ENISA Threat Taxonomy
ENISA Threat Taxonomy
ENISA Threat Taxonomy
INITIAL VERSION
1.0
JANUARY 2016
About ENISA
The European Union Agency for Network and Information Security (ENISA) is a centre of network and
information security expertise for the EU, its member states, the private sector and Europe’s citizens.
ENISA works with these groups to develop advice and recommendations on good practice in information
security. It assists EU member states in implementing relevant EU legislation and works to improve the
resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing
expertise in EU member states by supporting the development of cross-border communities committed to
improving network and information security throughout the EU. More information about ENISA and its
work can be found at www.enisa.europa.eu.
Author
Louis Marinos, ENISA.
Contact
For contacting the authors please use [email protected]
For media enquiries about this paper, please use [email protected].
Acknowledgements
ENISA would like to thank Jakub Radziulis, iTTi, for his support in the consolidation of the threat taxonomy
on the basis of available ENISA material. We would also like to thank the members of the ENISA ETL
Stakeholder Group for reviewing this material: Paolo Passeri, Consulting, UK, Pierluigi Paganini, Chief
Security Information Officer, IT, Paul Samwel, Banking, NL, Tom Koehler, Consulting, DE, Stavros Lingris,
CERT, EU, Jart Armin, Worldwide coalitions/Initiatives, International, Thomas Häberlen, Member State, DE,
Neil Thacker, Consulting, UK, Margrete Raaum, CERT, NO, Shin Adachi, Security Analyst, US, R. Jane Ginn,
Consulting, US, Lance James, Consulting, US, Polo Bais, Member State, NL.
Legal notice
Notice must be taken that this publication represents the views and interpretations of the authors and
editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or
the ENISA bodies unless adopted pursuant to the Regulation (EU) No 526/2013. This publication does not
necessarily represent state-of the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external
sources including external websites referenced in this publication.
This publication is intended for information purposes only. It must be accessible free of charge. Neither
ENISA nor any person acting on its behalf is responsible for the use that might be made of the
information contained in this publication.
Copyright Notice
© European Union Agency for Network and Information Security (ENISA), 2015
Reproduction is authorised provided the source is acknowledged.
02
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Table of Contents
1. Introduction/Method/Sources 4
2. Purpose of threat taxonomy 7
State-of-play and next steps 9
3. ENISA Threat Taxonomy 10
03
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
1. Introduction/Method/Sources
The present threat taxonomy is an initial version that has been developed on the basis of available ENISA
material. This material has been used as an ENISA-internal structuring aid for information collection and
threat consolidation purposes. It emerged in the time period 2012-2015. The consolidated threat
taxonomy is an initial version: in 2016, ENISA plans to update and expand it with additional details, such as
definitions of the various threats mentioned.
For the presented threat taxonomy, Cyber Threats should be understood as threats applying to assets
related to information and communication technology. Such threats are materialized mostly in cyberspace,
while some threats included are materialized in the physical world but affect information and cyber-assets.
Besides the ENISA material, the following available threat taxonomies where analysed and – when relevant
– have been integrated in the current version of the ENISA taxonomy:
1
http://www.ict-forward.eu/whitebook/, accessed December 2015.
2
http://www.researchgate.net/profile/Eric_Luiijf/publication/220592994_Extensible_threat_taxonomy_for_critical_i
nfrastructures/links/0a85e53603c15d292b000000.pdf, accessed December 2015.
3
https://github.com/certtools/intelmq/wiki/Data-Harmonization, accessed December 2015.
4
http://csrc.nist.gov/publications/drafts/800-150/sp800_150_draft.pdf, accessed December 2015.
5
http://projects.webappsec.org/w/page/13246977/Threat%20Classification%20Views, accessed December 2015.
6
http://www.eecis.udel.edu/~sunshine/publications/ccr.pdf, accessed December 2015.
7
https://s2erc.georgetown.edu/sites/s2erc/files/CyberISE%20Taxonomy.pdf, accessed December 2015.
8
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.457.5398&rep=rep1&type=pdf, accessed December
2015.
9
http://www.nasa.gov/pdf/636745main_day_3-algirdas_avizienis.pdf, accessed December 2015.
10
http://resources.sei.cmu.edu/library/asset-view.cfm?assetID=52454, accessed December 2015.
11
http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf, accessed December 2015.
12
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/download/threats_catalogue.html;jsessioni
d=A72092E049CA62A0A1B8521261DA8381.2_cid368, accessed December 2015.
04
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
13
http://cordis.europa.eu/project/rcn/87757_en.html, accessed December 2015.
14
http://www85.homepage.villanova.edu/timothy.ay/MIS2040/OCTAVEthreatProfiles%5B1%5D.pdf, accessed
December 2015.
15
https://www.owasp.org/index.php/Application_Threat_Modeling, accessed December 2015.
16
http://www.ecsirt.net/cec/service/documents/wp4-clearinghouse-policy-v12.html#HEAD6, accessed December
2015.
17
http://www.terena.org/activities/tf-csirt/meeting39/20130523-DV1.pdf, accessed December 2015.
18
http://infoserve.sandia.gov/sand_doc/1998/988667.pdf, accessed December 2015.
19
https://www.ncsc.nl/conference/conference-2011/speakers/tom-longstaff.html, accessed December 2015.
20
https://code.google.com/p/collective-intelligence-framework/wiki/API_FeedTypes_v1, accessed December 2015.
21
https://code.google.com/p/collective-intelligence-framework/wiki/TaxonomyAssessment_v1, accessed
22
http://personal.inet.fi/koti/erka/Studies/DI/DI_Erka_Koivunen.pdf, accessed December 2015.
23
http://www.terena.org/activities/tf-csirt/pre-meeting3/TLversion0_2.html, accessed December 2015.
24
http://www.terena.org/activities/tf-csirt/meeting39/20130523-DV1.pdf, accessed December 2015.
25
http://h10032.www1.hp.com/ctg/Manual/c03964615, accessed December 2015.
26
http://archiv.cesnet.cz/doc/techzpravy/2010/otrs-csirt-workflow/, accessed December 2015.
27
ftp://homeproj.cesnet.cz/tar/warden/warden-client-2.1.tar.gz, accessed December 2015.
28
https://csirt.cesnet.cz/en/services/mentat, accessed December 2015.
29
http://www.slideshare.net/chinwhei/7-steps-to-threat-modeling, accessed December 2015.
30
https://cwe.mitre.org/data/pdf/711_owasp_cats_colored.pdf, accessed December 2015.
31
http://resources.sei.cmu.edu/library/asset-view.cfm?assetID=9395, accessed December 2015.
32
http://www.ict-forward.eu/, accessed December 2015.
05
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
VITA project33
NI2S3 project34
IMCOSEC project35
INTERSECTION project36
INSPIRE project37
THREVI238
ESCORTS39
Developed threats taxonomy consist of following fields:
High level threats: this is the top level threat category, used mainly to discriminate families of
threats.
Threats: this field indicates the various threats within a category.
Threats details: in this field details of a specific threat are being described. Threat details are based
on a specific attack type/method or targeting specific IT asset.
Additional fields can be added depending on the use case of this table (see also next section). In the
information collection, for example, we use some additional fields indicating affected assets, threat agents,
related sources/URLs, etc.
It should be noted that the ENISA threat taxonomy is a living document: during its use within ENISA,
additional threats, references, definitions, etc. can be added. ENISA will publish the threat taxonomy every
time new content has been created and consolidated. Interested individuals may visit the corresponding
location and check availability of the ENISA threat taxonomy40.
33
http://www.researchgate.net/publication/220592994_Extensible_threat_taxonomy_for_critical_infrastructures,
accessed December 2015.
34
http://cordis.europa.eu/result/rcn/58659_en.html, accessed December 2015.
35
http://cordis.europa.eu/result/rcn/55741_en.html, accessed December 2015.
36
http://cordis.europa.eu/project/rcn/85347_en.html, accessed December 2015.
37
http://cordis.europa.eu/project/rcn/87757_en.html, accessed December 2015.
38
http://www.threvi2.eu/, accessed December 2015.
39
http://cordis.europa.eu/result/rcn/55021_en.html, accessed December 2015.
40
https://www.enisa.europa.eu/activities/risk-management/evolving-threat-environment/enisa-threat-
landscape#b_start=0, accessed December 2015.
06
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Threat taxonomy is a classification of threat types and threats at various levels of detail. The purpose of
such a taxonomy is to establish a point of reference for threats encountered, while providing a possibility
to shuffle, arrange, amend and detail threat definitions. To this extend, a threat taxonomy is a living
structure that is being used to maintain a consistent view on threats on the basis of collected information.
The current version of ENISA threat taxonomy has been developed over the past years as an internal tool
used in the collection and consolidation of threat information. When collecting information on various
threats, it is very convenient to store similar things together. To this extend, a threat taxonomy has been
generated. It is worth mentioning that the initial structure has been updated/consolidated with various
sources of threat information. Most of threat information included was from existing threat catalogues the
area of information security and in particular risk management. Besides the references mentioned in the
introduction section, an overview of further threat catalogues can be found here 41. Hence, besides cyber-
threats the ENISA threat taxonomy contains also physical threats that can cause harm to information
technology assets. Yet, due to the focus of ENISA work in the area of cyber-space, the threat taxonomy
presented has a better maturity in the field of cyber-threats.
As until now the threat taxonomy has been used for collection and consolidation of cyber-threat
information, only the cyber-threat part of the taxonomy has been maintained and developed further.
Although all information security threat areas are part of the threat taxonomy, those that are not related
to cyber have not evolved over the time.
In 2015, ENISA has created a consolidated version of these threats, has added some short descriptions to
these threats and has decided to make this material publicly available as a table by means of this
document. The figure below shows this taxonomy in form of a mind map, together with some symbols
indicating its possible use-cases (see Figure 1).
41
http://opensecurityarchitecture.org/cms/images/OSA_images/TC_Comparison.pdf, accessed November 2015.
07
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Sorting resources
Lack of network
actions
Lack of resources/
Malfunctions
Failures or disruptions of the power
supply
Water
Network devices
Vulnerability
capacity Servers
08
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
The current version of ENISA threat taxonomy is an initial document whose development will be continued
in 2016. In addition to this document, the ENISA threat taxonomy is going to be published in form of an
excel table. Please note that the excel table is contains fields used in the ENISA collection work and
contains additional fields and some examples for the content of these fields.
In its current version, the ENISA threat taxonomy has been reviewed by the ENISA Threat Landscape
Stakeholder Group.
09
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Line
High Level Threats Threats Threat details Comments
number
Theft of mobile devices (smartphones/ Taking away another person's property in the form of mobile
7
tablets) devices, for example smartphones, tablets.
10
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Information leak /sharing due to human Information leak / sharing caused by humans, due to their
17
error mistakes.
20 Leaks of data via Web applications Threat of leaking important information using web applications.
Loss of information due to maintenance Threat of loss of information by incorrectly performed maintenance
23
errors / operators' errors of devices or systems or other operator activities.
Loss of information due to configuration/ Threat of loss of information due to errors in installation or system
24
installation error configuration.
11
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Using information from an unreliable Bad decisions based on unreliable sources of information or
27
source unchecked information.
Unintentional change of data in an Loss of information integrity due to human error (information
28
information system system user mistake).
30 Damage caused by a third party Threats of damage to IT assets caused by third party.
33 Loss of information in the cloud Threats of losing information or data stored in the cloud.
12
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
13
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Threats from space / Electromagnetic Threats of the negative impact of solar radiation to satellites and
54
storm radio wave communication systems - electromagnetic storm.
57 Failure of devices or systems Threat of failure of IT hardware and/or software assets or its parts.
14
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Failure or disruption of service providers Threat of failure or disruption of third party services required for
69
(supply chain) proper operation of information systems.
Malfunction of equipment (devices or Threat of malfunction of IT hardware and/or software assets or its
70
systems) parts (i.e. improper working parameters, jamming, rebooting).
15
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Information leakage due to unsecured Wi-Fi, Threat of obtaining important information by insecure network
86
rogue access points rogue access points etc.
Network Reconnaissance, Network traffic Threat of identifying information about a network to find security
89
manipulation and Information gathering weaknesses.
90 Man in the middle/ Session hijacking Threats that relay or alter communication between two parties.
16
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
101 Malicious code/ software/ activity Threat of malicious code or software execution.
102 Search Engine Poisoning Threat of deliberate manipulation of search engine indexes.
103 Exploitation of fake trust of social media Threat of malicious activities making use of trusted social media.
17
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Leakage affecting mobile privacy and mobile Threat of leaking important information due to using malware
119
applications mobile applications.
18
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Leakage affecting web privacy and web Threat of leakage important information due to using malware web
120
applications applications.
121 Leakage affecting network traffic Threat of leaking important information in network traffic.
122 Leakage affecting cloud computing Threat of leaking important information in cloud computing.
123 Generation and use of rogue certificates Threat of use of rogue certificates.
124 Loss of (integrity of) sensitive information Threat of loss of sensitive information due to loss of integrity.
128 Manipulation of hardware and software Threat of unauthorised manipulation of hardware and software.
Abuse of computing power of cloud to Threat of using large computing powers to generate attacks on
130
launch attacks (cybercrime as a service) demand.
Access of web sites through chains of HTTP Threat of bypassing the security mechanism using HTTP proxies
132
Proxies (Obfuscation) (bypassing the website blacklist).
133 Access to device software Threat of unauthorised manipulation by access to device software.
19
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
138 Address space hijacking (IP prefixes) Threat of the illegitimate takeover of groups of IP addresses.
Unauthorised use or administration of Threat of nefarious action due to unauthorised use of devices and
148
devices and systems systems.
20
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
149 Unauthorised use of software Threat of nefarious action due to unauthorised use of software.
Web based attacks (Drive-by download / Threat of installation of unwanted malware software by misusing
154
malicious URLs / Browser based attacks) websites.
157 False rumour and/or fake warning Threat of disruption of work due to rumours and/or a fake warning.
158 Remote activity (execution) Threat of nefarious action by attacker remote activity.
159 Remote Command Execution Threat of nefarious action due to remote command execution.
161 Botnets / Remote activity Threat of penetration by software from malware distribution.
21
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
Installation of sophisticated and targeted Threat of malware delivered by sophisticated and targeted
165
malware software.
169 Abuse of authorizations Threat of using authorised access to perform illegitimate actions.
Violation of rules and regulations / Breach Threat of financial or legal penalty or loss of trust of customers and
171
of legislation collaborators due to violation of law or regulations.
22
ENISA Threat Taxonomy
Initial Version | 1.0 | January 2016
23
ENISA
European Union Agency for Network
and Information Security
Science and Technology Park of Crete (ITE)
Vassilika Vouton, 700 13, Heraklion, Greece
Athens Office
1 Vass. Sofias & Meg. Alexandrou
Marousi 151 24, Athens, Greece