1. Microsoft Documentation: In the official description of the STRIDE model
Tampering is defined as the "modification of data." The scenario describes a modification to the data and code within the container image.
Source: Microsoft
"The STRIDE Threat Model
" Security Development Lifecycle. Section: "Tampering."
2. University Courseware: University security courses define tampering as a violation of integrity. Modifying a container image to include a trojan is a classic example of an integrity violation.
Source: University of Washington
Paul G. Allen School of Computer Science & Engineering. CSE 481D: Systems and Security
Lecture 2: Threat Modeling
Slide 15
"STRIDE
" defines Tampering as "Modification of data (integrity)."
3. Academic Publication: Foundational security literature and academic papers on threat modeling consistently link the unauthorized modification of assets to the threat of tampering.
Source: Shostack
A. (2008). Experiences Threat Modeling at Microsoft. MODSEC. Section 2.1
"STRIDE
" describes Tampering as "If an attacker can change my data
that's a violation of integrity." The container image is the data in this context.