Skip to content

Federal Risk Register

Document ID: PLCY-FED-003
Version: 1.0
Effective Date: December 30, 2025
Last Review: December 30, 2025
Owner: Hop And Haul Team


CONFIDENTIAL

This document is CONFIDENTIAL and for internal use only. Do not distribute outside the organization.

1. Purpose

This document serves as the "SSP-Lite" Risk and Mitigation Register for Hop And Haul. It documents the "High Consequence" threat model specific to a multi-tenant, inter-company rideshare system operating in federal and regulated environments. This register aligns with NIST RMF (Risk Management Framework) and supports FedRAMP Moderate authorization.


2. Risk Assessment Methodology

2.1 Impact Levels

LevelDefinitionExamples
CriticalLoss of life, severe injury, or catastrophic mission failurePhysical safety compromise, complete data breach
HighSignificant harm to individuals, substantial financial loss, or major operational disruptionIdentity theft, stalking enablement, regulatory violation
ModerateLimited harm, manageable financial impact, or recoverable operational issuesData exposure (non-PII), service degradation
LowMinimal impact, easily recoverableMinor inconvenience, cosmetic issues

2.2 Likelihood Levels

LevelDefinitionFrequency
HighExpected to occurMultiple times per year
MediumLikely to occurOnce per year or less
LowUnlikely but possibleLess than once per year
RareExceptional circumstancesMay never occur

2.3 Risk Score Matrix

Low ImpactModerate ImpactHigh ImpactCritical Impact
High LikelihoodMediumHighCriticalCritical
Medium LikelihoodLowMediumHighCritical
Low LikelihoodLowLowMediumHigh
Rare LikelihoodLowLowLowMedium

3. Physical Safety & Mission Risks

These risks address threats to the physical safety of drivers, riders, and mission integrity.

3.1 Risk Register - Physical Safety

IDRisk ScenarioImpactLikelihoodRisk ScoreNIST Controls
P1Predator/StalkerCriticalMediumCriticalAC-3, SI-4, AC-4
P2ImpersonationHighMediumHighIA-2, IA-5, IA-8
P3Coercion/DuressHighLowMediumAU-2, IR-4, SI-4
P4Social Engineering (Voice)ModerateMediumMediumAT-2, SA-11, AC-3

3.2 Risk Details and Mitigations

P1: Predator/Stalker Risk

Description: Driver or Rider uses location data to stalk or ambush the other party.

Attack Vectors:

  • Exploitation of real-time location data
  • Pattern analysis from historical ride data
  • Abuse of contact information

Technical & Process Mitigations:

ControlImplementationStatus
Coarse LocationShow only "5 mins away" (no map dot) until pickup commitmentImplemented
Step-Up RevealExact location requires in-app acceptance + step-up authenticationImplemented
Voice/SMS MaskingVoice and SMS relay through system; no real numbers sharedImplemented
Anti-TriangulationFuzzification algorithm with random offset per offerImplemented
Time-Limited AccessTracking tokens auto-expire after ride + 15 minutesImplemented
Data Retention LimitsGPS breadcrumbs purged after 48 hours unless disputedImplemented

Residual Risk: Low (after mitigations)


P2: Impersonation Risk

Description: Wrong person picks up the rider, creating robbery or kidnapping risk.

Attack Vectors:

  • Vehicle/driver substitution
  • Stolen credentials
  • Compromised device

Technical & Process Mitigations:

ControlImplementationStatus
Mandatory HandshakeRide cannot "Start" without PIN/QR exchangeImplemented
Mismatch FlowOne-tap "Report Mismatch" blocks the ride and alerts safety teamImplemented
Device BindingDrivers cannot switch phones without re-authenticationImplemented
Photo VerificationDriver photo displayed to rider; rider can verifyImplemented
Vehicle VerificationLicense plate and vehicle description verifiedImplemented

Residual Risk: Low (after mitigations)


P3: Coercion/Duress Risk

Description: User forced to drive off-route or cancel ride under threat.

Attack Vectors:

  • Physical threat during ride
  • Kidnapping scenario
  • Forced route deviation

Technical & Process Mitigations:

ControlImplementationStatus
Silent SOS"Fake Cancel" button triggers safety ops but ends ride in UIPlanned (Phase 2)
Deviation AlertsServer triggers check-in if route deviates >5 miles/minutesImplemented
Duress CodeEntering a specific PIN alerts safety teams silentlyPlanned (Phase 2)
Real-Time MonitoringSafety ops can monitor active rides flagged for deviationImplemented
Emergency EscalationAutomatic 911 dispatch integration for unresponsive alertsPlanned (Phase 2)

Residual Risk: Medium (pending Phase 2 implementation)


P4: Social Engineering (Voice) Risk

Description: Attacker spoofs "Fleet Seats Agent" to redirect driver via phone call.

Attack Vectors:

  • Caller ID spoofing
  • Pretexting as support agent
  • Manipulation to change destination

Technical & Process Mitigations:

ControlImplementationStatus
Verifiable RequestAgent calls must reference a code displayed in-appImplemented
In-App ConfirmationAgent cannot "accept" for a driver; driver must tap in-appImplemented
No Phone InstructionsPolicy: Agents never instruct drivers to deviate via voiceImplemented
TrainingDriver awareness training on social engineering tacticsImplemented

Residual Risk: Low (after mitigations)


4. Technical & Data Risks

These risks address threats to the confidentiality, integrity, and availability of the Hop And Haul platform and data.

4.1 Risk Register - Technical & Data

IDRisk ScenarioImpactLikelihoodRisk ScoreNIST Controls
T1Tenant Leak (Blast Radius)CriticalLowHighAC-4, SC-4, AC-3
T2Device CompromiseHighMediumHighSC-7, SI-4, AC-19
T3Insider Threat (Admin)CriticalLowHighAC-5, AU-12, AC-6
T4Samsara/API Key LeakHighMediumHighSC-12, SC-28, SA-9
T5Data PermanenceModerateMediumMediumSI-12, MP-6, AU-11

4.2 Risk Details and Mitigations

T1: Tenant Leak (Blast Radius) Risk

Description: Bug exposes all fleets' drivers to one user, breaking tenant isolation.

Attack Vectors:

  • SQL injection bypassing tenant filters
  • API parameter manipulation
  • Authorization logic flaws

Technical & Process Mitigations:

ControlImplementationStatus
Row Level Security (RLS)Tenant ID enforced at PostgreSQL database levelImplemented
Middleware EnforcementApplication layer rejects queries without Tenant IDImplemented
Schema IsolationSeparate schema/encryption keys for "Mission Mode" fleetsPlanned (Phase 3)
Tenant ID ValidationAll API endpoints validate tenant contextImplemented
Automated TestingCross-tenant access tests in CI/CD pipelineImplemented

Residual Risk: Low (after mitigations)


T2: Device Compromise Risk

Description: Stolen unlocked phone accesses fleet data.

Attack Vectors:

  • Device theft
  • Malware on device
  • Rooted/jailbroken devices

Technical & Process Mitigations:

ControlImplementationStatus
Short SessionsAccess tokens expire in 15 minutes; refresh rotationImplemented
Step-Up AuthCritical actions (Accept/Start/Export) require FaceID/PINImplemented
MDM IntegrationBlock rooted/jailbroken devices; remote session revokePlanned (Phase 2)
Device BindingSession tied to device fingerprintImplemented
Remote Wipe CapabilityFleet admin can revoke device accessImplemented

Residual Risk: Medium (pending MDM integration)


T3: Insider Threat (Admin) Risk

Description: Support staff uses admin tools to spy on locations or access sensitive data.

Attack Vectors:

  • Unauthorized data browsing
  • Abuse of admin privileges
  • Data exfiltration

Technical & Process Mitigations:

ControlImplementationStatus
Just-In-Time AccessAdmins cannot browse; access requires Ticket ID + Time-boxPlanned (Phase 2)
Break-Glass Alerts"View all" triggers immediate alert + audit logImplemented
RedactionLocation/PII masked by default in admin viewsImplemented
Separation of DutiesDifferent roles for different admin functionsImplemented
Comprehensive LoggingAll admin actions logged to immutable audit trailImplemented
Periodic Access ReviewsQuarterly review of admin access rightsImplemented

Residual Risk: Medium (pending JIT access implementation)


T4: Samsara/API Key Leak Risk

Description: Fleet API key stolen, exposing entire fleet map and telematics data.

Attack Vectors:

  • Key in source code
  • Key in logs
  • Compromised integration service

Technical & Process Mitigations:

ControlImplementationStatus
Secrets ManagerKeys stored in AWS Secrets Manager; never in code/DB textImplemented
Least PrivilegeScoped keys (read-only, specific tags)Implemented
Kill SwitchAuto-revoke if anomaly detection sees usage spikesPlanned (Phase 2)
Key RotationQuarterly rotation of integration keysImplemented
Envelope EncryptionTenant keys encrypted with master keyImplemented

Residual Risk: Medium (pending anomaly detection)


T5: Data Permanence Risk

Description: Old GPS trails subpoenaed or leaked years later, enabling retrospective surveillance.

Attack Vectors:

  • Legal discovery
  • Data breach of historical archives
  • Regulatory overreach

Technical & Process Mitigations:

ControlImplementationStatus
Lifecycle Policy - LiveGPS data retained <24 hours in hot databaseImplemented
Lifecycle Policy - SummaryBilling data only in cold storage (no GPS)Implemented
Lifecycle Policy - IncidentEncrypted package with legal hold flagImplemented
Auto-DeletionGPS breadcrumbs purged after 48 hours unless disputedImplemented
Cryptographic ErasureKey destruction for expired dataPlanned (Phase 3)

Residual Risk: Low (after mitigations)


5. Risk Treatment Summary

5.1 Current Risk Posture

Risk LevelCountRisks
Critical0-
High2T1 (pending isolation), T3 (pending JIT)
Medium4P3, P4, T2, T4
Low3P1, P2, T5

5.2 Risk Treatment Decisions

RiskTreatmentRationale
P1MitigateMultiple layers of location protection implemented
P2MitigateIdentity verification controls in place
P3MitigatePhase 2 will add duress detection
P4MitigateTraining and verification codes implemented
T1MitigateRLS and middleware provide strong isolation
T2MitigateMDM integration planned for Phase 2
T3MitigateJIT access planned for Phase 2
T4MitigateAnomaly detection planned for Phase 2
T5MitigateRetention policies minimize data permanence

6. Risk Monitoring

6.1 Key Risk Indicators (KRIs)

KRIThresholdFrequencyOwner
Failed authentication attempts>100/hourReal-timeSecurity
Cross-tenant query attemptsAnyReal-timeSecurity
Admin break-glass usageAnyReal-timeSecurity
Route deviation alerts>10/dayDailySafety Ops
Data export volume>1000 recordsReal-timeSecurity

6.2 Risk Review Cadence

ActivityFrequencyParticipants
Risk register reviewQuarterlySecurity, Operations, Legal
Threat model updateSemi-annualSecurity, Development
Tabletop exerciseQuarterlyAll stakeholders
Penetration testingAnnual3PAO

DocumentRelationship
PLCY-RSK-001Risk assessment methodology
PLCY-SEC-001Security controls implementation
PLCY-INC-001Incident response procedures
PLCY-FED-004Remediation timeline
PLCY-FED-005NIST control mapping

8. Document Control

VersionDateAuthorChanges
1.0December 30, 2025Hop And Haul TeamInitial release

CONFIDENTIAL - Internal Use Only - Hop And Haul Policy Documentation