Data Protection/Privacy
Vulnerable channel by which personal information may be accessed. The user may want their personal data to be kept private.
ENTITY
1 - Human
INTENT
2 - Unintentional
TIMING
2 - Post-deployment
Risk ID
mit637
Domain lineage
2. Privacy & Security
2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Mitigation strategy
1. Mandate strong end-to-end encryption protocols, such as Transport Layer Security (TLS) with robust cipher suites, for all data in transit across the channel and employ AES-256 or equivalent encryption for data at rest. This foundational measure ensures that personal information is unintelligible even if the communication channel is successfully compromised. 2. Implement and strictly enforce Multi-Factor Authentication (MFA) for all users accessing the channel or underlying data stores, coupled with Role-Based Access Control (RBAC) that adheres to the principle of least privilege to limit access only to personnel absolutely necessary for defined job functions. 3. Conduct regular, scheduled vulnerability assessments and specialized penetration testing (e.g., API, web, or network testing) focused on the communication channel's security posture. Remediation plans must prioritize addressing all discovered vulnerabilities, with critical patches applied immediately upon release.