Skip to main content

CCC.Core.F06: Access Control

Capability ID:CCC.Core.F06
Title:Access Control
Description:The service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

Mapped Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Logging.TH02Unauthorized Data Transfer Out of a Trusted BoundarySensitive log data, including PII, financial transaction details, or system vulnerabilities, is exfiltrated directly from the logging service's query or API interfaces by authorized but malicious insiders or compromised accounts exploiting legitimate access.
1
2
0
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
0