CAPEC 524 Rogue Integration Procedures

Draft Standard Low Risk
Severity High

Description

An attacker alters or establishes rogue processes in an integration facility in order to insert maliciously altered components into the system. The attacker would then supply the malicious components. This would allow for malicious disruption or additional compromise when the system is deployed.

Mitigations

7

Consequences

Relationships