Esc
Message Hardening
Definition
The application of security controls to user-to-user and system-to-system communications so messages remain confidential, unaltered, and verifiable while resisting injection, replay, and tampering.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Technique Subclasses
There are 5 techniques in this category, Message Hardening.
| Name | ID | Definition | Synonyms |
|---|---|---|---|
| Message Hardening | D3-MH | The application of security controls to user-to-user and system-to-system communications so messages remain confidential, unaltered, and verifiable while resisting injection, replay, and tampering. | |
| - Transfer Agent Authentication | D3-TAAN | Validating that server components of a messaging infrastructure are authorized to send a particular message. | |
| - Message Encryption | D3-MENCR | Encrypting a message body using a cryptographic key. | |
| - Bus Message Authentication | D3-BMA | Applies cryptographic primitives to individual bus frames to verify the sender's identity and ensure the integrity of the data payload. | |
| - Message Authentication | D3-MAN | Authenticating the sender of a message and ensuring message integrity. |