Threat and risk analysis

A guideline for threat and risk assessment

The purpose of a threat analysis is to identify the assets within a system that require protection and to determine the types of threats they need to be safeguarded against.

The process includes the following steps:

  1. identify assets which needs protection
  2. imagine possible violation scenarios and describe the impact
  3. collect threats, identify exposure and exploitability
  4. calculate threat risk levels by combining likelihood and impact
  5. plan mitigtaion for threats with high risk

System modeling

Describe the system’s intended operational environment. Illustrate with a context block diagram. Identify system boundaries and create a list of assets, that may need protection.

Impact modeling

The goal is to collect system assets, and fill in the impact matrix: describe the impact of a security property violation.

Basic tenets (CIA) or protection goals are:

IMPACT CATEGORIES

IMPACT SCALE

PROTECTION GOALS

PROTECTED ASSETS AND SERVICES

Component description

List hardware and software components and describe potential violation scenarios for each protection goal and assign an impact rating.

Threat and risk list

Describe attack scenarios:

#documentation #cybersec