | GPG signing (PREV-003), immutable Git history | N/A | GitHub audit logs (DET-001), structured logging, Audit trail analysis, commit verification |
15121512
| **📤 Information Disclosure** | Secret leaks, AI hallucination, S3 exposure | Secret scanning (PREV-005), IAM least privilege (PREV-007) | S3 bucket policy (PREV-008), mandatory PR review (PREV-028) | S3 access logs (DET-003), PR rejection rate (DET-012) |
15131513
| **⚡ Denial of Service** | DDoS, CloudFront outage, pipeline exhaustion | AWS Shield Standard (PREV-021), multi-region replication (PREV-020) | Route 53 health checks (PREV-022), S3 versioning (PREV-019) | CloudWatch alarms (DET-004), Shield metrics (DET-010) |
15141514
| **⬆️ Elevation of Privilege** | Workflow escalation, IAM policy bypass | CODEOWNERS (PREV-004), workflow approval (PREV-016) | IAM least privilege (PREV-007), OIDC scoped tokens (PREV-006) | Workflow logs (DET-009), GitHub audit logs (DET-001) |

0 commit comments

Comments
 (0)