Discover vulnerabilities related to Trust Model Problems in the ICS security context. Learn how operational deviations can lead to system vulnerabilities and potential security risks.
The weaknesses within this classification are connected to the section labeled "Trust Model Problems" in the SEI ETF's publication titled "Categories of Security Vulnerabilities in ICS" from March 2022. It states that vulnerabilities may arise in the system after installation if the user operates it with a security approach or process that differs from what was initially designed or constructed, due to assumptions made during the design or construction phase. It is worth mentioning that this category includes the recommendations outlined in the report's "Nearest IT Neighbor" section, as well as suggestions provided by the CWE team. It is likely that these relationships will be subject to change in future versions of CWE.