CAPEC-673: Developer Signing Maliciously Altered Software
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
前提条件
- An adversary would need to have access to a targeted developer’s software development environment, including to their software build processes, where the adversary could ensure code maliciously tainted prior to a build process is included in software packages built.
所需技能
后果影响
影响范围: Integrity Confidentiality
技术影响: Read Data
影响范围: Access Control Authorization
技术影响: Gain Privileges
缓解措施
Have a security concept of operations (CONOPS) for the IDE that includes: Protecting the IDE via logical isolation using firewall and DMZ technologies/architectures; Maintaining strict security administration and configuration management of configuration management tools, developmental software and dependency code repositories, compilers, and system build tools.
Employ intrusion detection and malware detection capabilities on IDE systems where feasible.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1195.002 | Supply Chain Compromise: Compromise Software Supply Chain |