CCC.TH12: Resource Constraints are Exhausted
Threat ID:CCC.TH12
Title:Resource Constraints are Exhausted
Description:
An attack or misconfiguration can consume all available resources, such as memory, CPU, or storage, to disrupt the service or deny access to legitimate users. This can be achieved through repeated requests, resource-intensive operations, or the lowering of rate/budget limits. Through auto-scaling, the attacker may also attempt to exhaust higher-level budget thresholds to impact other systems in the same scope.
Related Features:
ID | Title | Description |
---|---|---|
CCC.F04 | Transaction Rate Limits | Allows the setting of a threshold where industry-standard throughput is achieved up to the specified rate limit. |
CCC.F16 | Budgeting | Provides the ability to trigger alerts when spending thresholds are approached or exceeded for the service. |
CCC.F19 | On-demand Scaling | Provide scaling of resources based on demand. |