{"id":7315,"date":"2024-02-05T21:56:45","date_gmt":"2024-02-05T20:56:45","guid":{"rendered":"https:\/\/lorit-consultancy.com\/en\/?p=7315"},"modified":"2024-02-28T23:37:45","modified_gmt":"2024-02-28T22:37:45","slug":"the-threat-of-threat-analysis","status":"publish","type":"post","link":"https:\/\/lorit-consultancy.com\/en\/2024\/02\/the-threat-of-threat-analysis\/","title":{"rendered":"Cybersecurity Part 1: The threat of threat analysis"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Finding a pragmatic assessment scheme<\/strong><\/h2>\n\n\n\n<p>We start 2024 with a new series of cybersecurity blogs. In this first part we look at pragmatic approaches to threat analysis. As most industries are nowadays very much focused on cybersecurity, we are all faced with the challenges of defining what an acceptable cybersecurity residual risk is. Nothing different there to other technical areas, we require a strategy for hardware, software, and usability, that have varying input criteria and output acceptance. For cybersecurity there are numerous sources of information defined in reference material and international standards as we covered in our blog <a href=\"https:\/\/lorit-consultancy.com\/en\/2020\/04\/iec-62304-part-4-cybersecurity-opening-the-flood-gates\/\">IEC 62304 \u2013 Part 4: Cybersecurity opening the flood gates<\/a>. How do you approach the topic of a pragmatic strategy for defining an acceptable cybersecurity risk?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">NIST SP 800-30<\/h3>\n\n\n\n<p>The center piece of cybersecurity threat strategies in both <strong><a href=\"https:\/\/lorit-consultancy.com\/en\/standards\/automotive\/isosae21434\/\">automotive (ISO SAE 21434)<\/a><\/strong> and the <strong><a href=\"https:\/\/lorit-consultancy.com\/en\/standards\/medical-devices\/medical-device-cybersecurity\/\">medical device industry (AAMI TIR 57)<\/a><\/strong>, is the National Institute of Standards and Technology (NIST) SP 800-30. The approach is best illustrated diagrammatically from AAMI TIR 57.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"642\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-1920x642.png\" alt=\"\" class=\"wp-image-7316\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-1920x642.png 1920w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-1024x342.png 1024w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-768x257.png 768w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-1536x513.png 1536w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-risk-assessmnent-diagram-2048x685.png 2048w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><figcaption class=\"wp-element-caption\">Fig. 1. Generic cybersecurity risk assessment<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The process generating a likelihood and impact level for threats, the combination of which yielding a risk outcome. ISO SAE 21434, taking a similar approach.<\/p>\n\n\n\n<p>The factors that feed into this risk outcome are, however, sub-divided into many categories. In NIST SP 800-30, there are two key routes to reach the final risk score, based on adversarial or non-adversarial threats, the former having the greater number of factors. In figure 2 we have listed the 13 categories each having its own column and the qualitative risk level scale (a semi-quantitative scoring system is also defined in the document). <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69e62e3dde42f&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69e62e3dde42f\" class=\"aligncenter size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"578\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-1920x578.png\" alt=\"\" class=\"wp-image-7320\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-1920x578.png 1920w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-1024x308.png 1024w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-768x231.png 768w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-1536x462.png 1536w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Adversarial-risk-table-2048x616.png 2048w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><figcaption class=\"wp-element-caption\">Fig. 2. Adversarial risk table<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Some customers use this approach to define the risk score as illustrated in green in the right-hand column, but for adversarial with 10 columns contributing to the overall risk level, each with 5 or 6 potential ratings, this leads to a very complex assessment of cybersecurity risk acceptance. Where weighting of the result is required, based on specific input criteria is one of the challenges. However, it brings flexibility in the process that does not necessarily come from more pragmatic approaches.<\/p>\n\n\n\n<p>The NIST series of standards brings many practical tips and guidance in all sorts of technological areas, hence an invaluable reference source.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pragmatic Approaches to Assessing Cybersecurity Risk<\/h3>\n\n\n\n<p>With the release of version 4.0 of the Common Vulnerability Scoring System (CVSS) last year, we have an updated version of a well tried and tested open framework tool. Using such a tool certainly makes life easier for those defining the cybersecurity risk strategy and ultimately the acceptable residual risk. There has been criticism of the CVSS metrics over the years around suitability to address modern industry challenges, but V4.0 has improved many aspects of the scoring system.<\/p>\n\n\n\n<p>The main advantage to using such a tool, and there are many others such as Common Weakness Enumeration (CWE), is that a scoring system and acceptance threshold does not need to be devised. The tools are readily available online and hence save a significant amount of effort when generating a cybersecurity risk management plan, as the tool defines the acceptance level.<\/p>\n\n\n\n<p>That CVSS is used globally by a huge number of organizations and is extremely useful in providing a standardized approach to analyzing threats.<\/p>\n\n\n<\/div><\/div><\/div><div class=\"content_section blue_bg blog_trenner_section\"><div class=\"row align-center medium-align-spaced\"><div class=\"columns border_solid_square post_thumbnail small-10 medium-5 large-3\"><div  data-ratio=\"1.5\" class=\"\"><picture><source media=\"(min-width:1024px)\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-1280x1920.webp\" width=\"1280\" height=\"1920\" type=\"image\/webp\" ><source media=\"(min-width:640px)\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-683x1024.webp\" width=\"683\" height=\"1024\" type=\"image\/webp\" ><img decoding=\"async\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-640x640.webp\" alt=\"Lorit lead consultant and owner, Alastair Walker\" loading=\"lazy\" width=\"640\" height=\"640\" type=\"image\/webp\" ><\/picture><svg version=\"1.1\" id=\"svg_border_solid_square\" class=\"svg_border_solid_square\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 337 411.2\" style=\"enable-background:new 0 0 337 411.2;\" xml:space=\"preserve\">\n<polygon id=\"bg\" class=\"bg\" points=\"65,332.6 337,332.6 336.9,411.2 3.6,411.2 \"\/>\n<path id=\"border\" class=\"border\" d=\"M334,329.6V5.9c0-1.6-1.3-2.9-2.9-2.9l0,0L5.9,3.1C4.3,3.1,3,4.3,3,6v400.8c0,1.6,0.8,1.9,1.8,0.6\n\tl59.6-74.7l266.6-0.1C332.7,332.5,333.9,331.2,334,329.6z\"\/>\n<\/svg><\/div><div class=\"image_bottom_content\"><\/div><\/div><div class=\"columns post_content small-12 medium-6 large-7\"><p>Take a closer look at cybersecurity risk assessment strategies in our <a href=\"https:\/\/lorit-consultancy.com\/en\/standards\/automotive\/isosae21434\/\">Automotive Cybersecurity<\/a> or <a href=\"https:\/\/lorit-consultancy.com\/en\/standards\/medical-devices\/medical-device-cybersecurity\/\">Medical Device Cybersecurity<\/a> course. <a href=\"https:\/\/lorit-consultancy.com\/en\/training\/#trainings\">Schedule<\/a> your next training with us or send a direct inquiry at <a href=\"mailto:info@lorit-consultancy.com\">info@lorit-consultancy.com<\/a>.<\/p>\n<a class=\"add_logo_border\" target=\"_blank\" href=\"https:\/\/lorit-consultancy.com\/en\/training\/#trainings\"><span>Learn more<\/span><\/a><\/div><\/div><\/div><\/div><div class=\"single_content_section single_post_section content_section\"><div class=\"row\"><div class=\"post_content columns\">\n\n\n\n<h3 class=\"wp-block-heading\">Post-market strategies<\/h3>\n\n\n\n<p>One key aspect with a threat analysis is that the activity does not end at product release and continues throughout the expected service life of the product. Regardless of the strategy an approach should be used that enables teams or individuals to quickly reassess new vulnerabilities identified e.g. in Software of Unknown Provenance (SOUP) as it is referred to in the medical device sector or Commercial of the Shelf Software (COTS) in other industries. One area still that is finding its feet in many organizations is the post-market cybersecurity process. An individual maybe assigned the task of monitoring the cybersecurity landscape and identifying new vulnerabilities. These then being quickly assessed for their risk score and hence the decision on the next course of action. CVSS or similar tools lend themselves well to support this process stage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Ultimately how teams approach that analysis should be down to the industry and technology used with a key focus on the assets in the product. Developing risk management strategies in any industry can be challenging and it should ensure that in the world of cybersecurity threats shall not be missed but at the same time the process is not overly complex. Well-established tools such as CVSS help in this respect as they reduce the burden of defining acceptability. This thought should be balanced up with the flexibility of the tool as it may not always tick the boxes for your given approach, hence where the NIST SP 800-30 strategy may come in handy.<\/p>\n\n\n\n<p>In our next blog of the series we shall look at the usage of DFDs (data flow diagrams) as a starting point for threat modelling. <\/p>\n\n\n\n<p>By <a href=\"https:\/\/lorit-consultancy.com\/en\/about-us\/#alastair-walker\">Alastair Walker<\/a>, Consultant &amp; Owner<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Finding a pragmatic assessment scheme We start 2024 with a new series of cybersecurity blogs. In this first part we look at pragmatic approaches to threat analysis. As most industries are nowadays very much focused on cybersecurity, we are all faced with the challenges of defining what an acceptable cybersecurity residual risk is. Nothing different [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":7323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,92,93,9],"tags":[],"class_list":["post-7315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-functional-safety","category-medical-devices","category-automotive","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/posts\/7315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/comments?post=7315"}],"version-history":[{"count":13,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/posts\/7315\/revisions"}],"predecessor-version":[{"id":7415,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/posts\/7315\/revisions\/7415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/media\/7323"}],"wp:attachment":[{"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/media?parent=7315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/categories?post=7315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lorit-consultancy.com\/en\/wp-json\/wp\/v2\/tags?post=7315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}