Table A1 reference

Threats to "Back-end servers"

Ref

Mitigation

1.1 & 3.1

Abuse of privileges by staff (insider attack)

M1

Security Controls are applied to back-end systems to minimise the risk of insider attack

1.2 & 3.3

Unauthorised internet access to the server (enabled for example by backdoors, unpatched system software vulnerabilities, SQL attacks or other means)

M2

Security Controls are applied to back-end systems to minimise unauthorised access. Example Security Controls can be found in OWASP

1.3 & 3.4

Unauthorised physical access to the server (conducted by for example USB sticks or other media connecting to the server)

M8

Through system design and access control it should not be possible for unauthorised personnel to access personal or system critical data

2.1

Attack on back-end server stops it functioning, for example it prevents it from interacting with vehicles and providing services they rely on

M3

Security Controls are applied to back-end systems.  Where back-end servers are critical to the provision of services there are recovery measures in case of system outage. Example Security Controls can be found in OWASP

3.2

Loss of information in the cloud. Sensitive data may be lost due to attacks or accidents when data is stored by third-party cloud service providers

M4

Security Controls are applied to minimise risks associated with cloud computing. Example Security Controls can be found in OWASP and NCSC cloud computing guidance

3.5

Information breach by unintended sharing of data (e.g. admin errors, storing data in servers in garages)

M5

Security Controls are applied to back-end systems to prevent data breaches. Example Security Controls can be found in OWASP

a0c0