Redesign System asset into Hardware asset #70
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Reworked the
System
asset into theHardware
asset that is simpler and only represents, as the name suggests, the hardware components on whichApplications
are run. This makes the distinction between hardware and software in coreLang clearer.This pull request also introduces
HardwareVulnerabilities
which are analogous, but less complex, than theSoftwareVulnerabilities
. These are used to model vulnerabilities that both require physical access on and lead to disruptions(confidentiality, integrity, availability) on theHardware
asset. Vulnerabilities that require physical access but impact software(Applications
/SoftwareProducts
) are represented usingSoftwareVulnerabilities
with thephysicalAccessRequired
defence enabled.Also included is an update to the
PhysicalZone
asset. BothNetwork
andHardware
assets can be associated with aPhysicalZone
and each can belong to multiple zones, thus representing overlapping zones. This was initially requested by @jesajx(#39 (comment)).Users
now can directly be associated with eitherHardware
orPhysicalZone
assets in order to represent the hardware/network assets that they have physical access to.Identities
cannot be associated withHardware
as they were with the oldSystem
asset since privileges are only relevant for software assets.