Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IPY-03: measure the number of data flows where the traffic is decrypted for analysis. If this number is not 0, this control is not effective. #73

Open
pritikin opened this issue Oct 12, 2022 · 2 comments

Comments

@pritikin
Copy link
Collaborator

This is a proposed effectiveness metric from Walt Williams

IPY-03-M2
To test for effectiveness, measure the number of data flows where the traffic is decrypted for analysis. If this number is not 0, this control is not effective.

@pritikin
Copy link
Collaborator Author

The current IPY-03-M2 metric does track this:
"This metric measures the percentage of data flows that use an approved, standardized cryptographic security function for interoperable transmissions of data."

Some improvements would be to track amount of data transmitted vs just the count of flows. There may be tons of unencrypted low risk / low quantity of data flows which would skew the metric as currently written.

But a secondary concern voice in the oct 13th call is around CEK key management (and insertion of MiTM). We'll create a CEK proposal for that.

@mosi-k-platt
Copy link
Collaborator

In the spirit of "don't let perfect be the enemy of good", I don't think 100% should be the SLO for a metric. If we don't expect 100% uptime for mission-critical systems, then why should expectations change for security controls which may not be as critical?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants