General Assumptions

IdentifierAcc_Ovrwrit_SysData
Descriptive NameCorruption of system data
DescriptionThe TOE relies on an IT system software environment, and TOE users cannot unintentionally overwrite any system programs, logs, or data.
Selection GuidanceThis assumption is appropriate if the TOE is a trusted application, e.g., a trusted database system.
Editorial
IdentifierAcc_to_Comms
Descriptive NamePhysical protection of communications
DescriptionPhysical protection of the communications to the system is adequate to guard against unauthorized access or malicious modification by users.
Selection Guidance
Editorial
IdentifierAccess_to_Passwords
Descriptive NameUser access to passwords
DescriptionTOE password files are protected so that users can neither access nor modify them outside of authorized TOE functions.
Selection GuidanceDepricated (See Toolbox User Manual).  Consider replacing this with suitable threats, e.g., attackers might steal the password file as part of a masquerade attack, or might corrupt the password file as part of a denial-of-service attack.
EditorialThe idea here is to provide a caution in the User's manual to the effect that some Assumptions, though legal, are considered highly undesirable.
IdentifierAdmin_Cor_Usr_Data
Descriptive NameCorruption of data in transit
DescriptionSystem Administrators have the ability to corrupt data that is in transit to/from the system.
Selection GuidanceThis is a TOE Assumption: consider placing it in the TOE Description section rather than the Environment section.
EditorialWe didn't really understand this one. 
Examples — TOE is depending on outside sources (e.g., firewalls) that are corruptible by administrators.  Real problem:  TOE is relying on corruptible outside systems for data.  Recast as a threa
IdentifierAdmin_Docs
Descriptive NameDocumentation for administrators
DescriptionSystem Administrators follow the policies and procedures defined in the TOE documentation for secure administration of the TOE.
Selection GuidanceConsider combining this with similar Assumptions such as Competent_Admin, No_Abuse_by_Admin, and Well_Behaved_Admin.  Consider adding CC Requirement AGD_ADM.
EditorialGood example of an assumption. Doesn't work as a policy by itself, as the policy might not be followed.
IdentifierAdmin_Errors
Descriptive NamePotential for administrator errors
DescriptionSystem administrators are fallible and occasionally make errors that compromise security.
Selection GuidanceClarify either by adding Threats such as Admin_Err_Commit and Admin_Err_Omit, or by explicitly stating that such threats are considered beyond the scope of the PP.  Consider combining with the Negligent_Admin and Poor_Trained_Admin Assumptions.
EditorialThe intent of this Assumption is unclear as stated.  The Attitude, Motive, and Sophistication Attributes need to be combined.  These distinctions may be important for dealing with the threat agents themselves, but are less useful for distinguishing the attacks that they commit, as can be seen from which combinations of attributes occur frequently in the database Attribute table.
IdentifierAdmin_Virus_Check
Descriptive NameVirus checking procedures
DescriptionSystem Administrators follow policies and procedures to prevent TOE contamination by software viruses.
Selection GuidanceConsider casting this as an Organizational Security Policy. Doing so will more clearly indicate the consequences for TOE Description and will more clearly distinguish this from competing policies such as privilege based on physical access to the TOE.  Consider Threats in the Admin Threat Category.
EditorialClassic Assumption.
IdentifierAuth_Sys_Admin
Descriptive NameAuthenticated administrators
DescriptionSystem Administrators are authenticated and held accountable for their actions.
Selection GuidanceConsider casting this as a general Policy statement rather than as an Assumption.
Note consequences for TOE Description.
Editorial
IdentifierCompetent_Admin
Descriptive NameCompetent system administrators
DescriptionSystem administrators are competent to manage the TOE and the security of the information it contains.
Selection GuidanceConsider combining this with similar Assumptions such as Admin_Docs, No_Abuse_by_Admin, and Well_Behaved_Admin.
Editorial
IdentifierCoop_User
Descriptive NameCooperative users
DescriptionUsers cooperate with those responsible for managing the TOE to maintain TOE security.
Selection GuidanceNote similarity to the slightly stronger Trusted_User Assumption.
EditorialDoesn't work as a policy, since users might not follow the policy.
IdentifierDispose_User_Data
Descriptive NameDisposal of user data
DescriptionSystem Administrators properly dispose of user data after access has been removed (e.g., due to job termination, change in responsibility).
Selection GuidanceNote that this assumption constrains both the TOE and its administrators.  Consider adding a corresponding assumption to the TOE description.  Consider treating as a Policy rather than an Assumption.
EditorialMiscast, as the user may have access to data that he/she didn't own.Policy: when users leave, administrators terminate their accounts. Pair with the threat of an ex-user stealing or corrupting data.
IdentifierEavesdrop_by_Out
Descriptive NameEavesdropping by outsiders
DescriptionData sent across external communications lines are protected to ensure that they are unintelligible to outsiders using data capturing techniques (e.g., sniffers).
Selection GuidanceConsider recasting as a threat against communications lines. As stated, this appears to be a TOE Description Statement: consider placing it in the TOE Description section rather than the Environment section.
EditorialLots of ambiguities here. Distributed TOE? Incoming: encrypted?  Outgoing: Protected in the environment?
IdentifierHostile_Sys_Admin
Descriptive NameHostile system administrators
DescriptionSystem Administrators cannot be trusted and are considered to be hostile.
Selection GuidanceConsider treating as a General Threat rather than as an Assumption.
EditorialConsider treating as a General Threat rather than as an Assumption.  Consider Threats in the Admin Threat Category.
IdentifierHostile_User
Descriptive NameHostile users
DescriptionUsers cannot be trusted and are considered to be hostile.
Selection GuidanceConsider treating as a General Threat rather than as an Assumption. Consider threats in the User Threat Category.
EditorialDifficult to fully counter.  Better as a policy?  Why not as an Assumption: the statement isn't too helpful because we don't know if the system is supposed to counter the ill-effects of misbehaving users.  Secondary question: if they're hostile, do you care?
IdentifierNegligent_Admin
Descriptive NameNegligent system administrators
DescriptionSystem Administrators managing security-relevant data may be negligent and therefore cannot be relied upon to perform their job in a way that guarantees the security of the system.
Selection GuidanceClarify either by adding Threats such as Admin_Err_Commit and Admin_Err_Omit, or by explicitly stating that such threats are considered beyond the scope of the PP.  Consider combining with the Admin_Errors and Poor_Trained_Admin Assumptions.
EditorialThe intent of this Assumption is unclear as stated.  The Attitude, Motive, and Sophistication Attributes need to be combined.  These distinctions may be important for dealing with the threat agents themselves, but are less useful for distinguishing the attacks that they commit, as can be seen from which combinations of attributes occur frequently in the database Attribute table.
IdentifierNo_Abuse_By_Admin
Descriptive NameNo abusive system administrators
DescriptionSystem Administrators are trusted not to abuse their authority.
Selection GuidanceConsider combining this with similar Assumptions such as Admin_Docs, Competent_Admin, and Well_Behaved_Admin.
Editorial
IdentifierNo_Bypass_Security
Descriptive NameTOE-Environment separation
DescriptionThe TOE environment is divided into trusted and untrusted systems.  All communication between trusted and untrusted systems is mediated by the TOE.  Thus, users cannot bypass the security mechanisms of the TOE.
Selection GuidanceThis assumption on the IT Environment is useful if the TOE is responsible for protecting assets outside of the TOE, as when the TOE is a firewall.
EditorialThis originally came from a firewalls PP.  The wording needs to make it clear that it this is not intended as a summary of FDP_SEP.
IdentifierOutsider_Hi
Descriptive NameExpert threat agents
DescriptionThe TOE is subject to deliberate attack by experts with advanced knowledge of security principles and concepts employed by the TOE.
Selection GuidanceConsider treating as a General Threat rather than as an Assumption.  Deliberate attack is possible from both users and outsiders, more likely the latter.
Editorial
IdentifierOutsider_Low
Descriptive NameLaymen threat agents
DescriptionThe TOE is subject to deliberate attack by laymen with no particular expertise.
Selection GuidanceConsider treating as a General Threat rather than as an Assumption.  Deliberate attack is possible from both users and outsiders, more likely the latter.
Editorial
IdentifierOutsider_Med
Descriptive NameProficient threat agents
DescriptionThe TOE is subject to deliberate attack by threat agents proficient in the security behavior of the system.
Selection GuidanceConsider treating as a General Threat rather than as an Assumption.  Deliberate attack is possible from both users and outsiders, more likely the latter.
Editorial
IdentifierPassword_Management
Descriptive NamePassword management promoting user compliance
DescriptionSystem Administrators follow password management policies and procedures to ensure users comply with password policies.
Selection GuidanceCombine with a Password Policy and a General Threat covering user failure to follow the policy.
EditorialThis is an Assumption that relies on a threat and a policy.
IdentifierPeer
Descriptive NameConnectivity to other systems
DescriptionAny other systems with which the TOE communicates are assumed to be under the same management control and operate under the same security policy constraints.
Selection GuidanceThis Assumption is useful and enforceable within a local organization that is under centralized control, but not between organizations.  Recast this as a Policy, if direct TOE support is envisioned (e.g., TOE checks input for obvious policy discrepancies).  In any case, this Assumption has consequences for TOE Administrative documentation.
Editorial
IdentifierPhys_Acs_to_Out
Descriptive NamePhysical access
DescriptionThe TOE is located within controlled access facilities that prevent unauthorized physical access by outsiders.
Selection GuidanceThis may be treated either as an Assumption or as a Policy allocated to the non-IT environment.
Editorial
IdentifierPoor_Trained_Admin
Descriptive NameUntrained system administrators
DescriptionSystems administrators do not have adequate security training.
Selection GuidanceClarify either by adding Threats such as Admin_Err_Commit and Admin_Err_Omit, or by explicitly stating that such threats are considered beyond the scope of the PP.  Consider combining with the Admin_Errors and Negligent_Admin Assumptions.
EditorialThe intent of this Assumption is unclear as stated.  The Attitude, Motive, and Sophistication Attributes need to be combined.  These distinctions may be important for dealing with the threat agents themselves, but are less useful for distinguishing the attacks that they commit, as can be seen from which combinations of attributes occur frequently in the database Attribute table.
IdentifierProt_Against_Nature
Descriptive NameNatural disaster protection
DescriptionThe system is adequately protected against natural disasters such as fires and floods (e.g., sprinkler systems, alarms, etc.).
Selection GuidanceThis is relevant in systems where availability is a concern.  Tailor to clarify whether this is an assumption about the TOE or about the environment or both.
Editorial
IdentifierProt_Agnst_Pwr_Fail
Descriptive NamePower failure protection
DescriptionThe system has adequate backup power sources to ensure that sudden losses of power do not affect availability of service or loss of data.
Selection GuidanceThis is relevant in systems where availability is a concern.  This may be treated either as an Assumption or as a Policy supported by the non-IT environment.
Editorial
IdentifierProt_of_Comm
Descriptive NameCommunications protection
DescriptionThe system is adequately protected against loss of communications.
Selection GuidanceThis is relevant in systems where availability is a concern.  Tailor to clarify whether this is an assumption about the TOE or about the environment or both.
Editorial
IdentifierProtect_From_Out
Descriptive NameTOE protection from outsiders
DescriptionThe TOE hardware and software involved in security policy enforcement will be physically protected from unauthorized modification by potentially hostile outsiders.
Selection GuidanceThis is relevant when the TSF is physically separate form the non-TSF portion of the TOE.  Note that the Phys_Acs_to_Out Assumption is simpler and preferable in most cases. This assertion may be treated either as an Assumption or as a Policy supported by the Non-IT environment.
Editorial
IdentifierRemote_Access
Descriptive NameRemote users
DescriptionUsers are permitted to access the TOE from remote locations.
Selection GuidanceConsider treating as a Policy with consequences for both TOE and environment.  Consider adding a note to the TOE description regarding support for remote access.  Consider threats involving remote access by hackers.
EditorialThe relevant TOE-Description statement might be: The TOE interacts with its IT environment in such a way as to allow remote use.
IdentifierRemote_Admin
Descriptive NameRemote adminstration
DescriptionSystem Administrators have remote access and are able to view and modify security-relevant data.
Selection GuidanceConsider treating as a Policy with consequences for both TOE and environment.  Consider adding note to TOE description regarding support for remote access.  Consider threats involving remote access by hackers.
Editorial
IdentifierReview_Audit_Log
Descriptive NameAdministrators review audit logs
DescriptionSystem Administrators review audit logs regularly.
Selection GuidanceConsider treating this as an Objective that supports higher-level concerns such as the need to detect various kinds of threats.  Alternatively, consider treating this as the combination of an audit Policy (with consequences for administrative documentation) and an Assumption (like the Admin_Docs Assumption).
EditorialSome have claimed that Auditing is not an inherent security concern, but merely a derived objective that stems from other more direct matters.
IdentifierTrusted_User
Descriptive NameTrusted users
DescriptionAuthorized users are trusted not to compromise security.
Selection GuidanceNote similarity to the slightly weaker Coop_User Assumption.
EditorialDoesn't work as a policy, since users might not follow the policy.
IdentifierUser_Access
Descriptive NameUser access
DescriptionUsers possess the necessary privileges to access the security-relevant information managed by the TOE.
Selection GuidanceThis assumption has consequences for the TOE Description -- the TOE does not protect management information from the users.
EditorialOn the surface, this seems to be saying that the TOE doesn't do a very good job of protecting security-critical data.
IdentifierUser_Mistakes
Descriptive NameMistakes by users
DescriptionUsers are fallible and occasionally make errors that compromise security.
Selection GuidanceClarify this Assumption, either by adding Threats such as User_Err_Conf, User_Err_Inaccess, User_Err_Integrity, and User_Err_Slf_Protect, or else by explicitly stating that such threats are considered beyond the scope of the PP.
EditorialNote similarity to Admin_Errors.  Might want to have a question on the extent to which users do their own administration:  Are users permitted (or relied on) to administer their own systems, or is there a true separate administrative role that accomplishes administrative activities (e.g., having an out-of-date browser is an administrative error).
IdentifierUser_Virus_Scan
Descriptive NameSoftware virus scanning
DescriptionUsers scan software sent from outside the TOE for software viruses.
Selection GuidanceConsider treating this as an Objective that supports countering a general threat along the lines of Malicious_Code.  Alternatively, consider treating this as the combination of a user Policy (with consequences for user documentation) and an Assumption along the lines of Trusted_User or Coop_User.
Editorial
IdentifierWell_Behaved_Admin
Descriptive NameWell behaved system administrators
DescriptionSystem Administrators are trusted not to compromise security.
Selection GuidanceConsider combining this with similar Assumptions such as Admin_Docs, Competent_Admin, and No_Abuse_by_Admin.
Editorial