A Threat Catalog contains Threat Classes which can be used across multiple TARAs. I eases updating Feasibility Ratings throughout the entire TARA lifecycle. Threat Scenarios may refer to Threat Classes in order to derive the cause of compromise. But most importantly, Attack Steps refer to Threat Classes and derive the Threat Classes' Feasibility Rating.
itemis SECURE contains a predefined default Threat Catalog to help in kick-starting the threat modeling activities. This model contains the basic STRIDE Threat Classes and additional, customized sub-classes for a more detailed analysis. You may adapt the catalog contents to your needs.
Threat Classes can be defined or modified in the main editor window. A Threat Class contains the following properties:
AFL
(Attack Feasibility Level) is calculated automatically. The feasibility model can be customized in the related method configuration. Details can be found in chapter
Method Configuration
.
STRIDE is a model for identifying and categorizing cybersecurity related threats. Each defined threat category corresponds to one cybersecurity property. The cybersecurity properties are the basic CIA (Confidentiality, Integrity, Availability) and additional extended properties as Authenticity, Authorization and Non-repudiability.
|^.
Threat | Cybersecurity property | Threat manifestation |
---|---|---|
-. | ||
Spoofing | Authentication | Pretending to be another entity |
-. | ||
Tampering | Integrity | Unwanted modification of data |
-. | ||
Repudiation | Non-repudiation | Claiming that an action is done by another entity |
-. | ||
Information Disclosure | Confidentiality | Providing information to an entity normally not entitled to access |
-. | ||
Denial of Service | Availability | Preventing the normal provision of service |
-. | ||
Elevation of privileges | Authorization | Allowing an entity perform actions normally not entitled to |
The ASRG community Threat Catalog can be used for the whole life-cycle of a vehicle for:
A continuously maintained threat catalog can be beneficial for suppliers and service providers to extend their catalogs, but can be used by OEMs to tailor their own catalogs. Import and export is also possible via openXSAM format.
Threat catalog can be downloaded and imported into itemis SECURE. Further information on ASRG Threat Catalog can be found at https://garage.asrg.io/threat-catalog//.