Prompts

RootPrompt [Rank 0]Hidden starting point for the CC Toolbox Interview.
Answer list & Effects listNone: None
Child ListP99999, A999999, T99999
EditorialThe Answer List, Effect List, and Prompt String fields of this record are not used by the CC Toolbox.  Only the child list is relevant, and it must have the indicated value, namely P99999, A999999, T99999.
P99999 [Rank 1]Do you wish to consider common organizational security policies that could apply to the TOE?
Answer list & Effects listYes: PC.Root
No: None
Child ListP00001
Editorial
P00001 [Rank 2]Do you wish to consider organizational security policies derived from public DoD policy sources?
Answer list & Effects listYes: PC.DoD
No: None
Child ListP00002, P00003, P00004, P00005, P00006, P00007, P00008, P00009, P00010, P00011
Editorial
P00002 [Rank 3]Does organizational security policy require that individuals be held accountable for their actions?
Answer list & Effects listYes: P.Accountability
No: None
Child List
Editorial
P00003 [Rank 3]Does organizational security policy require that appropriate authorities be immediately notified of any threats or vulnerabilities impacting systems that process their data?
Answer list & Effects listYes: P.Authorities
No: None
Child List
Editorial
P00004 [Rank 3]Does organizational security policy require that information be used only for its authorized purpose(s)?
Answer list & Effects listYes: P.Authorized_Use
No: None
Child List
Editorial
P00005 [Rank 3]Does organizational security policy require that information be available to satisfy mission requirements?
Answer list & Effects listYes: P.Availability
No: None
Child List
Editorial
P00006 [Rank 3]Does organizational security policy require that guidance documentation be provided for the secure installation and use of the system?
Answer list & Effects listYes: P.Guidance
No: None
Child List
Editorial
P00007 [Rank 3]Does organizational security policy require that only authorized individuals and processes access information?
Answer list & Effects listYes: P.Information_AC
No: None
Child List
Editorial
P00008 [Rank 3]Does organizational security policy require that information retain its content integrity?
Answer list & Effects listYes: P.Integrity
No: None
Child List
Editorial
P00009 [Rank 3]Does organizational security policy require that information systems security be an integral part of all system lifecycle phases?
Answer list & Effects listYes: P.Lifecycle
No: None
Child List
Editorial
P00010 [Rank 3]Does organizational security policy require that information be appropriately marked and labeled?
Answer list & Effects listYes: P.Marking
No: None
Child List
Editorial
P00011 [Rank 3]Does organizational security policy require that information be physically protected to prevent unauthorized disclosure, destruction, or modification?
Answer list & Effects listYes: P.Physical_Control
No: None
Child List
Editorial
A999999 [Rank 1]Do you wish to consider common assumptions of operation?
Answer list & Effects listYes: AC.Root
No: None
Child ListA000001, A000015, A000036, A000040, A000046, A000050
Editorial
A000001 [Rank 2]Are there System Administrators who will be responsible for secure configuration, maintenance, and upgrade?
Answer list & Effects listYes: AC.Admin
No: None
Child ListA000002, A000003, A000004, A000009
Editorial
A000002 [Rank 3]Are the System Administration staff authenticated?
Answer list & Effects listYes: A.Auth_Sys_Admin
No: None
Child List
Editorial
A000003 [Rank 3]Can administration functions be performed remotely?
Answer list & Effects listYes: A.Remote_Admin
No: None
Child List
Editorial
A000004 [Rank 3]Are System Administrator's motives a concern?
Answer list & Effects listYes: AC.Admin_Motive
No: None
Child ListA000005
Editorial
A000005 [Rank 4]Are System Administrators considered to be trusted, hostile, or negligent?
Answer list & Effects listTrusted: A.Well_Behaved_Admin
Hostile: A.Hostile_Sys_Admin
Negligent: A.Negligent_Admin
Child List
Editorial
A000009 [Rank 3]Is the attitude/level of competence of System Administrators a factor?
Answer list & Effects listYes: AC.Admin_Attitude
No: None
Child ListA000010, A000014
Editorial
A000010 [Rank 4]Are System Administrators competent, improperly trained or error prone?
Answer list & Effects listCompetent: A.Competent_Admin
No Training: A.Poor_Trained_Admin
Error Prone: A.Admin_Errors
Child List
Editorial
A000014 [Rank 4]Are System Administrators trusted to be well-behaved and act constructively?
Answer list & Effects listYes: A.No_Abuse_By_Admin
No: None
Child List
Editorial
A000015 [Rank 2]Are users relied upon as part of ensuring the secure operation of the TOE?
Answer list & Effects listYes: AC.User
No: None
Child ListA000016, A000017, A000018, A000020, A000030, A000031, A000035
Editorial
A000016 [Rank 3]Is a cooperating secure IT environment needed?
Answer list & Effects listYes: A.Coop_User
No: None
Child List
Editorial
A000017 [Rank 3]Do users have the necessary privilege to access the information in the TOE?
Answer list & Effects listYes: A.User_Access
No: None
Child List
Editorial
A000018 [Rank 3]Can users access the TOE remotely?
Answer list & Effects listYes: A.Remote_Access
No: None
Child List
Editorial
A000020 [Rank 3]Are user's motives a concern?
Answer list & Effects listYes: AC.User_Motive
No: None
Child ListA000021
Editorial
A000021 [Rank 4]Are users considered to be competent, error prone, or hostile?
Answer list & Effects listTrusted: A.Trusted_User
Error Prone: A.User_Mistakes
Hostile: A.Hostile_User
Child List
Editorial
A000030 [Rank 3]Are users able to bypass the security mechanisms?
Answer list & Effects listYes: A.No_Bypass_Security
No: None
Child List
Editorial
A000031 [Rank 3]How sophisticated are adversaries?
Answer list & Effects listHighly: A.Outsider_Hi
Moderately: A.Outsider_Med
Low: A.Outsider_Low
No Adversaries: None
Child List
Editorial
A000035 [Rank 3]Are software viruses a concern?
Answer list & Effects listYes: A.User_Virus_Scan
No: None
Child List
Editorial
A000036 [Rank 2]Is access/modification of security data a concern?
Answer list & Effects listYes: AC.Data
No: None
Child ListA000037, A000038, A000039
Editorial
A000037 [Rank 3]Is access to passwords controlled?
Answer list & Effects listYes: A.Access_to_Passwords
No: None
Child List
Editorial
A000038 [Rank 3]Can System Administrators potentially modify data in transit?
Answer list & Effects listYes: A.Admin_Cor_Usr_Data
No: None
Child List
Editorial
A000039 [Rank 3]Is the modification of system data a concern?
Answer list & Effects listYes: A.Acc_Ovrwrit_SysData
No: None
Child List
Editorial
A000040 [Rank 2]Are procedural security measures important?
Answer list & Effects listYes: AC.Procedures
No: None
Child ListA000041, A000042, A000043, A000044, A000045
Editorial
A000041 [Rank 3]Can System Administrators review security logs?
Answer list & Effects listYes: A.Review_Audit_Log
No: None
Child List
Editorial
A000042 [Rank 3]Can System Administrators properly dispose of user data after access has been removed?
Answer list & Effects listYes: A.Dispose_User_Data
No: None
Child List
Editorial
A000043 [Rank 3]Will System Administrators follow documented policies and procedures?
Answer list & Effects listYes: A.Admin_Docs
No: None
Child List
Editorial
A000044 [Rank 3]Is management of passwords a concern?
Answer list & Effects listYes: A.Password_Management
No: None
Child List
Editorial
A000045 [Rank 3]Are procedures established to protect against viruses?
Answer list & Effects listYes: A.Admin_Virus_Check
No: None
Child List
Editorial
A000046 [Rank 2]Are communications to/from the TOE protected?
Answer list & Effects listYes: AC.Communications
No: None
Child ListA000047, A000048, A000049
Editorial
A000047 [Rank 3]Is physical protection of the communications provided?
Answer list & Effects listYes: A.Acc_to_Comms
No: None
Child List
Editorial
A000048 [Rank 3]Can outsiders read data sent across communications lines?
Answer list & Effects listYes: A.Eavesdrop_by_Out
No: None
Child List
Editorial
A000049 [Rank 3]Is connectivity to other systems a concern?
Answer list & Effects listYes: A.Peer
No: None
Child List
Editorial
A000050 [Rank 2]Are there physical security constraints that are important to protecting your product or system?
Answer list & Effects listYes: AC.Physical
No: None
Child ListA000051, A000052, A000053, A000054, A000055
Editorial
A000051 [Rank 3]Can an unauthorized user (e.g., Hacker) gain physical access to the system?
Answer list & Effects listYes: A.Phys_Acs_to_Out
No: None
Child List
Editorial
A000052 [Rank 3]Is physical protection of TOE security functions ensured?
Answer list & Effects listYes: A.Protect_From_Out
No: None
Child List
Editorial
A000053 [Rank 3]Is the system protected against such natural disasters as fires and floods?
Answer list & Effects listYes: A.Prot_Against_Nature
No: None
Child List
Editorial
A000054 [Rank 3]Is the system protected against a sudden loss of power?
Answer list & Effects listYes: A.Prot_Agnst_Pwr_Fail
No: None
Child List
Editorial
A000055 [Rank 3]Is the system protected against a loss of communications?
Answer list & Effects listYes: A.Prot_of_Comm
No: None
Child List
Editorial
T99999 [Rank 1]Do you wish to consider threats that may be addressed via the TOE?
Answer list & Effects listYes: TC.Root
No: None
Child ListT00001, T00002, T00003, T00004, T00005, T00006
Editorial
T00001 [Rank 2]Do you wish to consider threats originating from those responsible for the administration of the TOE?
Answer list & Effects listYes: TC.Admin
No: None
Child ListT00007, T00008, T00009, T00022, T00027, T00037
Editorial
T00007 [Rank 3]Can an administrator commit errors that change the intended security policy of the system or application?
Answer list & Effects listYes: T.Admin_Err_Commit
No: None
Child List
Editorial
T00008 [Rank 3]Can the system administrator fail to perform some function essential to security?
Answer list & Effects listYes: T.Admin_Err_Omit
No: None
Child List
Editorial
T00009 [Rank 3]Can an administrator maliciously modify the system's configuration to allow security violations to occur?
Answer list & Effects listYes: T.Admin_Hostile_Modify
No: None
Child List
Editorial
T00022 [Rank 3]Can an authorized user, IT system, or hacker download and execute malicious code, which causes abnormal processes that violate the integrity, availability, or confidentiality of system assets?
Answer list & Effects listYes: T.Malicious_Code
No: None
Child List
Editorial
T00027 [Rank 3]Can an attacker write software or modify protocol information in transit to trick users into interacting with spurious system services?
Answer list & Effects listYes: T.Spoofing
No: None
Child List
Editorial
T00037 [Rank 3]Can an administrator learn or disclose user identities in violation of a privacy policy?
Answer list & Effects listYes: T.Admin_UserPriv
No: None
There is no privacy policy: None
Child List
Editorial
T00002 [Rank 2]Do you wish to consider threats that originate from those who are not authorized to access the TOE?
Answer list & Effects listYes: TC.Hacker
No: None
Child ListT00014, T00015, T00016, T00017, T00018, T00019, T00020, T00021, T00022, T00027
Editorial
T00014 [Rank 3]Can missing, weak and/or incorrectly implemented access control allow a hacker to gain undetected access to the system causing potential violations of integrity, confidentiality, or availability?
Answer list & Effects listYes: T.Hack_AC
No: None
Child List
Editorial
T00015 [Rank 3]Can a hacker execute commands, send data, or performs other operations that make system resources unavailable to system users? Resources that may be denied to users include bandwidth, processor time, memory, and data storage.
Answer list & Effects listYes: T.Hack_Avl_Resource
No: None
Child List
Editorial
T00016 [Rank 3]Can an outsider obtain user data by eavesdropping on communications lines?
Answer list & Effects listYes: T.Hack_Comm_Eavesdrop
No: None
Child List
Editorial
T00017 [Rank 3]Can a hacker perform cryptoanalysis on encrypted data in order to recover message content?
Answer list & Effects listYes: T.Hack_Crypto
No: None
Child List
Editorial
T00018 [Rank 3]Can a hacker masquerade as an authorized user to perform operations that will be attributed to the authorized user or a system process?
Answer list & Effects listYes: T.Hack_Masq
No: None
Child List
Editorial
T00019 [Rank 3]Can a hacker modify information that he intercepts from a communication link between two unsuspecting entities before passing it on to the intended recipient?
Answer list & Effects listYes: T.Hack_Msg_Data
No: None
Child List
Editorial
T00020 [Rank 3]Can a hacker physically damage the IT system, leading to loss of ability to enforce the system security policy (TSP), possibly accompanied by loss of availability, incorrect processing of data, or exposure of system-resident data?
Answer list & Effects listYes: T.Hack_Phys
No: None
Child List
Editorial
T00021 [Rank 3]Can a hacker use social engineering techniques to gain information about system entry, system use, system design or system operation?
Answer list & Effects listYes: T.Hack_Social_Engineer
No: None
Child List
Editorial
T00003 [Rank 2]Do you wish to consider threats that originate from natural disasters such as fire, flood, earthquake, unplanned power disruptions, etc?
Answer list & Effects listYes: TC.Physical_Environment
No: None
Child ListT00010, T00023
Editorial
T00010 [Rank 3]Can failure of one or more system components result in the loss of system-critical functionality?
Answer list & Effects listYes: T.Component_Failure
No: None
Child List
Editorial
T00023 [Rank 3]Can a human or environmental agent disrupt power causing the system to lose information or security protection?
Answer list & Effects listYes: T.Power_Disrupt
No: None
Child List
Editorial
T00004 [Rank 2]Do you wish to consider threats that originate from the TOE developer, both accidental and intentional?
Answer list & Effects listYes: TC.System_Developer
No: None
Child ListT00010, T00012
EditorialDeleted T00011, as it is no longer in the GFI database
T00012 [Rank 3]Can a system or applications developer deliver code that does not perform according to specifications or contains security flaws?
Answer list & Effects listYes: T.Dev_Flawed_Code
No: None
Child List
Editorial
T00005 [Rank 2]Do you wish to consider threats that originate in software or hardware flaws?
Answer list & Effects listYes: TC.System_HW_SW
No: None
Child ListT00010, T00013, T00022, T00023
Editorial
T00013 [Rank 3]Can failure of a component that is part of a distributed system cause other parts of the distributed system to malfunction or provide unreliable results?
Answer list & Effects listYes: T.Failure_DS_Comp
No: None
Child List
Editorial
T00006 [Rank 2]Do you wish to consider threats that originate with authorized users of the TOE
Answer list & Effects listYes: TC.User
No: None
Child ListT00022, T00024, T00025, T00026, T00027, T00028, T00029, T00030, T00031, T00032, T00033, T00034, T00035, T00036
Editorial
T00024 [Rank 3]Can the recipient of a message deny receiving the message to avoid accountability for receiving the message and for subsequent action or inaction?
Answer list & Effects listYes: T.Repudiate_Receive
No: None
Child List
Editorial
T00025 [Rank 3]Can the sender of a message deny sending the message to avoid accountability for sending the message and for subsequent action or inaction?
Answer list & Effects listYes: T.Repudiate_Send
No: None
Child List
Editorial
T00026 [Rank 3]Can a participant in a transaction deny participation in the transaction to avoid accountability for the transaction and for subsequent action or inaction?
Answer list & Effects listYes: T.Repudiate_Transact
No: None
Child List
Editorial
T00028 [Rank 3]Can a user collect sensitive or proprietary information and remove it from the system, either by putting it on a disk or by transmitting it outside the organization?
Answer list & Effects listYes: T.User_Abuse_Conf
No: None
Child List
Editorial
T00029 [Rank 3]Can a user abuse granted authorizations to improperly collect sensitive or security-critical data?
Answer list & Effects listYes: T.User_Collect
No: None
Child List
Editorial
T00030 [Rank 3]Can a user commit errors of use that cause information to be delivered to the wrong place or wrong person?
Answer list & Effects listYes: T.User_Err_Conf
No: None
Child List
Editorial
T00031 [Rank 3]Can a user accidentally delete user data or change system data rendering user data inaccessible?
Answer list & Effects listYes: T.User_Err_Inaccess
No: None
Child List
Editorial
T00032 [Rank 3]Can a user commit errors of use that induce erroneous statements or actions by the system and/or its users?
Answer list & Effects listYes: T.User_Err_Integrity
No: None
Child List
Editorial
T00033 [Rank 3]Can a user commit errors of use that cause the system or one of its applications to undermine the system's security features?, e.g., by giving the user privileges for which he is not authorized.
Answer list & Effects listYes: T.User_Err_Slf_Protect
No: None
Child List
Editorial
T00034 [Rank 3]Can a users unauthorized use of resources causes undue burden on an affected resource?
Answer list & Effects listYes: T.User_Misuse_Avl_Resc
No: None
Child List
Editorial
T00035 [Rank 3]Can a user abuse granted authorizations to improperly change or destroy sensitive or security-critical data?
Answer list & Effects listYes: T.User_Modify
No: None
Child List
Editorial
T00036 [Rank 3]Can a user abuse granted authorizations to improperly send sensitive or security-critical data?
Answer list & Effects listYes: T.User_Send
No: None
Child List
Editorial